Flashcards in SECNAV M-5510.36, DEPARTMENT OF THE NAVY INFORMATION SECURITY PROGRAM Deck (34):
Who shall ensure that classified information is processed only in secure facilities, on accredited Information Technology (IT) systems, and under conditions which prevent unauthorized persons from gaining access?
All personnel shall comply with what policy for access to classified information?
Foreign national access to CUI shall be in accordance with what reference?
All Top Secret information (including copies) originated or received by a command shall be continuously accounted for, individually serialized, and entered into a command what?
Top Secret register or log
Who shall obtain a record of receipt (typically a classified material receipt) from each recipient for Top Secret information distributed internally and externally?
Top Secret Control Officers (TSCOs)
Top Secret information shall be physically sighted or accounted for at least how often, and more frequently as circumstances warrant?
Commanding officers shall establish procedures to control and mark all Secret and Confidential working papers in the manner prescribed for a finished document when retained more than how many days from the date of creation or officially released outside the organization by the originator?
A document transmitted over a classified IT system is considered a what?
What reference requires an administrative system for controlling the NWP Library within the command?
Control and safeguard NATO classified information (including NATO Restricted) per what reference?
Maintain records for the receipt, internal distribution, destruction, annual inventory, access, reproduction, and transmission of Top Secret FGI for how many years?
Maintain records for the receipt, internal distribution, transmission and destruction of Secret FGI for how many years?
Maintain records for the receipt and transmission of Confidential FGI for how many years?
Control and safeguard RD and FRD per what reference?
DoD Directive 5210.2
Control and safeguard SCI per what reference?
Control and safeguard COMSEC information per what reference?
Control and safeguard SIOP and SIOP-ESI per what reference?
Control and safeguard SOP information per what reference?
Control and safeguard NNPI per what reference?
Control and safeguard FOUO information per what reference?
Control and safeguard DoD UCNI per what reference?
When an Original Classification Authority (OCA) determines that other security measures detailed in this policy manual are insufficient for establishing “need-to-know” for classified information, and where Special Access Program (SAP) controls are not warranted, what may be employed?
Alternative Compensatory Control Measures (ACCM)
ACCM shall not be used for NATO or non-intelligence Foreign Government Information (FGI) without the prior written approval of the what?
ACCM shall not be used to protect classified information in acquisition programs as defined in what reference?
DoD Directive 5200.1-M
ACCM shall not be used to control classified information designated as Restricted Data (RD), Formerly Restricted Data (FRD), Communications Security (COMSEC) or what else?
Sensitive Compartment Information (SCI)
ACCM shall not use what structure or system to control the position and numbers of persons with access to ACCM?
Who approves the use of ACCM, and ensures that the protection afforded classified information is sufficient to reasonably deter and detect loss or compromise?
What shall be used in the text of message traffic and on cover sheets accompanying secure facsimile transmissions to assist in alerting the recipient that the transmission involves ACCM protected information?
What, or other secure transmission methods authorized for processing classified information at the same level may be used to transmit ACCM information?
Secret Internet Protocol Router Network (SIPRNET)
Approved ACCM may be applied to cleared DoD contractors only when identified in the Contract Security Classification Specification, what form?
DD Form 254
Commanding officers shall establish procedures for end of the day security checks, utilizing the what, Activity Security Checklist, to ensure that all areas which process classified information are properly secured?
What, Security Container Check Sheet, shall be utilized to record that classified vaults, secure rooms, strong rooms and security containers have been properly secured at the end of the day?
Refer to what reference for visit procedures?