Department of Commerce Office of Security. Initial Information Security Briefing



Similar documents
This directive applies to all DHS organizational elements with access to information designated Sensitive Compartmented Information.


This page left blank.

NATO SECURITY BRIEFING NATO/ATOMAL SECURITY BRIEFING

The President. Part VII. Tuesday, January 5, 2010

JOB AID. Derivative Classification Training U N I T E D A M E R I C A S TAT E S O F. Center for Development of Security Excellence (CDSE)

Consultant Annual DoD Security Refresher

Introduction. Derivative Classification Training JOB AID

Army Regulation Security. Department of the Army. Information Security Program. Headquarters. Washington, DC 29 September 2000 UNCLASSIFIED

Legislative Language

5 FAM 480 CLASSIFYING AND DECLASSIFYING NATIONAL SECURITY INFORMATION EXECUTIVE ORDER 13526

Information Security Program Management Procedures and Guidelines

FedRAMP Package Access Request Form For Review of FedRAMP Security Package

Approved By: Agency Name Management

PROCESSING CLASSIFIED INFORMATION ON PORTABLE COMPUTERS IN THE DEPARTMENT OF JUSTICE

BERKELEY COLLEGE DATA SECURITY POLICY

03/21/2013. Security Incident Requirements. Information Security Webinar. Administrative Announcements. Security Incident Requirements

College of DuPage Information Technology. Information Security Plan

One Hundred Twelfth Congress of the United States of America

TITLE III INFORMATION SECURITY

Self-Inspection Handbook for NISP Contractors TABLE OF CONTENTS

H. R SEC DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION.

DIVISION N CYBERSECURITY ACT OF 2015

Practice Test Security Fundamentals Professional Certification (SFPC) Multiple Choice. Multiple-Choice Sample Question # 1

Department of Defense MANUAL. DoD Information Security Program: Protection of Classified Information

2014 Core Training 1

Subject: U.S. Department of Housing and Urban Development (HUD) Privacy Protection Guidance for Third Parties

VS-NUR FÜR DEN DIENSTGEBRAUCH (RESTRICTED)

So the security measures you put in place should seek to ensure that:

Public Law th Congress An Act

Index .700 FORMS - SAMPLE INCIDENT RESPONSE FORM.995 HISTORY

HFS DATA SECURITY TRAINING WITH TECHNOLOGY COMES RESPONSIBILITY

PCI Training for Retail Jamboree Staff Volunteers. Securing Cardholder Data

EXPORT CONTROLS COMPLIANCE

DATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff

Information Security: Roles, Responsibilities, and Data Classification. Technology Services 1/4/2013

To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes.

Annual DoD Security Refresher Training

Commanding Officer and Executive Officer. Information and Personnel Security Reference Handbook

HIPAA and the HITECH Act Privacy and Security of Health Information in 2009

14 FAM 730 OFFICIAL MAIL AND CORRESPONDENCE

SECURITY ORIENTATION

PII Compliance Guidelines

There are many examples of sensitive information falling into the wrong hands. What s the worst that can happen? The worst has already happened.

Department of Defense MANUAL. b. Volume. This Volume provides guidance for the identification and protection of CUI.

HIPAA and Privacy Policy Training

United States Department of Agriculture Office of Inspector General

Secure Storage, Communication & Transportation of Personal Information Policy Disclaimer:

Information security management guidelines

HIPAA Training for Hospice Staff and Volunteers

REGULATIONS OF THE EUROPEAN SPACE AGENCY. Security Regulations

Computing Services Information Security Office. Security 101

The Department of Health and Human Services Privacy Awareness Training. Fiscal Year 2015

12 FAM 530 STORING AND SAFEGUARDING CLASSIFIED MATERIAL

Order. Directive Number: IM Stephen E. Barber Chief Management Officer

Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014

Act on Background Checks

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc.

