CMC REQUIRED PROCEDURES
|
|
|
- Diana Willis
- 10 years ago
- Views:
Transcription
1 Revised: October 2014 CMC REQUIRED PROCEDURES The following information is provided as guidance for Federal Government, Contractor and Military entities authorized to send COMSEC and classified non- COMSEC materiel items to the Classified Materiel Conversion (CMC) for declassification, destruction and disposition. Please review these procedures thoroughly and ensure that this information is widely distributed throughout your appropriate command chains and management structures. REQUIRED CMC PAPERWORK - RECEIPT FOR DESTRUCTION The CMC Receipt for Destruction is the only paperwork required when shipping and/or delivering materiel items. Additional forms or paperwork will not be accepted and any additional documents will not be returned. Please use only the Adobe version of the receipt, revision date 13 January 2009, found within the series of links on the CMC web page. Reference the section below for web page addresses. ADDITIONAL PAPERWORK FOR CONTRACTORS In addition to the CMC Receipt for Destruction, all contractor entities delivering or shipping materiel items are required to provide a completed copy of the Contractors Approval Form (CAF). If submitting the CAF with a contract number, the bottom portion of the form must be completed by the Contracting Officer Representative (COR). Possession of multiple contracts requires providing materials sent for destruction. The COR signature must be updated whenever changes to the contract occur and signatures must not exceed one year after submission. If submitting the CAF with a COMSEC Account Number, the bottom portion of the form may be completed by the COMSEC Custodian. The CAF can be found on the CMC web page. Reference the section for web page addresses.
2 REQUIRED INFORMATION FOR COMPLETION OF THE CMC RECEIPT FOR DESTRUCTION Use only the Adobe version of the CMC Receipt, revision date 13 January 2009, obtained from the series of links on the CMC web page. Recreations or modifications of the original CMC Receipt for Destruction will not be accepted. Reference the section below for web page addresses. The Receipt for Destruction must contain the following information and please write legibly when filling out the form: Date of completion Assigned Customer ID Number (CIN). The CIN is not a UIC or assigned COMSEC Account Number Full name of Government or Contractor entity. Military entities are to provide specific organizational name and command information (i.e., Division, Regiment, Battalion) without using acronyms. Complete mailing address (CONUS military locations provide street, city and state as opposed to APO AE/AP addresses) Point of contact, unclassified phone, fax and address Middle portion of the receipt should list quantity or poundage estimate of materiel items. Materiel items are measured in pounds, measured in quantity. Darkened or greyed areas on the receipt signify do not write in that space. Do not fill in blank spaces with zeros, slashes, N/A, etc. Additional verbiage is prohibited in the quantity and pounds columns and do not add additional text in the margin areas. An exception is when sending multiple boxes (See Requirements for Completion of the CMC Receipt for Destruction (Shipping) Section below. Materiel items not listed that have been approved by the CMC for acceptance should be entered in the section entitled Other Provide materiel description and quantity in the blocks provided on the receipt. Example: KOV-; KSV-. PROCEDURES FOR OBTAINING AN ASSIGNED CUSTOMER IDENTIFICATION NUMBER (CIN)
3 A CMC Account is to be established before sending or delivering materiel items to the CMC. Upon initial establishment of an account a Customer Identification Number (CIN) will be assigned by the CMC Office and ed to the requesting entity in the form of a CMC Policy Letter. The Policy Letter will outline the responsibilities of the requesting entity in conjunction with the handling, protection and dissemination of the assigned CIN. To request an account please to: [email protected]. Prior to requesting an account please check with your appropriate command structure and/or management chain to determine if a CIN has previously been assigned by the CMC Office. to signify a Government account to signify a Contractor account. The capitol letter is followed by a minimum of one to a maximum of four digits. As an account holder, your facility is responsible for establishing a POC that will provide oversight to ensure CMC procedures are followed. The POC is responsible for contacting the CMC Customer Service Office for any informational changes to the account. HANDLING, PROTECTION AND DISSEMINATION OF AN ASSIGNED CUSTOMER IDENTIFICATION NUMBER (CIN) The CMC Office currently manages over 6,500 individual military, government and contractor accounts and will not be responsible for informing account holders on multiple occasions as to their assigned CIN. Therefore, please read and disseminate the following information throughout your appropriate organizational command chain and management structures for immediate implementation. This is CMC Policy and will be strictly enforced: It is the sole responsibility of the account holders to ensure that the assigned CIN is handled, protected and disseminated to all present and future assignees of their specific organizations. Multiple requests for disclosure of a previously assigned CIN will not be addressed unless requested by the Organizational Commanding Officer (Military) or Executive Management chain (Government or Contractor). Non-compliance with this policy may result in non-return of materiel items, nonreturn of CMC Receipt for Destruction and/or suspension of destruction services.
