Podcast
Questions and Answers
What type of unauthorized disclosure has occurred if an individual with access to classified info sent a classified email across a network that is not authorized to process classified info?
What type of unauthorized disclosure has occurred if an individual with access to classified info sent a classified email across a network that is not authorized to process classified info?
Data Spill
Before releasing info to the public domain, in what order must it be reviewed?
Before releasing info to the public domain, in what order must it be reviewed?
Local command, security manager and then authorized personnel
Is whistleblowing the same as reporting an unauthorized disclosure?
Is whistleblowing the same as reporting an unauthorized disclosure?
False
When using social networking services, the penalties for ignoring requirements related to protecting classified info and controlled unclassified info (CUI) from unauthorized disclosure are what?
When using social networking services, the penalties for ignoring requirements related to protecting classified info and controlled unclassified info (CUI) from unauthorized disclosure are what?
Signup and view all the answers
The Whistleblower Protection Enhancement Act (WPEA) relates to reporting all of the following except?
The Whistleblower Protection Enhancement Act (WPEA) relates to reporting all of the following except?
Signup and view all the answers
What type of unauthorized disclosure has occurred when classified info is left in an office restroom?
What type of unauthorized disclosure has occurred when classified info is left in an office restroom?
Signup and view all the answers
Authorized holders must meet the requirements to access _________ in accordance with a lawful government purpose.
Authorized holders must meet the requirements to access _________ in accordance with a lawful government purpose.
Signup and view all the answers
What should you do if you see classified info or controlled unclassified info (CUI) on a public internet site?
What should you do if you see classified info or controlled unclassified info (CUI) on a public internet site?
Signup and view all the answers
What is described as the process by which info proposed for public release is examined for compliance with established national and DOD policies?
What is described as the process by which info proposed for public release is examined for compliance with established national and DOD policies?
Signup and view all the answers
Which of the following is not the responsibility of the security manager or facility security officer (FSO)?
Which of the following is not the responsibility of the security manager or facility security officer (FSO)?
Signup and view all the answers
Is Yuri following DoD policy?
Is Yuri following DoD policy?
Signup and view all the answers
When destroying or disposing of classified info, you must ________.
When destroying or disposing of classified info, you must ________.
Signup and view all the answers
What should Jane Johnson's first action be if she found classified info in the office breakroom?
What should Jane Johnson's first action be if she found classified info in the office breakroom?
Signup and view all the answers
If classified info or controlled unclassified info (CUI) is in the public domain, it is still classified or designated as CUI.
If classified info or controlled unclassified info (CUI) is in the public domain, it is still classified or designated as CUI.
Signup and view all the answers
How long is your NDA applicable?
How long is your NDA applicable?
Signup and view all the answers
Study Notes
Unauthorized Disclosure Concepts
- Misconception often surrounds the understanding of what constitutes unauthorized disclosure.
- A data spill occurs when classified information is transmitted through unauthorized networks.
Information Release Protocol
- When releasing information to the public, it must first be reviewed by local command and a security manager.
- Whistleblowing is distinctly separate from reporting unauthorized disclosures and follows different procedures.
Social Media and Information Security
- Penalties for failing to protect classified and controlled unclassified information (CUI) on social media mirror those for other unauthorized disclosure scenarios.
Whistleblower Protection
- The Whistleblower Protection Enhancement Act (WPEA) does not cover the reporting of classified information or CUI already in the public domain.
Types of Disclosure Violations
- Improper safeguarding occurs when classified information is carelessly left in public areas, like a restroom.
- CUI access requires compliance with lawful government purposes related to various operations and activities.
Reporting Procedures
- If classified or CUI material is found online, it should be reported to a security manager or Facility Security Officer (FSO).
- Prepublication review involves examining information proposed for public release to ensure it complies with national and DOD policies.
Security Responsibilities
- Responsibilities of a security manager or FSO do not include sanctioning personnel; their role is more about safeguarding information.
- Immediate safeguarding is necessary if an individual neglects to protect classified information.
Disposal Guidelines
- Proper guidelines must always be followed when destroying or disposing of classified information to prevent unauthorized access.
Handling Found Classified Information
- The first step after discovering classified information in a public space is to secure it to prevent further unauthorized access.
Status of Public Information
- Classified information remains classified even if it appears in the public domain, maintaining its protected status under law.
Non-Disclosure Agreements (NDA)
- NDA obligations remain in force for a lifetime, ensuring continued confidentiality of designated information.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge on unauthorized disclosure concepts and information release protocols. Understand the implications of social media on information security and the distinctions in whistleblower protections. This quiz will help clarify common misconceptions and the types of disclosure violations.