Podcast
Questions and Answers
_________________ is a type of unauthorized disclosure involving the willful, negligent, or inadvertent disclosures of classified information or controlled unclassified information (CUI) transferred onto an information system not authorized at the appropriate security level or not having the required protection or access controls.
_________________ is a type of unauthorized disclosure involving the willful, negligent, or inadvertent disclosures of classified information or controlled unclassified information (CUI) transferred onto an information system not authorized at the appropriate security level or not having the required protection or access controls.
Data Spills
_________________ is a type of unauthorized disclosure involving activities designed to obtain, deliver, communicate, or transmit classified information or controlled unclassified information (CUI) intended to aid a foreign power.
_________________ is a type of unauthorized disclosure involving activities designed to obtain, deliver, communicate, or transmit classified information or controlled unclassified information (CUI) intended to aid a foreign power.
Espionage
If classified information or controlled unclassified information (CUI) is in the public domain, ________________.
If classified information or controlled unclassified information (CUI) is in the public domain, ________________.
the information is still classified or designated as CUI.
How long is your Non-Disclosure Agreement (NDA) applicable?
How long is your Non-Disclosure Agreement (NDA) applicable?
Signup and view all the answers
Which of the following provide whistleblower protections?
Which of the following provide whistleblower protections?
Signup and view all the answers
Is whistleblowing the same as reporting an unauthorized disclosure (UD)?
Is whistleblowing the same as reporting an unauthorized disclosure (UD)?
Signup and view all the answers
Which of the following are some tools needed to properly safeguard classified information?
Which of the following are some tools needed to properly safeguard classified information?
Signup and view all the answers
As a military member or federal civilian employee, it is a best practice to ensure your current or last command conduct a security review of your resume and ____.
As a military member or federal civilian employee, it is a best practice to ensure your current or last command conduct a security review of your resume and ____.
Signup and view all the answers
In addition to military members and federal civilian employees those who work in ______________ should send resumes and cover letters for security review.
In addition to military members and federal civilian employees those who work in ______________ should send resumes and cover letters for security review.
Signup and view all the answers
The Public Affairs Office (PAO) conducts prepublication reviews for which of the following considerations? (Select all that apply)
The Public Affairs Office (PAO) conducts prepublication reviews for which of the following considerations? (Select all that apply)
Signup and view all the answers
Tonya Rivera was contacted by a news outlet with questions regarding her work. To whom should Tonya refer the media?
Tonya Rivera was contacted by a news outlet with questions regarding her work. To whom should Tonya refer the media?
Signup and view all the answers
Jane Johnson found classified information in the office breakroom. What should be her first action?
Jane Johnson found classified information in the office breakroom. What should be her first action?
Signup and view all the answers
One of your co-workers, Yuri, found classified information on the copy machine next to your cubicles. Yuri began questioning surrounding co-workers to see if anyone had left the documents unattended. Is Yuri following DoD policy?
One of your co-workers, Yuri, found classified information on the copy machine next to your cubicles. Yuri began questioning surrounding co-workers to see if anyone had left the documents unattended. Is Yuri following DoD policy?
Signup and view all the answers
If you have discovered unsecured classified information, you must report it to your local security manager or ___.
If you have discovered unsecured classified information, you must report it to your local security manager or ___.
Signup and view all the answers
Unauthorized disclosure is the communication or physical transfer of classified information or controlled unclassified information (CUI) to an unauthorized recipient.
Unauthorized disclosure is the communication or physical transfer of classified information or controlled unclassified information (CUI) to an unauthorized recipient.
Signup and view all the answers
An individual with access to classified information shared it with a journalist who then released the information in a podcast. Which type of unauthorized disclosure has occurred?
An individual with access to classified information shared it with a journalist who then released the information in a podcast. Which type of unauthorized disclosure has occurred?
Signup and view all the answers
Deliberately providing controlled unclassified information (CUI) to the media describes which type of unauthorized disclosure?
Deliberately providing controlled unclassified information (CUI) to the media describes which type of unauthorized disclosure?