4 REQUIREMENTS FOR COMPLETION OF CMC RECEIPT FOR DESTRUCTION (SHIPPING) When shipping materiel items to the CMC the following procedures will apply: When shipping separate packages, an itemized copy of the CMC Receipt for Destruction is required for each package. In addition, Government and Military entities are required to enclose a self-addressed envelope for each package. Contractor entities are required to enclose a completed Contractors Approval Form (CAF) and a self-addressed envelope with proper postage or FED EX envelope with account information for each package. All envelopes should be properly sized, paper clipped to each CMC receipt and placed inside each package. Itemize on each CMC receipt the materiel items and quantities/pounds you have placed in that particular package. Indicate in the white space on top of each CMC receipt the total number of separate packages sent in the shipment. For example, if shipping (2) separate packages, label the receipts as follows: Receipt #1 (Package 1 of 2); Receipt #2 (Package 2 of 2). Individual packages must not exceed 40 pounds in total weight. When shipping packages that have been palletized and shrink wrapped, it is permissible to use one itemized CMC Receipt for Destruction for each pallet. Itemize on each CMC receipt the material items and quantities/pounds placed on that particular pallet. Government and Military entities are required to enclose a self-addressed envelope for each pallet. Contractor entities are required to enclose a completed Contractors Approval Form (CAF) and a self-addressed envelope with proper postage or FED EX envelope with account information. All envelopes should be properly sized, paper clipped to the receipt and enclosed in one of the packages for each pallet. Write the words on all sides of the package in which the paperwork and envelope was inserted and place that package on top so it will be opened first. Indicate in the white space on top of each receipt the total number of pallets in the shipment. For example, if shipping (2) pallets, label the receipts as follows: Receipt #1 (Pallet 1 of 2); Receipt #2 (Pallet 2 of 2). There is no weight limit on individual packages when palletizing and shrink wrapping. Larger shipments may be required to be packaged in a 4 foot x 4 foot x 4 foot triwall palletized container. Please check with the CMC Customer Service Office prior to sending shipments.
5 When sending FED EX envelops for the return of the CMC Receipt for Destruction, make sure the return label contains your return address information as both the sender and recipient along with your billing information in order that FED EX will charge your account for the return postage. REQUIREMENTS FOR COMPLETION OF CMC RECEIPT FOR DESTRUCTION (DELIVERING) When delivering material items hand carry 2 completed copies of the CMC Receipt for Destruction. Self-addressed or FED EX envelops are not required as delivery personnel will receive a signed and dated copy of the CMC Receipt upon acceptance of your shipment. Contractors are also required to provide a current Contractor Approval Form (CAF) along with the CMC Receipt for Destruction. Reference the Completion of the CMC Receipt for for guidance. SUBMISSON OF A VISITOR REQUEST (VR) Prior to delivering materiel items to the CMC, the submission of a Visitor Request (VR) is required 2 business days (48 Hours) in advance of your requested delivery date. The VR is sent via fax to (301) and must contain the following information: Full name of Government, Contractor or Military entity. When identifying military organizations please spell out the complete organizational name and never use acronyms. Assigned Customer Identification Number (CIN). Complete Mailing Address Point of Contact and Commercial Phone/FAX Number Date of Visit (Provide One Primary and Two Secondary Dates) List each Materiel Item to include QUANTITY (for Hard Drives and a POUNDAGE ESTIMATE for all other Items. Full name, Full Social Security Number, and Date and Place of Birth for each individual. If Military, identify Branch of Service
6 represented and Rank. If a contractor employee provide the name of company represented All visitors MUST BE U.S. CITIZENS. Upon approval, the POC will be contacted by phone or to confirm visit date and provide specific delivery instructions. If an approval was not confirmed prior to your requested primary date of delivery, contact the CMC Customer Service Office to confirm that your request was received. PRE-APPROVAL REQUIREMENTS FOR CONTRACTOR ENTITIES Contractor entities sending or delivering classified materiel items to the CMC, must receive pre-approval from the CMC Office by the completion and submission of the Contractors Approval Form (CAF). The submission of the approval form is to verify that: 1. The contractor is sending COMSEC materiel items covered under a current COMSEC Account Number, or; 2. Non-COMSEC classified material items under a current contract with a U.S. Intelligence Community (IC), U.S. Federal Government or Military entity that has agreed to provide the contractor with Government Furnished Equipment (GFE). 3. The CMC will accept non-comsec contractor owned classified items if they contain direct and only direct NSA information. 4. Contractor entities are responsible for updating COMSEC and Contract information previously submitted to the CMC via submission of a Contractor Approval Form. The Contractor Approval Form can be obtained within the series of links on the CMC web page. Reference the section listed below for web page addresses. EXAMPLES OF UNACCEPTED MATERIEL ITEMS (LIST NOT ALL INCLUSIVE) The following materiel items are not accepted by the CMC and are subject to immediate return:
7 Whole Pieces of Equipment Computer Towers Laptops Computer Monitors Keyboards Printers and Printer Components (Toner Cartridges, Drums, Fusers and Rollers) Copiers and Copier Components Telephones or General Office Equipment Cables and Wires Routers and Switches Hard Drives that have been degaussed though the utilization of NSA approved destruction equipment, or have been drilled, punched, hammered or mutilated in any way All that DO NOT CONTAIN PERSONNAL IDENTIFIABLE INFORMATION (PII) Contractor owned or purchased classified material (non-gfe) that DOES NOT CONTAIN DIRECT NSA INFORMATION Contractor owned unclassified materials that are not relevant to NSA ACCEPTED MATERIEL ITEMS, SHIPPING INSTRUCTIONS/ADDRESSES Non-COMSEC materiel items classified at the overall level of SECRET AND BELOW may be shipped via Registered Mail or FED EX. Materiel items classified at the overall level of ABOVE SECRET should be shipped DCS. COMSEC materiel items classified at the overall level of CONFIDENTIAL OR ABOVE MUST be shipped DCS.
