Www.ispcert.com CLASSIFICATION. www.ispcert.com Classification Marking requirements Test CONTENTS.

Slides:



Advertisements
Similar presentations
FREEDOM OF INFORMATION EXECUTIVE BRIEFING PART II.
Advertisements

FOIA Exemption 1 & E.O Classified National Security Information
Merlin RAMCo Inc Initial Security Education.
Annual Security Refresher Briefing Note: All classified markings contained within this presentation are for training purposes.
Pakistan Nuclear Regulatory Authority
Section One: Classification System Overview Note: All classified markings contained within this presentation are for training purposes only.
Auditing Concepts.
Chapter 5: Asset Classification
HOW TO PREPARE FOR A NATIONAL SECURITY INFORMATION INSPECTION 1 SECRET Updated 09/27/11 Security is Everyone's Responsibility – See Something, Say Something!
The Department of Defense Intelligence Oversight Program
10/27/20111 Initial Security Indoctrination DoD. 10/27/20112 The protection of Government assets, people and property, both classified and controlled.
1 Disclaimer The following information was presented by Andrew Levy of the Office of General Counsel of DHS on June 12, 2007 at the 2007 Chemical Sector.
Information Systems Security Officer
Virginia Army National Guard Personnel Security
Security Education Briefing
Section Eight: Communication Security (COMSEC) Note: All classified markings contained within this presentation are for.
Section Ten: Security Violations and Deviations Note: All classified markings contained within this presentation are for training purposes only.
CUI Statistical: Collaborative Efforts of Federal Statistical Agencies Eve Powell-Griner National Center for Health Statistics.
IAEA International Atomic Energy Agency International Cooperation in Nuclear Security David Ek Office of Nuclear Security.
Security Policies University of Sunderland CSEM02 Harry R. Erwin, PhD.
1 Preparing a System Security Plan. 2 Overview Define a Security Plan Pitfalls to avoid Required Documents Contents of the SSP The profile Certification.
Company duties under the ISM Code
DEFENSIVE SECURITY BRIEFING. Employee Responsibilities While Traveling Threat Awareness and Defensive Information Methods.
Presented to President’s Cabinet. INTERNAL CONTROLS are the integration of the activities, plans, attitudes, policies and efforts of the people of an.
SECURITY BRIEFING (ANNUAL REFRESHER)
ISP Preparation Series 3- Chapter 6. NISPOM Chapter 6- Visits and Meetings  General- anticipate discussion  Classified visits- minimum and.
ISP Preparation Series 1- Chapter 3. CHAPTER 3: SECURITY TRAINING AND BRIEFING SECTION 1: SECURITY TRAINING General (3-100) - Provide all with training.
Theme: classification & distribution of government control of FEA.
MARKING CLASSIFIED MATERIAL
TSP 301-D , Phase II, OCS TSP 301-D , Phase II, OCS Protect Classified Information.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
DEFENSIVE SECURITY BRIEFING. Employee Responsibilities While Traveling Threat Awareness and Defensive Information Methods.
THE SECURITY CLASSIFICATION SYSTEM.
Main Requirements on Different Stages of the Licensing Process for New Nuclear Facilities Module 4.1 Steps in the Licensing Process Geoff Vaughan University.
SPS policy – Information Presentation Presentation to ROS June 16, 2004.
DEFENSE SECURITY SERVICE DSS Role in International Security.
Government classification
Classified information in Estonia: The role of the archives Priit Pirsko EBNA meeting in Brussels 18–19 November 2010.
Accountability Presented by Mollie Schaffer August 13 th, 2014.
Main Requirements on Different Stages of the Licensing Process for New Nuclear Facilities Module 4.5/1 Design Geoff Vaughan University of Central Lancashire,
Indoctrination Briefing 1SG Patrick Cullen KANSAS ARMY NATIONAL GUARD.
IAEA International Atomic Energy Agency School of Drafting Regulations – November 2014 Government and Regulatory Body Functions and Responsibilities IAEA.
Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.
What is Mandatory Declassification Review (MDR)? MDR is a means by which any individual, to include members of the public, can request any agency to review.
SECURITY BRIEFING A threat awareness briefing A defensive security briefing An overview of the security classification system Employee reporting obligations.
All Employee Basic Records Management Training. Training Overview 1.Training Objectives 2.Clark County RIM Program 3.Key Concepts 4.Employee Responsibilities.
IAEA International Atomic Energy Agency Methodology and Responsibilities for Periodic Safety Review for Research Reactors William Kennedy Research Reactor.
ISO/IEC 27001:2013 Annex A.8 Asset management
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Intelligence and Counterintelligence and Terrorism CHAPTER 8.
IAEA International Atomic Energy Agency Milestones in the development of a national infrastructure for nuclear power The Nuclear Security dimension Technical.
Managing a “Data Spill”
How To Conduct An Administrative Inquiry (AI) Due To A Security Violation
ISO 9001:2015 Subject: Quality Management System Clause 8 - Operation
Gasunie is one of the biggest gas infrastructure companies in Europe. Within the company, we give safety the highest priority; it forms the basis of our.
Information Management and the Departing Employee.
For Official Use Only (FOUO) and Similar Designations NPS Security Office
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Department of the Navy Security Enterprise Leadership Course Curriculum for Security Program Oversight 1.
1 Export Control of Dual-Use Items and Arms: Industry Outreach Sofia, May, 2006 POLAND’S EXPERIENCES INDUSTRY OUTREACH and PERSONNEL TRAINING JACEK.
Declassifying the Foreign Relations Series Bringing the Official Record to light.
Nassau Association of School Technologists
Safeguarding Covered Defense Information
Providing Access to Your Data: Handling sensitive data
IS4550 Security Policies and Implementation Unit 7 Risk Management
Office of the President of the Philippines Memorandum Circular No. 78
Derivative Classification Overview
AN OVERVIEW OF THE INDUSTRIAL SECURITY PROGRAM
Export Controls – Export Provisions in Research Agreements
Presentation transcript:

