Presentation is loading. Please wait.

Presentation is loading. Please wait.

Www.ispcert.com CLASSIFICATION. www.ispcert.com Classification Marking requirements Test CONTENTS.

Similar presentations


Presentation on theme: "Www.ispcert.com CLASSIFICATION. www.ispcert.com Classification Marking requirements Test CONTENTS."— Presentation transcript:

1 www.ispcert.com CLASSIFICATION

2 www.ispcert.com Classification Marking requirements Test CONTENTS

3 www.ispcert.com  Presidential Executive Order 12829 HOW CLASSIFICATION CAME TO BE The executive order was given to provide security measures to safeguard classified information that has been or may be released to… “current, prospective, or former contractors, licensees, or grantees of United States agencies”. It is also designed to provide for the protection of classified material as outlined in EO 12356 and the Atomic Energy Act of 1954, as amended.

4 www.ispcert.com  Provides Classified National Security Information and delivers a cohesive method for designation classification  The Government has designed stringent policy to ensure that classified material is protected at the level necessary to prevent unauthorized disclosure. CLASSIFICATION VIA EO

5 www.ispcert.com  CONFIDENTIAL information could reasonably be expected cause damage  SECRET could reasonably be expected to cause serious damage  TOP SECRET could reasonably be expected to cause exceptionally grave damage to national security. THREE DESINGNATIONS FOR CLASSIFIED Caution: Classified information designated CONFIDENTIONAL should not be confused with the proprietary information sometimes referred to as company confidential.

6 www.ispcert.com Four conditions must be met before assigning classification  An original classification authority is applying the classification level  The U.S. Government owns, is producing, or is controlling the information  Information meets one of eight categories  The Original Classification Authority determines unauthorized disclosure could cause damage to national security, including transnational terrorism and they can identify or describe the damage CONDITIONS FOR CLASSIFICATION

7 www.ispcert.com  According to a report from the Chairman of the House National Security Subcommittee, 10% of secrets should have never been classified and that nearly 90% of classified information has been over-classified  A Defense Security Services report stated in 2003 nearly $6.5 billion was spent to classify information  To prevent such abuse, the Executive Order provides guidance to train and prevent classification authorities from arbitrarily assigning a classification level CONDITIONS FOR CLASSIFICATION

8 www.ispcert.com 1.Military plans, weapons systems or operations  The U.S. armed forces not only safeguards, but provides instructions for protecting the specifics of their weapons and plans. If these strategies and operations were released to the wrong hands, the information would damage national security and adversely affect our ability to defend ourselves 2.Foreign government information  This knowledge includes what the U.S. Government may already know about other governments. This gives the U.S. the advantage of knowing information that another country thinks is protected. WHAT ARE THE EIGHT CATEGORIES

9 www.ispcert.com 3.Intelligence activities, sources, or methods or cryptology  One can imagine what damage could take place if any intelligence gathering sources, methods or activities were compromised. The suspecting adversary could become aware of the threat and cease their activity or design countermeasures designed to thwart future efforts. WHAT ARE THE EIGHT CATEGORIES

10 www.ispcert.com 4.Foreign relations or activities of the United States including confidential sources  This information is specified U.S. foreign policy activities and sources friendly to U.S. efforts and U.S. organizations. Such is protected to ensure the safety of the relations and success of the activities. Compromise of any of the sources could cause damage to National Security as they are denied further access. 5.Scientific, technological, or economic matters relating to national security, including defense against transnational terrorism  Unauthorized access to national security-related U.S. scientific, technological, and economic data could compromise plans, production, and strategies and leave certain vulnerabilities. WHAT ARE THE EIGHT CATEGORIES

11 www.ispcert.com 6.U.S. programs for safeguarding nuclear materials or facilities  For nuclear activities, the Department of Energy and the Nuclear Regulation Commission provide specific guidance to ensure the best protection. Vulnerabilities and strengths are assessed to ensure the best possible measures are in place to protect these items. Plans, strategies and programs are only effective if enforced AND access is limited. WHAT ARE THE EIGHT CATEGORIES

12 www.ispcert.com 7.Vulnerabilities of systems, installations, infrastructures, projects, plans or protection services related to national security including terrorism  Security managers assess strengths and to ensure the best possible measures are in place to protect these items. Plans, strategies and programs are only effective if enforced AND access is limited. An adversary could use the programs to gain advantages, steal, damage or destroy systems, installations, infrastructures, projects, plans or protection services. 8.Weapons of Mass Destruction  Information fitting this category is classified to prevent unauthorized disclosure. Such unauthorized disclosure could make the U.S. vulnerable to adversaries to include transnational terrorists. WHAT ARE THE EIGHT CATEGORIES

13 www.ispcert.com  Users of classified material must understand the level of classification they are working with. The OCA not only classifies the information, but tells why it is classified, what level of damage to national security the information may affect and the date or event for the duration of the classification.  Classification must be evident and marked clearly for easy identification  Whether a document or end item, individual components must be marked at the appropriate level CLASSIFICATION EVENTS

