Derivative Classifier Training

Similar documents
This page left blank.

Student Guide Course: Original Classification

Defense Security Service Academy OCA Desk Reference Guide

SUMMARY FOR CONFORMING CHANGE #1 TO DoDM , National Industrial Security Program Operating Manual (NISPOM)

9/2/2015. The National Security Exemption. Exemption 1. Exemption 1

DERIVATIVE CLASSIFICATION TRAINING/IMPLEMENTATION AND OVERVIEW OF EXECUTIVE ORDERS IMPACTING THE NISP

Declassification Options and Requirements

Security Classification Guidance v3

August Initial Security Briefing Job Aid

JOB AID. Marking Classified Information U N I T E D A M E R I C A S TAT E S O F. Downloadable Supplement to elearning Course

SUMMARY: The Department of Homeland Security (DHS) is revising its procedures

Department of Defense MANUAL

Department of Health and Human Services (HHS) National Security Information Manual, February 1, 2005

This publication is available digitally on the AFDPO WWW site at:

DoD Guide to Marking Classified Documents

Department of Defense MANUAL

Student Guide: North Atlantic Treaty Organization

NATO UNCLASSIFIED ARCHIVES COMMITTEE. Directive on the Public Disclosure of NATO Information

Department of Defense DIRECTIVE

Department of Defense INSTRUCTION. SUBJECT: DoD Information Security Program and Protection of Sensitive Compartmented Information

DEPARTMENT OF DEFENSE (DoD) INITIAL TRAINING GUIDE

PREPARATION OF A DD FORM 254 FOR SUBCONTRACTING. Cal Stewart ISP

INTERNATIONAL INDUSTRIAL SECURITY REQUIREMENTS GUIDANCE ANNEX

APPENDIX N. GENERIC DOCUMENT TEMPLATE, DISTRIBUTION STATEMENTS AND DOCUMENT DATA SHEET and THE IMPORTANCE OF MARKING DOCUMENTS

Department of Defense INSTRUCTION. Access to and Dissemination of Restricted Data and Formerly Restricted Data

Army Regulation Security. Department of the Army. Information Security Program. Headquarters. Washington, DC 29 September 2000 UNCLASSIFIED

NATO SECURITY INDOCTRINATION

Department of Defense MANUAL. DoD Information Security Program: Controlled Unclassified Information (CUI)

Department of Defense MANUAL

PRIVACY IMPACT ASSESSMENT (PIA) For the

PRIVACY IMPACT ASSESSMENT (PIA) For the

For Security Professionals in the Combat Environment. October 2012

The DD254 & You (SBIR)

Identification and Protection of Unclassified Controlled Nuclear Information

Derivative Classification Requirements

PRIVACY IMPACT ASSESSMENT (PIA) For the

Department of the Army TRADOC Memorandum Headquarters, United States Army Training and Doctrine Command Fort Eustis, Virginia

SECURITY OF CLASSIFIED MATERIALS B STUDENT HANDOUT

DODEA ADMINISTRATIVE INSTRUCTION , VOLUME 1 DODEA PERSONNEL SECURITY AND SUITABILITY PROGRAM

Department of Defense INSTRUCTION

PRIVACY IMPACT ASSESSMENT (PIA) For the

PRIVACY IMPACT ASSESSMENT (PIA) For the

EXECUTIVE ORDER 12333: UNITED STATES INTELLIGENCE ACTIVITIES

Suggested Contractor File Folder Headings

Department of Defense DIRECTIVE

Joint Base Lewis-McChord (JBLM), WA Network Enterprise Center (NEC) COMPUTER-USER AGREEMENT Change 1 (30 Jun 2008)

Protection of Classified National Intelligence, Including Sensitive Compartmented Information

REPORT ON COST ESTIMATES FOR SECURITY CLASSIFICATION ACTIVITIES FOR 2005

Department of Defense DIRECTIVE. SUBJECT: Unauthorized Disclosure of Classified Information to the Public

PRIVACY IMPACT ASSESSMENT (PIA) For the

DEPUTY SECRETARY OF DEFENSE 1010 DEFENSE PENTAGON WASHINGTON, D.C

DoD H, November 1999

PRIVACY IMPACT ASSESSMENT (PIA) For the

PRIVACY IMPACT ASSESSMENT (PIA) For the

DoD M OPERATING MANUAL. February

Student Guide: Controlled Unclassified Information

DEPARTMENT OF DEFENSE CONTRACT SECURITY CLASSIFICATION SPECIFICATION

BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE HEADQUARTERS OPERATING INSTRUCTION APRIL Security