8 ACCEPTED MATERIEL ITEMS Aluminum Disks/Products Computer and COMSEC Chips Film Magnetic Media Fort KSD-- Microfiche Mylar/Paper Tape Paper (Water Soluble) SHIPPING INSTRUCTIONS AND ADDRESSES IF OVERALL CLASSIFICATION OF NON- COMSEC ITEM LISTED ON LEFT IS AT THE LEVEL OF: SECRET & BELOW Send Via Registered Mail or FED EX TO: National Security Agency ATTN: CMC-Suite 6875 or Savage Road Fort George G. Meade, MD Identification (CAC) Cards * Cell and Smart Phones * Blackberry Devices * Printed Circuit Boards # Hard Drives *REMOVE ALL POWER SUPPLIES AND BATTERIES #HARD DRIVES MUST BE IN THE ORGINIAL CONDITION AS RECEIVED FROM THE MANUFACTURE. ALL MOUNTING BRACKETING, FRAMING, PROTRUDING SCREWS, BACKING PLATES AND CIRCUIT BOARDS MUST BE REMOVED PRIOR TO SENDING TO THE CMC MATERIELS NOT LISTED ABOVE MUST BE APPROVED BY THE CMC PRIOR TO SHIPPING OR DELIVERING TO OUR FACILITY IF OVERALL CLASSIFICATION OF NON- COMSEC ITEM LISTED ON LEFT IS AT THE LEVEL OF: ABOVE SECRET Send Via Defense Courier Service (DCS) HKD BA FILM DESTRUCTION FACILITY IF OVERALL CLASSIFICATION OF COMSEC ITEM LISTED ON LEFT IS AT THE LEVEL OF: CONFIDENTIAL & ABOVE Send via Defense Courier Service To the DCS Address Listed Above WHEN SENDING COMSEC MATERIELS AN SF-153 IS NOT REQUIRED
9 SUMMARY Please keep in mind that the procedures outlined in this document do not cover every contingency and circumstance. Specific issues not covered should be directed to the CMC Customer Service Office. Failure to follow CMC procedures will result in a CMC Corrective Action Report included with your return copy of the CMC Receipt for Destruction, or an notification by the CMC Customer Service Office. Once received, it is expected that your command or management chain will take immediate corrective action on each procedural violation listed. We strongly suggest that prior to sending or delivering material shipments that you review this document thoroughly and contact the CMC Customer Service Office with specific questions. The CMC is a logistics organization and as such, we do not provide specific guidance on packaging and wrapping. All questions pertaining to packaging and wrapping should be directed to your appropriate military, government or contractor security office. Along those same lines, the CMC is not a COMSEC organization. Therefore, when sending COMSEC materials to the CMC you are requesting that only a destruction service be provided. The items are not transferred to the CMC as we do not have a COMSEC Account Number in which to transfer. Therefore, an SF-153 is not required when sending COMSEC material shipments. Please retain the SF-153 until you receive your signed and dated copy of the CMC receipt verifying destruction. Attach the CMC receipt to your SF-153 and forward through the COR to have the materials removed from your records. Please be advised that Report of Shipments (REPSHIPS) should not be sent to the CMC Customer Service Office. Send all REPSHIPS via unclassified fax to the CMC Degaussing Office at the number listed in the Contact Information Section below. Materiel i chart above, are subject for immediate return. If your organization is in possession of a classified materiel item not listed in this document and wishes to make an inquiry as to CMC acceptance, please contact the CMC Customer Service Office on or to: cmc@nsa..
10 CMC Customer Service Office: Phone: / FAX: Address: CONTACT INFORMATION CMC Web Page Address: or CMC Degaussing Office: Phone: FAX: Media Technology Center: Phone: COMSEC Information Office: Phone:
UNCLASSIFIED//FOR OFFICIAL USE ONLY NATIONAL SECURITY AGENCY
NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE (Ul COMSEC CUSTODIAN- IMPORTANT NUMBERS & ASSOCIATED WEB SITES: (U) DSN Prefix: for (41 0) use 244// (301) use 644 unless noted otherwise. (UI/FOUO) Control.
