DO Off-Boarding Session Agenda Tuesday January 10, 2017

Similar documents
Initial Security Briefing

GAO INDUSTRIAL SECURITY. DOD Cannot Provide Adequate Assurances That Its Oversight Ensures the Protection of Classified Information

Security Asset Protection Professional Certification (SAPPC) Competency Preparatory Tools (CPT)

DOD Insider Threat Management and Analysis Center COUNTERINTELLIGENCE AWARENESS WEBINAR SERIES

STATEMENT OF JAMES R. CLAPPER FORMER DIRECTOR OF NATIONAL INTELLIGENCE BEFORE THE

APPENDIX N. GENERIC DOCUMENT TEMPLATE, DISTRIBUTION STATEMENTS AND DOCUMENT DATA SHEET and THE IMPORTANCE OF MARKING DOCUMENTS

SECURITY OF CLASSIFIED MATERIALS B STUDENT HANDOUT

NUCLEAR REGULATORY COMMISSION [NRC ] Nuclear Regulatory Commission Insider Threat Program Policy Statement

8/11/2015. Navigation in the Meeting Room. Cyber Enabled Threats to Cleared Industry. Host: Rebecca Morgan Counterintelligence Instructor CDSE

United States District Court

Creating an Insider Threat Program. NCMS June 2015

Balancing Requirements

SECURITY OF CLASSIFIED MATERIALS W130119XQ STUDENT HANDOUT

August Initial Security Briefing Job Aid

INSIDER THREATS. DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems

Department of Defense DIRECTIVE

DEPARTMENT OF THE NAVY INSIDER THREAT PROGRAM. (1) References (2) DON Insider Threat Program Senior Executive Board (DON ITP SEB) (3) Responsibilities

Department of Defense DIRECTIVE

Defense Security Service Academy OCA Desk Reference Guide

NATO SECURITY INDOCTRINATION

9/2/2015. The National Security Exemption. Exemption 1. Exemption 1

SECRETARY OF THE ARMY WASHINGTON

DoD Update Insider Threat and the NISP

GAO ECONOMIC ESPIONAGE. Information on Threat From U.S. Allies. Testimony Before the Select Committee on Intelligence United States Senate.

EXPORT CONTROL. Policy Statement. Reason for Policy. Who is Governed by this Policy

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release January 17, January 17, 2014

Introduction to Industrial Security, v3

REPORT ON COST ESTIMATES FOR SECURITY CLASSIFICATION ACTIVITIES FOR 2005

For Immediate Release October 7, 2011 EXECUTIVE ORDER

2017 AMSAT Space Symposium and Annual Meeting

EXECUTIVE ORDER 12333: UNITED STATES INTELLIGENCE ACTIVITIES

DEPARTMENT OF DEFENSE (DoD) INITIAL TRAINING GUIDE

National Security Agency

(Revised January 15, 2009) DISCLOSURE OF INFORMATION (DEC 1991)

Student Guide: Controlled Unclassified Information

Updated FY15 Dignity Health General Compliance Education for Staff Module 2

Defense Security Service Intelligence Oversight Awareness Training Course Transcript for CI

From: Commanding Officer/Leader, United States Navy Band

Q-53 Security Training: Transmitting and Transporting Classified Information, Part I

DOD INSTRUCTION IMPLEMENTATION OF THE CORRESPONDENCE AND TASK MANAGEMENT SYSTEM (CATMS)

il~l IL 20 I I11 AD-A February 20, DIRECTIVE Department of Defense

CHAPTER 26 BODY WORN CAMERAS

PRIVACY IMPACT ASSESSMENT (PIA) For the

THE WHITE HOUSE. Office of the Press Secretary NATIONAL SECURITY PRESIDENTIAL MEMORANDUM - 2

Welcome to LifeWorks NW.

General Security. Question Answer Policy Resource

Department of Defense INSTRUCTION. SUBJECT: DoD Information Security Program and Protection of Sensitive Compartmented Information

Department of Defense INSTRUCTION. SUBJECT: Security of Unclassified DoD Information on Non-DoD Information Systems

Client Engagement Policy and Operating Procedure

Information Security Emergency Planning Student Guide Student Guide. Course: Information Security Emergency Planning. Introduction

AGENCY: Transportation Security Administration (TSA), Department of Homeland

Frequently Asked Questions

Preserving Investigative and Operational Viability in Insider Threat

Department of Defense DIRECTIVE. SUBJECT: Unauthorized Disclosure of Classified Information to the Public

