12.07.2015 Views

Safeguarding Classified and Sensitive But Unclassified Information ...

Safeguarding Classified and Sensitive But Unclassified Information ...

Safeguarding Classified and Sensitive But Unclassified Information ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

• Reproduced copies of classified materials are subject to the same safeguards, controls,<strong>and</strong> accountability procedures as the original.Destruction of <strong>Classified</strong> Materials<strong>Classified</strong> materials will be destroyed in an approved manner. Most of the classified paperproducts you will encounter can be destroyed using existing cross-cut shredders with the particlesize of the cuts not exceeding 1/32 X 1/2 inch, provided the bag contents are stirred prior todisposal <strong>and</strong> unclassified paper products are also shredded <strong>and</strong> mixed in with the classifiedproducts. However, certain types of classified information, for example; <strong>Sensitive</strong>Compartmented <strong>Information</strong> (SCI) <strong>and</strong> Communications Security (COMSEC) paper products,require more stringent destruction st<strong>and</strong>ards. Newly purchased or replacement shredders <strong>and</strong>shredders that will be used for the destruction of SCI <strong>and</strong> COMSEC paper products, shallconform to the more stringent st<strong>and</strong>ard. Contact DHS OS/ASD, or go tohttp://www.nsa.gov/ia/government/mdg.cfm?MenuID=10.3.1, NSA/CSS Evaluated Products List(EPL) for High Security Crosscut Paper Shredders, for information on approved shredders.Two cleared people must be involved in the destruction of TOP SECRET materials - one todestroy <strong>and</strong> one to witness the destruction. A Certificate of Destruction, DHS <strong>Classified</strong>Document Record (Form Attached) will be used to record the destruction.One cleared person can destroy SECRET <strong>and</strong> CONFIDENTIAL. A destruction certificate is notrequired unless required by the originator.Appropriate Use Of Computer SystemsMisuse of an automated information system is sometimes illegal, often unethical, <strong>and</strong> alwaysreflects poor judgment or lack of care in following security rules <strong>and</strong> regulations. Misuse may,unintentionally, create security vulnerabilities or cause leaks of important information. A pattern ofinability or unwillingness to follow rules for the operation of computer systems raises seriousconcerns about an individual's reliability <strong>and</strong> trustworthiness.Security RulesThe following are basic rules for secure use of a computer.• Do not access any computer system without authorization. Unauthorized access to aprotected or compartmented computer file is a serious security violation. It can be a basisfor revocation of your security clearance. Whether motivated by the challenge ofpenetrating the system or by simple curiosity to see what is there, unauthorized access isa deliberate disregard for rules <strong>and</strong> regulations. It can cause you to be suspected ofespionage. At a minimum, it violates the need-to-know principle <strong>and</strong> in some cases is aninvasion of privacy.• Do not store or process classified information on any system not explicitlyapproved for classified processing by an appropriate Federal government official.• Do not attempt to circumvent or defeat security or auditing systems without priorauthorization from the system administrator, other than as part of a system test or securityresearch authorized in advance.• Do not use another individual’s user ID, password, or identity.19

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!