Signup and view all the answers
If classified information or controlled unclassified information (CUI) has been put in the public domain, then it is okay for employees to freely share it.
If classified information or controlled unclassified information (CUI) has been put in the public domain, then it is okay for employees to freely share it.
Signup and view all the answers
The Whistleblower Protection Enhancement Act (WPEA) relates to reporting all of the following except?
The Whistleblower Protection Enhancement Act (WPEA) relates to reporting all of the following except?
Signup and view all the answers
All classified information shall be clearly identified by authorized security classification, dissemination control _________, authorized abbreviations, and portion markings.
All classified information shall be clearly identified by authorized security classification, dissemination control _________, authorized abbreviations, and portion markings.
Signup and view all the answers
Markings give information on the source(s) of and reason(s) for _________________.
Markings give information on the source(s) of and reason(s) for _________________.
Signup and view all the answers
Which of the following requirements must employees meet to access classified information? (Select all that apply)
Which of the following requirements must employees meet to access classified information? (Select all that apply)
Signup and view all the answers
Jamal is using a security classification guide (SCG) to assist in marking information from a source document. Which best describes Jamal's work?
Jamal is using a security classification guide (SCG) to assist in marking information from a source document. Which best describes Jamal's work?
Signup and view all the answers
Study Notes
Unauthorized Disclosure of Classified Information
-
Data Spills: Refers to unauthorized disclosures of classified information or controlled unclassified information (CUI) on systems lacking proper security levels or access controls.
-
Espionage: Involves activities aimed at obtaining or transmitting classified information or CUI to assist a foreign power.
-
Public Domain Information: Classified information or CUI remains classified even if it appears in the public domain.
-
Non-Disclosure Agreement (NDA): Remains applicable for a lifetime, indicating the perpetual nature of confidentiality obligations.
-
Whistleblower Protections: Provided under DoD Whistleblower statutes, ensuring the rights of individuals reporting violations.
-
Whistleblowing vs. Unauthorized Disclosure Reporting: Different procedures are used for whistleblowing compared to reporting unauthorized disclosures.
-
Safeguarding Classified Information: Tools and practices for protecting classified information include various security measures and protocols.
Best Practices in Security Review
-
Resume and Cover Letter Security Review: Military members and federal civilian employees should have their resumes and cover letters security-reviewed by their current or last command.
-
Public Affairs Office (PAO): Personnel working in public affairs must also have their resumes and cover letters reviewed for security compliance.
-
Prepublication Reviews: Conducted by the PAO to evaluate content that could potentially discredit the military or federal government.
Incident Reporting Procedures
-
Media Inquiries: Individuals like Tonya Rivera should refer media inquiries to the Facility Security Officer (FSO).
-
Discovery of Classified Information: Finding classified materials in unsecured locations requires immediate securing in a GSA-approved container.
-
Protocol for Unsecured Classified Information: Upon discovery, it must be reported to the local security manager or the facility security officer (FSO).
-
Immediate Safeguarding: If classified information is left unattended, individuals must safeguard it without delay.
Understanding Unauthorized Disclosure
-
Definition of Unauthorized Disclosure: Involves the communication or transfer of classified information or CUI to unauthorized recipients.
-
Public Domain Disclosure: When classified information is in the public domain, it does not authorize employees to share it freely.
-
Leaking Information: Intentionally sharing controlled unclassified information (CUI) with media outlets is termed as leaking.
-
Whistleblower Protection Enhancement Act (WPEA): Does not cover classified information or CUI in the public domain.
Security Classification and Access
-
Clear Identification of Classified Information: Must include authorized security classification, dissemination control markings, abbreviations, and portion markings.
-
Purpose of Markings: Provides information on the source and reasons behind access to classified information.
-
Access Requirements for Classified Information: Employees need a favorable eligibility determination and a signed Nondisclosure agreement (SF-312 or Form 4414).
-
Derivative Classification: Describes the process of marking information from a source document using a security classification guide (SCG).
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge on the unauthorized disclosure of classified information with this set of flashcards. This quiz covers definitions, examples, and important concepts relevant to the Department of Defense and industry practices. Ideal for those involved in information security and compliance.