TSP 301-D-1052 0902, Phase II, OCS TSP 301-D-1052 0902, Phase II, OCS Protect Classified Information.

Slides:



Advertisements
Similar presentations
Merlin RAMCo Inc Initial Security Education.
Advertisements

Identification and Disposition of Official University Records University of Texas at Arlington Records Management.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
Department of the Navy Information Security Program
Charlie Daniels Arkansas Secretary of State HAVA Compliant Voting Systems Security Considerations General Recommendations to Enhance Security and Integrity.
Section One: Classification System Overview Note: All classified markings contained within this presentation are for training purposes only.
Office of Security Security Education Refresher Briefing
RVCC FACULTY FERPA WORKSHOP OCTOBER 2011 DAN PALUBNIAK REGISTRAR
Chapter 5: Asset Classification
Critical Data Management Indiana University HR Summit April 24, 2014.
The National Declassification Center Releasing All We Can, Protecting What We Must Public Interest Declassification Board NDC Project Update April 22,
HOW TO PREPARE FOR A NATIONAL SECURITY INFORMATION INSPECTION 1 SECRET Updated 09/27/11 Security is Everyone's Responsibility – See Something, Say Something!
UNCLASSIFIED1 COMSEC BRIEFING Having been selected to perform duties which will require access to classified COMSEC information, it is essential you be.
Section Four: Employee and Visitor Access Controls Note: All classified markings contained within this presentation are for training purposes only.
Election Observer Training 2008 Elections Certification & Training Program
1 GRAND VALLEY STATE UNIVERSITY FAMILY EDUCATIONAL RIGHTS & PRIVACY ACT (FERPA) TRAINING OFFICES OF THE REGISTRAR AND UNIVERSITY COUNSEL JANUARY 20, 2009.
Virginia Army National Guard Personnel Security
Security Education Briefing
Data Protection Recruitment Process
For Medication Certified Staff Members Only.   Governs how we give medications in a school setting  States that each parish will develop, follow and.
Section Eight: Communication Security (COMSEC) Note: All classified markings contained within this presentation are for.
FDA shall issue a certification for those FDA licensed establishments applying for amendment during the validity of their Licenses to Operate. This certification.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Section Ten: Security Violations and Deviations Note: All classified markings contained within this presentation are for training purposes only.
Security Policies University of Sunderland CSEM02 Harry R. Erwin, PhD.
HIPAA PRIVACY AND SECURITY AWARENESS.
Principle of Protection By C’Les Jensema About ARMA International and the Generally Accepted Recordkeeping Principles® ARMA International (
ISP Preparation Series 1- Chapter 3. CHAPTER 3: SECURITY TRAINING AND BRIEFING SECTION 1: SECURITY TRAINING General (3-100) - Provide all with training.
Theme: classification & distribution of government control of FEA.
MARKING CLASSIFIED MATERIAL
NATIONAL SECURITY INFORMATION ANNUAL CONTAINER INSPECTION
OCR Nationals Level 3 Unit 3.  To understand how the Data Protection Act 1998 relates to the data you will be collecting, storing and processing  To.
HOOVER CITY SCHOOLS In-Service Training: Annual Review of.
Information Asset Classification Community of Practicerev. 10/24/2007 Information Asset Classification What it means to employees.
1 CONFIDENTIALITY. 2 Requirement Under IDEA 34 CFR Sec (c) All staff collecting or using personally identifiable information in public education.
Indoctrination Briefing 1SG Patrick Cullen KANSAS ARMY NATIONAL GUARD.
United States Army Records Management Training Module 1 Part B.
SECURITY BRIEFING A threat awareness briefing A defensive security briefing An overview of the security classification system Employee reporting obligations.
Sensitive But Unclassified (SBU) Information
SCHOOLS FINANCE OFFICERS MEETINGS Records Management, “Paper-Lite” Environments and Procedures when a school closes Elizabeth Barber.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
PO :Physical Therapy Administration. Learning Objectives The physical therapy technician will participate as a member of the physical therapy administration.
ISO/IEC 27001:2013 Annex A.8 Asset management
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
Watech.wa.gov Records Management In a nutshell. watech.wa.gov What’s a record? A record is anything you create in the course of doing your work – Everything.
Managing a “Data Spill”
TSP 191-C , Phase II, OCS TSP 191-C , Phase II, OCS Process Captives.
CLASSIFICATION. Classification Marking requirements Test CONTENTS.
TSP 310-C , Phase II, OCS TSP 310-C , Phase II, OCS Implement OPSEC.
TASFAA 2016 Legacy of Leadership. TASFAA 2016 Legacy of Leadership Family Educational Rights and Privacy Act (FERPA) An Overview Molly Thompson Associate.
Information Security. Your responsibilities as a Government of Canada employee.
Sharing Personal Data ‘What you need to know’ Corporate Information Governance Team Strategic Intelligence.
PKI Services for CYPRUS STOCK EXCHANGE Kostas Nousias.
Information Management and the Departing Employee.
For Official Use Only (FOUO) and Similar Designations NPS Security Office
SAFEGUARDING CLASSIFIED INFORMATION.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
Declassifying the Foreign Relations Series Bringing the Official Record to light.
Security Education Refresher Briefing. Objectives Annual requirement Satisfactory knowledge of processing, handling and safeguarding of Classified National.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
Privacy and Security Basics for Falls Evidence Based Programs Data Collection . October 2016.
Privacy and Security Basics for CDSME Data Collection
Records Retention NYS Magistrates’ Association
Providing Access to Your Data: Handling sensitive data
Office of the President of the Philippines Memorandum Circular No. 78
Managing the IT Function
Derivative Classification Overview
The Health Insurance Portability and Accountability Act
Presentation transcript:

TSP 301-D , Phase II, OCS TSP 301-D , Phase II, OCS Protect Classified Information

TSP 301-D , Phase II, OCS Terminal Learning Objective Action:Protect Classified Information and Material. Conditions:This task can be performed in field and garrison locations under all conditions. Given classified documents and/or material, AR 380-5, local SOP, Standard Forms (SF) 700, 702, 703, 704, and 705, DA Form 3964, office equipment and supplies. Standard:Safeguard classified information and material to prevent unauthorized disclosure 100% of the time.

TSP 301-D , Phase II, OCS References Number TitleDatePara no. AR 380-5DA Information Security Program Feb 88Para 4-200, 201, 202; 301, 302, 306; 5-101, 201, 202, 204, 205; , 101, 102, 103; 112; 7-100; 304, 8-101, 102, 103; 200, 201, 202. E.O Classified National Security Information Apr 95Sec1.1b,f,h;1.3a;1.5;1.6 ;1.7; 2.1a; 3.1;4.1b,c,h; 4.2; 5.1;5.2; 9-100, 101, 102, 103, 104,105

TSP 301-D , Phase II, OCS SAFETY CONSIDERATIONSNONE RISK ASSESSMENTLOW ENVIRON. CONSIDERATIONS NONE EVALUATIONYES Administrative Notes

TSP 301-D , Phase II, OCS Question How important do you think the protection of classified information has been during the current Iraq & Afghanistan campaigns?

TSP 301-D , Phase II, OCS Enabling Learning Objective 1 Action:Identify classified material Conditions:Given classroom environment, classroom instructions, and classified documents. Standards:Identify security classification level.

TSP 301-D , Phase II, OCS What is Information? Is Any Knowledge That Can Be Communicated Or Documentary Material, Regardless Of Its Physical Form Or Characteristics, That Is Owned By, Produced By Or For, Or Is Under The Control Of The United States Government. Unauthorized Disclosure Is A Communication Or Physical Transfer Of Classified Information To An Unauthorized Recipient.

TSP 301-D , Phase II, OCS Security Classification Levels Confidential: Information, which if disclosed to unauthorized persons, could reasonably, is, expected to cause damage to the national security. Secret: Information, which if disclosed to unauthorized persons, could reasonably be, expected to cause serious damage to the national security. Top Secret: Information, which if disclosed to unauthorized persons, could reasonably be, expected to cause exceptionally grave damage to the national security.