REVIEWED BY Leadership & Privacy Officer Medical Staff Board of Trust. Signed Administrative Approval On File

Department of Defense DIRECTIVE. DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3)

Reporting a Privacy Breach to the Commissioner

Mandatory Reporting A process

Directive on United States Nationals Taken Hostage Abroad and Personnel Recovery Efforts June 24, 2015

Department of Defense DIRECTIVE

NATO UNCLASSIFIED ARCHIVES COMMITTEE. Directive on the Public Disclosure of NATO Information

Security Classification Guidance v3

WHAT IS HIPAA? HIPAA is the ELECTRONIC transmission of Three programs have been enacted to date Privacy Rule April 2004

GATEWAY BEHAVIORAL HEALTH SERVICES VOLUNTEER/INTERNSHIP APPLICATION

Department of Defense DIRECTIVE

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC

Part 1: Employment Restrictions After Leaving DoD: Personal Lifetime Ban

Export Control Review Processes Office of Sponsored Projects. Proposal and Award Phase

Radiation Protection at DOE: Politics and Science A Historical Perspective

UNITED STATES ARMY INTELLIGENCE AND SECURITY COMMAND

Overview of the Act on the Protection of Specially Designated Secrets (SDS)

AIRPORT SPONSOR USER GUIDE

Office of International Affairs Clemson University. H-1B Employee Information

Department of Defense INSTRUCTION

Student Guide Course: Original Classification

NG-J2 CNGBI A CH 1 DISTRIBUTION: A 07 November 2013

International Traffic in Arms Regulations Government and Corporate Perspectives

Compliance Program And Code of Conduct. United Regional Health Care System

Export Control Regulations Business Services

NOTICE OF PRIVACY PRACTICES

2017 Procure-to-Pay Training Symposium 2

CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

Department of Defense DIRECTIVE. SUBJECT: Disclosure of Classified Military Information to Foreign Governments and International Organizations

INTELLIGENCE COMMUNITY DIRECTIVE NUMBER 501

FSO Role in the NISP. Student Guide. Lesson 1: Course Introduction. Course Information. Course Overview

PERSONNEL SECURITY CLEARANCES

February 11, 2015 Incorporating Change 4, August 23, 2018

The DD254 & You (SBIR)

8/15/2013. Security Incidents Involving Special Circumstances. Information Security Webinar. Danny Jennings. DCO Meeting Room Navigation

DEPARTMENT OF THE AIR FORCE MEMORANDUM FOR 81 TRW AND APPLICABLE TENANT UNIT PERSONNEL

DoD Initial Briefing

Naval Security Enterprise Newsletter

Department of Defense DIRECTIVE

DOD CI AWARENESS AND REPORTING COURSE FOR DOD EMPLOYEES

Department of Defense DIRECTIVE

v. : 18 U.S.C. 371, 951 & 2 MICHAEL RAY AQUINO, : I N D I C T M E N T a/k/a "Ninoy" The Grand Jury in and for the District of New Jersey,

University of Pittsburgh

ALBUQUERQUE POLICE DEPARTMENT PROCEDURAL ORDERS. SOP 2-8 Effective:6/2/17 Review Due: 6/2/18 Replaces: 4/28/16

2011 Annual Refresher Briefing

Transcription:

DO Off-Boarding Session Agenda Tuesday January 10, 2017 Welcome Mary Lhotsky, Director of Communications, Treasury Management and Budget Navigating the Off-Boarding Site & Tools (P4P Process) and Human Resources Vernetta Wilkins and Stacie Gibbs, Human Resources Office Insider Threat and Counterintelligence Awareness Briefing Lara Murad, Office of Counterintelligence PIV Card and Office Keys LaDaryl Scott, Office of Physical Security Records Management Bertrand Tzeng, Director, Records and Information Management, Office of Privacy, Transparency, and Records Closing Remarks Open House/Booths for Questions: Public Transportation Incentive Program (PTIP) Travel Card/Purchase Card I.T. Equipment Returns Benefits (Insurance, etc.)