Defense Logistics Agency. Turn-in Guidance for Disposition of Unclassified Computer Hard Drives
Defense Logistics Agency Turn-in Guidance for Disposition of Unclassified Computer Hard Drives 1 Foreword It is very important to check all your computer equipment and property prior to turn-in to the
Commanding Officer and Executive Officer. Information and Personnel Security Reference Handbook
Commanding Officer and Executive Officer Information and Personnel Security Reference Handbook Assistant for Information and Personnel Security (N09N2) Office of the Chief of Naval Operations Governing
Premium Forwarding Service Residential (PFS-Residential ) Application
Premium Forwarding Service Residential (PFS-Residential ) Application Instructions PLEASE READ CAREFULLY BEFORE YOU COMPLETE THIS FORM. Instructions for completing this form are printed on the reverse
Premium Forwarding Service (PFS ) Application
Instructions PLEASE READ CAREFULLY BEFORE YOU COMPLETE THIS FORM. Individual Entire Household Premium Forwarding Service (PFS ) Application Instructions for completing this form are printed on the reverse
Approved By: Agency Name Management
Policy Title: Effective Date: Revision Date: Approval(s): LASO: CSO: Agency Head: Media Protection Policy Every 2 years or as needed Purpose: The intent of the Media Protection Policy is to ensure the
JOB AID. Derivative Classification Training U N I T E D A M E R I C A S TAT E S O F. Center for Development of Security Excellence (CDSE) www.cdse.
Center for Development of Security Excellence Learn. Perform. Protect. www.cdse.edu DEFENSE SECURITY SERVICE U N I T E D S TAT E S O F A M E R I C A Center for Development of Security Excellence (CDSE)
Additional Terms And Conditions Taiwan Air Force (TAF) E-2T Aircraft Retrofit of TW 1-4 (Prime Contract No. N00019-09-C-0040)
Additional Terms And Conditions Taiwan Air Force (TAF) E-2T Aircraft Retrofit of TW 1-4 (Prime Contract No. N00019-09-C-0040) All of the additional terms and conditions set forth below are incorporated
APPLICATION TO THE SACRAMENTO COUNTY BAR/ INDIGENT DEFENSE PANEL (IDP)
APPLICATION TO THE SACRAMENTO COUNTY BAR/ INDIGENT DEFENSE PANEL (IDP) 1. Read the enclosed summary of Program Description, Trial Requirements, Rules, Application, Agreement and Authorization and Release
Guideline for Mapping Types of Information and Information Systems to Security Categorization Levels SP 800-60 AP-2/03-1
Guideline for Mapping Types of Information and Information Systems to Security Categorization Levels SP 800-60 FISMA Legislation Overview (Public Law 107-347) Framework for ensuring effectiveness of Federal
IA/CYBERSECURITY IS CRITICAL TO OPERATE IN CYBERSPACE
IA/CYBERSECURITY IS CRITICAL TO OPERATE IN CYBERSPACE Commanders, leaders, and managers are responsible for ensuring that Information Assurance/Cybersecurity is part of all Army operations, missions and
Guidelines Related To Electronic Communication And Use Of Secure E-mail Central Information Management Unit Office of the Prime Minister
Guidelines Related To Electronic Communication And Use Of Secure E-mail Central Information Management Unit Office of the Prime Minister Central Information Management Unit Office of the Prime Minister
Cash, Petty Cash, Change Funds, and Credit Cards
CASH As public servants, it is our responsibility to safeguard taxpayer s dollars while adhering to laws and regulations governing processes over cash handling. Internal controls over cash are necessary
This directive applies to all DHS organizational elements with access to information designated Sensitive Compartmented Information.
Department of Homeland Security Management Directives System MD Number: 11043 Issue Date: 09/17/2004 SENSITIVE COMPARTMENTED INFORMATION PROGRAM MANAGEMENT I. Purpose This directive establishes Department
Information Security Program Management Procedures and Guidelines
Directive: LPR 1620.1C Effective Date: June 20, 2014 Expiration Date: May 31, 2019 Langley Research Center Information Security Program Management Procedures and Guidelines National Aeronautics and Space
Payment Card Industry (PCI) Policy Manual. Network and Computer Services
Payment Card Industry (PCI) Policy Manual Network and Computer Services Forward This policy manual outlines acceptable use Black Hills State University (BHSU) or University herein, Information Technology
The E-Discovery Process
POOLING PROVISIONS The E-Discovery Process A publication of Nevada Public Agency Insurance Pool The e- discovery process the search of electronic records for use as legal evidence can cost thousands of
Privacy Act of 1974; Department of Homeland Security <Component Name> - <SORN. AGENCY: Department of Homeland Security, Privacy Office.
DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2014-] Privacy Act of 1974; Department of Homeland Security -
Washington Headquarters Services ADMINISTRATIVE INSTRUCTION
Washington Headquarters Services ADMINISTRATIVE INSTRUCTION NUMBER 94 October 19, 2007 Incorporating Change 1, February 19, 2008 DFD SUBJECT: Personal Property Management and Accountability References:
14 FAM 730 OFFICIAL MAIL AND CORRESPONDENCE
14 FAM 730 OFFICIAL MAIL AND CORRESPONDENCE (CT:LOG-202; 08-10-2015) (Office of Origin: A/LM/PMP/DPM) 14 FAM 731 TYPES OF MAIL ROOMS a. There are four types of mail rooms subject to the policies in chapter
Standards for Security Categorization of Federal Information and Information Systems
FIPS PUB 199 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Standards for Security Categorization of Federal Information and Information Systems Computer Security Division Information Technology
Defense Security Service (DSS)
Defense Security Service (DSS) Center for Development of Security Excellence (CDSE) ADMINISTRATIVE INQUIRY (AI) PROCESS JOB AID July 2011 TABLE OF CONTENTS 1. INTRODUCTION... 1 1.1 Scope... 1 2. PRELIMINARY
ORDER PROCESSING/SHIPPING
ORDER PROCESSING/SHIPPING An order is now in the system, but it still needs to be finalized through the Software and prepared for shipping. Finalizing an order includes invoicing, updating inventory records,
New Account Application - Fill out the account application and bring it with your Driver s License to Grand Bank s office at 204 Westover Drive.