CLASSIFICATION

Classification Marking requirements Test CONTENTS

 Presidential Executive Order HOW CLASSIFICATION CAME TO BE The executive order was given to provide security measures to safeguard classified information that has been or may be released to… “current, prospective, or former contractors, licensees, or grantees of United States agencies”. It is also designed to provide for the protection of classified material as outlined in EO and the Atomic Energy Act of 1954, as amended.

 Provides Classified National Security Information and delivers a cohesive method for designation classification  The Government has designed stringent policy to ensure that classified material is protected at the level necessary to prevent unauthorized disclosure. CLASSIFICATION VIA EO

 CONFIDENTIAL information could reasonably be expected cause damage  SECRET could reasonably be expected to cause serious damage  TOP SECRET could reasonably be expected to cause exceptionally grave damage to national security. THREE DESINGNATIONS FOR CLASSIFIED Caution: Classified information designated CONFIDENTIONAL should not be confused with the proprietary information sometimes referred to as company confidential.

Four conditions must be met before assigning classification  An original classification authority is applying the classification level  The U.S. Government owns, is producing, or is controlling the information  Information meets one of eight categories  The Original Classification Authority determines unauthorized disclosure could cause damage to national security, including transnational terrorism and they can identify or describe the damage CONDITIONS FOR CLASSIFICATION

 According to a report from the Chairman of the House National Security Subcommittee, 10% of secrets should have never been classified and that nearly 90% of classified information has been over-classified  A Defense Security Services report stated in 2003 nearly $6.5 billion was spent to classify information  To prevent such abuse, the Executive Order provides guidance to train and prevent classification authorities from arbitrarily assigning a classification level CONDITIONS FOR CLASSIFICATION

1.Military plans, weapons systems or operations  The U.S. armed forces not only safeguards, but provides instructions for protecting the specifics of their weapons and plans. If these strategies and operations were released to the wrong hands, the information would damage national security and adversely affect our ability to defend ourselves 2.Foreign government information  This knowledge includes what the U.S. Government may already know about other governments. This gives the U.S. the advantage of knowing information that another country thinks is protected. WHAT ARE THE EIGHT CATEGORIES

3.Intelligence activities, sources, or methods or cryptology  One can imagine what damage could take place if any intelligence gathering sources, methods or activities were compromised. The suspecting adversary could become aware of the threat and cease their activity or design countermeasures designed to thwart future efforts. WHAT ARE THE EIGHT CATEGORIES

4.Foreign relations or activities of the United States including confidential sources  This information is specified U.S. foreign policy activities and sources friendly to U.S. efforts and U.S. organizations. Such is protected to ensure the safety of the relations and success of the activities. Compromise of any of the sources could cause damage to National Security as they are denied further access. 5.Scientific, technological, or economic matters relating to national security, including defense against transnational terrorism  Unauthorized access to national security-related U.S. scientific, technological, and economic data could compromise plans, production, and strategies and leave certain vulnerabilities. WHAT ARE THE EIGHT CATEGORIES

6.U.S. programs for safeguarding nuclear materials or facilities  For nuclear activities, the Department of Energy and the Nuclear Regulation Commission provide specific guidance to ensure the best protection. Vulnerabilities and strengths are assessed to ensure the best possible measures are in place to protect these items. Plans, strategies and programs are only effective if enforced AND access is limited. WHAT ARE THE EIGHT CATEGORIES

7.Vulnerabilities of systems, installations, infrastructures, projects, plans or protection services related to national security including terrorism  Security managers assess strengths and to ensure the best possible measures are in place to protect these items. Plans, strategies and programs are only effective if enforced AND access is limited. An adversary could use the programs to gain advantages, steal, damage or destroy systems, installations, infrastructures, projects, plans or protection services. 8.Weapons of Mass Destruction  Information fitting this category is classified to prevent unauthorized disclosure. Such unauthorized disclosure could make the U.S. vulnerable to adversaries to include transnational terrorists. WHAT ARE THE EIGHT CATEGORIES

