9/15/20151 Initial Security Indoctrination. 9/15/20152 Agenda Physical Security Personnel Security Information Security Information Assurance Public Release.

Slides:



Advertisements
Similar presentations
Personnel Background Investigations. Introduction The interests of the national security require that all persons privileged to be employed in the departments.
Advertisements

Annual Security Refresher Briefing Note: All classified markings contained within this presentation are for training purposes.
How to Obtain and Keep a Security Clearance?. What Is A Security Clearance? A determination made by the government that you are stable and trustworthy,
Counterintelligence Indicators Presented by Jerome Smith, Facility Security Officer, LAI/EES.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
Section Six: Foreign Ownership, Control, or Influence (FOCI)
What is Insider Threat? “Potential damage to the interests of an organization by a person(s) who is regarded, falsely, as loyally working for or on behalf.
Annual Security Refresher Briefing. General Information Edmonds Enterprises Services (EES) and Logistics Applications Inc. (LAI) as Defense Contractors.
Department of Health and Human Services Personal Identity Verification Training APPLICANT.
F ACILITY S ECURITY Presented by: Dela Williams. 2.
Espionage Indicators Updated 08/21/13 U.S. Department of Commerce Office Of Security (OSY) Security is Everyone's Responsibility 1 Briefing.
Section Nine: Reporting Requirements Note: All classified markings contained within this presentation are for training purposes only.
Espionage Indicators Briefing 1 U.S. Department of Commerce
10/27/20111 Initial Security Indoctrination DoD. 10/27/20112 The protection of Government assets, people and property, both classified and controlled.
Section Four: Employee and Visitor Access Controls Note: All classified markings contained within this presentation are for training purposes only.
11 Karen Atkins 12 September 2013 The Importance of New Hire Orientation - FISWG.
Initial Security Briefing
Information Systems Security Officer
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Session 3 – Information Security Policies
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
Network Centric Enterprise Public Trust Information and Navy Enterprise Resource Planning Presented to the Small Business and Industry Outreach Initiative.
Section Eight: Communication Security (COMSEC) Note: All classified markings contained within this presentation are for.
Section Ten: Security Violations and Deviations Note: All classified markings contained within this presentation are for training purposes only.
Security Policies University of Sunderland CSEM02 Harry R. Erwin, PhD.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
OFFICE OF THE UNDER SECRETARY OF DEFENSE FOR INTELLIGENCE CI & SECURITY DIRECTORATE, DDI(I&S) Valerie Heil March 20, 2015 UNCLASSIFIED Industrial Security.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
ESPIONAGE INDICATORS. ESPIONAGE INDICATORS GUIDE BRIEFING DEPARTMENTAL ADMINISTRATIVE ORDER (DAO ) NOAA ADMINISTRATIVE ORDER (NAO )
PERFORMING ON CLASSIFIED CONTRACTS.
OFFICE OF THE UNDER SECRETARY OF DEFENSE FOR INTELLIGENCE CI & SECURITY DIRECTORATE, DDI(I&S) Valerie Heil August 12, 2014 UNCLASSIFIED NISPOM Update.
Ames Laboratory Privacy and Personally Identifiable Information (PII) Training Welcome to the Ames Laboratory’s training on Personally Identifiable Information.
Theme: classification & distribution of government control of FEA.
MARKING CLASSIFIED MATERIAL
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Responsible Data Use: Data restrictions Robert R. Downs, PhD NASA Socioeconomic Data and Applications Center (SEDAC) Center for International Earth Science.
1 Personnel Security 2007 Data Protection Seminar TMA Privacy Office HEALTH AFFAIRS TRICARE Management Activity.
University of Miami Office of Research Compliance Assessment Lynn E. Smith, JD, CIM, CIP Johanna Stamates, RN, BA, CCRC With assistance from Elizabeth.
1 SECURITY BRIEFING FOR ACCESSING CLASSIFIED INFORMATION.
UC DAVIS OFFICE OF RESEARCH Overview of Good Clinical Practices (GCP) Investigator and Study Team Responsibilities Miles McFann IRB Administration Training.
Indoctrination Briefing 1SG Patrick Cullen KANSAS ARMY NATIONAL GUARD.
Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.
SECURITY BRIEFING A threat awareness briefing A defensive security briefing An overview of the security classification system Employee reporting obligations.
Development of a Clean Room/Highly Restricted Zone June 12, 2012 Thomas Garrubba - CVS Caremark; Manager, Technical Assessments Group ©2011 The Shared.
NISPOM Chapter 1 Basics General Requirements Reporting Responsibilities Steven Rivera, FSO July 10, 2013.
Managing a “Data Spill”
How To Conduct An Administrative Inquiry (AI) Due To A Security Violation
Information Protection The Personnel Security Program (PSP) & Supervisors’ Responsibilities Mr. Connolly.
DOD - Accessing Classified Information Brought to you by your company Security Officer.
For Official Use Only (FOUO) and Similar Designations NPS Security Office
Department of the Navy Security Enterprise Leadership Course Curriculum for Security Program Oversight 1.
Responsible Data Use: Data restrictions Robert R. Downs, PhD Center for International Earth Science Information Network (CIESIN), Columbia University Version.
Insider Threat Awareness
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Managing a Security Container
Providing Access to Your Data: Handling sensitive data
NISPOM Basics What You Need to Know!
Initial Security Indoctrination
Red Flags Rule An Introduction County College of Morris
2007 Computer End User Training
County HIPAA Review All Rights Reserved 2002.
AN OVERVIEW OF THE INDUSTRIAL SECURITY PROGRAM
ACCESSING CLASSIFIED INFORMATION
Annual Security Briefing
Export Controls – Export Provisions in Research Agreements
CNATRA CYBERSECURITY.
Accounting Information Systems & Computer Fraud
Presentation transcript:

9/15/20151 Initial Security Indoctrination

9/15/20152 Agenda Physical Security Personnel Security Information Security Information Assurance Public Release of Information Reporting Requirements Regulations

9/15/20153 Your Facility Security Officer (FSO) is: Your Assistant Facility Security Officer is: Call anytime! Your Facility Security Officer

9/15/20154 The United States Government classification system is established under Executive Order by President George W. Bush in 2003 which lays out the system of classification, declassification, and handling of national security information, generated by the United States Government, its employees and contractors, as well as information received from other governments. The protection of Government assets, people and property, both classified and controlled unclassified, is the responsibility of each and every member of the Harrington Group, regardless of how it was obtained or what form it takes. Our vigilance is imperative in the protection of this information. Anyone with access to these resources has an obligation to protect them. Security Message

9/15/20155 Objective This briefing will: Identify your personal security responsibilities Provide a basic understanding of DoD security policies Explain the importance of protecting United States Government assets

9/15/20156 DoD Security Regulations, Directives, and Programs are established to counter threats Threats to classified and unclassified government assets can include: Insiders (employees, contractor employees, and authorized visitors) Criminal and Terrorist Activities Foreign Intelligence Services Foreign Governments Why Security?

9/15/20157 Physical security includes, but is not limited to: Employee and Visitor Access Controls (Badges) Common Access Cards (CAC) Intrusion Detection Systems Prohibited item controls Entry/Exit inspections Escorting Closed circuit video monitoring Physical Security

9/15/20158 You are responsible for: Becoming familiar with local security regulations pertaining to your assigned duties Notifying your FSO of changes in your status which could affect your security clearance Individual Responsibility

9/15/20159 Your position and/or duties will determine your level of clearance or access There are three levels of security clearance and access: Top Secret Secret Confidential Your Security Clearance

9/15/ There are also three levels of Classification TOP SECRET Exceptionally grave damage to the National Security SECRET Serious damage to the National Security CONFIDENTIAL Damage to the National Security Classification of Data

9/15/ Your Investigation and Clearance All DoD Government and contractor personnel are subject to a background investigation Investigations are conducted to determine suitability for a position of trust and/or granting of a security clearance Your suitability for a security clearance is continually assessed

9/15/ CLEARANCE Administrative action, involving a form of background investigation and adjudication determination NEED TO KNOW Determination made by an authorized holder of classified information that a prospective recipient requires access to perform a lawful and authorized government function. + ACCESS The ability and opportunity to obtain knowledge of classified information. This can involve seeing, hearing, or touching classified information, material, or equipment. = + SF 312 Classified Information Nondisclosure Agreement: All persons authorized access to classified information are required to sign a SF 312, a legal contractual agreement between you and the United States Government. Access to Classified Information

9/15/ Pertains to the protection of classified and sensitive information, to include but not limited to: Marking Handling Transmission Storage Destruction Information Security

9/15/ Classified Material Machinery, Documents Machinery, Documents s, Models, Faxes Photographs, Reproductions Storage Media, Working Papers, Meeting Notes Sketches, Maps, Products, Substances, or Materials Examples of classified materials, all of which must be properly marked

9/15/ All classified data must be appropriately marked to alert potential recipients to the information’s classification. CONFIDENTIAL (C) SECRET (S) TOP SECRET (TS) ? How Do I Identify Classified Documents?