At Grand Bank, we re making it simple for you to switch all your accounts and use us as your primary hometown financial institution. Print and complete these forms. Bring your Driver s License and completed
This page left blank.
This page left blank. Introduction 2 Reminders 2 SECTION 1 Originally Classified Documents 3 Portion Marking 5 Overall Classification Marking 6 Classification Authority Block Classified By line 7 Reason
PERFORMANCE WORK STATEMENT. for. United States Air Forces in Europe (USAFE)/ Air Forces Africa (AFAFRICA)
PERFORMANCE WORK STATEMENT for United States Air Forces in Europe (USAFE)/ Air Forces Africa (AFAFRICA) Communications Directorate (A6) Task Management Tool (TMT) Support 1 TABLE OF CONTENTS Contract Number
USER INFORMATION REQUEST NON-GOVERNMENT ORGANIZATION
EADSIM Extended Air Defense Simulation USER INFORMATION REQUEST NON-GOVERNMENT ORGANIZATION Return this User Information Request and completed Software User's Agreement to: Teledyne Brown Engineering Attn:
**************** UNCLASSIFIED / **************** Precedence: ROUTINE DTG: 281759Z Aug 12 Originator: DON CIO WASHINGTON DC(UC) UNCLASSIFIED//
**************** UNCLASSIFIED / **************** Precedence: ROUTINE DTG: 281759Z Aug 12 Originator: DON CIO WASHINGTON DC(UC) UNCLASSIFIED// FROM: DON CIO WASHINGTON DC TO: ASN(M&RA) ASN(RD&A) ASN(EI&E)
Department of Commerce Office of Security. Initial Information Security Briefing
Department of Commerce Office of Security Initial Information Security Briefing Security Clearance A security clearance is a determination of trust, which makes you eligible for access to classified information.
PROCESSING CLASSIFIED INFORMATION ON PORTABLE COMPUTERS IN THE DEPARTMENT OF JUSTICE
PROCESSING CLASSIFIED INFORMATION ON PORTABLE COMPUTERS IN THE DEPARTMENT OF JUSTICE U.S. Department of Justice Office of the Inspector General Audit Division Audit Report 05-32 July 2005 PROCESSING CLASSIFIED
DBIDS/IACS PRIVACY IMPACT ASSESSMENT (PIA) 2. Name of IT System: Defense Biometric Identification System (DBIDS)
DBIDS/IACS PRIVACY IMPACT ASSESSMENT (PIA) (Use N/A where appropriate) 1. DoD Component: Defense Manpower Data Center (DMDC) 2. Name of IT System: Defense Biometric Identification System (DBIDS) 3. Budget
L-3 Guardian SME PED Frequently Asked Questions
1. What is L-3 Guardian and why do I want one? L-3 Guardian was developed under the NSA Secure Mobile Environment Personal Electronic Device (SME PED) Program. L-3 Guardian is a wireless handheld PDA which
PRIVACY IMPACT ASSESSMENT (PIA) For the
PRIVACY IMPACT ASSESSMENT (PIA) For the TOTAL WORKFORCE MANAGEMENT SERVICES (TWMS) Department of the Navy - CNIC SECTION 1: IS A PIA REQUIRED? a. Will this Department of Defense (DoD) information system
New Carrier Setup Form
New Carrier Setup Form Carrier Name: Business Address Street: City: State: Zip: Contact Name: Phone Number: Cell Phone Number: Toll Free Phone Number: Fax Number: Email Address: Payee Address (if different)
MAIL SERVICES. (Except for the holidays observed by the University of Massachusetts Lowell)
MAIL SERVICES Mission: The mission of the Mail Services is to offer cost effective mail services to the university community, striving to provide quality and timely service to all academic and administrative
HIPAA Policy, Protection, and Pitfalls ARTHUR J. GALLAGHER & CO. BUSINESS WITHOUT BARRIERS
HIPAA Policy, Protection, and Pitfalls Overview HIPAA Privacy Basics What s covered by HIPAA privacy rules, and what isn t? Interlude on the Hands-Off Group Health Plan When does this exception apply,
Department of Defense INSTRUCTION. SUBJECT: Information Assurance (IA) in the Defense Acquisition System
Department of Defense INSTRUCTION NUMBER 8580.1 July 9, 2004 SUBJECT: Information Assurance (IA) in the Defense Acquisition System ASD(NII) References: (a) Chapter 25 of title 40, United States Code (b)
NATO SECURITY BRIEFING NATO/ATOMAL SECURITY BRIEFING
NATO SECURITY BRIEFING FOREWORD This sample security briefing contains the minimum elements of information that must be provided to individuals upon initial indoctrination for access to NATO classified
The Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3
