Frequently Asked Questions for Department of Defense Prepublication Security and Policy Reviews – What is a prepublication security and policy review? A prepublication security and policy review is the process by which information proposed for public release is reviewed to ensure compliance with established national and DoD policies, and to determine that it contains no classified, controlled unclassified, export-controlled, or operational security related information.
- Once the information is cleared by a DoD component or the Defense Office of Prepublication and Security Review, release to the public is the responsibility of the originating office or individual.
- Why are prepublication reviews necessary? The purpose of the prepublication security and policy review is to ensure information damaging to the national security is not inadvertently disclosed.
Department of Defense employees and military service members have a lifelong responsibility to submit for prepublication review any information intended for public disclosure that is or may be based on protected information gained while associated with the Department.
- Note: Public disclosure means disclosure to one or more persons who do not have the appropriate access authorization, security clearance, and need-to-know to receive protected information.
- Who must submit materials intended for public release? All current, former, and retired DoD employees, contractors, and military service members (whether active or reserve) who have had access to DoD information, facilities, or who signed a Non-Disclosure Agreement (NDA) must submit DoD information intended for public release to the appropriate office for review and clearance.
“DoD information” includes any work that relates to military matters, national security issues, or subjects of significant concern to the Department of Defense in general, to include fictional novels, stories and biographical accounts of operational deployments and wartime experiences.
- Publications about gardening, cooking, sports, crafts, and the like do not need to undergo prepublication review if there is no association with the author’s current or former affiliation with the Department of Defense.
- Reminder: Protection of DoD information is a lifelong responsibility.
- The responsibility does not end with an individual’s association with the Department of Defense.
Unauthorized disclosure of classified information (whether in a printed article, manuscript or book, on a blog, on a public website or provided to the media), even when it appears in the public domain, does not automatically result in the declassification of the information.
The information remains classified and must be protected until the U.S. government official with original classification authority declassifies the information. What materials must be reviewed as part of the prepublication security and policy review process? Any DoD-related material that is intended for public release or dissemination must undergo a prepublication security and policy review.
This includes, but is not limited to:
Manuscripts, books, theses Conference papers, briefings, brochures Articles, biographies, speeches Research and scientific papers International Traffic in Arms Regulations technical data Congressional hearing statements Reports to Congress, Reprogramming Actions, Selected Acquisition Reports
How long do reviews take? Review times vary and are dependent on the complexity of the subject matter, the volume of information, and the number of components with equity in the submitted material. Reviews may require tasking to multiple component equity holders inside and outside the Department of Defense.
I am a student. Am I required to submit my academic assignments for review? Department of Defense employees who are students are not required to submit their academic assignments if the assignment will stay within the academic institution. If an employee intends to publically release the academic work, they are then obliged to submit it for prepublication review.
See DoD Instruction 5230.09, Section 1.2.f. I am a foreign national. Am I required to submit materials for review? Only foreign nationals with employment affiliations with the Department of Defense are required to submit materials for review. This applies to foreign nationals who are or were working for a DoD component, except those hired pursuant to a defense contract, consistent with labor agreements, international treaties and agreements, and host-country laws.
Joint military training exercises, multinational conferences and symposiums, and multinational deployments do not constitute affiliation or employment with DoD. Can I use individuals’ names or other personally identifiable information (PII) in my material? As an author, you are responsible for the release of any individual’s PII.
DOPSR suggests that you obtain permission from these individuals to use their information but it is not a condition of DOPSR clearance. You are not required to use pseudonyms but in some instances, especially for those military members attached to sensitive or routinely deployed units, DOPSR may ask you to use pseudonyms or only the individual’s first name or military rank.
- How does the prepublication security review process work with the editing process? Can I have others (publishers and editors) read the material? An editor may make changes, and I expect that I will want to edit content as well.
- DOPSR does not accommodate publishers’ or editors’ timelines.
- Therefore, we recommend that you do not sign a contract with a publishing company, or provide copies of the material to a publisher or other individuals until the review is complete.
