Sample Main Presentation

Download Report

Transcript Sample Main Presentation

SECURITY BRIEFING
A threat awareness briefing
A defensive security briefing
An overview of the security
classification system
Employee reporting obligations and
requirements
Security procedures and duties
applicable to the employee's job
WHY OUR TECHNOLOGY?
Why go through process of Research and Development
Let someone else pay for R&D
Possible military application
EMPLOYEE RESPONSIBILITIES
Notify FSO of travel plans
Ensure proper travel documentation
Protect export controlled technology and classified
information
Visit the State Department website for up to date
travel information www.state.gov
EMPLOYEE RESPONSIBILITIES
Maintain professional bearing
Remain in contact with host
Travel with others when possible
Display wealth as little as possible
Learn customs and courtesies of host
country
NISPOM
All agencies apply three factors to the concept of Risk
Management
1. Damage to national security
2. Existing or anticipated threat to disclosure of
information.
3. Short and long term costs of the requirements,
restrictions, and other safeguards
The second and third factors aren’t spelled out in the NISPOM, but
are recognized as legitimate concerns to prevent the NISP from
becoming a burden to industry
THREE CLASSIFICATION LEVELS
 CONFIDENTIAL information could reasonably be
expected cause damage
 SECRET could reasonably be expected to cause
serious damage
 TOP SECRET could reasonably be expected to cause
exceptionally grave damage to national security
Caution: Classified information should
not be confused with the proprietary
information sometimes referred to as
company confidential or secret.
HOW TO MARK A CLASSIFIED PAGE
Overall Page Markings
Portion Marking
Classification Information
Notice that the document has a top and bottom marking at
the highest level of classification on the page and
appropriate levels of classification for the information in the
paragraph.
TRAINING AND INSTRUCTIONS
 Cleared employees are trained to
protect classified information
 Sanctions should be imposed on
those who fail to protect it from
unauthorized disclosure
 Each originating agency must
provide instructions on the proper
protection, use, storage,
transmission and destruction of the
information
HOTLINES
Hotlines are available. However, recommend that
company officers have chance to handle situation
Not to take place of investigations
May be used to tip off
Defense Hotline
The Pentagon
Washington, DC 20301-1900
(800) 424-9098
REPORTING
• Events that impact:
– FCL
– PCL
– Protection of classified information
– Loss or compromise
• Contractors cleared employees on reporting
channels with:
– Federal agencies
– FBI
– CSA
HOW TO REPORT
Report to the FBI
Follow up with written report
Send copy to IS Rep with FBI approval
Contact FBI
File Office
Send Written
Report
Notify DSS
when
permitted
REPORTING (TO CSA)
• Reports to CSA
– Changes in storage capability
– Inability to protect classified
– Security equipment vulnerabilities
– Unauthorized receipt of classified
LOSS, COMPROMISE OR
SUSPECTED COMPROMISE
Conduct
preliminary inquiry
Loss, compromise or
suspected
compromise?
Submit initial report
Submit initial
report
Submit final report
WHAT IS A CLASSIFICATION
MARKING?
A classification marking is a physical designation
designed to notify and warn the holder that the
information they are in possession of is classified
and to what level of classification
MARKINGS
 Must put reason for classification
 Who classified the material (office or person)
 Annotate date or event marking the duration of
classification
 Classified material should always display proper
markings at all times
DERIVATIVE CLASSIFICATION
Contractor personnel make derivative classification decisions when they
incorporate, paraphrase, restate, or generate in new form, information
that is already classified; then mark the newly developed material
consistently with the classification markings that apply to the source
information.
 FSO ensures contractor is training and has resources
 Contractor ensures:
Use of Security Classification Guide
Mark derived copy with the same classification as original
Challenge classification when necessary
Carry over longest period of classification to the new
document
Maintain list of sources used to compile the derivative
document
Special Material
 Classification markings must be clear, no matter the media
Files, folders or groups of documents must be marked at
highest level within
Email and other electronic messages have to be marked
the same as any document
Microform is tiny, but the media has to be marked to be
seen by the unaided eye and within the microform
document
Translations of U.S. classified information is marked with
U.S. as country of origin and the classification in English
and foreign language
FACILITY SECURITY CLEARANCE
(FCL)
 FCL Process
Government Contracting Authority approve,
Cognitive Security Agency conducts evaluation
Company compiles list of Key Management
Personnel
Assembles vital corporate documents
Prepares Department of Defense Security
Agreement DD Form 441
Prepares FOCI Statement SF328
FOREIGN OWNERSHIP CONTROL
AND INFLUENCE (FOCI)
The SF 328 is used by the contractor and the CSA to
determine whether or not and to what limit the cleared
contractor falls under FOCI.
THE FSO
Qualifications
Cleared at the same level as the
facility clearance
U.S. Citizen
This FSO has a tremendous scope of responsibility and takes on the role as
the provider of security and the link between the government contractor, the
cognizant security agency (CSA) and the federal government.
PERSONNEL SECURITY
CLEARANCE (PCL)

A security clearance is the administrative determination
that an employee is eligible from a national security
basis for a security clearance

The final clearance is the result of a request by the
contractor, investigation conducted by the CSA and
determination made by a trained adjudicator
REQUIREMENTS
Contractors protect classified material under their control
Individuals protect classified information entrusted to them
The FSO leads and implements the security program designed to
protect classified information and prevent unauthorized disclosure
STORAGE
 TOP SECRET is stored in GSA approved container, approved
vault or approved closed area with supplemental controls
 SECRET and CONFIDENTIAL material do not need supplemental
controls when stored in a GSA approved container
GSA APPROVED CONTAINERS
 Repairs to GSA approved containers shall be made by cleared or
escorted personnel trained in approved methods
 Access control can be used to limit access to closed areas DURING
WORK HOURS