14 www.ispcert.com Derivative classification involves extracting, summarizing, or deriving classification from another source  FSO ensures contractor is training and has resources  Contractor ensures:  Use of Security Classification Guide  Mark derived copy with the same classification as original  Challenge classification when necessary  Carry over longest period of classification to the new document  Maintain list of sources used to compile the derivative document DERIVATIVE CLASSIFICATION RESPONSIBILITIES

15 www.ispcert.com  In many cases those performing on classified contracts may assemble, modify, or construct classified information, reports, hardware and etc. into a new product. In that case the new product is an item derived from different sources.  Both the contractor and the government have responsibilities. The Cognizant Security Agency provides the instruction and resources and the contractor complies. DERIVATIVE CLASSIFICATION RESPONSIBILITIES

16 www.ispcert.com EXAMPLES OF DOCUMENT MARKINGS Overall classification from source document Paragraph from source to derived document “Derived From” line based on information from source documents

17 www.ispcert.com  Contractors assist and ensure they understand guidance  The contract security classification specification identifies the specific elements of classified information involved in the contract that require security protection (NISPOM 4-103)  The FSO directs and implements the security measures necessary to protect the classified material to the appropriate level.  The GSA determines the disposition. Once the contract expires, the FSO can coordinate with the GCA to extend the storage of classified material related to the contract for up to two years CLASSIFICATION

18 www.ispcert.com  Contractors are obliged to challenge classification through the GCA for any of the following situations:  Improperly classified  Current situations warrant upgrade or downgrade  Security Classification Guide is improper or inadequate  Users of classified information may discover that the classification level may be inappropriate or unnecessary. These holders have a duty to report their beliefs to the agency for review and decision CLASSIFICATION

19 www.ispcert.com Contractor Developed information may need to be classified  If previously classified, use proper DDForm254, classification guide or source document  If not previously classified, but should be classified protect it and submit to proper agency  Use the following marking: CLASSIFICATION DETERMINATION PENDING Protect as though classified (TOP SECRET, SECRET, CONFIDENTIAL) CLASSIFICATION

20 www.ispcert.com A contractor may have developed a product that they believe should be protected as classified. The item or information may have been previously classified. If that’s the case, then refer to the source document, classification guide and/or the DDForm254 There may be situations where a contractor has created a product that they believe should be protected as classified, but there is no guidance. In that case it will be necessary to protect the item to the level they believe it to be and submit to the proper agency for evaluation. However, the item or information must have one or both of the following characteristics: NISOM 4-105 1. Derivative classified information from which contractor was given prior access 2. Government must have a proprietary interest in the information CLASSIFICATION

21 www.ispcert.com  Information that loses sensitivity based on time or event is downgraded or declassified. The action is taken based on formal notification or from the Contract Security Classification Guidance.  Contractors should consult with the GCA prior to taking downgrade or declassification action. Once approved, documentation and remarking should take place concurrently. DOWNGRADING OR DECLASSIFICATION

22 www.ispcert.com  The NISP is created to protect classified information  Information is protected according to guidance in the Contract Security Classification Specification  Contractors may construct, compile, extract or summarize classified information into a new document. This is called derivative information  Classified material should always be marked and protected at the correct level SUMMARY

23 www.ispcert.com Click on the correct answers TEST

24 www.ispcert.com 1.All of the following are classifications except: A.TOP SECRETTOP SECRET B.CONFIDENTIALCONFIDENTIAL C.SECRETSECRET D.FOR OFFICIAL USE ONLYFOR OFFICIAL USE ONLY 2.Guidance for performing on classified contract is found in A.SF328SF328 B.DDForm441DDForm441 C.SF86SF86 D.DDForm254DDForm254 3.Derivative information involves marking original classified information at the proper level A.TrueTrue B.FalseFalse 4.All must be considered before the OCA can assign a classification marking except A.May cause damage to national securityMay cause damage to national security B.Is owned by the GovernmentIs owned by the Government C.Displays nuclear vulnerabilitiesDisplays nuclear vulnerabilities D.Hide an nationally embarrassing situationHide an nationally embarrassing situation TEST-SELECT THE CORRECT ANSWER

25 www.ispcert.com 5.Which of the following is described as possible damage for unauthorized disclosure of SECRET A.Causes extremely serious damageCauses extremely serious damage B.Causes damageCauses damage C.Causes extremely grave damageCauses extremely grave damage D.Causes serious damageCauses serious damage 6.GCA can approve storage of classified up to three years after expiration of contract A.TrueTrue B.FalseFalse TEST-SELECT THE CORRECT ANSWER

26 www.ispcert.com Go Back!

27 www.ispcert.com Go Back!

28 www.ispcert.com Go Back!

29 www.ispcert.com Go Back!

30 www.ispcert.com CERTIFICATE


Download ppt "Www.ispcert.com CLASSIFICATION. www.ispcert.com Classification Marking requirements Test CONTENTS."

Similar presentations


Ads by Google