Normally, DOPSR does not require you to resubmit material once it is cleared unless you make substantive (as opposed to editorial or format) changes that alter or supplement the original meaning of the text. DOPSR does not need to review formatting, grammatical, or spelling changes made by a publisher or editor.
Additionally, DOPSR is not concerned with changes made to the material that do not concern your DoD employment or military service or that are not related to U.S. government information. Can I use the DoD Seal or other military insignia in my product? The DoD seal and seals of the Military Departments are protected by trademark restrictions and can only be used for official purposes.
Other DoD insignia, emblems, ribbons, and medals are protected under trademark licensing laws and require permission prior to use. Approval of trademarked items is regulated by DoD Instruction 5535.12, “DoD Branding and Trademark Licensing Program Implementation,” Section 2.d.
Which of the following is responsible for the review of written materials for public release?
The Defense Office of Prepublication and Security Review manages the Department of Defense Security Review program, reviewing written materials both for public and controlled release. This includes the mandatory pre-release review of official government and defense industry work products, as well as materials (such as books and articles) submitted by cleared or formerly cleared individuals pursuant to their voluntary non-disclosure agreement obligations.
Which of the following required to access classified information?
Classified information may be made available to a person only when the possessor of the information establishes that the person has a valid ‘need to know’ and the access is essential to the accomplishment of official government duties.
How can classified information be safeguarded by using?
How to securely safeguard classified information & what solution to use to do it – Classified information can be safeguarded by using Locklizard to stop sharing, copying, editing, and printing. Automatically expire and revoke access, and track use. Movies make classified information sound exciting, but those who work with it every day will know that’s rarely the case.
- Public data : This type of data is freely accessible to the public (i.e. all employees/company personnel). It can be freely used, reused, and redistributed without repercussions. An example might be first and last names, job descriptions, or press releases.
- Internal-only data : This type of data is strictly accessible to internal company personnel or internal employees who are granted access. This might include internal-only memos or other communications, business plans, etc.
- Confidential data : Access to confidential data requires specific authorization and/or clearance. Types of confidential data might include Social Security numbers, cardholder data, M&A documents, and more. Usually, confidential data is protected by laws like HIPAA and the PCI DSS.
- Restricted data : Restricted data includes data that, if compromised or accessed without authorization, which could lead to criminal charges and massive legal fines or cause irreparable damage to the company. Examples of restricted data might include proprietary information or research and data protected by state and federal regulations.
- Top Secret: applies when compromise might reasonably cause exceptionally grave injury to the national interest. The possible impact must be great, immediate and irreparable.
- Secret: applies when compromise might reasonably cause serious injury to the national interest.
- Confidential: disclosure might reasonably cause injury to the national interest.
- The receipt for the document, OMB Form 87, (not required for Confidential material) will be attached to or placed within the inner envelope to be signed by the recipient and returned to the sender.
- Receipts will identify the sender, the addressee, and the document, and will contain no classified information.
- Alternatively, it shall be taken to the White House Situation Room for transmission over secure communications circuits.
- B ) Transmittal of Secret material.
- The transmittal of Secret material shall be as follows: ( 1 ) Within and between the fifty States, the District of Columbia, and Puerto Rico: Use one of the authorized means for Top Secret material, or transmit by U.S.
- Failure to log opening or closing of a security container or vault door.
- As stated previously Infractions are more administrative in nature. You can be issued an infraction for leaving classified material out on your desk even if you are in a vaulted area that is approved for classified materials and there is a 24/7 monitored and approved alarm system which was operational and in use when the material was left out on the desk.
- Initiate personal contact between the reviewers and reviewee.
- Set the date and time of the observation process.
- Set the location for the observation process.
- Discuss teaching process being observed.
- Discuss dimensions that will be reviewed.
- Discuss any relevant components of the supporting documentation uploaded by the reviewee.
- Select the date and time for the meeting to commence. The end date and time will default to the same date, one hour on.
- Enter the proposed location for the meeting.
- Select Save,
- An email which will also contain a meeting maker will be sent to both reviewers and the reviewee.
