Click Here to
Order this information in Print

Click Here to
Order this information on CD-ROM

Click Here to
Download this information in PDF Format

 

Click here to make tpub.com your Home Page

Page Title: Categories of Classified Information
Back | Up | Next

Click here for a printable version

Google


Web
www.tpub.com

Home

   
Information Categories
.... Administration
Advancement
Aerographer
Automotive
Aviation
Combat
Construction
Diving
Draftsman
Engineering
Electronics
Food and Cooking
Math
Medical
Music
Nuclear Fundamentals
Photography
Religion
USMC
   
Products
  Educational CD-ROM's
Printed Manuals
Downloadable Books

   


 

to   you,   this   manual   lays   down   specific responsibilities   and   procedures   to   protect classified   information.   Every   individual   who acquires  access  to  classified  material  is responsible  for  protecting  it.  As  a  Yeoman (YN),  you  will  be  directly  involved  in  this process  and  must  be  aware  of  the  regulations given in the  Security   Manual. The  purpose  of  the  security  program  is  to ensure  that  official  information  is  protected  to the  level  and  for  the  period  of  time  necessary. Through  identification  of  information  to  be protected,   defining   a   progressive   system   for classification;   downgrading   the   level   of classification;   and,   finally,   declassification   of information,   policies,   and   procedures   have been   established   to   effectively   monitor   the Navy’s   program. The   security   of   the   United   States,   in general,  and  of  naval  operations,  in  particular, depends  upon  the  success  of  the  security program.   Don’t   let   information   fall   into   the wrong hands through careless talk or improper handling   and   safeguarding   of   written information. CATEGORIES  OF  CLASSIFIED INFORMATION Information   is classified   into   three categories,  each  category  requiring  its  own level   of   protection: Top  Secret,  Secret,  and Confidential. Top  Secret Top  Secret  is  the  designation  applied  only to   information   or   material   the   unauthorized disclosure  of  which  could  reasonably  be expected  to  cause  exceptionally  grave  damage to   the   national   security. Examples   of exceptionally   grave   damage   include   armed hostilities  against  the  United  States  or  its allies;   disruption   of   foreign   relations   vitally affecting the national security; the compromise  of  vital  national  defense  plans  or complex   cryptologic   and   communication intelligence systems; the   revelation   of sensitive   intelligence   operations;   and   the disclosure   of   scientific   or   technological developments  vital  to  national  security. Secret Secret  is  the  designation  applied  only  to information   or   material   the   unauthorized disclosure  of  which  could  reasonably  be expected   to   cause   serious   damage   to   the national  security.  Examples  of  serious  damage include   disruption of   foreign relations significantly  affecting  the  national  security; significant  impairment  of  a  program  or  policy directly   related   to   the   national   security; revelation  of  significant  military  plans  or intelligence operations; compromise    of significant   military   plans   or   intelligence operations;  and  compromise  of  significant scientific   or   technological   developments relating  to  national  security. Confidential Confidential  is  the  designation  applied  to information   or   material   the   unauthorized disclosure  of  which  could  reasonably  be expected  to  cause  identifiable  damage  to  the national   security.   Examples   of   identifiable d a m a g e    i n c l u d e    t h e    c o m p r o m i s e    o f information  that  indicates  strength  of  ground, air,  and  naval  forces  in  the  United  States  and overseas areas;   disclosure   of   technical information  used  for  training,  maintenance, and  inspection  of  classified  munitions  of  war; and  revelation  of  performance  characteristics, test  data  design,  and  production  data  on munitions  of  war. You  will  come  across  information  marked For  Official  Use  Only.  This  is  not  a  category of  classification  under  the  information  security program. You  should  refer  to  the  Security   Manual for   the   requirements   of   each   type   of investigation  and  the  level  of  clearance authorized  by  each. 8-5

Privacy Statement - Press Release - Copyright Information. - Contact Us - Support Integrated Publishing

Integrated Publishing, Inc. - A (SDVOSB) Service Disabled Veteran Owned Small Business