| |
to you, this manual lays down specific
responsibilities and procedures to protect
classified information. Every individual who
acquires access to classified material is
responsible for protecting it. As a Yeoman
(YN), you will be directly involved in this
process and must be aware of the regulations
given in the Security Manual.
The purpose of the security program is to
ensure that official information is protected to
the level and for the period of time necessary.
Through identification of information to be
protected, defining a progressive system for
classification; downgrading the level of
classification; and, finally, declassification of
information, policies, and procedures have
been established to effectively monitor the
Navys program.
The security of the United States, in
general, and of naval operations, in particular,
depends upon the success of the security
program. Dont let information fall into the
wrong hands through careless talk or improper
handling and safeguarding of written
information.
CATEGORIES OF CLASSIFIED
INFORMATION
Information is
classified into three
categories, each category requiring its own
level of protection:
Top Secret, Secret, and
Confidential.
Top Secret
Top Secret is the designation applied only
to information or material the unauthorized
disclosure of which could reasonably be
expected to cause exceptionally grave damage
to the national security.
Examples of
exceptionally grave damage include armed
hostilities against the United States or its
allies; disruption of foreign relations vitally
affecting
the
national
security;
the
compromise of vital national defense plans or
complex cryptologic and communication
intelligence
systems;
the revelation of
sensitive intelligence operations; and the
disclosure of scientific or technological
developments vital to national security.
Secret
Secret is the designation applied only to
information or material the unauthorized
disclosure of which could reasonably be
expected to cause serious damage to the
national security. Examples of serious damage
include disruption
of foreign
relations
significantly affecting the national security;
significant impairment of a program or policy
directly related to the national security;
revelation of significant military plans or
intelligence
operations;
compromise of
significant military plans or intelligence
operations; and compromise of significant
scientific or technological developments
relating to national security.
Confidential
Confidential is the designation applied to
information or material the unauthorized
disclosure of which could reasonably be
expected to cause identifiable damage to the
national security. Examples of identifiable
d a m a g e i n c l u d e t h e c o m p r o m i s e o f
information that indicates strength of ground,
air, and naval forces in the United States and
overseas
areas; disclosure of technical
information used for training, maintenance,
and inspection of classified munitions of war;
and revelation of performance characteristics,
test data design, and production data on
munitions of war.
You will come across information marked
For Official Use Only. This is not a category
of classification under the information security
program.
You should refer to the Security Manual
for the requirements of each type of
investigation and the level of clearance
authorized by each.
8-5
|