Presentation on theme: "SECNAV M-5510.36 Department of the Navy Information Security Program."— Presentation transcript:
SECNAV M Department of the Navy Information Security Program
Purpose Establishes policy and procedures for handling and destroying classified information Provides guidance on security education and industrial security programs.
Applicability Applies to all uniformed sailors DON civilian personnel
Authorities The President of the United States. National Security Council(NSC) Information Security Oversight Office (ISOO) Central Intelligence FBI
Types of classified information 9 types – Communications Security (COMSEC) Information – Sensitive Compartmented Information (SCI) – Special Access Programs (SAPs) – Single Integrated Operational Plan (SIOP) and Single Integrated Operational Plan-Extremely Sensitive Information (SIOP-ESI) – Naval Nuclear Propulsion Information (NNPI) – Restricted Data (RD) and Formerly Restricted Data (FRD) – Critical Nuclear Weapons Design Information (CNWDI) – Foreign Government Information (FGI) – North Atlantic Treaty Organization (NATO) Information
For Official Use Only (FOUO) Department of State (DOS) Sensitive But Unclassified (SBU) (formerly Limited Official Use (LOU)) information DoD and DOE Unclassified Controlled Nuclear Information (UCNI) Drug Enforcement Administration (DEA) Sensitive Information Unclassified information in technical documents requiring distribution statements National Geospatial Intelligence Agency Limited Distribution Information Types of unclassified information
Command Security Responsibility and Authority Standards Risk Management Delegation
COMMAND SECURITY INSTRUCTION PART ONE: EMERGENCY PLAN PART TWO: EMERGENCY DESTRUCTION SUPPLEMENT
Classification levels – Top Secret – Secret – Confidential
Control Measures – Top Secret – Secret – Confidential
Dissmination Third party rule Emergency situations – Top Secret information – Secret information – Confidential information
Transmission Top Secret Secret Confidential
Storage and destruction – In a GSA-approved security container – In a vault, modular vault or secure room constructed per exhibit 10A, equipped with an IDS and a personnel response to the alarm within 15 minutes of the alarm annunciation if the area is covered by Security-in-Depth, or a 5-minute alarm response if it is not. – Until 1 October 2012, in a non-GSA-approved container having a built-in combination lock.
Loss/compromise of classified information A loss of classified information occurs when it cannot be accounted for or physically located. A compromise is the unauthorized disclosure of classified information to a person(s) who does not have a valid security clearance, authorized access or need-to-know. A possible compromise occurs when classified information is not properly controlled.