REPORT to the PRESIDENT. NATIONAL ARCHIVES and RECORDS ADMINISTRATION

PRIVACY IMPACT ASSESSMENT (PIA) For the

PRIVACY IMPACT ASSESSMENT (PIA) For the

PRIVACY IMPACT ASSESSMENT (PIA) For the. Department of Defense Consolidated Cancer Registry (CCR) System. Defense Health Agency (DHA)

SECURITY OF CLASSIFIED MATERIALS W130119XQ STUDENT HANDOUT

Georgia Lottery Corporation ("GLC") PROPOSAL. PROPOSAL SIGNATURE AND CERTIFICATION (Authorized representative must sign and return with proposal)

Approved for Public Release Distribution Unlimited DIST713UTIOV STATR'E NT A. DoD H DEPARTMENT OF DEFENSE HANDBOOK FOR WRITING

Department of Defense INSTRUCTION. DoD Unclassified Controlled Nuclear Information (UCNI)

PRIVACY IMPACT ASSESSMENT (PIA) For the

PRIVACY IMPACT ASSESSMENT (PIA) For the

Student Guide - DSS Annual Security Awareness Training

PRIVACY IMPACT ASSESSMENT (PIA) For the

INSTRUCTIONS FOR REQUESTING AN AFOSI LEOSA ID CARD Updated: 1 February 2018

il~l IL 20 I I11 AD-A February 20, DIRECTIVE Department of Defense

PRIVACY IMPACT ASSESSMENT (PIA) For the

DEFENSE CLEARANCE AND INVESTIGATIONS INDEX DATABASE. Report No. D June 7, Office of the Inspector General Department of Defense

DEPARTMENT OF DEFENSE DIRECTIVES SYSTEM TRANSMITTAL. July 31, 1997 INSTRUCTIONS FOR RECIPIENTS

CURRICULUM OUTLINE OF INSTRUCTION SURFACE WARFARE OFFICER DEPARTMENT HEAD COURSE CIN: A-4H-0107 CDP: 9545 VER: 2.0 CHANGE: 1

DEPARTMENT OF THE ARMY OFFICE OF THE DEPUTY CHIEF OF STAFF, G ARMY PENTAGON WASHINGTON, DC

8/15/2013. Security Incidents Involving Special Circumstances. Information Security Webinar. Danny Jennings. DCO Meeting Room Navigation

Chapter 9 Legal Aspects of Health Information Management

PRIVACY IMPACT ASSESSMENT (PIA) For the

Reporting Period: June 1, 2013 November 30, October 2014 TOP SECRET//SI//NOFORN

Part I of the Spring 2016 MCAS Principal s Administration Manual: MCAS Test Security Requirements

PRIVACY IMPACT ASSESSMENT (PIA) For the

PRIVACY IMPACT ASSESSMENT (PIA) For the

PRIVACY IMPACT ASSESSMENT (PIA) For the

PRIVACY IMPACT ASSESSMENT (PIA) For the

PRIVACY IMPACT ASSESSMENT (PIA) For the

Information and Personnel Security Program (IPSP) Annual Refresher

PRIVACY IMPACT ASSESSMENT (PIA) For the

Guide to Incident Reporting for In-vitro Diagnostic Medical Devices

Defense Security Service DELIVER! A Pamphlet On. How to Transmit and Transport Your Classified Materials. Prepared by

Part I of the Fall 2017/Winter 2018 MCAS Principal s Administration Manual: MCAS Test Security Requirements

PRIVACY IMPACT ASSESSMENT (PIA) For the

Department of Defense DIRECTIVE. SUBJECT: Release of Official Information in Litigation and Testimony by DoD Personnel as Witnesses

Initial Security Briefing

Department of Defense DIRECTIVE

PRIVACY IMPACT ASSESSMENT (PIA) For the

A Guide. Preparation. DD Form 254. for the. of a. National Classification Management Society. Defense Security Service

Pre-OCONUS travel File (PRO-File) Step-by-step instruction

Security Asset Protection Professional Certification (SAPPC) Competency Preparatory Tools (CPT)

Transcription:

As a cleared contractor employee that creates classified materials you are considered a derivative classifier as outlined in the presidents Executive Order (E.O.) 13526. Page 1 of 21