TSP 301-D , Phase II, OCS Define Classifications Original Classification - an initial determination that information requires, in the interest of national security, protection against unauthorized disclosure. Derivative Classification - the incorporating, paraphrasing, restating or generating in new form information that is already classified, and marking the newly developed material consistent with the classification markings that apply to the source information.

TSP 301-D , Phase II, OCS Check on Learning: ELO #1 Question: What are the three levels of classification and what differentiates them? Answer: Confidential, Secret, and Top Secret. The difference is the amount of damage the unauthorized disclosure could cause, and how it was classified.

TSP 301-D , Phase II, OCS Check on Learning: ELO #1 Question: When is information classified? Answer: Information is classified as soon as there is a determination that information requires protection against unauthorized disclosure (Original classification) or developing new material based on information which is already classified (Derivative classification).

TSP 301-D , Phase II, OCS Enabling Learning Objective 2 Action:Locate the declassification and downgrading instructions on a classified document. Conditions:Given classroom environment, classroom instructions, classified documents and AR Standards:Locate the declassification and downgrading instructions on a classified document.

TSP 301-D , Phase II, OCS Important to know… Information is any knowledge that can be communicated or documented. Unauthorized disclosure is a communication or physical transfer of classified information to an unauthorized recipient.

TSP 301-D , Phase II, OCS Declassification of Information Declassification - The authorized change in the status of information from classified information to unclassified information. On a specific date or event 10 years from the date of classification Extensions may not exceed10 years at a time. Information shall be declassified as soon as it no longer meets the standards for classification. Once information is declassified and released to the public it cannot be reclassified.

TSP 301-D , Phase II, OCS Downgrading of Information A determination by a declassification authority that classified information requires a lower degree of protection against unauthorized disclosure than currently provided.

TSP 301-D , Phase II, OCS Check on Learning: ELO #2 Question: What is declassification? Answer: The authorized change in the status of information from Top Secret to Secret, Secret to Confidential and Confidential to Unclassified.

TSP 301-D , Phase II, OCS Check on Learning: ELO #2 Question: If no specific date or event for declassification is determined, when is the date of declassification? Answer: Ten years from the date of the original classification.

TSP 301-D , Phase II, OCS Enabling Learning Objective 3 Action:Review information for identification and markings. Conditions:Given classroom environment, classroom instructions, classified documents and AR Standards:Inspect documents for identification, markings and errors.

TSP 301-D , Phase II, OCS Classification Markings Top & bottom of outside front cover On title page On first page Outside of back cover Each interior page, top & bottom On charts, maps, drawings, photos, & film

TSP 301-D , Phase II, OCS Required on the face of all Classified Information Overall classification – stamped on top & bottom Identity of original classification authority Agency and office of origin Declassification date Reason for declassification Completeness is the key

TSP 301-D , Phase II, OCS Declassified Document The end of WWII. Message from General Dwight D. Eisenhower

TSP 301-D , Phase II, OCS Declassified Document Eisenhower's message to Patton's 3rd Army that the Germans have surrendered.

TSP 301-D , Phase II, OCS Declassified Document Eisenhower's message to Patton's 3rd Army that the Germans have surrendered. Signed by Eisenhower

TSP 301-D , Phase II, OCS Check on Learning: ELO #3 Question: Why would you examine a classified document for completeness? Answer: Examine a document for completeness to ensure that each page is accounted for to prevent a possible compromise of information.

TSP 301-D , Phase II, OCS Enabling Learning Objective 4 Action:Protect classified information through restricted access Conditions:Given classroom environment, classroom instructions, classified documents, SF 703, SF 704, and SF 705. Standards:Protect classified information through restricted access 100% of the time

TSP 301-D , Phase II, OCS Define Access The ability or opportunity to gain knowledge of classified information. Access is based on: - Security Clearance - Need-to-Know

TSP 301-D , Phase II, OCS Security Clearance Ensure that an individual’s security clearance is equal to, or exceeds the classification level of the material required to perform official duties.

