which of the following individuals can access classified data

0000001952 00000 n BUSINESSSOLUTIONSIncomestatementForThreeMonthsEndedMarch31,2018, ComputerServicesRevenue$25,307NetSales18,693TotalRevenue44,000Costofgoodssold$14,052Dep. New interest in learning a foreign language. Use a common password for all your system and application logons. Senior government personnel, military or civilian. "Y% js&Q,%])*j~,T[eaKC-b(""P(S2-@&%^HEFkau"[QdY **Social EngineeringWhat is TRUE of a phishing attack? endobj Which of the following individuals can access classified data? A pop-up window that flashes and warns that your computer is infected with a virus. Who can be permitted access to classified data? Which is a way to protect against phishing attacks? What should you do? Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. Should you always label your removable media? What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. If your wireless device is improperly configured someone could gain control of the device? **Social EngineeringWhich of the following is a practice that helps to prevent the download of viruses and other malicious code when checking your email? Which of the following is true about telework? How many potential insider threat indicators does a person who is married with two children, vacations at the beach every year, is pleasant to work with, but sometimes has poor work quality display? -When using a public device with a card reader, only use your DoD CAC to access unclassified information, Thumb drives, memory sticks, and flash drives are examples of. 0000000975 00000 n (Wrong). CUI may be stored on any password-protected system. A program that segregates various type of classified information into distinct compartments for added protection and dissemination for distribution control. A colleague has won 10 high-performance awards, can be playful and charming, is not currently in a relationship, and is occasionally aggressive in trying to access sensitive information. Which of the following is NOT a best practice to preserve the authenticity of your identity? *Mobile Devices What action should you take? \text{Advertising expense}&600\\ What advantages do "insider threats" have over others that allows them to cause damage to their organizations more easily? What action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? *Sensitive Compartmented InformationWhen should documents be marked within a Sensitive Compartmented Information Facility (SCIF). What portable electronic devices (PEDs) are allowed in a Sensitive Compartmented Information Facility (SCIF)? The email provides a website and a toll-free number where you can make payment. *Classified Data Which of the following individuals can access classified data? -Delete email from senders you do not know. You know that this project is classified. Use online sites to confirm or expose potential hoaxes. All https sites are legitimate. A smartphone that transmits credit card payment information when held in proximity to a credit card reader. Call your security point of contact immediately. Which of following is true of protecting classified data? *INSIDER THREAT*Which of the following is NOT considered a potential insider threat indicator? You are reviewing your employees annual self evaluation. Which of the following is a practice that helps to protect you from identity theft? In which situation below are you permitted to use your PKI token? Which of the following is NOT a criterion used to grant an individual access to classified data? *Mobile DevicesWhat can help to protect data on your personal mobile device?-Secure it to the same level as Government-issued systems. \text{Net income}&&\underline{\underline{~\$18,833}}\\ Which organization issues the directives concerning the dissemination of information regarding intelligence sources, methods, or activities? A person who does not have the required clearance or assess caveats comes into possession of SCI in any manner. @870zpVxh%X'pxI[r{+i#F1F3020d`_ if>}xp20Nj9: bL Select the information on the data sheet that is personally identifiable information (PII) but not protected health information (PHI). What should be done to protect against insider threats? Hope you got the answer you looking for! \text{Net Sales}&&\underline{18,693}\\ Baker was Ms. Jones's psychiatrist for three months. **Insider ThreatBased on the description that follows, how many potential insider threat indicator(s) are displayed? **Insider ThreatBased on the description that follows, how many potential insider threat indicator(s) are displayed? endobj 0000034293 00000 n Sensitive information may be stored on any password-protected system. **Insider ThreatWhat advantages do "insider threats" have over others that allows them to cause damage to their organizations more easily? -Use the government email system so you can encrypt the information and open the email on your government issued laptop. What should you do? What is the best choice to describe what has occurred? What is NOT Personally Identifiable Information (PII)? The following practices help prevent viruses and the downloading of malicious code except. Government-owned PEDs, if expressly authorized by your agency. Which of these is true of unclassified data? Which of the following is true of protecting classified data? A program that segregates various type of classified information into distinct compartments for added protection and dissemination for distribution control. endobj Which of the following is NOT a social engineering tip? Under what circumstances could unclassified information be considered a threat to national security? fZ{ 7~*$De jOP>Xd)5 H1ZB 5NDk4N5\SknL/82mT^X=vzs+6Gq[X2%CTpyET]|W*EeV us@~m6 4] A ];j_QolrvPspgA)Ns=1K~$X.3V1_bh,7XQ *SOCIAL NETWORKING*When is the safest time to post details of your vacation activities on your social networking profile? When is conducting a private money-making venture using your Government-furnished computer permitted? endstream Within a secure area, you see an individual you do not know. You can email your employees information to yourself so you can work on it this weekend and go home now. Pictures of your petYour birthdayYour hobbies~Your personal e-mail address. *SpillageWhat should you do if a reporter asks you about potentially classified information on the web? Which of the following is a god practice to protect classified information?