Derivative classifiers must receive training every two years; if training is not completed you will be unable to derivatively classify materials. As a derivative classifier you are assigned a unique designator that identifies you. The purpose of this designator is to allow future recipients of this material to contact you if necessary. You will be using your Northrop Grumman external identifier as your DoD identifier on all materials that you create. The identifier is your birth month, birth day, last four digits of your my ID and your last name. This training will provide guidance on: Classification levels Appropriate classification sources Duration of classification Identification and marking of classified materials Prohibitions and or limitations, and sanctions of the marking and classification of materials Classification challenges Other key elements in the derivative classification process. Page 2 of 21

There are two means by which classification is determined. Originally: is material classified by a government official designated in writing by the President of the United States. Derivatively. As a contractor we determine classification derivatively, meaning we obtain the classification from either: source documents, Classification Guides, or DD254 guidance. By incorporating, paraphrasing, restating, generating unclassified, that when compiled reveals classified, or generating in a new form, information that was already noted as classified, we are derivatively classifying. You must be able to point to your source for derivative classification. If you cannot point to the source, then you likely cannot derivatively classify your information. It must be documented and confirmable. Page 3 of 21

As defined by the executive order, information is classified at one of three levels: Top secret Secret; or Confidential. These levels are based on the possible damage to national security that could be caused if released. Top Secret, could cause exceptionally grave damage; secret could cause grave damage; and confidential could cause damage. As a derivative classifier, you should avoid over classification of information, and are strongly encouraged to take appropriate and reasonable steps, in coordination with your Site Security Officer to clarify or request assistance from the original classification authority, for resolution of doubts or apparent conflicts about the appropriate level and duration of classification. Classified addenda or unclassified versions of documents, should be used whenever practical to facilitate greater information sharing. As a reminder, use caution when compiling or combining unclassified information as pulling various parts together could change the classification level. Page 4 of 21

Use of authorized classification sources is critical to the protection of our Nations information. The use of memory or general rules about the classification of information is not permitted. So what are the authorized classification sources? There are only three. 1. The Security Classification Guide 2. Properly marked source documents 3. Department of Defense, DD form 254, which is the classification requirements document included in your contract. When classifying derivative materials be sure to: Observe and move forward the original classification determinations Apply standard markings, described later in this training Use caution when paraphrasing, restating, or compiling information to ensure accurate classification. Page 5 of 21

Be aware that when applying derivative classifications in no instance should information be classified, continue to be maintained as classified, or fail to be declassified in order to: Conceal violations of law, inefficiency, or administrative error Prevent embarrassment to a person, organization, or agency Restrain competition; or Prevent or delay the release of information that does not require protection in the interest of national security. Page 6 of 21

Sanctions that apply when classified information is not handled, in accordance with government regulations and restrictions may include: Reprimand; Suspension without pay; Removal or termination of classification authority. You could also lose your access to classified information. Additional sanctions could be levied in accordance with applicable laws and agency regulations. Page 7 of 21

Classified materials you create must carry forward the most restrictive declassification instruction. For instance, the one that specifies the longest duration for the classification. If the source document or security classification guide does not provide declassification instruction, or the instructions are obsolete or invalid, derivative classifiers should apply a calculated 25-year duration from the date of the source document. Declassification instructions on materials will be listed as either: A specific date, also include the date of the origin of the source document. An occurrence of an event in which case declassification would be 10 years after the occurrence of the event. 25X1, means material includes information that reveals the identity of a confidential human source or intelligence and is not subject to automatic declassification. 50X1-HUM, means that the information may not identify specifically the source, but does clearly reveal the identity of a confidential human or intelligence source. The duration of classification is up to 75 years and exempt from automatic declassification. 50X2 WMD means that the information is expected to reveal key design concepts of weapons of mass destruction, the duration of classification is up to 75 years. Materials may contain obsolete declassification instructions in that case you should calculate 25 years from the date of the source document and apply that declassification date. If no source date is available then use the current date for your 25-year calculation. Obsolete declassification instructions include: Originating Agency's Determination Required (OADR) Manual Review (MR) Any of the exemption markings (X1, X2, X3, X4, X5, X6, X7, & X8). Page 8 of 21

As a derivative classifier you are responsible to ensure that materials you create contain: Classification markings that are immediately apparent A banner line Portion markings immediately preceding the portion to which it applies Classified by line including your personal identifier Appropriate derived from and declassification instructions The origination date of the material. Classified addenda or unclassified versions of documents should be used whenever practical to facilitate greater information sharing. Use caution when extracting information to ensure that it is appropriately marked. Page 9 of 21

When marking electronic media such as emails, you may use the short forms shown. They must also contain: Portion markings Overall classification The classification marking of the title of attachment. This is the classification of the title of the attachment and not the classification of the file itself. Most titles should be unclassified, but this example shows an attachment with a classified title. Classified emails can only be received or sent on approved classified systems. Page 10 of 21

