Average Reviews:
(More customer reviews)If you are interested in thorough polices concerning how the Department of the Army handles information relating to restricted data and sensitive information this book or online manual has all you need to know. All the material in this online book has information for all military and civilian personnel of the Active Army, Army National Guard, and U.S. Army Reserve. Also if your interests are in U.S. military security and the Department of the Army Information Security Program this is the book! Bottom line if you are interested in learning about how to safeguard and protect America's national security, read this book!
It goes over how to handle paperwork whether its classified, top secret or confidential. Handling paperwork meaning who to let view certain documents, who can carry certain documents and where to, who can review certain documents, who can access certain areas where top secret information is held. This regulation book has it all when it comes to rules and policies about securing information that is off limits to some and limited to some.
Click Here to see more reviews about: 21st Century U.S. Military: U.S. Army Information Security Program, Espionage Laws and Statutes, Classified Material
This is a reproduction of the official U.S. military regulation 380-5 covering security and the Department of the Army Information Security Program. This regulation implements the policy set forth in Executive Order (E. O.) 12958, "Classified National Security Information" and DOD 5200.1R, "Information Security Program." It establishes the policy for classification, downgrading, declassification, and safeguarding of information requiring protection in the interest of national security. This regulation applies to all military and civilian members of the Active Army, Army National Guard of the United States (ARNGUS), and U.S. Army Reserve (USAR) and Department of the Army (DA) personnel. During mobilization, chapters and policies contained in this regulation may be modified by the proponent. The proponent of this regulation is the Deputy Chief of Staff for Intelligence.Contents include:General Provisions and Program ManagementResponsibilitiesSpecial Types of InformationAtomic Energy InformationExceptional SituationsCorrective Actions and SanctionsReportsClassificationDelegation of AuthorityThe Classification ProcessLevels of ClassificationSecurity Classification GuidesNon-government InformationDeclassification, Regrading, and DestructionMandatory ReviewStandards for DestructionMarking DocumentsMarking Special Types of MaterialUpgradingSafeguarding Joint Chiefs of Staffs PapersForeign Government InformationFor Official Use Only InformationSensitive but Unclassified and Limited Official Use InformationDEA Sensitive InformationDOD Unclassified Controlled Nuclear InformationComputer Security Act of 1987Access, Control, Safeguarding, and VisitsProceduresReproduction of Classified MaterialWaiversInspectionsStorage and Physical Security StandardsPrioritiesTransmission and TransportationSecurity EducationUnauthorized Disclosure and Other Security IncidentsExtracts of Espionage Laws and Federal Statutes
No comments:
Post a Comment