Classified Data Handling By Francesco Scarimbolo.

Slides:



Advertisements
Similar presentations
Annual Security Refresher Briefing Note: All classified markings contained within this presentation are for training purposes.
Advertisements

September 22, 2010 Updates New Hire/Rehire Documents.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
Section Six: Foreign Ownership, Control, or Influence (FOCI)
NISPOM Update for JSAC Workshop
Section One: Classification System Overview Note: All classified markings contained within this presentation are for training purposes only.
HOW TO PREPARE FOR A NATIONAL SECURITY INFORMATION INSPECTION 1 SECRET Updated 09/27/11 Security is Everyone's Responsibility – See Something, Say Something!
UNCLASSIFIED1 COMSEC BRIEFING Having been selected to perform duties which will require access to classified COMSEC information, it is essential you be.
The Department of Defense Intelligence Oversight Program
10/27/20111 Initial Security Indoctrination DoD. 10/27/20112 The protection of Government assets, people and property, both classified and controlled.
Section Four: Employee and Visitor Access Controls Note: All classified markings contained within this presentation are for training purposes only.
Coping with Electronic Records Setting Standards for Private Sector E-records Retention.
Developing a Records & Information Retention & Disposition Program:
18- 1 © 2006 The McGraw-Hill Companies, Inc., All Rights Reserved. Chapter 18 Integrated Audits of Internal Control (For Public Companies Under Sarbanes-Oxley.
PIV-I Issuing Procedures for Applicants (New Employees) v1.1.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Thank you for joining us today. Please ensure you call into the conference call number at or if your outside the U.S. The pass.
CUI Statistical: Collaborative Efforts of Federal Statistical Agencies Eve Powell-Griner National Center for Health Statistics.
Security Policies University of Sunderland CSEM02 Harry R. Erwin, PhD.
1 Preparing a System Security Plan. 2 Overview Define a Security Plan Pitfalls to avoid Required Documents Contents of the SSP The profile Certification.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
OFFICE OF THE UNDER SECRETARY OF DEFENSE FOR INTELLIGENCE CI & SECURITY DIRECTORATE, DDI(I&S) Valerie Heil March 20, 2015 UNCLASSIFIED Industrial Security.
HIPAA PRIVACY AND SECURITY AWARENESS.
9/15/20151 Initial Security Indoctrination. 9/15/20152 Agenda Physical Security Personnel Security Information Security Information Assurance Public Release.
Using NIMA Limited Distribution Data & Products Many of NIMA’s data and products are Unclassified Limited Distribution (LIMDIS). These materials are used.
PERFORMING ON CLASSIFIED CONTRACTS.
OFFICE OF THE UNDER SECRETARY OF DEFENSE FOR INTELLIGENCE CI & SECURITY DIRECTORATE, DDI(I&S) Valerie Heil August 12, 2014 UNCLASSIFIED NISPOM Update.
ISP Preparation Series 1- Chapter 3. CHAPTER 3: SECURITY TRAINING AND BRIEFING SECTION 1: SECURITY TRAINING General (3-100) - Provide all with training.
Theme: classification & distribution of government control of FEA.
MARKING CLASSIFIED MATERIAL
TSP 301-D , Phase II, OCS TSP 301-D , Phase II, OCS Protect Classified Information.
NATIONAL SECURITY INFORMATION ANNUAL CONTAINER INSPECTION
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Immigration and Hiring
1 Personnel Security 2007 Data Protection Seminar TMA Privacy Office HEALTH AFFAIRS TRICARE Management Activity.
Privacy and Confidentiality. Definitions n Privacy - having control over the extent, timing, and circumstances of sharing oneself (physically, behaviorally,
Developing Plans and Procedures
The right item, right place, right time. DLA Privacy Act Code of Fair Information Principles.
ANTI-MONEY LAUNDERING COMPLIANCE PROGRAM FCM TRAINING
Indoctrination Briefing 1SG Patrick Cullen KANSAS ARMY NATIONAL GUARD.
Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.
Drs. Krishna and Webb October 31,  6  6.1  6.2  6.3  6.4  7.1, 7.2, 7.3, 7.4  7  7.3  7.4  LUNCH ANSI Training 2013: Webb/Krishna.
SECURITY BRIEFING A threat awareness briefing A defensive security briefing An overview of the security classification system Employee reporting obligations.
Session 8 Confidentiality and disclosure. 1 Contents Part 1: Introduction Part 2: The duty of confidentiality Part 3: The duty of disclosure Part 4: Confidentiality.
SCHOOLS FINANCE OFFICERS MEETINGS Records Management, “Paper-Lite” Environments and Procedures when a school closes Elizabeth Barber.
ISO/IEC 27001:2013 Annex A.8 Asset management
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
Managing a “Data Spill”
2009 Legislative Changes Concerning Protective Orders and Firearms Effective October 1, 2009 FVC--1.
CLASSIFICATION. Classification Marking requirements Test CONTENTS.
WISHA, 7/23/04 Employee Medical and Exposure Records Chapter WAC Employer Responsibilities.
How To Conduct An Administrative Inquiry (AI) Due To A Security Violation
Information Security. Your responsibilities as a Government of Canada employee.
For Official Use Only (FOUO) and Similar Designations NPS Security Office
SAFEGUARDING CLASSIFIED INFORMATION.
HIPAA Training Workshop #3 Individual Rights Kaye L. Rankin Rankin Healthcare Consultants, Inc.
Nassau Association of School Technologists
Managing a Security Container
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA)
Wyoming Statutes §§ through
Providing Access to Your Data: Handling sensitive data
NISPOM Basics What You Need to Know!
Obligations of Educational Agencies: Parents’ Bill of Rights
Domain 2 – Asset Security
Office of the President of the Philippines Memorandum Circular No. 78
Derivative Classification Overview
AN OVERVIEW OF THE INDUSTRIAL SECURITY PROGRAM
Export Controls – Export Provisions in Research Agreements
Presentation transcript:

Classified Data Handling By Francesco Scarimbolo

Outline  Purpose & Overall Authority  Security Clearances - Authorization  Security Training & Briefings  Classification & Marking  Safeguarding Classified Information  Automated Access Control System

Purpose & Overall Authority  Requirements, Restrictions and Safeguards to prevention unauthorized disclosure (Information Assurance Policy)  Controlled Disclosure from Government to Contractors  The President appointed Secretary of Defense – Executive Agent  The Director, Information Security Oversight Office Implements, Monitors and issues directives  Overall Authority – National Industrial Security Program (NISP) Executive Order 12829, January Executive Order 12829, January Executive Order 12958, April – Classified National Security InformationExecutive Order 12958, April – Classified National Security Information

Security Clearances - Authorization  Facility Clearances  Personal Clearances

Facility Clearances - (FLC) Eligibility Requirements  Must need access to classified information for legitimate U.S. Gov. or foreign requirement  Must exist under the laws of any of the 50 states, in D.C., or Puerto Rico, and be located within the U.S. and its territorial areas or possessions  Must have a reputation for integrity and lawful conduct in business practices  Must not be in under foreign ownership, control, or influence, to the extent that granting FCL would be inconsistent with national interest

Facility Clearances - (FLC) Eligible Requirements (Continued)  Facility Security Officer (FSO) must be a U.S. Citizen employee  Senior Management and the FSO must have a Personal Clearance (PLC) = FLC

Personal Clearances  Single Scope Background Investigation (SSBI) – Required for Top Secret PCL  National Agency Check with Local Check and Credit Check – Required for Secret and Confidential PCL  Polygraph – Agency Dependent, coverage expanded upon surfacing concerns in effort to resolve the issues  Reciprocity – Previously granted PLC that meets or exceeds current clearance required provides basis without for further investigation unless significant information wasn’t known

Personal Clearances (Continued)  Contractor Based Clearances – Not permitted after January 1, 2004  Proof Of Citizenship Birth Certificate for US bornBirth Certificate for US born Certificate of NaturalizationCertificate of Naturalization Certificate of Citizenship by INSCertificate of Citizenship by INS Birth abroad of a Citizen of USBirth abroad of a Citizen of US Passport, Current or ExpiredPassport, Current or Expired

Converting PLC to Industrial Clearance  Investigation meets standards for equivalent clearance  No More Than 24 Months pass since termination of last investigation  No evidence of adverse information exists since last investigation  Q access authorization can be converted to a Top Secret PLC  L access authorization can be converted to a Secret PLC

