Security Education Briefing

Slides:



Advertisements
Similar presentations
FREEDOM OF INFORMATION EXECUTIVE BRIEFING PART II.
Advertisements

FOIA Exemption 1 & E.O Classified National Security Information
Merlin RAMCo Inc Initial Security Education.
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
Identification and Disposition of Official University Records University of Texas at Arlington Records Management.
Privacy and Information Security Training ( ) VUMC Privacy Website
1. As a Florida KidCare community partner families entrust you to not only help them navigate the Florida KidCare system but to keep the information they.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
HIPAA Privacy Training Your Name Here. © 2004 MHM Resources Inc.2 HIPAA Background Health Insurance Portability and Accountability Act of 1996.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Security Solutions Group
Section One: Classification System Overview Note: All classified markings contained within this presentation are for training purposes only.
Office of Security Security Education Refresher Briefing
1 DEFENSE LOGISTICS AGENCY AMERICA’S COMBAT LOGISTICS SUPPORT AGENCY DEFENSE LOGISTICS AGENCY AMERICA’S COMBAT LOGISTICS SUPPORT AGENCY WARFIGHTER SUPPORT.
Espionage Indicators Updated 08/21/13 U.S. Department of Commerce Office Of Security (OSY) Security is Everyone's Responsibility 1 Briefing.
Critical Data Management Indiana University HR Summit April 24, 2014.
SAFEGUARDING DHS CLIENT DATA PART 2 SAFEGUARDING PHI AND HIPAA Safeguards must: Protect PHI from accidental or intentional unauthorized use/disclosure.
HOW TO PREPARE FOR A NATIONAL SECURITY INFORMATION INSPECTION 1 SECRET Updated 09/27/11 Security is Everyone's Responsibility – See Something, Say Something!
Section Four: Employee and Visitor Access Controls Note: All classified markings contained within this presentation are for training purposes only.
FERPA The Family Educational Rights and Privacy Act.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Section Three: Protection of Controlled Unclassified Information Note: All classified markings contained within this.
Virginia Army National Guard Personnel Security
HIPAA Privacy & Security EVMS Health Services 2004 Training.
Unclassified Controlled Cryptographic Item Access Briefing
Section Eight: Communication Security (COMSEC) Note: All classified markings contained within this presentation are for.
Section Ten: Security Violations and Deviations Note: All classified markings contained within this presentation are for training purposes only.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
Section Two: Classified Safeguarding and Handling Note: All classified markings contained within this presentation are for training purposes only.
Defensive Travel Briefing Cheryl L. Wieser Regional Security Officer US Department of Commerce (206) (206) Fax Updated 10/03/11 Security.
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
HQ Expectations of DOE Site IRBs Reporting Unanticipated Problems and Review/Approval of Projects that Use Personally Identifiable Information Libby White.
Section Five: Security Inspections and Reviews Note: All classified markings contained within this presentation are for training purposes only.
ISP Preparation Series 1- Chapter 3. CHAPTER 3: SECURITY TRAINING AND BRIEFING SECTION 1: SECURITY TRAINING General (3-100) - Provide all with training.
MARKING CLASSIFIED MATERIAL
TSP 301-D , Phase II, OCS TSP 301-D , Phase II, OCS Protect Classified Information.
NATIONAL SECURITY INFORMATION ANNUAL CONTAINER INSPECTION
Next ETCH Confidentiality and HIPAA Annual Review What you need to know. The Privacy Rule 1.
THREAT AWARENESS. 1 What is “Threat”? Adversary with intent and capability to act against friendly interests. Other countries Business competitors Criminals.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
Indoctrination Briefing 1SG Patrick Cullen KANSAS ARMY NATIONAL GUARD.
1 st Choice Document Destruction th Avenue, Milaca, Minnesota Office: Cell:
Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
SECURITY BRIEFING A threat awareness briefing A defensive security briefing An overview of the security classification system Employee reporting obligations.
Sensitive But Unclassified (SBU) Information
ISO/IEC 27001:2013 Annex A.8 Asset management
CLASSIFICATION. Classification Marking requirements Test CONTENTS.
Information Security. Your responsibilities as a Government of Canada employee.
Information Management and the Departing Employee.
For Official Use Only (FOUO) and Similar Designations NPS Security Office
SAFEGUARDING CLASSIFIED INFORMATION.
Declassifying the Foreign Relations Series Bringing the Official Record to light.
Security Education Refresher Briefing. Objectives Annual requirement Satisfactory knowledge of processing, handling and safeguarding of Classified National.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Managing a Security Container
Mysale Information Classification 101
Providing Access to Your Data: Handling sensitive data
Office of the President of the Philippines Memorandum Circular No. 78
Derivative Classification Overview
Mysale Information Classification 101
Annual Security Briefing
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
The Health Insurance Portability and Accountability Act
HQ Expectations of DOE Site IRBs
Handling Information Securely
Presentation transcript:

Security Education Briefing Department of Commerce Office of Security Western Region Security Office Security Education Briefing Updated 10/01/01

Security Clearance A security clearance is a determination of trust, which makes you eligible for access to classified information A security clearance is not permanent; it expires when you leave your position

Requirements for holding a security clearance Attend a briefing designed to teach you proper procedures for handling and protecting classified information. Refresher briefing every year Sign a Non-Disclosure Agreement (SF-312)

SF-312 Non-Disclosure Agreement Legally binding agreement between US Government and you. It is a life long agreement Understanding of damage which could occur from unauthorized disclosure

SF-312 Non-Disclosure Agreement Agree to pre-publication review Classified information is US GOVERNMENT PROPERTY

SF-312 and Penalties Should you improperly disclose classified: Under E.O. 12958, Performance Plan: Performance Appraisal/Awards Reprimand/Suspension (Without Pay) Loss of monetary gains made from improper disclosure

SF-312 and Penalties Loss of security clearance Termination of employment Criminal prosecution (prison/fines)

National Security Information Official information which relates to the national defense or foreign relations of the United States, which has been deemed requiring protection from unauthorized disclosure.

National Security Information There are levels of classification to describe national security information. Unauthorized disclosure of this information could cause damage to our nation’s security CONFIDENTIAL- Damage SECRET- Serious Damage TOP SECRET- Exceptionally Grave Damage

The Threat Why must we protect classified information? Economic espionage is on the rise Intelligence needs are economic as well as military Present/former adversaries and our allies are conducting intelligence activities against us.

“Countries don’t have friends, they have interests” Charles deGaulle

The Threat Don’t forget the insider! Counterintelligence is your responsibility Report suspicious activities to your Security Officer immediately

Classification of Information How does information become classified? Original Classification: initial determination that information, in the interests of national security, needs protection Derivative Classification: incorporating, paraphrasing, restating, or generating in new form, information that is already classified

National Security Information Classified information must fall under one of the following categories: Military plans, weapons systems or operations Foreign government information Intelligence activities, sources or methods to include cryptology

National Security Information Foreign relations or activities of the U.S. Scientific, technological, or economic matters relating to national security Programs for safeguarding nuclear materials or facilities Vulnerabilities or capabilities of systems, installations, projects, or plans

Reasons to NOT classify information To conceal violation of law, inefficiency, or administrative error To prevent embarrassment to a person, organization, or agency

Reasons to NOT classify information To restrain competition To prevent or delay the release of information that does not require protection in the interests of national security

Declassification Documents are marked for automatic declassification within ten years unless: The document is exempt from automatic declassification at 10 years under E.O. 12958. Additional reviews at 10 and 5 year intervals All classified documents are declassified at 25 years (with a few exceptions). No document series at Commerce are exempt

Marking Documents Title and/or subject should be marked Paragraphs and sub-paragraph must be marked Illustrations and pictures also

Marking Documents Overall classification is determined by the highest portion marking Mark classification on top/bottom of every page

Marking Documents The bottom of the document should have the following: Classified by: Jack Smith, Director, OSY Reason for Classification: 1.5 (d) E.O. 12958 Declassify on: 1 June 2007 or x1-8 (exempt)

Derivative Classification When incorporating classified information, be sure to: Observe and respect original markings. Carry forward all classification markings. Carry forward declassification instructions (using the most stringent) List all sources

Derivative Marking If derivatively classifying a document, the bottom left corner of the document should have: Derived by: Sarah Smith, DOC, OSY Derived from: CIA Terrorism Report, 3/97 Declassify on: 3/1/07 (or x1-8)

Derivative Marking When derivatively classifying a document using multiple sources, either list each source or list “multiple sources” and maintain a list of the sources on file copy Always use the most stringent declassification date If source is marked OADR, list “Source marked OADR” and list date of document

Accountability of Classified Required for Secret and Top Secret CD481 (will be switched to a computer database)

Accountability of Classified Identify who, what, when, where, how Annual inventory is required! Use cover sheets and classified receipts!