TSP 301-D , Phase II, OCS Need-to-know A determination made by an authorized holder of classified information that a prospective recipient requires access to specific information in order to perform or assist in a lawful and authorized governmental function

TSP 301-D , Phase II, OCS Prevent Unauthorized Access Keep all classified documents under constant observation when removed from storage. Keep documents face down or covered when not in use. Take appropriate measures when temporarily departing the work area. Place one of the following cover sheets on all classified material: - SF 705 for Confidential information. - SF 704 for Secret information. - SF 703 for Top Secret information.

TSP 301-D , Phase II, OCS Access vs. Rank No one has a right to have access to classified information solely by virtue of rank or position

TSP 301-D , Phase II, OCS Special Access Program A program that imposes safeguarding and access requirements that exceed those normally required for information at the same classification level. Example: those involved in the development of a new weapons system. Such people would require special security clearance to work on the program.

TSP 301-D , Phase II, OCS Check on Learning: ELO #4 Question: Your commander has tasked you to request some classified information from the CIA. The classified information is sent to you. When you go to deliver it to your commander, the S4 asks to see the documents. Do you give it to him? Answer: No, not until his security clearance is verified and his need to know has been determined.

TSP 301-D , Phase II, OCS Check on Learning: ELO #4 Question: If your supply of SF 703 runs out and you need to place a cover sheet on a Top Secret document, should you use a SF 704? Yes or No? Answer: No. You cannot run the risk of providing access to Top Secret information to someone who is not cleared to that level of security.

TSP 301-D , Phase II, OCS Check on Learning: ELO #4 Question: What two basic principles must be applied prior to giving classified information to anyone? Answer: Proper clearance and need to know.

TSP 301-D , Phase II, OCS Enabling Learning Objective 5 Action:Safeguard classified information and material Conditions:Given classroom environment, classroom instructions, classified documents, GSA approved security container, SF 703, SF 704, and SF 705. Standards:Safeguard classified information and material 100% of the time.

TSP 301-D , Phase II, OCS Precaution to protect classified information Will remain under the control of the originating agency or its successor. An agency will not disclose information originally classified by another agency without its authorization. May not be removed from official premises without proper authorization.

TSP 301-D , Phase II, OCS Precaution to protect classified information Keep under constant observation when removed from storage. Protect when uncleared personnel enter the work area: - Cover classified information with the proper coversheet - Place the information in a GSA approved security container. Prevent display of classified information in public places.

TSP 301-D , Phase II, OCS Working Paper Precautions Date the document Mark the document with the words “Working papers.” Mark each page, top and bottom, according to the content classification. Bring working papers under control as a finished document when: Retained more than 90 days from date of origin. Released outside the originator’s agency. Transmitted electrically or electronically. Filed permanently. Papers contain Top Secret information.

TSP 301-D , Phase II, OCS Check on Learning: ELO #5 Question: Working Papers do not need classification markings until they are completed. True or False? Answer: False. Working papers should be dated when created and marked to indicate they are working papers and marked with the highest classification of any information contained therein.

TSP 301-D , Phase II, OCS Enabling Learning Objective 6 Action: Comply with security regulations when discussing classified information. Conditions: Given classroom environment, classroom instructions and AR Standards: Comply with security regulations when discussing classified information 100% of the time.

TSP 301-D , Phase II, OCS Discussing Classified Information DO NOT discuss classified and/or sensitive information on an unsecured telephone. Use proper procedures when presenting a classified briefing Ensure that automated information systems have controls that: Prevent access by unauthorized persons Ensure the integrity of the information

TSP 301-D , Phase II, OCS Transmitting Classified Information Refer to AR Ensure transmitted under conditions that provide adequate protection and prevent access by unauthorized personnel.

TSP 301-D , Phase II, OCS Check on Learning: ELO #5 Question: What should you do with a classified document if you have to leave your work area momentarily? Answer: Place the document in a GSA approved security container or in control of an authorized person.

TSP 301-D , Phase II, OCS Check on Learning: ELO #6 Question: If you have important classified information to pass to someone and you don’t have a secure phone, can you use an unsecured phone in the interest of time? Answer: No, classified information can only be discussed on a secure phone.