Table of Contents 1 Acceptable use 1 Violations 1 Administration 1 Director and Supervisor Responsibilities 1 MIS Director Responsibilities 1 The Internet and e-mail 2 Acceptable use 2 Unacceptable use
ESRD Application Access Form Previously known as Part B of the QualityNet Identity Management System (QIMS) Account Form
Previously known as Part B of the QualityNet Identity Management System (QIMS) Account Form You must have a QIMS account in order to access (1) CROWNWeb and/or (2) ESRD Quality Incentive Program (QIP)
United Cerebral Palsy of Greater Chicago Records and Information Management Policy and Procedures Manual, December 12, 2008
United Cerebral Palsy of Greater Chicago Records and Information Management Policy and Procedures Manual, December 12, 2008 I. Introduction United Cerebral Palsy of Greater Chicago ( UCP ) recognizes that
Chapter Quarterly Financial Report Instructions (Quarterly Format)
Chapter Quarterly Financial Report Instructions (Quarterly Format) Chapters are expected to maintain 100% compliance with reporting requirements to National. This is important because chapters are organized
APPROVED BY: DATE: NUMBER: PAGE: 1 of 9
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
Vendor Requirements and Compliances
Vendor Requirements and Compliances As a valued supplier to Ottens Flavors there are implied customer requirements and there are requirements that are established as specifications. To assist you and Ottens
Please visit https://www.distributor.hcup-us.ahrq.gov/
KID APPLICATION KIT November 18, 2015 All HCUP Databases and select Supplemental Files may now be purchased online through the HCUP Central Distributor. Please visit https://www.distributor.hcup-us.ahrq.gov/
NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE NSA/CSS POLICY MANUAL 9-12. Issue Date: 15 December 2014 Revised:
NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE NSA/CSS POLICY MANUAL 9-12 Issue Date: 15 December 2014 Revised: NSA/CSS STORAGE DEVICE SANITIZATION MANUAL PURPOSE AND SCOPE This manual provides guidance
BY ORDER OF THE COMMANDER USTRANSCOM INSTRUCTION 33-3 UNITED STATES TRANSPORTATION COMMAND 5 DECEMBER 2011
BY ORDER OF THE COMMANDER USTRANSCOM INSTRUCTION 33-3 UNITED STATES TRANSPORTATION COMMAND 5 DECEMBER 2011 Communications and Information MANAGEMENT OF PORTALS AND WEB SITES COMPLIANCE WITH THIS PUBLICATION
CHAPTER 7. MANUFACTURING NFA FIREARMS
CHAPTER 7. MANUFACTURING NFA FIREARMS Section 7.1 Qualifying to manufacture NFA firearms 7.1.1 Licensing under the GCA. Persons intending to engage in the business of manufacturing NFA firearms that also
Privacy Act of 1974; Department of Transportation, Federal Aviation Administration,
(4910-62-P) DEPARTMENT OF TRANSPORTATION Office of the Secretary Docket No. DOT-OST-2015-0235 Privacy Act of 1974; Department of Transportation, Federal Aviation Administration, DOT/FAA-801; Aircraft Registration
DIRECT PURCHASING & DISTRIBUTION POLICY (DPDP)
DIRECT PURCHASING & DISTRIBUTION POLICY (DPDP) February 2016 Page 1 of 13 TABLE OF CONTENTS 1. BACKGROUND INFORMATION... 3 2. DEFINITIONS... 3-4 3. ORDER MANAGEMENT... 4 3.1 TERMS OF SALE AND SHIPMENT...
TITLE III INFORMATION SECURITY
H. R. 2458 48 (1) maximize the degree to which unclassified geographic information from various sources can be made electronically compatible and accessible; and (2) promote the development of interoperable
4 FAH-2 H-210 CHECK STOCK, SIGNATURE DIE, INTERNAL CONTROLS AND FILE MANAGEMENTS
4 FAH-2 H-200 CHECK STOCK, SIGNATURE DIE, INTERNAL CONTROLS AND FILE MANAGEMENTS 4 FAH-2 H-210 REQUISITIONING, RECEIVING, AND CONTROLLING CHECK STOCK, AND SIGNATURE DIE (Office of Origin: CGFS/FPRA/FP)
Customer Service Dept., London Hydro, 111 Horton Street, P.O. Box 2700, London, ON N6A 4H6 519-661-5503 from 8:30 am to 4:00 pm - Monday to Friday
Welcome to London Hydro! To Whom It May Concern: Whether you are a new customer or you have relocated within London, we require that all customers complete and return the enclosed Application for Service
1.0 Purpose. 2.0 Applicability. 3.0 References. 4.0 Attachments. 5.0 General. 5.1 Abbreviations. 5.2 Definitions. 5.3 Responsibilities. 6.