Navigating the Off Boarding Site & Tool Kit (P4P Process) Office of Human Resources

Human Resources Office of Human Resources

Human Resources Office of Human Resources

Insider Threat and Counterintelligence Awareness DO Off-Boarding Session

Post-Treasury Counterintelligence Considerations Handling Sensitive or Classified Information Sensitive or classified information should NOT be removed from Treasury without prior approval Contact recordsmanagement@treasury.gov for questions regarding unclassified info Contact sso@treasury.gov for questions regarding classified info Remember to de-conflict any work-related documents you wish to retain to avoid any problems Avoid forwarding Treasury emails to your personal accounts It is highly recommended that you submit your resume for review to avoid unauthorized disclosures (this is required for OIA employees) Contact prepub@treasury.gov for a prepublication review

Insider Threat Case Study: Charles H. Eccleston Charles H. Eccleston Former Department of Energy and Nuclear Regulatory Commission (NRC) employee arrested in Jan 2011 Pled guilty in Feb 2016 Faces up to 30 months in prison and a $95,000 fine What Happened? So What? Eccleston attempted to hack federal agency computers to steal and then sell nuclear secrets to Iran, China, and Venezuela Fired from his job at the NRC in 2010, Eccleston had been living in the Philippines since 2011 He came to the attention of the Federal Bureau of Investigation in 2013 when he entered a foreign embassy in Manila and offered to sell a list of over 5,000 email accounts of officials, engineers, and employees of a U.S. government energy agency In January 2015, Eccleston attempted to send dozens of spear-phishing emails to former colleagues containing malware with the intention of extracting classified nuclear information Who could become an insider threat? Anyone with authorized access to U.S. Government resources who uses that access either wittingly or unwittingly to harm national security. Insider threats can have far reaching consequences and impacts on national security Can you still be an insider threat post-employment? Yes

Post-Treasury Counterintelligence Considerations Post-Employment Counterintelligence Threats Offers of Foreign Employment Former U.S. government employees are often targeted for collection by foreign intelligence entities with offers of travel accommodations, high salaries, and special designated positions Aggressive interest in your past clearance level from a foreign employer is a red flag Social Media Use discretion when posting information about your experience and access; it could increase your risk of being targeted Reporting to the Office of Counterintelligence If you experience unusual encounters with foreign contacts that raise concerns, contact us (not mandatory, but encouraged)

Contact Information Office of Counterintelligence Hotline: 202-622-1348 Email: CI@treasury.gov

Office of Physical Security DO Off-Boarding Session

What to do with your PIV Card o Leave your PIV card at any Main Treasury Complex (building or Annex) entry or exit location. o Drop your PIV card in the card slot or give it to the Secret Service officer. What to do with your office keys o Main Treasury office keys should be returned to the Main Treasury Pass & Lock Office, Room MT 1015, Monday Friday, 8:00 a.m. to 2:00 p.m. Contact: TPA@Treasury.gov or LaDaryl Scott (202) 622-3063

Records Management Office of Privacy, Transparency, and Records

Before Traveling 01 Planning your departure 02 Preparing to go 03 Suggested steps

Planning Your Departure What may I take when I leave? Publicly-available materials Outlook contacts Personal documents Non-public information: Treasury policy prohibits removal

Planning Your Departure What steps should I take? Complete the Treasury departure form (TD F 80-05.5) Contact the DO Help Desk for any Outlook items Separate personal documents and publicly available materials

Preparing to Go What should I expect? Executives: PTR will contact you for an exit interview GS employees: You will receive the departure form and instructions via email Contact PTR if you have any questions (RecordsManagement@treasury.gov)

Suggested Steps Ensure records will be properly maintained What is a record? Information that is Made or received to comply with a law or to conduct public business, and Being preserved because it Is evidence of Treasury policy, decisions, and activities, or Contains information of value What form can a record take? Emails, electronic documents, and paper files

Suggested Steps What is not a record? Non-records: Information that Was not made or received to conduct public business Is neither evidence of Treasury policy, decisions, or activities, nor contains information of value Or is merely a convenience copy Personal documents: Belong to an individual Were not used to conduct agency business

Suggested steps Best clean-up practices Minimize your: Non-records Personal documents (and keep them separate from records) Transitory documents (<180 day value) Paper files Avoid storing records on local/shared drives Keep records on your team s SharePoint site Keep sensitive records to SharePoint MySite (e.g. personally identifiable information)

Suggested steps for email Best clean-up practices for email Minimize your - Non-records Personal email (forward to your personal account) Transitory email (<180 day value) Empty the Deleted Items folder regularly, but Do not use it as a storage folder (especially for records) Do not delete any email that is subject to a litigation hold

Bon Voyage! For more information, contact: Office of Privacy, Transparency, and Records Records and Information Management team RecordsManagement@treasury.gov

Closing Remarks Mary Lhotsky Questions? Please take advantage of the Open House / Information Booths