 Users of classified material must understand the level of classification they are working with. The OCA not only classifies the information, but tells why it is classified, what level of damage to national security the information may affect and the date or event for the duration of the classification.  Classification must be evident and marked clearly for easy identification  Whether a document or end item, individual components must be marked at the appropriate level CLASSIFICATION EVENTS

Derivative classification involves extracting, summarizing, or deriving classification from another source  FSO ensures contractor is training and has resources  Contractor ensures:  Use of Security Classification Guide  Mark derived copy with the same classification as original  Challenge classification when necessary  Carry over longest period of classification to the new document  Maintain list of sources used to compile the derivative document DERIVATIVE CLASSIFICATION RESPONSIBILITIES

 In many cases those performing on classified contracts may assemble, modify, or construct classified information, reports, hardware and etc. into a new product. In that case the new product is an item derived from different sources.  Both the contractor and the government have responsibilities. The Cognizant Security Agency provides the instruction and resources and the contractor complies. DERIVATIVE CLASSIFICATION RESPONSIBILITIES

EXAMPLES OF DOCUMENT MARKINGS Overall classification from source document Paragraph from source to derived document “Derived From” line based on information from source documents

 Contractors assist and ensure they understand guidance  The contract security classification specification identifies the specific elements of classified information involved in the contract that require security protection (NISPOM 4-103)  The FSO directs and implements the security measures necessary to protect the classified material to the appropriate level.  The GSA determines the disposition. Once the contract expires, the FSO can coordinate with the GCA to extend the storage of classified material related to the contract for up to two years CLASSIFICATION

 Contractors are obliged to challenge classification through the GCA for any of the following situations:  Improperly classified  Current situations warrant upgrade or downgrade  Security Classification Guide is improper or inadequate  Users of classified information may discover that the classification level may be inappropriate or unnecessary. These holders have a duty to report their beliefs to the agency for review and decision CLASSIFICATION

Contractor Developed information may need to be classified  If previously classified, use proper DDForm254, classification guide or source document  If not previously classified, but should be classified protect it and submit to proper agency  Use the following marking: CLASSIFICATION DETERMINATION PENDING Protect as though classified (TOP SECRET, SECRET, CONFIDENTIAL) CLASSIFICATION

A contractor may have developed a product that they believe should be protected as classified. The item or information may have been previously classified. If that’s the case, then refer to the source document, classification guide and/or the DDForm254 There may be situations where a contractor has created a product that they believe should be protected as classified, but there is no guidance. In that case it will be necessary to protect the item to the level they believe it to be and submit to the proper agency for evaluation. However, the item or information must have one or both of the following characteristics: NISOM Derivative classified information from which contractor was given prior access 2. Government must have a proprietary interest in the information CLASSIFICATION

 Information that loses sensitivity based on time or event is downgraded or declassified. The action is taken based on formal notification or from the Contract Security Classification Guidance.  Contractors should consult with the GCA prior to taking downgrade or declassification action. Once approved, documentation and remarking should take place concurrently. DOWNGRADING OR DECLASSIFICATION

 The NISP is created to protect classified information  Information is protected according to guidance in the Contract Security Classification Specification  Contractors may construct, compile, extract or summarize classified information into a new document. This is called derivative information  Classified material should always be marked and protected at the correct level SUMMARY

Click on the correct answers TEST

1.All of the following are classifications except: A.TOP SECRETTOP SECRET B.CONFIDENTIALCONFIDENTIAL C.SECRETSECRET D.FOR OFFICIAL USE ONLYFOR OFFICIAL USE ONLY 2.Guidance for performing on classified contract is found in A.SF328SF328 B.DDForm441DDForm441 C.SF86SF86 D.DDForm254DDForm254 3.Derivative information involves marking original classified information at the proper level A.TrueTrue B.FalseFalse 4.All must be considered before the OCA can assign a classification marking except A.May cause damage to national securityMay cause damage to national security B.Is owned by the GovernmentIs owned by the Government C.Displays nuclear vulnerabilitiesDisplays nuclear vulnerabilities D.Hide an nationally embarrassing situationHide an nationally embarrassing situation TEST-SELECT THE CORRECT ANSWER

5.Which of the following is described as possible damage for unauthorized disclosure of SECRET A.Causes extremely serious damageCauses extremely serious damage B.Causes damageCauses damage C.Causes extremely grave damageCauses extremely grave damage D.Causes serious damageCauses serious damage 6.GCA can approve storage of classified up to three years after expiration of contract A.TrueTrue B.FalseFalse TEST-SELECT THE CORRECT ANSWER

Go Back!

Go Back!

Go Back!

Go Back!

CERTIFICATE