Procurement Card Procedures (Amended June 13, 2006) Questions or comments? Call the County Manager's Office at (910)798-7185 or contact Susan Wynn at [email protected] 1.0 Purpose 2.0 Applicability 3.0
ISO IEC 27002 2005 (17799 2005) INFORMATION SECURITY AUDIT TOOL
7.1 ESTABLISH RESPONSIBILITY FOR ASSETS 1 GOAL Do you protect your organization s assets? 2 GOAL Do you use controls to protect your assets? 3 GOAL Do you account for your organization s assets? 4 GOAL
SUMMARY: The Office of the Secretary of Defense proposes to. alter a system of records notice DPFPA 02, entitled Pentagon
This document is scheduled to be published in the Federal Register on 02/11/2016 and available online at http://federalregister.gov/a/2016-02788, and on FDsys.gov Billing Code: 5001-06 DEPARTMENT OF DEFENSE
ILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION DATA PROCESSING OPERATIONS SERIES CLASS TITLE POSITION CODE EFFECTIVE
ILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION DATA PROCESSING OPERATIONS SERIES CLASS TITLE POSITION CODE EFFECTIVE DATA PROCESSING OPERATOR 11425 4-16-89 DATA PROCESSING ASSISTANT
1 Purpose The DOE M 470.4-4A, Information Security Manual states, All information security programs, practices, and procedures developed within DOE must be consistent with and incorporate the requirements
CITY OF DALLAS. Request for Competitive Sealed Proposal (RFCSP) BUZ1524. For. SCADA Repair, Parts and Support
CITY OF DALLAS Request for Competitive Sealed Proposal (RFCSP) BUZ1524 For SCADA Repair, Parts and Support Purpose The purpose of this specification is to establish a thirty-six (36) month service agreement
ARCIS Archives and Records Centers Information System RECORDS TRANSFERS
ARCIS Archives and Records Centers Information System RECORDS TRANSFERS USER S MANUAL February 10, 2012 Page 1 CONTENTS 1. Overview of Records Transfers... 5 1.1 Introduction to Records Transfers... 5
Application Fees are non-refundable.
Application Fees are non-refundable. Applicant s should contact the DMV DUI-Interlock Section at 1-800-642-9066 or 304-926-2507 for a review of their driving record before submission of the application.
CHECK LIST FOR MILITARY SPOUSE SCHOLARSHIP APPLICATION Where noted, please submit two copies. You may also want to keep a copy for yourself.
FORT MEADE OFFICERS SPOUSES CLUB 16 MILITARY SPOUSE SCHOLARSHIP APPLICATION SCHOLARSHIP: The Fort Meade Officers Spouses Club (OSC) will award financial scholarships for academic advancement to highly
DD FORM 254 Preparation Guide
Headquarters, Department of the Army, G-2 DD FORM 254 Preparation Guide FY-10 FOREWORD Within The Department of Defense, Industrial Security is identified as the portion of information security concerned
Introduction. Derivative Classification Training JOB AID
Introduction Derivative Classification Training The purpose of this job aid is to provide reference information for the responsibilities and procedures associated with derivative classification. This job
Department of Homeland Security Management Directive System MD Number: 4900 INDIVIDUAL USE AND OPERATION OF DHS INFORMATION SYSTEMS/ COMPUTERS
Department of Homeland Security Management Directive System MD Number: 4900 INDIVIDUAL USE AND OPERATION OF DHS INFORMATION SYSTEMS/ COMPUTERS 1. Purpose This directive establishes the Department of Homeland
SECURITY ORIENTATION
SECURITY ORIENTATION Administration and Resource Management Division Security Programs and Information Management Branch HQMC Security Manager: Kevin J White HQMC Assistant Security Manager: Orlando Roman
The President. Part VII. Tuesday, January 5, 2010
Tuesday, January 5, 2010 Part VII The President Executive Order 13526 Classified National Security Information Memorandum of December 29, 2009 Implementation of the Executive Order Classified National
Dell Service Description
Dell Service Description IT Asset Donation - EMEA Introduction Dell is pleased to provide Asset Resale and Recycling Services (the Service(s) ) in accordance with this service description (the Service
For all shipments through FEDX, FEDX FREIGHT is to be third party billed to: Graham-White/VISTA Manufacturing, 1242 Colorado St.
A. INTRODUCTION: Graham-White Manufacturing Co. and Vista Corporation of Virginia (collectively referred to herein as Graham- White/VISTA ) has established a Preferred Carrier Program of carriers to include
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5400.11 October 29, 2014 DCMO SUBJECT: DoD Privacy Program References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues DoD Directive (DoDD) 5400.11 (Reference
NGA Instruction for Determining Property Accountability. a. Primary. NGA PD 4000R2, Policy Directive for Logistics, 24 November 2003.
NI 4160.1R3 Approved: 1 October 2004 Subgroup: Personal and Military Property 1. References. NGA Instruction for a. Primary. NGA PD 4000R2, Policy Directive for Logistics, 24 November 2003. b. Secondary.
