4.
5.
6.
7.
Store and use classified material only in
secure areas, protect it during transfer from
one area (or command) to another, and
destroy it only by authorized means
Report any breach of security
Report any contact with citizens of
Communist-controlled or hostile countries
Report any attempt by an unauthorized
person to solicit classified information
Make sure each person who will have access
to classified information receives orientation and
signs a nondisclosure agreement. Provide the
orientation and have the person sign the statement
as soon as possible after reporting aboard or
before their assignment to duties involving access
to classified information.
The timing and format for orientation will
vary, depending on the size of the command.
However, having persons certify that they have
read and understand the provisions of security
matters is not adequate orientation. Describe the
command security organization and identify the
security manager by name. Give personnel enough
information to make them realize they are an
essential link in the security structure of the
command. Make sure you tell new members about
any special security precautions for your
command. For instance, if your command has
foreign national students or personnel in exchange
programs, alert new members to the restrictions
on access by foreign nationals. If your command
has a coded badge system, explain the significance
of the different codes.
The security orientation should fit the
command and the person receiving it. Place more
emphasis on security procedures when a new
member has not had previous experience with
handling classified information.
CONTINUING SECURITY EDUCATION.
Once personnel have received the basic security
education training, make sure they take part in
a continuing security education training program.
Guarding against security compromises and other
violations is vital to our nations security.
The various programs that protect our security
include on-the-job training, refresher and special
briefings, and debriefings.
to
On-The-Job Training. Your personnel need
know the security procedures required for the
duties they perform. On-the-job training is the
phase of security education in which personnel
learn to apply specific security procedures.
Compromised reports often show that breaches
of security are caused by supervisors who assume
subordinates know what they are supposed to do.
Examples include assigning people to mail rooms
without training them in the preparation and
transmission of classified material or designating
a Top Secret control officer without reviewing
control requirements. Allowing subordinates to
learn by the trial-and-error method risks security
as much as assuming they know how to protect
classified information.
Refresher Briefings. Once a year, make sure
all personnel who have access to classified infor-
mation receive a refresher briefing. The refresher
briefing should enhance security awarenessit
should not rehash the basics or be a repeat of the
same program year after year.
Once every 2 years, an NIS agent should give
a counterespionage briefing to those persons who
have access to materials classified as Secret or
above. The security manager is responsible for
arranging the briefing with the local NIS office.
Arrange for various types of special briefings
as needed. They could include briefings on foreign
travel, the North Atlantic Treaty Organization
(NATO), and single integrated operational plan-
extremely sensitive information and sensitive
compartmented information.
Debriefings. Persons who have had access
to classified information should receive a
debriefing at the following times:
1.
2.
3.
4.
9-9
Before termination of active military
service or civilian employment or temporary
separation for a period of 60 days or more,
including sabbaticals and leave without
pay
At the conclusion of an access period, when
a Limited Access Authorization has been
granted
When the persons security clearance is
revoked for cause
When a persons security
administratively withdrawn
clearance is