Network and Workstation Acceptable Use Policy

ZIMPERIUM, INC. END USER LICENSE TERMS

Page 1. NAOP HIPAA and Privacy Risks 3/11/2014. Privacy means being able to have control over how your information is collected, used, or shared;

U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course

Guideline for Identifying an Information System as a National Security System

7.0 Information Security Protections The aggregation and analysis of large collections of data and the development

HIPAA Compliance (DSHS and HCA) Preamble: This section of the Contract is the Business Associate Agreement as

Instructions for Completing Required Documentation for Clinical Rotations

ACRONYMS: HIPAA: Health Insurance Portability and Accountability Act PHI: Protected Health Information

Overview of the HIPAA Security Rule

Act of 20 March 1998 No. 10 relating to Protective Security Services (the Security Act)

Peace Corps Office of the OCIO Information and Information Technology Governance and Compliance Rules of Behavior for General Users

INSTRUCTION. Department of Defense. NUMBER August 23, 2012 USD(AT&L) Distribution Statements on Technical Documents

Gatekeeper PKI Framework. February Registration Authority Operations Manual Review Criteria

M E M O R A N D U M. Definitions

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Enterprise Information Security Procedures

HIPAA 101: Privacy and Security Basics

Physical Access Control System

Department of Health and Human Services Policy ADMN 004, Attachment A

Information for Individuals Adult Abuse Registry Check (Self Check-Mail) Checklist

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

UNITED STATES MARINE CORPS INFORMATION AND PERSONNEL SECURITY PROGRAM MANUAL (SHORT TITLE: MARINE CORPS IPSP)

A. Executive Order 12333, United States Intelligence Activities. B. Executive Order 12829, National Industrial Security Program.

FedRAMP Standard Contract Language

HIPAA Security Alert

Transcription:

Department of Commerce Office of Security Initial Information Security Briefing

Security Clearance A security clearance is a determination of trust, which makes you eligible for access to classified information. A security clearance is not permanent; it expires when you leave your position.

Requirements for holding a security clearance Attend a briefing designed to teach you proper procedures for handling and protecting classified information. Refresher briefing every year. Sign a Non-Disclosure Agreement (SF-312).

SF-312 Non-Disclosure Agreement Is A legally binding agreement between US Government and you. It is a life long agreement. An understanding of damage that could occur from unauthorized disclosure. An agreement to a pre-publication review An understanding that Classified information is US GOVERNMENT PROPERTY

SF-312 and Penalties Should you improperly disclose classified: Under E.O. 12958, Performance Plan: Performance Appraisal/Awards affected Reprimand/Suspension (Without Pay) Loss of monetary gains made from improper disclosure Loss of security clearance Termination of employment Criminal prosecution (prison/fines)

What is National Security Information Official information which relates to the national defense or foreign relations of the United States, which has been deemed requiring protection from unauthorized disclosure.

National Security Information There are three levels of classification used to describe national security information. Unauthorized disclosure of this information could cause damage to our nation s security. CONFIDENTIAL- Damage SECRET-Serious Damage TOP SECRET- Exceptionally Grave Damage

The Threat Why must we protect classified information? Economic espionage is on the rise Intelligence needs are economic as well as military Present/former adversaries and our allies are conducting intelligence activities against us.

Countries don t have friends, they have interests degaulle

The Threat cont... Don t forget the insider! Counterintelligence is your responsibility. Report suspicious activities to the Office of Security immediately.

Classification of Information How does information become classified? Original Classification: An initial determination that information, in the interests of national security, needs protection. Derivative Classification: incorporating, paraphrasing, restating, or generating in new form, information that is already classified.

National Security Information Classified information must fall under one of the following categories: Military plans, weapons systems or operations Foreign government information Intelligence activities, sources or methods to include cryptology

National Security Information cont... Foreign relations or activities of the U.S. Scientific, technological, or economic matters relating to national security Programs for safeguarding nuclear materials or facilities Vulnerabilities or capabilities of systems, installations, projects, or plans

Reasons to NOT classify information To conceal violation of law, inefficiency, or administrative error To prevent embarrassment to a person, organization, or agency To restrain competition To prevent or delay the release of information that does not require protection in the interests of national security.

Declassification Documents are marked for automatic declassification within ten years unless: The document is exempt from automatic declassification at 10 years under E.O. 12958. Additional reviews at 10 and 5 year intervals. All classified documents are declassified at 25 years (with a few exceptions). No document series at Commerce are exempt.

Marking Documents Title and/or subject should be marked Paragraphs and sub-paragraphs must be marked Illustrations and pictures also Overall classification is determined by the highest portion marking Mark classification of the material on top/bottom of every page.