- The screen will refresh to show the Current Review process flow screen.
Does a security infraction involve loss compromise or suspected compromise?
Security Incidents An infraction does not involve loss, compromise, or suspected compromise. A violation could result in a loss or compromise.
What is the prepublication review process?
What is Prepublication Review? – Prepublication review is the process to determine that information proposed for public release contains no protected information and is consistent with established NSA, DOD, and IC policies. Protected information is classified, in the process of a classification determination, or unclassified, but protected by statute.
Department of Defense Instruction 5230.29, “Security and Policy Review of DoD Information for Public Release” requires that only FULL and FINAL material proposed for release into the public domain be submitted to NSA for review. Partial information (drafts) cannot be accepted. REMINDER: Official NSA Information appearing in the public domain shall not be considered automatically UNCLASSIFIED or approved for public release.
Information remains classified and must be protected until the U.S. government official with Original Classification Authority (OCA) declassifies the information.
Which procedures must be reviewed before destruction of CUI documents?
Before any CUI can be destroyed, it must be processed through the Records Management procedures.
What are the 4 types of information classification?
4 Ways to Classify Data – Depending on the sensitivity of the data an organization holds, there needs to be different levels of classification, which determines a number of things, including who has access to that data and how long the data needs to be retained.
What are the three requirements that must be met in order to access classified information?
Requirements for Access They must have a favorable determination of eligibility at the proper level, have a ‘need-to-know’, and have signed an appropriate NDA before accessing classified information. Any individual who fails to meet these requirements is not authorized to access classified information.
What type of information can be classified?
Classified information – Classified information can be designated Top Secret, Secret or Confidential, These classifications are only used on matters of national interest.
What is the proper handling of classified materials?
|If you find classified material left unattended (for example, in a rest room, or on a desk), it is your responsibility to ensure that the material is properly protected. Stay with the classified material and notify the security office. If this is not possible, take the documents or other material to the security office, a supervisor, or another person authorized access to that information, or, if necessary, lock the material in your own safe overnight.
Classified material shall not be taken home, and you must not work on classified material at home. Classified information shall not be disposed of in the waste basket. It must be placed in a designated container for an approved method of destruction such as shredding or burning. E-mail and the Internet create many opportunities for inadvertent disclosure of classified information. Before sending an e-mail, posting to a bulletin board, publishing anything on the Internet, or adding to an existing Web page, you must be absolutely certain none of the information is classified or sensitive unclassified information. Be familiar with your organization’s policy for use of the Internet. Many organizations require prior review of ANY information put on the Internet. Classified working papers such as notes and rough drafts should be dated when created, marked with the overall classification and with the annotation “Working Papers,” and disposed of with other classified waste when no longer needed. Computer diskettes, magnetic tape, CDs, carbon paper, and used typewriter ribbons may pose a problem when doing a security check, as visual examination does not readily reveal whether the items contain classified information. To reduce the possibility of error, some offices treat all such items as classified even though they may not necessarily contain classified information. Foreign government material shall be stored and access controlled generally in the same manner as U.S. classified material of an equivalent classification, with one exception. See Foreign Government Classified Information, Top Secret information is subject to continuing accountability. Top Secret control officials are designated to receive, transmit, and maintain access and accountability records for Top Secret information. When information is transmitted from one Top Secret control official to another, the receipt is recorded and a receipt is returned to the sending official. Each item of Top Secret material is numbered in series, and each copy is also numbered. Some classified Department of Defense information is subject to special controls called Alternative or Compensatory Control Measures (ACCM). ACCM are security measures used to safeguard classified intelligence or operations and support information when normal measures are insufficient to achieve strict need-to-know controls and where special access program (SAP) controls are not required. ACCM measures include the maintenance of lists of personnel to whom the specific classified information has been or may be provided, together with the use of an unclassified nickname and ACCM designation used in conjunction with the security classification to identify the portion, page, and document containing such specific classified information. Sensitive Controlled Information (SCI) is subject to special handling procedures not discussed here. Related Topics: Mailing and Carrying Classified Materials, Protecting Sensitive Unclassified Information, Foreign Government Classified Information,
How do you handle classified materials?
