VERIFIED
◉ identify immediate actions for safeguarding suspected classified
material. Answer: Report all security violations or suspected
compromises, including espionage attempts, to the security manager
immediately.
◉ identify the levels of classified materials security classification.
Answer: 1. Top Secret -
2. Secret
3. Confidential - -
4. Unclassified -
◉ top secret. Answer: - unauthorized disclosure can be expected to
cause exceptionally grave damage to national security. Orange cards
◉ Secret. Answer: unauthorized disclosure could be expected to
cause serious damage to national security. Red card indicator
,◉ Confidential. Answer: - could be expected to cause identifiable
damage to national security- blue cards
◉ Unclassified. Answer: any other material not marked
◉ identify procedures for classified material spillage or
compromise. Answer: Report all security violations or suspected
compromises, including espionage attempts, to the security manager
immediately.
Use classified material in a controlled environment that limits the
number of people who have access to it.
Cover or close material if uncleared personnel approach.
Never leave classified material unsecured.
Never take classified material home.
Memorize safe combinations; written records of combinations are
only maintained in the CMCC and may not be held by any individual.
Store nothing valuable with classified material.
Do not discuss classified material with anyone other than cleared
personnel with need to know.
Destroy material exactly when told using the prescribed method.
◉ identify the procedures for reporting persons suspected of
espionage. Answer: report the incident or person immediately to
,your chain of command, security manager, S-2 Intelligence Officer, or
Naval Criminal Investigative Services (NCIS
◉ identify the methods used by foreign agents to collect
information. Answer: 1. Exploiting or stealing classified equipment
and technology
2. Illegally transferring U.S. technology from third countries
3. Covert espionage.
4. Recruitment of Americans to a foreign cause or the exploitation of
human intelligence.
5. Cyber attacks
◉ identify procedures for handling of "For Official Use Only"
materials. Answer:
◉ identify ways to safeguard personally identifiable information
(PII) in. Answer: 1. Ensuring that PI/PII contained in a system of
records, , is protected so that the security and confidentiality of the
information is preserved.
, 2. Not disclosing any information contained in a system of records
3. Not maintaining unpublished official files.
4. Safeguarding the privacy of individuals and confidentiality of
PI/PII contained in a system of records.
5. Properly marking all FOR OFFICIAL USE ONLY - PRIVACY
SENSITIVE - Any misuse or unauthorized disclosure can result in
both civil and criminal penalties."
6. Not maintaining privacy sensitive information in public folders.
7. Reporting any unauthorized disclosure of PI/PII f
.
8. DON activities shall not maintain records describing how an
individual exercises his/her rights guaranteed by the First
Amendment
◉ define personally identifiable information (PII. Answer: Any
information or characteristics that may be used to distinguish or
trace an individual's identity, such as their name, social security
number, or biometric records. PII falls under the sub-classification
For Official Use Only (FOUO).