Security Training & Briefings  FSO Training – Should be completed 1 year of appointment to position of FSO  Classified Information Nondisclosure Agreement – SF 312  Initial Security Briefings Threat Awareness BriefingThreat Awareness Briefing Defensive Security BriefingDefensive Security Briefing Overview of security classification systemOverview of security classification system Employee reporting obligations and requirementsEmployee reporting obligations and requirements Security procedures and duties applicable to job functionSecurity procedures and duties applicable to job function

Classification & Marking  Top Secret, Secret, Confidential, Unclassified  Terms such as “Official Use only” or “Administratively Confidential” are not applicable to national security information  Original Classification Falls within categories set by Executive Order 12958Falls within categories set by Executive Order May cause damage to National Security by itself or with other information – Classification cannot be given otherwiseMay cause damage to National Security by itself or with other information – Classification cannot be given otherwise Must State Reason on front pageMust State Reason on front page Must also set date for duration of classification if possible or marked with an exemption category of “X”Must also set date for duration of classification if possible or marked with an exemption category of “X” Viewer must have completed SF 312 and have “Need to Know”Viewer must have completed SF 312 and have “Need to Know” Apply the markings as document is being createdApply the markings as document is being created Preliminary documents must be handled as destroyed as if it had a classificationPreliminary documents must be handled as destroyed as if it had a classification

Derivative Classification Responsibilities  Manager at operational level where information is being produced or assembled determines classification  Employees are responsible for marking or challenging the classification when copying, extracting, reproducing, or translating a portion of or the totality of the document

Challenging the Classification  Information is classified improperly or unnecessarily  Current security considerations justify downgrading or upgrading classification Declassification is not automatically an approval for public disclosureDeclassification is not automatically an approval for public disclosure  Security classification guidance is improper or inadequate

Contractor Developed Information  Similar information previously identified as classified retain the associated level  Novel information the contractor believes should be classified, the contractor submits it to the appropriate agency that would have interest in it for classification determination

Identification & Overall Markings  Name & Address of Facility responsible for preparation  Date of Preparation  Overall marking should be on the front cover & back cover (if applicable), top and bottom  Markings are done by stamped, printed, etched, written engraved, painted or affixed by a adhesive tag (except on documents)

Page, Component, & Portion Marking  The top and bottom of the page is marked with the highest classification on that page  Components such as annex or an appendix can be given a one time classification marking of UNCLASSIFIED if it holds true for the entire component  Each portion, such as a paragraph shall be given the highest classification marking that exists within the portion with either a (TS) for Top Secret, (S) for Secret, (C) for Confidential and (U) for Unclassified

Portion Marking (Continued)  Foreign government information is marked with abbreviation for that nation and appropriate classification (UK – C)  NATO documents receive a mark of “NATO” or “COSMIC” with the appropriate classification (NATO – TS), (COSMIC – S)  Illustrations get marked with no abbreviations directly next to the illustration  Impractical marking and all portions are at same level, the document can have an overall classification as long as there is a full explanation included

Marking for Derivatively Classified Documents  Source of classification and declassification instructions need to be marked  The marking of “multiple sources” is acceptable  “Declassify on” may have the markings of the date to declassify, an X for unknown declassification date or “Original Agency’s Determination Required”

“Downgrade To” and “Reason Classified”  The classification to downgrade to upon a certain date can be given in advance and is marked downgraded subsequently on storage containers  The reason of Classification may sometimes be necessary upon original Classification

Marking Special Types of Material  Files, Folders or Groups of Document – Marked with highest classification when not stored  Messages – Electronically Transmitted – Need “Derived From” & some agencies require “Classified By” & “Reason Classified”  Microfilms – Unaided to the eye markings are necessary on container, Images shall also contain markings of classification so its properly disclosed upon printing  Translations – Only difference, U.S. must be indicated as country of origin

Marking Transmittal Documents  Classified documents are noted with highest classification information  Unclassified documents that transmit classified data as an attachment get marked as “Unclassified when Separated from Classified Enclosures”  Classified Documents get marked similarly as follows “Secret when Separated from Enclosures”

Upgrading and Automatic Downgrading  Appropriately upgraded material removes all indication of previous classification  Authority & date of upgrade is marked  Notification to all who obtained information is required for further correct dissemination  Automatic downgrading (such as based on date) remove all indication of previous classification with new classification  No further dissemination is necessary when it is automatic

