The Information Security (INFOSEC) Program establishes policies, procedures, and requirements to protect classified and controlled unclassified information (CUI) that, if disclosed, could cause damage to national security.
These "shorts" are not intended for download. Please note, you will not receive a certificate of completion for watching a short.
- Alternative Compensatory Control Measures (ACCM)
The Alternative Compensatory Control Measures (ACCM) Short will discuss the ACCM requirements Heads of DOD Components with original classification authority (OCA) may employ when determining that standard security measures detailed in DOD Manual 5200.01, Volume 3 are insufficient to enforce need-to-know for classified information and Sensitive Compartmented Information (SCI) or Special Access Program (SAP) protections are not warranted.
- Classified Meetings and Conferences
Conducting meetings and conferences that include classified information presents a set of circumstances that require adherence to specific procedures. The Classified Meetings and Conferences Short will provide students with an overview of procedures for preparing, processing, providing security, and approving requests for Department of Defense (DOD) classified meetings and conferences.
- Classified Storage Requirements
Refreshes the requirements and best practices for storing classified information and provides exercises applying this knowledge.
- Completing the SF 700
Identifies the basic requirements in preparing and completing the SF 700, Security Container Information, in accordance with DOD Manual 5200.01, Vol. 3, "DOD Information Security Program: Protection of Classified Information."
- Completing the SF 701
Identifies the basic requirements in preparing and completing the Standard Form (SF) 701, Activity Security Checklist, in accordance with DOD Manual 5200.01, Vol. 3, "DOD Information Security Program: Protection of Classified Information."
- Completing the SF 702
Identifies the basic requirements in preparing and completing the Standard Form (SF) 702, Security Container Check Sheet, in accordance with DOD Manual 5200.01, Vol. 3, "DOD Information Security Program: Protection of Classified Information."
- Disposal and Destruction of Classified Information
Provides an overview of the requirements for disposal and destruction of classified information as addressed in DOD Manual 5200.01, Volume 3, "DOD Information Security Program: Protection of Classified Information." Identifies what types of classified information are authorized to be destroyed, why classified information must be destroyed, who is authorized to destroy it, when it must be destroyed, and the methods available for its destruction.
- DOD Activity Security Practices
The intent of this Short is to provide an overview of the roles and responsibilities of the Department of Defense Activity Security Manager and how they implement the activity’s Information Security Program (or ISP) while ensuring its visibility and effectiveness on behalf of the activity leadership.
- Downgrading and Declassification
Provides an opportunity to practice the thought process involved in calculating declassification instructions of a derivatively classified document derived from multiple sources.
- Marking in the Electronic Environment
Explains how to recognize and apply classification marking in the electronic environment.
- Marking Syntax
Provides information on how to apply the proper marking syntax to banner lines contained in a U.S. classified document based on portion markings contained therein. This includes the hierarchy and order of markings, the specific markings that fall within each category, and the proper formatting structure.
- NATO Information
Delivers information on the who, what, where, how and why's of NATO handling and processing requirements in accordance with DOD Manual 5200.01, Volumes 1-3, DOD Information Security Program and USSAN 1-07.
- Security Incidents Reporting Requirements
Identifies the appropriate reporting requirements to follow in the event of a security incident.
- Termination Briefing
Provides the requirements for the protection of classified information, even after cleared employees no longer require access.
Email questions or comments to firstname.lastname@example.org