TSP 301-D , Phase II, OCS Check on Learning: ELO #6 Question: How can you inform the audience of the classification of a briefing? Answer: a.Post the Security Classification in the front of the room. b.Inform the audience at the beginning of the briefing. c.State the classification at the end of the briefing.

TSP 301-D , Phase II, OCS Enabling Learning Objective 7 Action: Protect classified material when transporting outside of a building. Conditions: Given classroom environment, classroom instructions, classified documents, DA Form 3964, and opaque envelopes. Standards: Protect classified documents when transporting 100% of the time.

TSP 301-D , Phase II, OCS Transporting Classified Information Do not remove classified information from official premises without proper authorization. Protect classified information when transporting outside of a secure area. –Proper address –Proper packaging & markings –Proper storage compartment

TSP 301-D , Phase II, OCS Check on Learning: ELO #7 Question: Is it permissible to take classified materials when you go TDY to another location? Yes or No. Answer: Yes, with proper authorization.

TSP 301-D , Phase II, OCS Check on Learning: ELO #7 Question: Why should classified materials be double wrapped? Answer: You do not want to advertise in any way the fact that you are carrying classified information.

TSP 301-D , Phase II, OCS Enabling Learning Objective 8 Action: Safeguard classified material when in storage. Conditions: Given classroom environment, classroom instructions, GSA approved security container, SF 700, 702 and classified material. Standards: Safeguard classified information and material when in storage 100% of the time.

TSP 301-D , Phase II, OCS Storing Classified Information Store classified information under conditions adequate to prevent unauthorized access. Place under guard or stored in a locked GSA security container Complete SF702 when opening/closing security container Turn sign on front to the ‘CLOSED’ position

TSP 301-D , Phase II, OCS SF 702

TSP 301-D , Phase II, OCS Check on Learning: ELO #8 Question: What should you do with a classified document if you have to leave your work area momentarily? Answer: Place the document in a GSA approved security container or in control of an authorized person.

TSP 301-D , Phase II, OCS Enabling Learning Objective 9 Action: Report possible compromise of classified information. Conditions: Given classroom environment and classroom instructions. Standards: Report compromise of classified information and material 100% of the time.

TSP 301-D , Phase II, OCS Individual responsibilities Any person having knowledge of the loss of possible compromise of classified information will immediately report it to their security manager, S2 or commanding officer. Any person who discovers classified information out of proper control will take custody of the information, safeguard it and immediately report to their security manager, S2 or commanding officer.

TSP 301-D , Phase II, OCS S2 Responsibilities S2 will report the circumstances of the compromise to the appropriate authority: HQDA (DAMI-CIS) when dealing with SECRET and TOP SECRET information. Commander when dealing with CONFIDENTIAL information.

TSP 301-D , Phase II, OCS Enabling Learning Objective 10 Action: Use proper procedures when destroying classified information. Conditions: Given classroom environment, classroom instructions, classified documents and DA Form Standards: Properly destroy classified information or material 100% of the time.

TSP 301-D , Phase II, OCS Methods of Destruction Destroy classified information in a way sufficient to preclude recognition or reconstruction Burning (preferred method) Melting Chemical decomposition Pulping Pulverizing Cross-cut shredding Mutilation.

TSP 301-D , Phase II, OCS Destruction by Classification Records of destruction are required for Top Secret information Records of destruction of Secret and Confidential information are not required except for NATO Secret and some limited categories of specially controlled Secret information.

TSP 301-D , Phase II, OCS Check on Learning: ELO #10 Question: You are required to destroy a small amount of classified information. What is the preferred method you should use? Answer: Burning

TSP 301-D , Phase II, OCS Summary 1.Identify classified material 2.Declassification and downgrading 3.Identification and markings. 4.Restricted access 5.Safeguard classified information and material 6.Security regulations when discussing classified information. 7.Transporting outside of a building. 8.Safeguard classified material when in storage. 9.Compromise of classified information. 10.Methods of destruction

TSP 301-D , Phase II, OCS Conclusion It is incumbent upon you to protect all classified information against unauthorized discloser. Your life and your battle buddies life may depend upon it.