1 / 18

Eagle Harbor Corporation Quarterly Security Training

Eagle Harbor Corporation Quarterly Security Training. Shelley Hickman University of Phoenix Applications of Multimedia and Web Page Design-EDTC 560 Tommy Martin (FAC) October 24, 2005. Welcome!. I am the Security Manager for Eagle Harbor Corporation .

delta
Download Presentation

Eagle Harbor Corporation Quarterly Security Training

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Eagle Harbor Corporation Quarterly Security Training Shelley Hickman University of Phoenix Applications of Multimedia and Web Page Design-EDTC 560 Tommy Martin (FAC) October 24, 2005

  2. Welcome! I am the Security Manager for Eagle Harbor Corporation. I am located in Bldg. 586/Rm 101 and you can reach me at 757-334-6789. If I am not available, you may contact the Alternate Security Manager, Mr. Tim Burke at 757-334-9854.

  3. Objectives • Provide introduction to the organization’s • security program • Inform all employees of their organizational roles and responsibilities regarding security • Provide some basic rules and procedures related to security information requirements Responsibilities & Requirements

  4. Individual Information Security Responsibilities • Ensure incoming and outgoing classified is marked appropriately using Eagle Harbor Policies and Security Marking Handbook • Protect classified material in your possession and return it to a secure storage container/area when finished working on it • Obtain appropriate approval before reproducing classified, use copier approved for classified, follow reproduction and clearing procedures • Immediately report security procedure infractions or discovery of • unprotected classified to immediate supervisor and/or security manager

  5. Types of Security Classifications • SECURITY CLASSIFICATION DEFINITIONS • Top Secret – Information whose unauthorized disclosure could be expected to cause exceptionally grave damage to national security • Secret – Information whose unauthorized disclosure could be expected to cause grave damage to national security • Confidential – Information whose unauthorized disclosure could be expected to cause damage to national security

  6. CLASSIFICATION MARKINGS Various Levels Top Secret Secret Confidential Unclassified

  7. MARKING (Hot Item) • Eagle Harbor, requires you to mark notebooks, binders, folders, etc, containing classified information. Affix the appropriate overall classification marking to the front, back, and also the spine of binders and notebooks SECRET SECRET SECRET

  8. MARKINGS ONCLASSIFIED PRODUCTSDocuments • Required: • Overall classification on front and back • Agency, office of origin and date • Identification of source(s) and reason • Declassification and/or downgrade • instructions • Each page at top and bottom • Each paragraph or portion • (including Unclassified) • Control notices • Overall classification on the spine of the binder SECRET UNCLASSIFIED SECRET (U) (S) SECRET Markings for Training Purposes Only

  9. Other Products SECRET SECRET SECRET SECRET AIS Products Removable AIS Storage Media SECRET SECRET SECRET File Folders SECRET SECRET Motion Picture Film & Videotapes Diskettes used on approved system

  10. Information Security-Storage Containers • Eagle Harbor Corporation-approved security containers only (safes & vault doors built to Eagle Harbor Corporation specifications or secure rooms built to approved standards) • Must have a security clearance, need to know, or signed • Nondisclosure Agreement before given access • Each opening and closing of container must be documented on the appropriate organizational security forms • Classified destroyed promptly when no longer needed • promotes good housekeeping; and reduces risk of security • incidents of containers

  11. Information Security-Reproduction & Destruction Classified Reproduction -- Check material for copying restrictions -- Copy after getting approval by designated person -- Use only copier authorized for classified (Identify where copier located if one approved) Destroying Classified -- Material is destroyed as soon as its no longer required or has served its primary purpose -- The preferred and approved method at Eagle Harbor is shredding -- All employees are to only use shredders approved for classified destruction -- The normal shred size for cross-cut shredders for collateral classified destruction is 1/32” x 1/2”

  12. Information Security- Daily Office Closure Security Procedures • Performed in areas where classified materials are stored or being worked on • Office duties are rotated among cleared personnel within the work-center • Office personnel must ensure all classified materials are stored and containers locked • Employees/responsible security duty personnel are required to physical check offices to ensure all computers have been turned off; windows closed; and doors locked

  13. Mail • Controlled Mail • -- Registered and Certified Mail • -- Transmits Secret and some Confidential • First Class Mail • -- May contain Confidential material • -- Must open immediately to determine contents • -- Secure unopened in safe • Federal Express and US Postal Service Overnight • -- May contain Secret or Confidential • -- Requires special authorization for sending classified • -- Open immediately otherwise secure in safe • NOTE: Top Secret material NEVER sent by mail

  14. Personnel Security SECURITY CLEARANCE REQUIREMENTS -- Determined by job requirements -- Individual responsible for timely submission of paperwork for initial and periodic investigations -- Individual must sign a Nondisclosure Agreement CHECK WITH SECURITY MANAGER OR SUPERVISOR FOR MORE INFORMATION

  15. For Official Use Only • Is not classified information, but may be withheld from public because disclosure would cause foreseeable harm to an interest protected by one or more Freedom of Information Act exemptions • Material identified by markings in classified and unclassified material • Protective requirements • -- During normal hours of operations its important for all employees to safeguard this information from unauthorized personnel • -- After hours all employees are required to file with other unclassified material in locked cabinet, desk or bookcase

  16. Telephones -- DO NOT discussed classified on regular desk phone-- Classified discussed on secure phones onlyFaxes -- send classified over secure machine only (machine connected to a secure telephone) (Identify if available & where located) Communications And Computers

  17. Communications And Computers Computers -- All must be evaluated and certified as being network certified and poses no harm to the organizations networking infrastructure -- Must undergo network accreditation training annually -- Classified information will only be processed on approved computer systems

  18. Training Completion Stats

More Related