Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
40 Cards in this Set
- Front
- Back
What is the name of the INST?
|
SECNAV 5510.36
|
|
Who ensures that classified material is secure?
|
CO
|
|
Commanding Officers shall ensure that controlled unclassifed information is what?
|
Is safegaurded from UA by by the public.
|
|
Classified information is the property of what?
|
The U.S. government and personal property.
|
|
All Top Secret information (including copies) originated or recieved by a command should be what?
|
continously accounted for, indivually seralized, and entered into a command Top Secret register or log.
|
|
Describe the register or log.
|
-shall completly indeintify the information, and at minmum include the date originated or received, indiviual serial numbers, copy numbers, copy number, etc.
|
|
What happens when a disposition action such as destruction, downgrade or declassifiction affetcs the inital document page count?
|
The page count does not need to be changed in the register or log if a list of the effective pages (LOESPs) is contained within the document.
|
|
How long should Top Secret registers or logs shall be reatined for how many years?
|
5.
|
|
What should Top Secret information be marked by?
|
-with an indiviaul copy number
e.g. "Copy No. _of_ copies." |
|
What are the exceptions of marking Top Secret information?
|
-is allowed for publications containing a distribution list by copy number and for mass-produced reproductions when copy numbering would be cost prohibtive.
|
|
Top Secret Control Officers shall obtain a record of reciept form who?
|
- a classified material reciept from each recepent for Top Secret information distributed internally and externally.
|
|
What cirumcstances require Top Secret information to be sighted physically?
|
-annauly
-change of command -change of TSCO -upon report of loss or compromise. |
|
What is the CO's responsiblity as far as Secret Control Measures go?
|
establish administrative procedures for the control of Secret information appropiaate to their local enviorment, assessment of a threat, the location and mission of their command.
|
|
What are Secret and Confidential Working Papers?
|
classifeid notes from a training course or conference, research notes, rough drafts
|
|
How will S&C working papers be handled.
|
-dated when created
-marked top and bottom of each page with the highest class. level (WORKING PAPER) on top left of the first page in letters larger than the text -protected per the class. level -destroyed, by authorized means, when no longer needed. |
|
How many days will Secret and Confidential working papers be retained?
|
180 days.
|
|
True of Flase: A document transmitted over a classified IT system is considered a finished document.
|
TRUE
|
|
TRUE or FALSE: Administrative controls for NWPs replace the security controls required for classified information.
|
FALSE
|
|
TRUE or FALSE:
The originating government shall approve reproduction of Secret FGI and destruction. |
TRUE
|
|
Should Secret FGI be reporduced to meet mission requiremnts and reproduction shall be witnessed by two appropriately cleared personnel.
|
YES
|
|
How long should you retain Secret FGI?
|
Three years.
|
|
How long should you keep Confidential FGI?
|
2 years.
|
|
What steps need to be taken to provide foreign government better protection?
|
-provide the information only to those who have a need-to-know
-notify indiviuals given access of appliciable handling instruction in wiriting or by an oral briefing -store info in a locked desk or cabinet, or in a locked room. |
|
What is a OCA?
|
Original Classification Authority
. |
|
What Alternative Compensatory Control Measures?
|
-when an OCA determines that other security measures are insufficient for establishing "need-to-know" for classified info, ACM may be employed.
-The purpose of ACCM is to strictly enforce the "need-to-know" principle. |
|
What ACCM controls are authorized?
|
-unclassified nickname assigned with the CNO.
-list of persons granted access to the ACCM protected info. -placing class. ACCM info in sealed envelopes marked only ACCM, the classified level, and nickname -special markings to identify information as being controlled by ACCM. |
|
What are ACCM limitations are there?
|
- not use codewords not assigned.
-accm shall not be used for NATO or non-intellegence FGI -ACCM shall not be used to protect classified information in acquistion programs. -ACCM shall not be used to control classified information SCI or COMSEC. |
|
What does FGI stand for?
|
Foreign Governmnet Information
|
|
Who approves the use of ACCM?
|
CNO.
|
|
How are request submitted?
|
-in wiriting
- must include a justification for application of ACCM and a security plan. |
|
What forms must be used with class material?
|
-Standard Form classified material cover sheets
-must be stamped or marked with ACCM markings. |
|
When transmitting a message under ACCM? describe it.
|
-The ACCM nickname shall be used in the text of mesage traffic and on cover sheets accomp. secure facsimile transmissions to assist in alerting the recipient.
|
|
What network is ACCM protected information sent over?
|
SIPRNET.
|
|
Who is provided a copy of the ACCM security plan?
|
Activitvies and indiviuals having responsiblity for protecting ACCM.
-shall be cancelled as soon as they are no longer needed. |
|
What are the classified cover sheets?
|
SFs 703, 704, 705.
|
|
Describe the End-Of-Day Security Checks?
|
-utilizing the SF 701, Activity Security Checklist, to ensure that all areas which process classified information are properly secured. A SF 702 shall be utilized to record that strong rooms. Destroy these forms 30 dyas after the last entry.
|
|
What is the SF 702?
|
Security Container Check Sheet
|
|
What is the SF 701?
|
Activity Security Checklist
|
|
What safegaurds should CO implement during classified metings?
|
-are held only when disclousre of the information serves a specific US gov.
-may be only held at a US gov agency oy a cleared contractor facility |
|
Can Classified meetings may not be held at hotels, conference centers, or any other uncleared venue?
|
YES.
|