1 / 24

SECURITY BRIEFING

SECURITY BRIEFING. Sample only not a full presentation. A threat awareness briefing A defensive security briefing An overview of the security classification system Employee reporting obligations and requirements Security procedures and duties applicable to the employee's job.

yon
Download Presentation

SECURITY BRIEFING

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. SECURITY BRIEFING Sample only not a full presentation A threat awareness briefing A defensive security briefing An overview of the security classification system Employee reporting obligations and requirements Security procedures and duties applicable to the employee's job

  2. WHY OUR TECHNOLOGY? • Why go through process of Research and Development • Let someone else pay for R&D • Possible military application Sample only not a full presentation Why Us? Because We're the BEST!

  3. EMPLOYEE RESPONSIBILITIES • Notify FSO of travel plans • Ensure proper travel documentation • Protect export controlled technology and classified information • Visit the State Department website for up to date travel information www.state.gov Sample only not a full presentation

  4. EMPLOYEE RESPONSIBILITIES • Maintain professional bearing • Remain in contact with host • Travel with others when possible • Display wealth as little as possible • Learn customs and courtesies of host country Sample only not a full presentation

  5. NISPOM • All agencies apply three factors to the concept of Risk Management • Damage to national security • Existing or anticipated threat to disclosure of information. • Short and long term costs of the requirements, restrictions, and other safeguards Sample only not a full presentation • The second and third factors aren’t spelled out in the NISPOM, but are recognized as legitimate concerns to prevent the NISP from becoming a burden to industry

  6. THREE CLASSIFICATION LEVELS • CONFIDENTIAL information could reasonably be expected cause damage • SECRET could reasonably be expected to cause serious damage • TOP SECRET could reasonably be expected to cause exceptionally grave damage to national security Sample only not a full presentation Caution: Classified information should not be confused with the proprietary information sometimes referred to as company confidential or secret.

  7. HOW TO MARK A CLASSIFIED PAGE Sample only not a full presentation Overall Page Markings Portion Marking Classification Information Notice that the document has a top and bottom marking at the highest level of classification on the page and appropriate levels of classification for the information in the paragraph.

  8. TRAINING AND INSTRUCTIONS • Cleared employees are trained to protect classified information • Sanctions should be imposed on those who fail to protect it from unauthorized disclosure • Each originating agency must provide instructions on the proper protection, use, storage, transmission and destruction of the information Sample only not a full presentation

  9. HOTLINES Sample only not a full presentation Hotlines are available. However, recommend that company officers have chance to handle situation Not to take place of investigations May be used to tip off Defense Hotline The Pentagon Washington, DC 20301-1900 (800) 424-9098

  10. REPORTING Sample only not a full presentation Events that impact: • FCL • PCL • Protection of classified information • Loss or compromise Contractors cleared employees on reporting channels with: • Federal agencies • FBI • CSA

  11. HOW TO REPORT Sample only not a full presentation Report to the FBI Follow up with written report Send copy to IS Rep with FBI approval

  12. REPORTING (TO CSA) Sample only not a full presentation Reports to CSA • Changes in storage capability • Inability to protect classified • Security equipment vulnerabilities • Unauthorized receipt of classified

  13. LOSS, COMPROMISE OR SUSPECTED COMPROMISE Sample only not a full presentation Loss, compromise or suspected compromise? Submit initial report

  14. WHAT IS A CLASSIFICATION MARKING? Sample only not a full presentation A classification marking is a physical designation designed to notify and warn the holder that the information they are in possession of is classified and to what level of classification

  15. MARKINGS • Must put reason for classification • Who classified the material (office or person) • Annotate date or event marking the duration of classification • Classified material should always display proper markings at all times Sample only not a full presentation

  16. DERIVATIVE CLASSIFICATION • Contractor personnel make derivative classification decisions when they incorporate, paraphrase, restate, or generate in new form, information that is already classified; then mark the newly developed material consistently with the classification markings that apply to the source information. • FSO ensures contractor is training and has resources • Contractor ensures: • Use of Security Classification Guide • Mark derived copy with the same classification as original • Challenge classification when necessary • Carry over longest period of classification to the new document • Maintain list of sources used to compile the derivative document Sample only not a full presentation

  17. Special Material • Classification markings must be clear, no matter the media • Files, folders or groups of documents must be marked at highest level within • Email and other electronic messages have to be marked the same as any document • Microform is tiny, but the media has to be marked to be seen by the unaided eye and within the microform document • Translations of U.S. classified information is marked with U.S. as country of origin and the classification in English and foreign language Sample only not a full presentation

  18. FACILITY SECURITY CLEARANCE (FCL) • FCL Process • Government Contracting Authority approve, Cognitive Security Agency conducts evaluation • Company compiles list of Key Management Personnel • Assembles vital corporate documents • Prepares Department of Defense Security Agreement DD Form 441 • Prepares FOCI Statement SF328 Sample only not a full presentation

  19. FOREIGN OWNERSHIP CONTROL AND INFLUENCE (FOCI) Sample only not a full presentation The SF 328 is used by the contractor and the CSA to determine whether or not and to what limit the cleared contractor falls under FOCI.

  20. THE FSO Sample only not a full presentation • Qualifications • Cleared at the same level as the facility clearance • U.S. Citizen This FSO has a tremendous scope of responsibility and takes on the role as the provider of security and the link between the government contractor, the cognizant security agency (CSA) and the federal government.

  21. PERSONNEL SECURITY CLEARANCE (PCL) • A security clearance is the administrative determination that an employee is eligible from a national security basis for a security clearance • The final clearance is the result of a request by the contractor, investigation conducted by the CSA and determination made by a trained adjudicator Sample only not a full presentation

  22. REQUIREMENTS Sample only not a full presentation • Contractors protect classified material under their control • Individuals protect classified information entrusted to them How well? To the level necessary to prevent unauthorized disclosure The FSO leads and implements the security program designed to protect classified information and prevent unauthorized disclosure

  23. STORAGE • TOP SECRET is stored in GSA approved container, approved vault or approved closed area with supplemental controls • SECRET and CONFIDENTIAL material do not need supplemental controls when stored in a GSA approved container Sample only not a full presentation

  24. GSA APPROVED CONTAINERS • Repairs to GSA approved containers shall be made by cleared or escorted personnel trained in approved methods • Access control can be used to limit access to closed areas DURING WORK HOURS Sample only not a full presentation

More Related