Quantcast Control of Dissemination

Click Here to
Order this information in Print

Click Here to
Order this information on CD-ROM

Click Here to
Download this information in PDF Format

 

Click here to make tpub.com your Home Page

Page Title: Control of Dissemination
Back | Up | Next

Click here for a printable version

Google


Web
www.tpub.com

Home

   
Information Categories
.... Administration
Advancement
Aerographer
Automotive
Aviation
Combat
Construction
Diving
Draftsman
Engineering
Electronics
Food and Cooking
Math
Medical
Music
Nuclear Fundamentals
Photography
Religion
USMC
   
Products
  Educational CD-ROM's
Printed Manuals
Downloadable Books

   


 

Share on Google+Share on FacebookShare on LinkedInShare on TwitterShare on DiggShare on Stumble Upon
Back
Categories of Classified Information - 14261_111
Up
Yeoman Basic
Next
Custodial Precautions
CONTROL  OF  DISSEMINATION The  CO  is  responsible  for  controlling  the dissemination  of  classified  material  within  the command.  The  command  security  manager  is delegated the   responsibility to   ensure information   is   issued   and   personnel   are instructed   on   prevention   of   unauthorized disclosure  of  classified  information.  Steps must  be  taken  to  ensure  that  the  existence, contents, and   whereabouts   of   classified information   are   divulged   only   to   those   who are   authorized   access   and   whose   official duties  require  that  knowledge. Responsibility  for  determining  who  sees classified   information rests upon each individual   who   has   possession   or   knowledge of  the  information,  not  the  person  who  seeks the  information.  You  must  be  totally  satisfied that   you   are   providing   information   to   a properly  authorized  person. ACCOUNTABILITY   AND   CONTROL Regulations d o    n o t    g u a r a n t e e protection–enforcing them does. The following   procedures   are   required   by   the security regulations; one o f    y o u r responsibilities  is  to  know  and  enforce  these accountability   and control procedures. Remember,  the  security  program  is  a  means, not an end. Top  Secret  Accountability Each  copy  of  a  Top  Secret  document  is numbered  at  origination,  for  example,  copy number  2  of  10  copies,  and  includes  a  list  of effective  pages  with  a  record  for  page  checks. Each  page  of  Top  Secret  letters  or  messages is  numbered;  for  example,  page  1  of  15  pages. Top Secret   documents   cannot   be reproduced  without  permission  of  the  issuing or  higher  authority. When  permission  is granted,   any   copies   made   must   also   be numbered.   Always   use   the   number   of   the original  the  copies  are  made  from  as  a  part  of the   numbering   sequence;   for   example,   Copy 14/1  of  2  copies. The  14  indicates  the fourteenth  copy  of  the  original. Top  Secret  material  is  always  transported hand   to   hand   and   receipted   for   at   each exchange. Inventory   for   all   Top   Secret   material   is made  at  least  annually  and  at  each  change  of command  by  the  security  manager  or  the  Top Secret   control   officer. Top  Secret  Control A   Disclosure   Record,   OPNAV   Form 5511/13,   identifying   the   document   and   all personnel  who  have  had  access  to  the document,   is   maintained   for   each   individual document. The   record   of   disclosure   is maintained  for  2  years  after  the  document  is transferred, downgraded   to a lower classification,   or   destroyed. Secret  Accountability A  command  must  establish  administrative procedures to record Secret material originated or  held  by  the  command.  The  record  can  be  in the     form     of     a     log,     a     route     slip     file (Correspondence/Material    Control    Form 5216/10),     a     serial     file,     or     some     other administrative  record. Secret Control The  control  procedures  for  Secret  material must   balance   security   and   operating efficiency. The   normal   procedure   is hand-to-hand transfer between individuals, but receipt  at  each  transfer  within  a  command  is not required. Confidential  Accountability  and  Control Procedures  for  protecting  Confidential material   are   less   stringent   than   those   for Secret  material.  There  is  no  requirement  to maintain  records  of  receipts,  distribution,  or 8-6

Privacy Statement - Press Release - Copyright Information. - Contact Us - Support Integrated Publishing

Integrated Publishing, Inc.