Miscellaneous Actions (Improperly handled Information)  Determine who has it (their clearance) and should they have it (the information’s discovered classification)  Determine who has control of information  Determine whether control has been lost  If recipients have the correct clearance – issue notices promptly of classified information  If not, report incident to Cognizant Security Agency (CSA) DoD – Incident Response for National Security Matters

Safeguarding Classified Information  Safeguarding Oral Communication – prohibited: unsecured phone lines, public conversations, any other interception by unauthorized personnel  End of Day Security Checks – At the close of each day – ensure all classified data is securely storedAt the close of each day – ensure all classified data is securely stored At the end of each shift – ensure all classified data is securely stored except when facility is in 24 hour contiguous operationAt the end of each shift – ensure all classified data is securely stored except when facility is in 24 hour contiguous operation

Perimeter Control (Physical Security)  Inspections must be done in random nature guided by legal advice  All individuals are subject to inspection Must be done within facility groundsMust be done within facility grounds Inspections are not necessary for highly personal – purse, wallet, clothing etc.Inspections are not necessary for highly personal – purse, wallet, clothing etc.

External Receipt and Dispatch Records  The date of the material  The date of receipt or dispatch  The classification  An Unclassified description  Identify the activity that resulted in the retrieval of the material or to which the material was dispatched  Receipt and dispatch records are kept for 2 years

Receiving Classified Material  Top Secret & Secret Classified data needs signature receipt  Confidential doesn’t, but if signature is required, it must be given  If tampering is detected (TS, S) – should be reported promptly to sender

Generation of Classified Material  Classified working papers Dated when createdDated when created Marked with classificationMarked with classification Marked with “working papers”Marked with “working papers” Destroyed when no longer neededDestroyed when no longer needed Classified as finished documents whenClassified as finished documents when  Transmitted out of facility  Retained for more than 180 days  Contractor produced Top Secret material – Record must be produced Completed DocumentCompleted Document Retained for 30 daysRetained for 30 days Transmitted Outside facilityTransmitted Outside facility

General Services Administration (GSA)  Top Secret material – Stored in GSA approved security container, approved vault or approved closed area  Secret Material – Stored similar to Top Secret without the GSA approval In a safe, steel file cabinet, automatic locking, 4 sides welded, riveted, or bolted to indicate visible evidence of tampering (Until October 1, 2012)In a safe, steel file cabinet, automatic locking, 4 sides welded, riveted, or bolted to indicate visible evidence of tampering (Until October 1, 2012)

Restricted Areas  Necessary impractical or impossible to store otherwise due to unusual characteristic  Clearly defined perimeter – No barriers necessary  Personnel within the area are responsible for challenging all individuals who may lack proper authority

Intrusion Detection Systems  Guard Patrol – 2 hours for Top Secret Material, 4 hours for Secret  GSA approved containers need no supplemental security if in an area deemed “with security-in-depth”

Protection of Combinations  Record of Names with combinations maintained  All containers are locked if not under the direct supervision of an authorized person  Combination is dependent upon classification of contents, upgrade in classification destroys previous combinations

Changing Combinations  Initial use of container  Termination of employee or clearance is withdrawn, suspended or revoked  Compromise of security container Unlocked, UnattendedUnlocked, Unattended

Supervision of Keys  Key and lock custodian is appointed  Key and lock control register center  Key and lock audit every month  Keys inventoried with every change of custody  Keys and spare locks protected as classified  Locks and keys rotated at least once a year  Master Keys prohibited

Automated Access Control System  Manufactures must meet these requirements Chances of unauthorized access are no more than one in 10,000Chances of unauthorized access are no more than one in 10,000 Chances of authorized access being rejected in no more than 1 in 1,000Chances of authorized access being rejected in no more than 1 in 1,000 Locations of access and there storage must be protectedLocations of access and there storage must be protected Tamper alarm protection is mandatory for Top Secret Closed AreaTamper alarm protection is mandatory for Top Secret Closed Area

Automated Access Control System Continued  Personal Identification Identification can be obtained by ID with PIN badge or personal identityIdentification can be obtained by ID with PIN badge or personal identity  ID Badge – must use embedded sensors, integrated circuits magnetic stripes etc  Fingerprint  Hand geometry  Handwriting  Retina  Voice Recognition

Summary  Purpose & Overall Authority  Security Clearances - Authorization  Security Training & Briefings  Classification & Marking  Safeguarding Classified Information  Automated Access Control System