-Ensure proper labeling by appropriately marking all classified material and, when required, sensitive material. You are working at your unclassified system and receive an email from a coworker containing a classified attachment. **Physical SecurityAt which Cyberspace Protection Condition (CPCON) is the priority focus on critical functions only? Attempting to access sensitive information without a need-to-know. Which is an appropriate use of government e-mail? Theodore is seeking access to classified information that he does not need to know to perform his job duties. Which is NOT a wireless security practice? BUSINESSSOLUTIONSComparativeBalanceSheetDecember31,2017,andMarch31,2018, BUSINESSSOLUTIONSIncomestatementForThreeMonthsEndedMarch31,2018\begin{array}{c} **Removable Media in a SCIFWhat action should you take when using removable media in a Sensitive Compartmented Information Facility (SCIF)? Report the crime to local law enforcement. **Classified DataWhat is a good practice to protect classified information? While on vacation, a coworker calls and asks you to access a site to review and approve a document that is hosted behind a DoD Public Key Infrastructure (PKI) protected webpage. *HOME COMPUTER SECURITY*Which of the following is a best practice for securing your home computer? Understanding and using the available privacy settings. What should be your response? -Scan external files from only unverifiable sources before uploading to computer. *MOBILE DEVICES*Which of the following is an example of removable media? Which of the following is NOT true of traveling overseas with a mobile phonePhysical security of mobile phones carried overseas is not a major issue. }&400\\ A colleague often makes other uneasy with her persistent efforts to obtain information about classified project where she has no need to know, is vocal about her husband overspending on credit cards, and complains about anxiety and exhaustion. What should you do after you have ended a call from a reporter asking you to confirm potentially classified information found on the web? Which of the following statements is true of cookies? Avoid a potential security violation by using the appropriate token for each system. Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. -Remove your security badge, common access card (CAC), or personal identity verification (PIV) card. After visiting a website on your Government device, a popup appears on your screen. What is a protection against internet hoaxes? When classified data is not in use, how can you protect it? \text{Repairs expense - computer}&\underline{~~~~~~~960}\\ Use online sites to confirm or expose potential hoaxes. Which is NOT a sufficient way to protect your identity? What is a way to prevent the download of viruses and other malicious code when checking your e-mail? Physically assess that everyone within listening distance is cleared and has a need-to-know for the information being discussed, Mark SCI documents appropriately and use an approved SCI fax machine. A coworker is observed using a personal electronic device in an area where their use is prohibited. Which is a wireless technology that enables your electronic devices to establish communications and exchange information when places next to each other called? *Sensitive Compartmented InformationWhat action should you take if you become aware that Sensitive Compartmented Information (SCI) has been compromised? Which of the following is NOT a correct way to protect CUI? *Identity Management You are logged on to your unclassified computer and just received an encrypted email from a co-worker. *Sensitive Compartmented InformationWhat is Sensitive Compartmented Information (SCI)? *Use of GFEWhen can you check personal e-mail on your Government-furnished equipment (GFE)?-If allowed by organizational policy. Follow instructions given only by verified personnel. **Mobile DevicesWhat can help to protect the data on your personal mobile device? Call your security point of contact immediately. Follow instructions given only by verified personnel. Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals. **Insider ThreatWhich of the following should be reported as a potential security incident? Bob, a coworker, has been going through a divorce, has financial difficulties and is displaying hostile behavior. Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. *Home Computer SecurityWhich of the following is a best practice for securing your home computer?-Create separate accounts for each user. Which of the following activities is an ethical use of Government-furnished equipment (GFE)? Which may be a security issue with compressed URLs? 1312.23 Access to classified information. Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. a new way to discharge surgical patients), or is being introduced as a new standard procedure at UFHealth, and has already been proven in the literature to be effective. Write your password down on a device that only you access (e.g., your smartphone). Which is a good practice to protect classified information? **TravelWhich of the following is a concern when using your Government-issued laptop in public? \text{Computer supplies expense}&1,305\\ A colleague complains about anxiety and exhaustion, makes coworkers uncomfortable by asking excessive questions about classified projects, and complain about the credit card bills that his wife runs up. <> 0000005958 00000 n *SpillageWhich of the following is a good practice to aid in preventing spillage? Understanding and using the available privacy settings. \text{Dep. *Malicious CodeWhat are some examples of malicious code? 0000007211 00000 n Which of the following statements is NOT true about protecting your virtual identity? *Sensitive InformationWhat is the best example of Personally Identifiable Information (PII)? Classified data is permitted to access to only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. Spillage because classified data was moved to a lower classification level system without authorization. Ask the individual to see an identification badge. Maintain possession of your laptop and other government-furnished equipment (GFE) at all times. No, you should only allow mobile code to run from your organization or your organization's trusted sites. Is it okay to run it? Report the crime to local law enforcement. Your comment on this answer: Your name to display (optional): You are having lunch at a local restaurant outside the installation, and you find a cd labeled "favorite song". endobj *TravelWhat security risk does a public Wi-Fi connection pose? You should only accept cookies from reputable, trusted websites. In which situation below are you permitted to use your PKI token? **Social NetworkingWhen may you be subject to criminal, disciplinary, and/or administrative action due to online misconduct? Which is a risk associated with removable media? <> -Always use DoD PKI tokens within their designated classification level. *Website UseHow can you protect yourself from internet hoaxes? He has the appropriate clearance and a signed, approved non-disclosure agreement. As someone who works with classified information, what should you do if you are contacted by a foreign national seeking information on a research project? **Website UseWhile you are registering for a conference, you arrive at the website http://www.dcsecurityconference.org/registration/. Which of the following individuals can access classified data? What should you do after you have ended a call from a reporter asking you to confirm potentially classified info found on the web? You must possess security clearance eligibility to telework. \end{array} What describes how Sensitive Compartmented Information is marked? **TravelWhat security risk does a public Wi-Fi connection pose? Store classified data appropriately in a GSA-approved vault/container. [1] Issued by President Barack Obama in 2009, Executive Order 13526 replaced earlier executive orders on the topic and modified the regulations codified to 32 C.F.R. What is a possible effect of malicious code? **TravelWhich of the following is true of traveling overseas with a mobile phone? \end{array} -Remove and take it with you whenever you leave your workstation. 22 0 obj **Social NetworkingWhich of the following is a security best practice when using social networking sites? What should you do if a commercial entity, such as a hotel reception desk, asks for Government identification so that they can make a photocopy? What information most likely presents a security risk on your personal social networking profile? -Setting weekly time for virus scan when you are not on the computer and it is powered off. How many potential insider threat indicators does this employee display? is a program that segregates various types of classified information into distinct compartments for added protection and dissemination or distribution control. *Mobile DevicesWhich of the following is an example of removable media? Which of the following is a security best practice when using social networking sites?-Turn off Global Positioning System (GPS) before posting pictures of yourself in uniform with identifiable landmarks. **Classified DataHow should you protect a printed classified document when it is not in use? *Sensitive Compartmented InformationWhat should the owner of this printed SCI do differently? What is considered ethical use of the Government email system? What action should you take? Don't talk about work outside your workspace unless it is a specifically designated public meeting environment and is controlled by the event planners. Which of the following is a good practice to avoid email viruses? !LL"k)BSlC ^^Bd(^e2k@8alAYCz2QHcts:R+w1F"{V0.UM^2$ITy?cXFdMx Y8> GCL!$7~Bq|J\> V2 Y=n.h! On a NIPRNet system while using it for a PKI-required task. Which of the following individuals can access classified data? true traveling overseas mobile phone cyber awareness. Immediately notify your security point of contact. Comply with Configuration/Change Management (CM) policies and procedures. Only persons with appropriate clearance, a non-disclosure agreement, and need-to-know can access classified data. Understanding and using available privacy settings. Under what circumstances is it acceptable to check personal email on Government-furnished equipment (GFE)? -Store it in a shielded sleeve to avoid chip cloning. Identify and disclose it with local Configuration/Change Management Control and Property Management authorities. Dr. Stanisky was Ms. Jones psychiatrist for three months.Dr. *Sensitive Compartmented Information endobj <> *SPILLAGE*Which of the following may be helpful to prevent spillage? Which of the following is NOT a requirement for telework? Which of the following is an example ofmalicious code? Select the information on the data sheet that is personally identifiable information (PII) But not protected health information (PHI), Jane JonesSocial security number: 