Generally material or information being created is considered working papers. Working papers are defined as documents or materials, regardless of the media, which are expected to be revised prior to the preparation of a finished product for dissemination or retention. The following is required for working papers: Date when created Marked as working papers Marked with highest classification level of the information contained within Protected at that level Destroyed when no longer needed Finalized to include portion markings and accountability if released outside the facility, or retained for more than 180 days from the date created, filed permanently, e-mailed within or released outside the originating activity. Page 11 of 21

All classified materials must be marked. This includes marking materials such as charts, maps, equipment and hardware, drawings and photographs and rolled documents and photographic media. For more information on marking these types of items, refer to the Marking Classified Information document. https://ess.myngc.com/security/documents/pdfs/derivativeclassification.pdf Page 12 of 21

As mentioned earlier there are three authorized sources that may be used to derivatively classify. A Security Classification Guide is a collection of precise, comprehensive guidance about a specific program, system, operation, or weapons systems identifying what elements of information are classified. For each element of information, the Security Classification Guide includes its classification level, the reason for that classification, and information about when that classification will be downgraded or declassified. For this reason, the security classification guide is the primary source guide for derivative classification. Page 13 of 21

A second authorized source for derivative classification is an existing, properly marked source documents from which information is extracted, paraphrased, restated, and or generated in a new form for inclusion in another document. When extracting data from several sources a list of the sources used must be attached or included in the new document. Page 14 of 21

The third authorized source is the DD form 254, the Department of Defense contract security classification specification. The DD form 254 will usually cite the Security Classification Guide that is to be used for that program. However, in some cases specific language related to classification of certain program information may be included in the DD 254. Page 15 of 21

In creating your derivatively classified materials you may find yourself using more than one source. In that case the materials will be marked as, Classified by Multiple Sources. When using the multiple sources classified by line, a list of source material and or bibliography is required and must be included or annotated in the derivative document. If you are only using one document but that document is marked multiple sources, you should mark your document as derived from the document rather than using the term multiple sources to mark your classification instructions. If the document has a bibliography or reference list, this may be used as the list of sources. Page 16 of 21

If the information was previously identified as classified, it will continue to be classified, marked and handled as appropriate. If you are not certain about the classification of the material it should be marked to the highest possible level at the top and bottom of each page with the words, Classification Determination Pending. The originator of the information should contact the appropriate government customer or owner for final classification determination. If specific material when standing alone is unclassified, but when compiled with other information becomes classified, the reason for classifying the compilation shall be stated at an appropriate location at or near the beginning of the compiled document. Any unclassified portions will be portion marked with the letter U, while the overall markings will reflect the classification of the compiled information, even if all the portions are marked with the letter U, the material should display the overall classification. Page 17 of 21

You are encouraged and expected to challenge the classification of information, if you believe it is improperly or unnecessarily classified. Coordinate classification challenge activities with your security representative. Formal challenges will be worked in coordination with your Security Representative, and the appropriate program customer or originating classifier. Page 18 of 21

Marking, is the principal way of letting holders of information know the specific protection requirements for that information. As a derivative classifier of information it is your responsibility to ensure to the best of your ability that our nation s sensitive information is properly protected through appropriate marking. This training provided you with the basic information in the derivative classification process. You are strongly encouraged to review additional information provided in the Center for Development of Security Excellence, Marking Classified Information Document (https://ess.myngc.com/security/documents/pdfs/marking_classified_information.pdf), as well as working with your Northrop Grumman Security Professional. Page 19 of 21

This summary provides helpful hints to the training you have just completed. In addition; this summary is downloadable, and can be used as a quick reference tool (https://ess.myngc.com/security/documents/pdfs/derivativesummary.pdf). Remember, as a derivative classifier you are responsible to ensure that materials you create contain: Classification markings that are immediately apparent A banner line Portion markings immediately preceding the portion to which it applies Classified by line including your personal identifier Appropriate derived from and declassification instructions; and The origination date of the material. Always use caution when extracting information to ensure that is appropriately marked. Page 20 of 21

If you have questions or comments please contact your local security representative or call the Enterprise Security Shared Service, at 855-737-8364. If you are viewing this presentation, on some other area than the Learning Exchange, please send an email to, ESSS_DoD@ngc.com, stating you have completed the derivative classification training. In your email include your legal first and last name, your MyID or last four digits of your social security number, and the code (IMTRND-DC), shown on the bottom right corner, to receive credit for the training. Page 21 of 21