§ 1312.28 Transmission of classified material. – Prior to the transmission of classified material to offices outside OMB, such material will be enclosed in opaque inner and outer covers or envelopes. The inner cover will be sealed and marked with the classification, and the address of the sender and of the addressee.
The outer cover or envelope will be sealed and addressed with no identification of its contents. ( a ) Transmittal of Top Secret material. The transmittal of Top Secret material shall be by personnel specifically designated by the EOP Security Officer, or by Department of State diplomatic pouch, by a messenger-courier system specifically created for that purpose.
Postal Service express or registered mail. ( 2 ) Other Areas. Use the same means authorized for Top Secret, or transmit by U.S. registered mail through Military Postal Service facilities. ( c ) Transmittal of Confidential material. As identified in paragraphs (a) and (b) of this section, or transmit by U.S.
Postal Service Certified, first class, or express mail service within and between the fifty States, the District of Columbia, and Puerto Rico. ( d ) Transmittal between OMB offices and within the EOP complex. Classified material will normally be hand carried within and between offices in the Executive Office of the President complex by cleared OMB employees.
Documents so carried must be protected by the appropriate cover sheet or outer envelope. Top Secret material will always be hand carried in this manner. Secret and Confidential material may be transmitted between offices in the EOP complex by preparing the material as indicated above (double envelope) and forwarding it by special messenger service provided by the messenger center.
What is the difference between a security infraction and violation?
What is a security incident involving failure to comply with requirements?
Essentially, an infraction is a security incident involving failure to comply with requirements (which cannot reasonably be expected to) and does not, result in the loss, suspected compromise, or compromise of classified information. An Infraction may be unintentional or inadvertent.
Which of the following is not considered controlled unclassified information?
CUI is best understood by first knowing what does not qualify as CUI. Put simply, any information classified under Executive Order No.13526 and the Atomic Energy Act cannot be considered CUI. In other words, any classified information labeled ‘classified,’ ‘secret,’ or ‘top-secret’ cannot be designated as CUI.
What is the purpose of pre review?
Summative Peer Review of Teaching Help The purpose of the pre-review meeting is to:
Once both reviewers have agreed to participate in the review, an email is sent to both reviewers to organise the pre-review meeting. The email will contain a link taking you directly to the scheduling screen. You can also access it from the home screen of the peer review tool. You can navigate to the schedule task by: 1. The task notification (direct link to the required screen).2. Via the Manage Reviews process. The schedule screen is displayed.
: Summative Peer Review of Teaching Help
What are the 4 stages of book review?
Abstract – A book review is a form of academic writing that provides a succinct yet critical analysis evaluating the content, style, merit and significance of a book. The reader should gain insight into the strengths and weaknesses of the book, aided by input from the reviewer.
What are the procedures for destruction of CUI?
Some typical destruction methods for such devices and materials are: Disintegrate, Pulverize, Melt, or Incinerate outsourced metal.
What are the approved methods of destruction for classified information?
Classified Waste Paper Disposal Practices Highlights Classified waste disposal requires destroying government documents to prevent release of their contents. The three primary methods used by the Federal Government to destroy classified documents are incineration, shredding or milling (dry process), and pulping (wet process). : Classified Waste Paper Disposal Practices
What is the process by which information proposed for public release is examined?
JB: Prepublication review is the process by which information proposed for public release is examined by the DOPSR for compliance with established national and DoD policies and to determine whether it contains any classified, CUI, or unclassified information that may individually or in compilation lead to the
Who is responsible for protecting CUI?
WHO IS RESPONSIBLE FOR CONTROLLING CUI? Anyone who creates information that is considered CUI is responsible for protecting and correctly handling it. Formally, 32 CFR Part 2002 designates the National Archives and Records Administration (NARA) as the program’s Executive Agent (EA).
Is Yuri following DoD policy?
Is Yuri following DoD policy? No, Yuri must safeguard the information immediately.