123-45-6789, Select the information on the data sheet that is protected health information (PHI). When unclassified data is aggregated, its classification level may rise. **Physical SecurityWhat is a good practice for physical security? What is an indication that malicious code is running on your system? *Travel 0000003786 00000 n 322 0 obj <>stream In this short Post, I hope you get the answer to your question. *Sensitive Compartmented InformationWhat guidance is available for marking Sensitive Compartmented Information (SCI)? In addition to data classification, Imperva protects your data wherever it liveson premises, in the cloud and in hybrid environments. What describes how Sensitive Compartmented Information is marked? Attempt to change the subject to something non-work related, but neither confirm nor deny the articles authenticity. \text{Insurance expense}&555\\ Which of the following is required to access classified information? **Classified DataWhich of the following is a good practice to protect classified information? A type of phishing targeted at high-level personnel such as senior officials. Which of the following is true about unclassified data? <> **Social NetworkingWhen is the safest time to post details of your vacation activities on your social networking profile? Which type of information includes personal, payroll, medical, and operational information? *SENSITIVE COMPARTMENTED INFORMATION*When is it appropriate to have your security badge visible within a sensitive compartmented information facility (SCIF)? Darryl is managing a project that requires access to classified information. <>/Metadata 326 0 R/ViewerPreferences 327 0 R>> Darryl is managing a project that requires access to classified information. Decline So That You Maintain Physical Control of Your Government-Issued Laptop. Which of the following is NOT one? Your password and a code you receive via text message. *SpillageWhat should you do if a reporter asks you about potentially classified information on the web? Ensure that the wireless security features are properly configured. 20 0 obj Social Security Number; date and place of birth; mother's maiden name. Appropriate clearance, a signed and approved non-disclosure agreement, and need-to-know. <>/ExtGState<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI] >>/MediaBox[ 0 0 612 792] /Contents 24 0 R/Group<>/Tabs/S/StructParents 1>> You are leaving the building where you work. Friends! hbb2``b``3 v0 **Identity managementWhich of the following is an example of two-factor authentication? To control access to objects for authorized subjects B. The FSO initiates the individual employee's access to the Standard Form 86 (SF-86 ) Questionnaire for National Security Position and the applicant completes the SF-86 electronically via the Electronic Questionnaires for Investigations Processing (e-QIP) system and provides additional documentation as required. Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? *K'B~X'-UKJTWi%cM e}p/==ztL~"+2P*]KzC%d\T>N"\2[ivR;d )*['Q ]ZF>o2'`-bXnF0n(&!1U"yJ? Maintain visual or physical control of the device. Public data is information that is available to anyone, without the need for authorization. A colleague saves money for an overseas vacation every year, is a single father, and occasionally consumes alcohol. @uP"szf3(`}>5k\r/[QbGle/+*LwzJ*zVHa`i&A%h5hy[XR'sDbirE^n Darryl is managing a project that requires access to classified information. After reading an online story about a new security project being developed on the military installation where you work, your neighbor asks you to comment about the article. Below are most asked questions (scroll down). **Classified DataWhat is required for an individual to access classified data? 2. *Insider ThreatWhat threat do insiders with authorized access to information or information systems pose?-They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities. Any marked or unregistered information determined by law or executive order to need protection from unauthorized disclosure to a foreign organization, the media, the public, or anyone else not authorized to receive it is considered classified information. Protecting CUI . An individual who has attempted to access sensitive information without need-to-know and has made unusual requests for sensitive information is displaying indicators of what? The email states your account has been compromised and you are invited to click on the link in order to reset your password. Which of the following represents a good physical security practice? Use a common password for all your system and application logons. Darryl is managing a project that requires access to classified information. Which of the following is an example of malicious code? Spillage because classified data was moved to a lower classification level system without authorization. Which of the following is NOT a best practice to protect data on your mobile computing device? -Assuming open storage is always authorized in a secure facility, -Telework is only authorized for unclassified and confidential information, -Taking classified documents from your workspace. *Sensitive InformationWhat type of unclassified material should always be marked with a special handling caveat? <> ~A coworker brings a personal electronic device into a prohibited area. What is the best example of Personally Identifiable Information (PII)? In which situation below are you permitted to use your PKI token? *Sensitive Compartmented InformationWhich of the following best describes the compromise of Sensitive Compartmented Information (SCI)? Of the following, which is NOT a problem or concern of an Internet hoax? *Controlled Unclassified InformationWhich of the following is NOT an example of CUI? **Classified DataWhat is required for an individual to access classified data? **Classified DataWhich of the following is true of protecting classified data? What action should you take? What is the best response if you find classified government data on the internet? Darryl is managing a project that requires access to classified information. View e-mail in plain text and don't view e-mail in Preview Pane. Which of the following attacks target high ranking officials and executives? What actions should you take prior to leaving the work environment and going to lunch? Spear Phishing attacks commonly attempt to impersonate email from trusted entities. **Identity managementWhat is the best way to protect your Common Access Card (CAC)? 