9/15/ All Classified Data Must be under the control of or guarded by an authorized person or stored in a locked security container, vault, secure room, or secure area Must be discussed only on secure telephones or sent via secure communications Must be processed on approved equipment Must be destroyed by approved methods Must only be discussed in an area authorized for classified discussions.

9/15/ Information Assurance (IA) In the performance of your duties, you may be required to have access to Government computer systems Information Assurance protects and defends information and information systems by ensuring their availability, integrity, authenticity and confidentiality

9/15/ DoD IA Responsibilities Complete annual IA training to include threat identification, physical security, acceptable use policies, malicious content and logic, and non- standard threats Ensure compliance with password or pass- phrase policy directives for classified data

9/15/ Public Release of Information Public release of Government information must first be approved by the FSO

9/15/ All Employees Must Report Change of name, martial status or citizenship

9/15/ All Employees Must Report (cont) Adverse events concerning themselves or a co-worker Adverse events include, but are not limited to, recent arrests, alcohol or drug related problems, serious financial difficulties, etc.

9/15/ Report to Your FSO In addition to personal contact or , another option for reporting potential security issues is to use the link provided on our Intranet Page called “”

9/15/ Cleared Employees Must Report Adverse information Suspicious contacts Change in name or citizenship Any reluctance to support a classified program Unauthorized receipt of classified data Loss, compromise or suspected compromise of classified data, including evidence of tampering with a security container used for storage of classified data.

9/15/ Cleared Employees Must Report (cont) All continuing contacts with foreign nationals, to include shared living quarters and marriage Suspicious contacts with/by foreign nationals

9/15/ Cleared Employees Must Report (cont) If a member of your immediate family (or your spouse’s immediate family) is a citizen or resident of a foreign country

9/15/ Cleared Employees Must Report (cont) All foreign travel

9/15/ Cleared Employees Must Report (cont) Any potential employment or service, whether compensated or volunteer, with a foreign government, foreign national, foreign organization, or other entity, or a representative of any foreign interest

9/15/ Cleared Employees Must Report (cont) A lost or stolen badge or Common Access Card (CAC) immediately to the FSO

9/15/ Cleared Employees Must Report (cont) Any information that might have a bearing on your continued eligibility for access to classified information

9/15/ Cleared Employees Must Report (cont) Potential Espionage Indicators Exhibited by Others Unexplained affluence Keeping unusual work hours or excessive absences Divided loyalty or allegiance to the United States Disregarding security procedures Unreported foreign contact and travel Pattern of lying Attempts to enlist others in illegal or questionable activity Verbal or physical threats Inquiry about operations/projects where no legitimate need to know exists Unauthorized removal of classified information Fraud/Waste/Abuse of credit cards and/or travel or training advances

9/15/ Impact of Not Reporting Not reporting a known security violation may constitute a major security violation itself, regardless of the severity of the unreported incident. Examples: Classified material left out or unattended Removal of material without approval. Unauthorized copying or destroying Lost classified information

9/15/ Security Regulations Reference Security Regulations, not all inclusive: Executive Order 12958, as amended - Classified National Security Information, Signed by President Bush March 23/2003 Executive Order – Access to Classified Information Director of Central Intelligence Directive No 6/4 DoD R, DoD Information Security Program DoD R, DoD Personnel Security Program DoDD , DoD Operations Security (OPSEC) Program DoD R, DoD Physical Security Program DoDD , Information Assurance DODI , Information Assurance Implementation DoDD , DoD Anti-terrorism (AT) Program Homeland Security Presidential Directive (HSPD)-12

9/15/ YOU CAN MAKE A DIFFERENCE! Security is a team effort... Your diligence in promptly reporting concerns and adhering to the security policies and procedures will help protect our war fighters, colleagues, and families from potential harm.

CERTIFICATE Certificate of Completion This is to certify that I, _____________________,have completed the (Print Your Name) Initial Security Indoctrination Training Initial Security Indoctrination Training Program. ____________________ ____________ ____________________ ____________ Individual’s Signature Date ___________________ ____________ ___________________ ____________ FSO’s Signature Date FSO’s Signature Date