• Home
  • Download PDF
  • Order CD-ROM
  • Order in Print
Security  Termination  Statement
Security Discrepancy Notice, OPNAV Form 5511/51

Military Requirements for Chief Petty Officer
Page Navigation
  184    185    186    187    188  189  190    191    192    193    194  
Members are also debriefed and required to sign a Security Termination Statement (fig. 9-2) if they inadvertently gain access to information they aren’t qualified to receive. The debriefing should clearly stress the following security precautions: 1. 2. 3. 4. 5. Personnel are to return all classified materials in their possession. Personnel are no longer eligible for access to classified information. Personnel  may  never  divulge  classified information; orally or in writing, to any unauthorized person or in judicial, quasi- judicial, or administrative proceedings without first receiving written permission from OP-09N. Personnel may receive severe penalties for disclosure. Personnel are to report to NIS any attempt by  an  unauthorized  person  to  solicit classified information. (Any attempts are reported  to  the  FBI  or  nearest  DOD component if personnel are no longer affiliated with the Department of the Navy.) When a clearance is being revoked, a person occasionally  may  refuse  to  sign  the  Security Termination Statement during the debriefing. If that happens, stress that the refusal to sign doesn’t change the person’s obligation to protect classified information from unauthorized disclosure. Send a copy of the termination statement, which shows that the person refused to sign the statement, to OP-09. COMPROMISE AND OTHER SECURITY VIOLATIONS Two types of security violations occur. One involves the compromise or possible compromise of classified information. The other involves a violation of security regulations, but does not involve a compromise. Compromise  is  the  disclosure  of  classified information to a person who is not authorized access  to  that  information.  The  unauthorized disclosure may have occurred knowingly, willfully, or through negligence. Conclusive evidence that classified information has been disclosed to an unauthorized person confirms the existence of a compromise. Discovery of Compromise If you discover a compromise of classified material,  you  should  regain  custody  of  the material, if possible, and give it the proper protection. Then notify NIS, who may begin an investigation independent of command inquiries. PRELIMINARY INQUIRY. —A preliminary inquiry will be conducted when classified infor- mation has been compromised or subjected to compromise. The inquiry should be completed quickly, usually within 2 or 3 days. Every  effort  should  be  made  to  keep  the inquiry  Unclassified. The  occurrence  of  a compromise does not necessarily require a classified inquiry. The inquiry may reveal that the compromise presents a minimal risk. If you find no signifi- cant command security weaknesses, you do not have to take formal disciplinary action. In such cases, send the report of preliminary inquiry, by endorsement, to the next senior in the admin- istrative chain and who has Top Secret classifica- tion authority. JUDGE  ADVOCATE  GENERAL  (JAG) MANUAL INVESTIGATION. —A JAG Manual investigation is an administrative investigation based on chapters II through VI of the Manual of the Judge Advocate General. The command having custodial responsibility for the material compromised  convenes  the  investigation.  The purpose of a JAG Manual  investigation  is  to answer, in detail, questions about the who, what, where, when, and why of the security violation. The JAG Manual investigation gives the command an opportunity to make a critical review of its security posture. Other Security Violations The commanding officer may act without reporting to higher authority on a violation of a security regulation not resulting in compromise or  subjection  to  compromise.  However,  the commanding officer must ensure that type of security violation is investigated just as thoroughly as  one  resulting  in  a  compromise  because  it shows a weakness within the security program. Commanding officers may decide if the occurrence of that security violation justifies some form of corrective  action.  The  possibility  of  persons receiving  disciplinary  action  for  that  type  of violation is just as great as it is for a violation 9-11







Western Governors University

Privacy Statement
Press Release
Contact

© Copyright Integrated Publishing, Inc.. All Rights Reserved. Design by Strategico.