NASAA Recordkeeping Requirements For Investment Advisers Model Rule 203(a)-2 Adopted 9/3/87, amended 5/3/99, 4/18/04, 9/11/05; Amended 9/11/2011
NASAA Recordkeeping Requirements For Investment Advisers Model Rule 203(a)-2 Adopted 9/3/87, amended 5/3/99, 4/18/04, 9/11/05; Amended 9/11/2011 NOTE: Italicized information is explanatory and not intended
PRINCE EDWARD COUNTY REQUEST FOR PROPOSAL (RFP) FOR MEDICAL AND MEDI-GAP INSURANCE RFP# HR 13-05. March 7 th, 2013
PRINCE EDWARD COUNTY REQUEST FOR PROPOSAL (RFP) FOR MEDICAL AND MEDI-GAP INSURANCE RFP# HR 13-05 March 7 th, 2013 Page 1 of 8 Issue Date: March 7, 2013 REQUEST FOR PROPOSAL (RFP) RFP# HR-13-05 Title: Medical
PCI Training for Retail Jamboree Staff Volunteers. Securing Cardholder Data
PCI Training for Retail Jamboree Staff Volunteers Securing Cardholder Data Securing Cardholder Data Introduction This PowerPoint presentation is designed to educate Retail Jamboree Staff volunteers on
Outside Director and Proxy Holder Training: Module 2: Managing Foreign Ownership, Control, or Influence (FOCI) Mitigation Defense Security Service
Outside Director and Proxy Holder Training: Module 2: Managing Foreign Ownership, Control, or Influence (FOCI) Mitigation Defense Security Service February 2014 Training Objectives FOCI Control Procedures
ELECTRONIC INFORMATION SECURITY A.R.
A.R. Number: 2.6 Effective Date: 2/1/2009 Page: 1 of 7 I. PURPOSE In recognition of the critical role that electronic information systems play in City of Richmond (COR) business activities, this policy
Legislative Language
Legislative Language SEC. 1. COORDINATION OF FEDERAL INFORMATION SECURITY POLICY. (a) IN GENERAL. Chapter 35 of title 44, United States Code, is amended by striking subchapters II and III and inserting
Department of Defense MANUAL. b. Volume. This Volume provides guidance for the identification and protection of CUI.
Department of Defense MANUAL NUMBER 5200.01, Volume 4 February 24, 2012 USD(I) SUBJECT: DoD Information Security Program: Controlled Unclassified Information (CUI) References: See Enclosure 1 1. PURPOSE
SUMMARY: The Department of the Army proposes to alter a system. of records notice A0145-1 TRADOC, entitled Army Reserve
This document is scheduled to be published in the Federal Register on 06/27/2016 and available online at http://federalregister.gov/a/2016-15097, and on FDsys.gov Billing Code: 5001-06 DEPARTMENT OF DEFENSE
HFS DATA SECURITY TRAINING WITH TECHNOLOGY COMES RESPONSIBILITY
HFS DATA SECURITY TRAINING WITH TECHNOLOGY COMES RESPONSIBILITY Illinois Department of Healthcare and Family Services Training Outline: Training Goals What is the HIPAA Security Rule? What is the HFS Identity
Network Security Policy
KILMARNOCK COLLEGE Network Security Policy Policy Number: KC/QM/048 Date of First Issue: October 2009 Revision Number: 3 Date of Last Review: October 2011 Date of Approval \ Issue May 2012 Responsibility
UNITED STATES MARINE CORPS INFORMATION AND PERSONNEL SECURITY PROGRAM MANUAL (SHORT TITLE: MARINE CORPS IPSP)
Headquarters, U.S. Marine Corps MCO P5510.18A PCN 10208490600 UNITED STATES MARINE CORPS INFORMATION AND PERSONNEL SECURITY PROGRAM MANUAL (SHORT TITLE: MARINE CORPS IPSP) DISTRIBUTION STATEMENT A: Approved
HIPAA Compliance (DSHS and HCA) Preamble: This section of the Contract is the Business Associate Agreement as
HIPAA Compliance (DSHS and HCA) Preamble: This section of the Contract is the Business Associate Agreement as required by HIPAA. 1. Definitions. a. Business Associate, as used in this Contract, means the
Chapter 4. Records Management
Chapter 4 Records Management 4-1. Overview At division, corps, and theater the signal officer is responsible for staff supervision of correspondence, files, and FOIA/PA. Staff supervision includes interpreting
Information Technology Security Policies
Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral
TOURO UNIVERSITY WORLDWIDE AND TOURO COLLEGE LOS ANGELES IDENTITY THEFT PREVENTION POLICY 1.0 POLICY/PROCEDURE 2.0 PURPOSE 3.0 SCOPE 4.
TOURO UNIVERSITY WORLDWIDE AND TOURO COLLEGE LOS ANGELES IDENTITY THEFT PREVENTION POLICY 1.0 POLICY/PROCEDURE Touro adopts this identity theft policy to help protect employees, students, contractors and
There are many examples of sensitive information falling into the wrong hands. What s the worst that can happen? The worst has already happened.
Data Spills Short Introduction There are many examples of sensitive information falling into the wrong hands. What s the worst that can happen? The worst has already happened. When data spills occur, they
