Block 1 - Unit 4 Flashcards Preview

Knowledge Operation Management (AF) > Block 1 - Unit 4 > Flashcards

Flashcards in Block 1 - Unit 4 Deck (59):
1

1) Name the two groups of information into which Official information is divided into:

Classified and Unclassified

2

2) Information that has been determined to require protection against unauthorized disclosure in the interest of national security is _______________.

Classified Information

3

3) Information or material that could cause exceptionally grave damage to the national security if the information was disclosed or released to unauthorized personnel.

Top secret

4

4) Information or material that could cause serious damage to the national security if the information was disclosed or released to unauthorized personnel

Secret

5

5) Information or material that could be expected to cause damage to the national security if the information was disclosed or released to unauthorized personnel.

Confidential

6

7) What should be done if you find classified material out of proper control?

Take custody, safeguard the material, and then notify the appropriate security authorities.

7

6) A __________ is an unauthorized disclosure of classified information.

Compromise

8

8) Only individuals that have authorized ___________, ___________, or _______________ of the classified information can grant individuals access to classified information.

Possession, Knowledge or Control

9

9) How often should Top Secret control officers (TSCO) conduct an inventory of all TS material?

Annually or whenever there is a change in TSCOs

10

10) Which form, in short, says you may never disclose classified material?

Standard Form (SF) 312

11

11) How can TS material be transported or transmitted?

Armed Forced Courier (AFCOS)

12

The privacy Act Program objectives do NOT include which of the following

mandating that secret records on individuals can be maintained.

13

2) The Base PA officers do which of the following:

Provide guidance and training to base personnel; ensure training for the squadron level PA monitor; and directs investigation of complaints and violations

14

3) What did congress pass to protect individuals from unwarranted invasions of their personal privacy?

Privacy Act of 1974

15

4) The PA requires information systems to have a privacy act system notice published in the __________.

Federal Register

16

5) Who has the overall responsibility for the AF PA program?

Air Force Chief Information Officer (AF-CIO)

17

6) Who has the responsibility of making sure organization personnel are aware of their responsibilities regarding the PA?

The Organization's PA Monitor

18

7) Information systems that contain data on individuals that is retrieved by name or personal identifier are subject to the ____________.

Privacy Act

19

8) How should PA material be protected?

According to its sensitivity level, consider the personal sensitivity of the info, and the risk of loss or alteration. Utilize the AF form 3227, Privacy Act Cover sheet

20

9) When Transmitting personal information by email, FOUO, should appear in the:

in the subject line and the statement in the first part of the email

21

10) Use the following methods to dispose of records protected by the PA?

Tear, burn or shred

22

1) Who develops policies and procedures for administering the FOIA program?

Freedom of Information Act Manager

23

2) Who coordinates the release or denial of FOIA request?

FOIA Manager

24

3) Under FOIA, who may not make FOIA requests?

Federal Agencies and Fugitives

25

4) Foreign citizens, military, and civilians acting as ___________ may request records under FOIA.

Private citizens

26

How many exemptions exist under the FOIA program in which a request for a records could be denied?

9

27

6) Normally, you can expect a response to your FOIA request within _________ days from the date the proper FOIA office receives it.

20 working days

28

1) __________ is a protective marking to be applied to unclassified information when disclosure to the public of that particular record, or portion thereof, would reasonably be expected to use a foreseeable harm

FOUO

29

2) FOUO is now a subcategory of the _________________ rules.

Controlled Unclassified Information (CUI)

30

3) An unclassified document containing FOUO shall be marked.

At the bottom on the outside of the front cover, on each page containing FOUO, on the outside of the back cover

31

4) Who is responsible for determining, at origination, whether the information of a document may qualify for CUI status?

The Originator

32

5) (T/F) Unauthorized disclosure of FOUO records is an unauthorized disclosure of classified information.

False

33

6) During working hours, FOUO material should be kept away from ___________________.

Unauthorized bystanders

34

7) After working hours, store FOUO material with other classified records in ______________.

unlocked files or desks

35

Protecting ________ is critical to mission accomplishment.

Information

36

Official information is divided into what two groups

classified and unclassified

37

What are the three security classifications?

Top Secret, Secret, and Confidential

38

A compromise of classified information can present a threat to what?

National Security

39

What form says you may never disclose classified information

AF Form 312 Classified info nondisclosure

40

What individual in your unit, appointed by the commander, will deal with Top Secret material

Top Secret Control Officer (TSCO)

41

Why did congress pass the Privacy Act of 1974

To protect individuals from unwarranted invasion of personal property

42

List the duties of the base privacy act officer

Provide guidance and training to base personnel; Ensure training for the squadron level PA monitor; direct investigations of complaints/violations

43

Who may ask for a copy of records in a system of records

persons or their designated representatives

44

A person obtaining someone else's records under false pretenses could result in a ________ fine.

no more than $5,000

45

Where do you include a PA Warning banner?

in each AF publication that requires collecting or keeping information in system of records.

46

What should you not use when making FOIA requests?

Government supplies, equipment or materials

47

Who coordinates the release or denial of FOIA request?

FOIA manager

48

Who controls and processes FOIA requests?

FOIA Manager

49

Which FOIA exemption covers personnel, medical , and other files involving personal privacy?

Exemption 6

50

FOUO is now a subcategory of what rules?

Controlled Unclassified Information (CUI)

51

What is the proper procedure for marking FOUO material?

should be marked at the bottom of the outside of the front cover, the title page, the first page, bottom of each page containing FOUO, and outside of bottom of each page containing FOUO, and outside of back cover, as well as each paragraph containing FOUO

52

Information marked FOUO cannot be withheld, unless it meets the criteria for what Act? Which exemptions?

FOIA exemptions 2-9

53

When unauthorized persons gain access to FOUO records, administrators find out who is responsible and _______________

must investigate and take disciplinary actions

54

How do you protect FOUO during working hours? After working hours?

during - keep away from unauthorized bystanders
after - store w/ other unclassified records in unlocked files or desk

55

what method do you use to dispose of FOUO material?

tear, burn or shred

56

What is Personally Identifiable information

any info about an individual which can be used to distinguish or trace and individuals identity

57

Protecting privacy information is the responsibility of every _________, ___________, and ___________ who handles privacy records or PII contained in any record

Federal employee, military member, and contractor

58

Who elevates PII for impact of loss or unauthorized disclosure and protected accordingly?

reported to Installation Privacy Official by anyone discovering it

59

Define PII breach?

a loss of control, compromise, unauthorized disclosure, unauthorized acquisition, unauthorized access, or any similar term referring to situations where persons other than authorized users and for an other than authorized purpose have access or potential access to PII, whether physical or electronic