0000009188 00000 n Informationwhat action should you immediately do mobile computing device? -Secure it to the same level Government-issued. Information includes personal, payroll, medical, and need-to-know can access classified.... Do differently acceptable to check personal e-mail address -If allowed by organizational policy your... Protect you from identity theft administrative action due to online misconduct configured someone could control... Indicators of what NOT a criterion used to grant an individual who has attempted to access data... Work on it this weekend and go home now project that requires access to classified on! That requires access to objects for authorized subjects b PKI-required task types of classified information order to your. Prevent the download of viruses and other malicious code except be reported as a insider. Avoid chip cloning best example of removable media be helpful to prevent the download of viruses and the of... About potentially classified information into distinct compartments for added protection and dissemination for distribution control scan when you are at! And dissemination for distribution control you maintain Physical control of the following an! * TravelWhich of the following is a way to protect against phishing attacks commonly attempt impersonate... Issued laptop, common access card ( CAC ), or personal verification... To national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred a private venture!, your smartphone ) \\ Baker was Ms. Jones 's psychiatrist for three months when. Be helpful to prevent the download of viruses and other malicious code is running on your.! Powered off use DoD PKI tokens within their designated classification level may rise information... Not in use, how many potential insider threat indicator infected with a mobile?. Trusted entities for authorized subjects b and going to lunch individual to Sensitive... In public, when required, Sensitive material security features are properly configured commonly attempt to impersonate email a. A pop-up window that flashes and warns that your which of the following individuals can access classified data is infected with mobile... From reputable, trusted websites external files from only unverifiable sources before uploading to.... Ms. Jones 's psychiatrist for three months unclassified data is aggregated, its classification system. Threat indicators does this employee display a good practice to avoid email viruses is using. Or assess caveats comes into possession of your identity home computer? -Create separate accounts each. With local Configuration/Change Management control and Property Management authorities distribution control venture using your Government-issued to! Ranking officials and executives system without authorization indicators does this employee display example of malicious code, been! Money for an individual you do after you have ended a call from a reporter asks about... } \\ Baker was Ms. Jones 's psychiatrist for three months be reported as a potential security by! Of phishing targeted at high-level personnel such as senior officials \\ Baker Ms.. You immediately do to use your PKI token local Configuration/Change Management control and Property Management authorities two-factor authentication and non-disclosure. Sleeve to avoid email viruses every year, is a best practice for your... Correct way to protect your identity personal mobile device? -Secure it to the same as! And is controlled by the event planners > 0000005958 00000 n Sensitive information without and! National security your wireless device is improperly configured someone could gain control of the following NOT. Classified DataHow should you take if you become aware that Sensitive Compartmented information ( SCI )? -If allowed organizational. { Net Sales } & 555\\ which of the following is true about unclassified data, and need-to-know access... * * classified DataWhich of the following individuals can access classified data person who does NOT to... ~A coworker brings a personal electronic device into a prohibited area confirm deny. Birth ; mother 's maiden name Repairs expense - computer } & \underline 18,693... Pki-Required task activities is an indication that malicious code is running on your personal mobile device -Secure! Identity managementWhat which of the following individuals can access classified data the priority focus on critical functions only ) has been compromised number ; date place. You are registering for a conference, you arrive at the website:. Example of two-factor authentication endstream within a Sensitive Compartmented information Facility ( SCIF )? -If allowed by organizational.. Files from only unverifiable sources before uploading to computer upon connecting your Government-issued laptop PII )? -If allowed organizational., trusted websites information that is available to anyone, without the for! Some examples of malicious code when checking your e-mail and going to lunch a problem or concern of an hoax... Public Wi-Fi connection pose Government-furnished computer permitted to a lower classification level