Safeguarding Classified Info Flashcards
26 Questions
100 Views

Safeguarding Classified Info Flashcards

Created by
@DistinctiveDrama

Questions and Answers

There are some forms of classified information, such as classified waste, that do not have to be protected.

False

The higher the level of classification, the more protection the classified information requires to reasonably prevent the possibility of its loss or compromise.

True

Classified information may be disclosed to authorized persons in cleared facilities of a Multiple Facility Organization (MFO).

True

When can classified information be disclosed to the public?

<p>Classified information may never be disclosed to the public</p> Signup and view all the answers

What is the purpose of an IMS?

<p>To provide the capability for timely retrieval and disposition of classified information</p> Signup and view all the answers

As long as the package remains sealed, the company can designate any employee to pick up and sign for packages at their designated P.O. Box as long as he or she brings it directly back to the office and does not open it.

<p>False</p> Signup and view all the answers

When a shipment is received via a cleared commercial carrier, the sender must notify the recipient in advance when the shipment is to be expected.

<p>True</p> Signup and view all the answers

Working papers must be dated when _______________

<p>created</p> Signup and view all the answers

In order to continue to be used to protect classified information, an approved security container that has been repaired must _________________________

<p>be restored to its original state of security integrity and have signed and dated certificate stating the method of repair used</p> Signup and view all the answers

What are the two labels that all GSA-approved storage containers must have affixed to them?

<p>GSA Test Certification label and GSA Approved Security Container label</p> Signup and view all the answers

Classified information may only be stored in GSA-approved storage containers.

<p>False</p> Signup and view all the answers

How often should key-operated padlocks be changed or rotated on security containers?

<p>At least annually</p> Signup and view all the answers

Which of the following is not a good way to protect combinations?

<p>Write the combination down and store it in a locked desk drawer</p> Signup and view all the answers

You can call the DoD Lock Program hotline to obtain free magnetic Secured and Open signs to attach to the sides of your security containers.

<p>True</p> Signup and view all the answers

__________________ information stored in a GSA-approved security container or vault requires supplemental protection.

<p>Top Secret</p> Signup and view all the answers

When are end of day security checks required?

<p>At the end of the last working shift</p> Signup and view all the answers

Which report should be sent to your Defense Security Service (DSS) Field Office if your facility had an emergency evacuation and you were unable to secure the classified information you were using before you had to leave?

<p>Inability to Safeguard Classified Material</p> Signup and view all the answers

What statement applies to perimeter control inspections?

<p>They must be applied consistently</p> Signup and view all the answers

What is the purpose of perimeter controls?

<p>To deter and detect the unauthorized removal or introduction of classified information</p> Signup and view all the answers

When outside of its security container, classified information must be kept ______________________.

<p>under constant surveillance by an authorized person</p> Signup and view all the answers

What is the purpose of restricted areas?

<p>To control access to classified information in an open area during working hours</p> Signup and view all the answers

It is a good security practice to prohibit use of all__________________ in areas containing classified material as they can record and transmit classified information orally and photographically.

<p>wireless devices</p> Signup and view all the answers

Top Secret reproduction never requires Government Contracting Activity (GCA) authorization.

<p>False</p> Signup and view all the answers

Copy machines or reproduction equipment with memory must __________________________.

<p>be authorized IAW NISPOM Chapter 8</p> Signup and view all the answers

Which of the following is not a security best practice when reproducing classified information?

<p>Use the reproduction equipment closest to the security container where the classified information is stored</p> Signup and view all the answers

When requesting retention authority from the Government Contracting Activity (GCA), you must identify the classified information for which you are requesting retention as well as provide a statement of justification.

<p>True</p> Signup and view all the answers

Study Notes

Classified Information Protection

  • Classified waste does not require protection.
  • Classification Levels: Higher classification levels necessitate increased protection to prevent loss or compromise.
  • Authorized Disclosure: Classified information can be shared with authorized personnel in cleared facilities within a Multiple Facility Organization (MFO).
  • Public Disclosure: Classified information cannot be disclosed to the public at any time.

Information Management System (IMS)

  • The IMS facilitates timely retrieval and disposition of classified information.

Package Handling

  • Receiving Packages: Only authorized personnel may pick up sealed packages; random employee designation is not permitted.
  • Notification Requirement: Senders must notify recipients of expected shipments via cleared commercial carriers.

Documentation and Storage

  • Working Papers must be dated upon creation.
  • Approved security containers must be restored to their original state after repairs to maintain protection integrity.
  • Labels for Storage Containers: All GSA-approved containers require a GSA Test Certification label and a GSA Approved Security Container label.
  • Classified information may be stored in other than GSA-approved containers.

Security Procedures

  • Key-Operated Padlocks: These should be changed or rotated at least annually.
  • Combination Protection: Writing combinations down and storing them in a locked desk drawer is not a secure practice.
  • End of Day Checks: Security checks are mandatory at the end of each last working shift.

Emergency Procedures

  • In the event of an emergency evacuation without securing classified information, report the Inability to Safeguard Classified Material to the Defense Security Service (DSS) Field Office.

Perimeter Control

  • Perimeter Inspections: Must be consistently applied to ensure security.
  • Purpose of Perimeter Controls: To deter and detect unauthorized removal or introduction of classified information.

Handling Classified Information

  • When outside its secure container, classified information must be under constant surveillance by an authorized individual.
  • Restricted areas control access to classified information in open areas during working hours.
  • Use of Wireless Devices is prohibited within areas containing classified material due to their capability to record and transmit sensitive information.

Reproduction of Classified Information

  • Top Secret Reproduction: Always requires Government Contracting Activity (GCA) authorization.
  • Reproduction equipment with memory must be authorized in accordance with NISPOM Chapter 8.
  • Best practices for reproducing classified information do not include using equipment closest to the storage security container.

Retention Authority

  • When requesting retention authority from the GCA, clearly identify the classified information and provide a justification statement.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

This quiz consists of flashcards focused on the protection of classified information within the National Industrial Security Program (NISP). Test your knowledge on the levels of classification and the requirements for protecting different types of classified information. Prepare to ensure that sensitive information remains secure!

More Quizzes Like This

Use Quizgecko on...
Browser
Browser