Marking cont... The bottom of the cover or title page of the document should have the following: Classified by: Jack Smith, Director, OSY Reason for Classification: 1.5 (d) E.O. 12958 Declassify on: 1 June 2007 or x1-8 (exempt)

Derivative Classification When incorporating classified information, be sure to: Observe and respect original markings. Carry forward all classification markings. Carry forward declassification instructions (using the most stringent) List all sources

Derivative Marking If derivatively classifying a document, the bottom right corner of the should have: Derived by: Joe Burns, DOC, OSY Derived from: CIA Terrorism Report, 3/01 Declassify on: 3/1/11 (or x1-8)

Derivative Marking cont... When derivatively classifying a document using multiple sources, either list each source or list multiple sources and maintain a list of the sources on file copy. Always use the most stringent declassification date. If source is marked OADR, list Source marked OADR and list date of document.

Accountability of Classified Required for Secret and Top Secret CD481 (will be switched to a computer database) Identify who, what, when, where, how. Annual inventory is required! Use cover sheets and classified receipts!

Storage of Material Sensitive, FOUO, Privacy Act, proprietary information must be stored under one level of lock (desk, drawer, file cabinet). Classified information must be stored in a GSA approved security container (safe). Note that each safe should have a SF700, SF702 and open/closed sign.

Combinations Security container combinations are classified at the level of information in the safe. Should always be memorized; never write them down. Don t share with anyone who does not need to know it.

Combinations cont... Change your combination when: the security container is found open and unattended someone who has the combination leaves if you feel the combination has been compromised when the security container is taken out of service

Control and Access You are responsible for protecting and controlling classified information. You must limit access to authorized persons by verifying: Identification Clearance Need to know

LEAKS Most leaks result from: Casual conversations Don t discuss classified outside the office! Open Sources Publication does not infer declassification!

Transmission: Telephone/Fax Always use a STU III phone or fax Standard and cell phones are not secure Is there a secure phone in your office? If not, where is the nearest one?

Transmission: Double Wrapping Must be done to prepare for hand carry, courier, or US Postal Affords 2 layers of protection Protects against damage. Use opaque envelopes Don t forget a receipt Inner wrapping: full address. Return address Classification markings top/bottom and front/back Information and receipt placed inside

Transmission cont... Outer Wrapping: Full address of receiver Full return address NO CLASSIFICATION MARKINGS Recommend that you put If undeliverable, return to sender

Transmission cont... To send Top Secret: call the Office of Security. Secret and Confidential Hand-carry Approved courier US Postal Service Hand Carry: No overnight stay without proper storage No aircraft overseas Courier: check authorization US Postal: Secret: Registered Confidential: Certified, Express or First class

Computer Security Do not process classified unless: You have contacted an Office of Security Representative Your computer has a removable hard drive Is in a stand-alone configuration (no modem/network unless accredited)

Reproduction Various ways to reproduce classified information: Paper (photocopier) Electronically Other means (video and/or cassettes) Use approved equipment for that purpose Account for your copies!

Reproduction cont... Approved photocopiers: Are in controlled environments Do not have memories Are sanitized after classified copies are made Are serviced by cleared personnel or service personnel are monitored while repairs are made Contact the Office of Security if your copier jams while working with classified

DESTRUCTION Classified material destruction Approved methods: Burning (at an approved facility) Shredding (using an approved cross cut shredder) Use small classified waste burn bags Other types (FOUO, Privacy Act, SBU, etc.): SBU should be shredded using cross cut shredder. At a minimum tear up other types.

Overseas Travel Contact the Office of Security for a briefing before you go. Do not bring classified Limit sensitive information Notify U.S. Embassy of your visit

Reporting Requirements All employees must report contact with a foreign national who: Requests classified information Wants more information than they need to know Acts suspiciously Report incidents to your security officer immediately.

End of Day Security Checks All security containers windows/doors desk tops for classified Complete the SF 701 Activity Security Checklist. The office manager is responsible for the implementation of the SF 701

Your Security Officer The Office of Security is there to help you! Report to an Office of Security Rep: Security violations Loss or compromise of classified information Security incidents or problems

When You Depart Commerce If you are leaving the Department you must: Turn all classified material over to your classified control point Contact your Security Officer for a debriefing Turn in your ID, keys, and access cards

Finally. Who is responsible for security at NOAA and the Department of Commerce? YOU ARE! Have a secure day!