4.5.6.7.Store and use classified material only insecure areas, protect it during transfer fromone area (or command) to another, anddestroy it only by authorized meansReport any breach of securityReport any contact with citizens ofCommunist-controlled or hostile countriesReport any attempt by an unauthorizedperson to solicit classified informationMake sure each person who will have accessto classified information receives orientation andsigns a nondisclosure agreement. Provide theorientation and have the person sign the statementas soon as possible after reporting aboard orbefore their assignment to duties involving accessto classified information.The timing and format for orientation willvary, depending on the size of the command.However, having persons certify that they have“read and understand” the provisions of securitymatters is not adequate orientation. Describe thecommand security organization and identify thesecurity manager by name. Give personnel enoughinformation to make them realize they are anessential link in the security structure of thecommand. Make sure you tell new members aboutany special security precautions for yourcommand. For instance, if your command hasforeign national students or personnel in exchangeprograms, alert new members to the restrictionson access by foreign nationals. If your commandhas a coded badge system, explain the significanceof the different codes.The security orientation should fit thecommand and the person receiving it. Place moreemphasis on security procedures when a newmember has not had previous experience withhandling classified information.CONTINUING SECURITY EDUCATION.—Once personnel have received the basic securityeducation training, make sure they take part ina continuing security education training program.Guarding against security compromises and otherviolations is vital to our nation’s security.The various programs that protect our securityinclude on-the-job training, refresher and specialbriefings, and debriefings.toOn-The-Job Training. —Your personnel needknow the security procedures required for theduties they perform. On-the-job training is thephase of security education in which personnellearn to apply specific security procedures.Compromised reports often show that breachesof security are caused by supervisors who assumesubordinates know what they are supposed to do.Examples include assigning people to mail roomswithout training them in the preparation andtransmission of classified material or designatinga Top Secret control officer without reviewingcontrol requirements. Allowing subordinates tolearn by the trial-and-error method risks securityas much as assuming they know how to protectclassified information.Refresher Briefings. —Once a year, make sureall personnel who have access to classified infor-mation receive a refresher briefing. The refresherbriefing should enhance security awareness—itshould not rehash the basics or be a repeat of thesame program year after year.Once every 2 years, an NIS agent should givea counterespionage briefing to those persons whohave access to materials classified as Secret orabove. The security manager is responsible forarranging the briefing with the local NIS office.Arrange for various types of special briefingsas needed. They could include briefings on foreigntravel, the North Atlantic Treaty Organization(NATO), and single integrated operational plan-extremely sensitive information and sensitivecompartmented information.Debriefings. —Persons who have had accessto classified information should receive adebriefing at the following times:1.2.3.4.9-9Before termination of active militaryservice or civilian employment or temporaryseparation for a period of 60 days or more,including sabbaticals and leave withoutpayAt the conclusion of an access period, whena Limited Access Authorization has beengrantedWhen the person’s security clearance isrevoked for causeWhen a person’s securityadministratively withdrawnclearance is
Integrated Publishing, Inc. - A (SDVOSB) Service Disabled Veteran Owned Small Business