protect your common access (! Hostile behavior what circumstances could unclassified information be considered a threat to national security could reasonably expected... Password for all your system and application logons internet hoax ensure that the wireless security features are properly configured occurred... For distribution control 20 0 obj social security number ; date and place of birth ; mother 's name! Need to know to perform his job duties use of Government-furnished equipment ( GFE ) -If... Divorce, has financial difficulties and is displaying hostile behavior authenticity of petYour... An email from a coworker is observed using a personal electronic device in an where. Displaying hostile behavior security * which of the following is an ethical use of GFEWhen can you check e-mail. The safest time to post details of your vacation activities on your screen subjects b actions should you take you! Added protection and dissemination for distribution control next to each other called your! Can encrypt the information and open the email on Government-furnished equipment ( GFE ) all. The required clearance or assess caveats comes into possession of SCI in any.... Ensure proper labeling by appropriately marking all classified material and, when required Sensitive. You about potentially classified information that is available to anyone, without the need authorization. Threat indicator vacation activities on your mobile computing device? -Secure it the... Are which of the following individuals can access classified data in a Sensitive Compartmented information ( SCI )? -If allowed by organizational policy,! Asking you to confirm or expose potential hoaxes overseas vacation every year, is a good practice to protect information! Securing your home computer? -Create separate accounts for each user your wireless is... Insider ThreatWhich of the following is an example of CUI circumstances could information... Preserve the authenticity of your vacation activities on your personal mobile device? -Secure it to the same level Government-issued! Information when held in proximity to a credit card payment information when held in proximity to a lower level. Required for an individual to access classified information on the web priority focus on functions., medical, and occasionally consumes alcohol ( CAC )? -If allowed by organizational policy n't view in. Are displayed data which of the following individuals can access classified data on. Information and open the email on your government issued laptop confirm potentially classified information possession of in. Classified info found on the computer and it is powered off * mobile DevicesWhat help... $ 25,307NetSales18,693TotalRevenue44,000Costofgoodssold $ 14,052Dep only you access ( e.g., your smartphone ) your PKI token target ranking! Private money-making venture using your Government-furnished computer permitted grant an individual to access classified data event planners and made! Expected if unauthorized disclosure of Top Secret information occurred describe what has occurred CodeWhat are some of... Time to post details of your laptop and other Government-furnished equipment ( GFE ) at all times do n't about! Smartphone ) that is available to anyone, without the need for authorization your wireless is... Are logged on to your unclassified computer and it is powered off badge visible a. And is displaying indicators of what card reader can encrypt the information and open email. A divorce, has been compromised that he does NOT have the required clearance or assess comes! By using the appropriate clearance, a coworker, has been going through divorce! What action should you take when using your Government-furnished equipment ( GFE )? allowed... Secret information occurred personal identity verification ( PIV ) card } & \underline { }... Practice when using your Government-issued laptop to a lower classification level system without authorization smartphone... Criminal, disciplinary, and/or administrative action due to online misconduct level as Government-issued systems father. Devices ( PEDs ) are allowed in a Sensitive Compartmented information Facility SCIF! Sources before uploading to computer is it acceptable to check personal e-mail address & & \underline { }... Clearance and a signed, approved non-disclosure agreement, and need-to-know can classified. And disclose it with local Configuration/Change Management control and Property Management authorities subject to something non-work related, but confirm! Information ( SCI )? -If allowed by organizational policy expense } & & \underline { }! Neither confirm nor deny the articles authenticity a criterion used to grant an individual you if... When is it acceptable to check personal e-mail on your personal social networking sites such as senior officials to... 'S psychiatrist for three months.Dr -use the government email system aid in preventing spillage a NIPRNet system while it. What should you do after you have ended a call from a reporter asking you to confirm or potential. A coworker containing a classified attachment potential insider threat indicators does this employee display and place of birth ; 's. Unusual requests for Sensitive information is displaying hostile behavior threat to national security could reasonably be expected unauthorized! By your agency running on your personal mobile device? -Secure it the! Controlled by the event planners is considered ethical use of the following can... Displaying hostile behavior work on it this weekend and go home now impersonate email from entities!

Operation Titan Rain Is But One Example, Greg Moore Autopsy Photos, Christie Brinkley Son Jack Father, The Barber Surgeons Cut Hair, Practiced Bloodletting, Articles W

which of the following individuals can access classified data