Storage of Material Sensitive, FOUO, Privacy Act, proprietary information must be stored under one level of lock (desk, drawer, file cabinet) Classified information must be stored in a GSA approved security container (safe) Note that each safe should have a SF700, SF702 and open/closed sign

Combinations Security container combinations are classified at the level of information in the safe Should always be memorized; never write them down Don’t share with anyone who does not need to know it

Combinations Change your combination when: the security container is found open and unattended someone who has the combination leaves if you feel the combination has been compromised when the security container is taken out of service

You are responsible for allowing proper access to your material!! Control and Access You are responsible for protecting and controlling classified information You must limit access to authorized persons by verifying: Identification Clearance Need to know You are responsible for allowing proper access to your material!!

LEAKS Most leaks result from: Casual conversations Don’t discuss classified outside the office! Open Sources Publication does not infer declassification!

Transmission: Telephone/Fax Always use a STU III phone or fax Standard and cell phones are not secure Is there a secure phone in your office? If not, where is the nearest one?

Transmission: Double Wrapping Must be done to prepare for hand carry, courier, or US Postal Affords 2 layers of protection Protects against damage Use opaque envelopes Don’t forget a receipt

Transmission Outer Wrapping: Full address of receiver Full return address NO CLASSIFICATION MARKINGS Recommend that you put “If undeliverable, return to sender”

Transmission Inner Wrapping: full address Return address Classification markings top/bottom and front/back Information and receipt placed inside

Transmission To send Top Secret: Secret and Confidential Call your security officer Secret and Confidential Hand-carry Approved courier US Postal Service

Transmission Hand Carry: No overnight stay without proper storage No aircraft overseas Courier: check authorization US Postal: Secret: Registered Confidential: Certified, Express or First class

Computer Security Do not process classified unless: You have contacted your information technology rep Your computer has a removable hard drive

Computer Security Do not process classified unless: It is in a stand-alone configuration (no modem or network unless it has been properly accredited)

Reproduction Various ways to reproduce classified information: Paper (photocopier) Electronically Other means (video and/or cassettes) Use approved equipment for that purpose Account for your copies!

Reproduction Approved photocopiers: Are in controlled environments Do not have memories Are sanitized after classified copies are made Are serviced by cleared personnel or service personnel are monitored while repairs are made Contact your security officer if your copier jams while working with classified

DESTRUCTION Classified material destruction Approved methods: Burning (at an approved facility) Shredding (using an approved cross cut shredder) Use small classified waste “burn bags” Other types (FOUO, Privacy Act, SBU, etc.): SBU should be shredded using cross cut shredder. At a minimum tear up other types

Overseas Travel Contact your security officer for a briefing before you go Do not bring classified Limit sensitive information Notify U.S. Embassy of your visit

Reporting Requirements All employees must report contact with a foreign national who: Requests classified information Wants more information than they need to know Acts suspiciously Report incidents to your security officer immediately

End of Day Security Checks All security containers windows/doors desk tops for classified Complete the SF 701 “Activity Security Checklist.” The office manager is responsible for the implementation of the SF 701

Your Security Officer Your security officer is there to help you! Report to your security officer: Security violations Loss or compromise of classified information Security incidents or problems

Western Region Security Office Staff Regional Security Officer: Cheryl Wieser Asst. Regional Security Officer: Kathy Newberry Regional Security Assistant: Joe Lubin

When You Depart Commerce If you are leaving the Department you must: Turn all classified material over to your classified control point Contact your Security Officer for a debriefing Turn in your ID, keys, and access cards

Who is responsible for security at the Department of Commerce? Finally…. Who is responsible for security at the Department of Commerce? YOU ARE!

QUESTIONS?