Section Nine: Reporting Requirements Note: All classified markings contained within this presentation are for training purposes only.

Slides:



Advertisements
Similar presentations
Adverse Information Adverse Information:
Advertisements

Continuous Evaluation Program
Annual Security Refresher Briefing Note: All classified markings contained within this presentation are for training purposes.
How to Obtain and Keep a Security Clearance?. What Is A Security Clearance? A determination made by the government that you are stable and trustworthy,
Section Six: Foreign Ownership, Control, or Influence (FOCI)
A Combat Support Agency 11 Tim Sullivan Chief of Security Defense Information Systems Agency 7 May 2009 Security Clearances A Combat Support Agency Defense.
Surry 2010 Fall Outage Gravel Neck Processing Wayne Croshaw Processing Coordinator.
F ACILITY S ECURITY Presented by: Dela Williams. 2.
Property Management Overview
Espionage Indicators Updated 08/21/13 U.S. Department of Commerce Office Of Security (OSY) Security is Everyone's Responsibility 1 Briefing.
Successful Solutions Professional Development LLC A Basic Approach to Child Safety Chapter 4 Mandated Reporting Law.
Espionage Indicators Briefing 1 U.S. Department of Commerce
Alcohol/Drug-Free Workplace Administrative Policy GBEC Updated 07/31/2012 HR.
10/27/20111 Initial Security Indoctrination DoD. 10/27/20112 The protection of Government assets, people and property, both classified and controlled.
Section Four: Employee and Visitor Access Controls Note: All classified markings contained within this presentation are for training purposes only.
Initial Security Briefing
Employee Assistance Programs & Peer Assistance Programs UI300 K Farwell, PhD, CARN-AP.
1 A SAFE AND HEALTHY WORK ENVIRONMENT. 2 Chapter Objectives Describe some safety and security strategies for a post-September 11 world. Describe the nature.
D.O.T. Compliance Doug Lozier Safety and Environmental Director The Heritage Group Part 1.
Achieving our mission Presented to Line Staff. INTERNAL CONTROLS What are they?
1.  Describe some safety and security strategies for a post-September 11 world.  Describe the nature and role of safety and health.  Explain the purpose.
ETHICS, POLICY & SECURITY ISSUES 1CIIT---ETHICS,POLICY AND SECURITY ISSUES.
Section Ten: Security Violations and Deviations Note: All classified markings contained within this presentation are for training purposes only.
Mental Illness and Substance Abuse in the Workplace Sheila Thibodeau, LCSW, CCS, Qualified SAP.
General Awareness Training
Temple University Hospital Resident Orientation Key Policies and Procedures.
Cleared Employee Reporting Requirements. Reporting Regulations  Defense Security Service (DSS)  The National Industrial Security Program Operating Manual(NISPOM)1-300.
9/15/20151 Initial Security Indoctrination. 9/15/20152 Agenda Physical Security Personnel Security Information Security Information Assurance Public Release.
Washington State Patrol Office of the State Fire Marshal Unit 6: Expectations of Mobilization Resources.
Ames Laboratory Privacy and Personally Identifiable Information (PII) Training Welcome to the Ames Laboratory’s training on Personally Identifiable Information.
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
University of Louisiana at Monroe DRUG FREE WORKPLACE POLICY.
Working Together The Key to Safety
British Columbia Human Rights Code. Purpose To foster a society in British Columbia in which there are no impediments to full and free participation in.
CENTRA T ECHNOLOGY, I NC. 1 5 Steps To Protect Your Company Katherine D. Mills CENTRA Technology, Inc. Insider Threat:
CODE OF CONDUCT TRAINING. We conduct our global business honestly, ethically and legally, believing that good ethics is good business. The Company’s Philosophy.
Peter Sakaris CISSP Booz Allen Hamilton, 1299 Farnam Street Suite 1230, Omaha, NE Office The Insider Threat.
Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.
Creating an Insider Threat Program.
Division of Risk Management State of Florida Loss Prevention Program.
Mental Illness and Substance Abuse in the Workplace Sheila Thibodeau, LCSW, CCS, Qualified SAP.
Data Protection: Workplace, Health and Safety. Employers’ responsibilities Employer obliged to provide safe place of work. Health and Safety Act 2004.
NISPOM Chapter 1 Basics General Requirements Reporting Responsibilities Steven Rivera, FSO July 10, 2013.
OSHA Guidelines for Employers to Reduce Motor Vehicle Crashes
CJ 333 Unit 9. Minneapolis Domestic Violence Experiment –Arrest the suspect –Order one party out of the residence –Advise couple how to solve their problems.
1 Procurement Operations Division (POD) Guidance for Telework and Work Schedules February 2016.
CODE OF CONDUCT TRAINING We conduct our global business honestly, ethically and legally, believing that good ethics is good business. The Company’s Philosophy.
Information Protection The Personnel Security Program (PSP) & Supervisors’ Responsibilities Mr. Connolly.
Jeff Davis County Schools Fraud, Waste, and Abuse Procedures REVISED 7/31/2014.
Substance Misuse Policy Replaces the Alcohol and Substance Misuse Policy. New policy triggered by updated drug driving laws – but gave opportunity for.
CRIMINAL LAW 1. Ahmed T. Ghandour.. CRIMES OF POWERFUL.
Insider Threat Awareness
Domestic and Family Violence - A workplace issue
Fusion Center ITS security and Privacy Operations Joe Thomas
Providing Access to Your Data: Handling sensitive data
NISPOM Basics What You Need to Know!
INSIDER THREAT AWARENESS
SUBSTANCE USE AND WORKPLACE
Initial Security Indoctrination
Refuah Community Health Collaborative (RCHC) PPS
“What is Adverse Information”?
Reporting Incidents and Hazards Accident Prevention
Module 2: Legal and Ethical Issues
Annual Security Briefing
Shame on you if you aren’t making required security reports
SSSC Fitness to Practise Calum Davidson Intake and Engagement Officer.
Tips for Obtaining a Security Clearance
Public Safety and Title IX Administrators: Working Together
Presentation transcript:

Section Nine: Reporting Requirements Note: All classified markings contained within this presentation are for training purposes only.

As a cleared employee of {Company} you are responsible for: – Becoming familiar with security policies and procedures pertaining to your assigned duties and reporting responsibilities  Reports based solely on rumor or innuendo should not be made – Notifying your Security Department of personal changes that could affect your security clearance – Notifying your Security Department and scheduling a debriefing when you leave the {Company} or your duties change such that you no longer need a security clearance and/or access Reporting Requirements Individual Responsibilities

Individual Responsibilities Reporting Requirements You must report the following: –Security violations or deviations –Loss, compromise, suspected loss or compromise of classified or sensitive information, or theft of {Company} equipment –System viruses, unusual system anomalies –Suspicious activity –Foreign or suspicious contacts –Contacts with U.S. persons representing a foreign interest –Foreign Influence –Foreign travel (TS, SCI, SAP) –Concerns regarding safety and security –Concerns regarding workplace violence –Incidents impacting {Company} systems security or classified contaminations –Lost or stolen identification badges –Adverse Information

Questions regarding allegiance to the United States Potential foreign influence Financial problems Affluence (wealth) beyond known sources of income Excessive alcohol consumption or drug abuse Emotional, mental and personality disorders Criminal conduct Misuse of information technology systems Security violations and deviations Any information that adversely reflects on the integrity, character, or reliability of a cleared individual Suggests the individual’s ability to safeguard classified information may be impaired Indicates the individual’s access to classified information may not be in the interest of the National Security DefinitionExamples Adverse Information Definition, Examples and Reporting Requirements All reports are treated with the utmost discretion and privacy Other Reportable Information ‒ Change in marital status ‒ Change in citizenship ‒ Litigation ‒ Foreign Travel/Contacts Other Reportable Information ‒ Change in marital status ‒ Change in citizenship ‒ Litigation ‒ Foreign Travel/Contacts