secret - (SPAWAR) is - The US Navy
secret - (SPAWAR) is - The US Navy secret - (SPAWAR) is - The US Navy
(Z) SECNAVINST 5239.3, Systems Security (aa) (ah) SEC!NAVINST 5510.36 17 MAflm Department of the Navy Information (INPDSEC) Program, 14 Jul 95 (NOTAL) OPNAVINST 5239.1A, Department of the Navy Automatic Data Processing Secuiity-Prcgram, 3 Aug 82 - CWS-21 Series, Interim CMS Policy and Procedures for Navy Tier 2 Electronic Key Management System, 30 May 97 (NOTAL) SECNAVINST 5510.36 1-11
2-1 COMMANDING OP3UCXR CHAPTBA 2 COMMAND SECURITY MAMAGF24ENT BECNAVIZiBT 5510.36 I? MAH1999 1. Termiuol~ . WCOXUBSAdW iS used as a generic te~ for anY organizational entity and may include a base, station, unit, laboratory, installation, facility, center, activity, detachment, sguadron, ship, etc. ~~co~nding offiaersa is used throughout thie regulation as a generic term for the head of any DON command and includee commander, commanding general, director, officer in charge, etc. 2. Reeponaibility and Authority. The commanding officer is responsible for the effective management of the ISP within the command. Authority delegated by thie regulation to a commanding officer may be further delegated unless specifically prohibited. 3. Bten&erda. Thie regulation establiehee baseline etandarde, but the commanding officer may impose more etringent requirements within the command or upon subordinates if the situation warrants. The commanding officer ehall not, however, unilaterally establish requirements that Impact on other commands or cleared DoD contractors, or that contradict thie regulation or reference (a). 4. Risk Management. Commands confront different environments and eets of changing operational reguiremente. Therefore, each commanding officer shall apply risk management principles to determine how best to attain the required levele of protection. Employing rick management results in command decisione to adopt specific security measures given the relative costs and available resources. 5. Implementation. The commanding officer shall designate, in writing, certain security personnel directly involved in program implementation (see paragraphs 2-2 through 2-9). Additionally, the commanding officer shall: a. Iesue a written command security instruction (eee exhibit 2A) . b. Approve an emergency plan which includes provisions for the protection and destruction of classified information in emergency situations (see exhibit 2B). S13CNAVIMST 5510.36 2-1
- Page 1 and 2: SECNAV INSTRUCTION 5510.36 CHANGE T
- Page 3 and 4: .) , DEPARTMENT OF THE NAVY &f%i$i
- Page 5 and 6: SKXAVIIWT 17MAR1999 f. Chapter 5. S
- Page 7 and 8: TABLE OF CONT_S SECWAVIIJST 5510.36
- Page 9 and 10: 6-9 6-10 6-11 6-12 6-13 6-14 6-15 6
- Page 11 and 12: SEC3?AVIIJST5510.36 17MAII1999 9-13
- Page 13 and 14: APPENDICES SKNAVINST 5510.36 IIMIR
- Page 15 and 16: SECMAV137ST 5510.S6 1? MAR 1999 b.
- Page 17 and 18: SECNAVINBT 5510.36 17MMI 1999 compl
- Page 19 and 20: 8ECNAVINST 5510.36 I7 MAR1999 2.
- Page 21 and 22: SEKNAVIEJST S51O.36 t7 M~R1999 3. T
- Page 23: SECNAVIIiST 5510.36 I7 MAR1999 (k)
- Page 27 and 28: SECNAVINST 5510.36 17M1R !999 Devel
- Page 29 and 30: BECNAVINET 5510.36 /lM~R 1999 assig
- Page 31 and 32: 8ECNAVINBT 5510.36 I? Mill1999 for
- Page 33 and 34: OECNAVINBT 5.510.36 17MI mg (h) OPN
- Page 35 and 36: SEXl?AVIiWT 5510.36 17 M~81999 j. E
- Page 37 and 38: BECNAVIIWT 5510.36 I7 MhR1999 after
- Page 39 and 40: SECIiAVIlfST5510.36 17M1R t999 —
- Page 41 and 42: 8ECMAVINBT 5510.36 I 7 Ml 1999 YES
- Page 43 and 44: SECllAVINST 5510.36 I7.ml 1999, YES
- Page 45 and 46: SECNAVII?ST 5510.36 17 MAfI1999 YES
- Page 47 and 48: BECNAV2NBT 5510.36 Y13BNO — . —
- Page 49 and 50: BE_~V121BT 5510.36 17 MIR1999 YEB M
- Page 51 and 52: 3-1 BASIC POLICY CEAPTER 3 SECURITY
- Page 53 and 54: SBCHAVIMST 5510.36 I7 MAfl1999 disc
- Page 55 and 56: BECNAVII?8T 5510.36 17MMI 1999 a. R
- Page 57 and 58: 3. Classifiers shall not: a. Use cl
- Page 59 and 60: BECNAV121BT 5510.36 I7 Mill1999 b.
- Page 61 and 62: BECNAVXHBT 5510.36 17 MMl1999 4-18
- Page 63 and 64: 8ECNAVINBT 5510.36 l~MAll!999 4. Th
- Page 65 and 66: SEC31AVII?ST5510.36 17M18 1999 1 de
- Page 67 and 68: BECNAV13Z8T 5510.36 17M1R 1999 (m)
- Page 69 and 70: BECNAVINBT 5510.36 t7 MAR 1999 Prog
- Page 71 and 72: SBC2?AVIM6T 5510.36 17M1111999 Dire
- Page 73 and 74: SECNAVIIJST 5510.36 17 Mlfl1999 Oce
2-1 COMMANDING OP3UCXR<br />
CHAPTBA 2<br />
COMMAND SECURITY MAMAGF24ENT<br />
BECNAVIZiBT 5510.36<br />
I? MAH1999<br />
1. Termiuol~ . WCOXUBSAdW iS used as a generic te~ for anY<br />
organizational entity and may include a base, station, unit,<br />
laboratory, installation, facility, center, activity, detachment,<br />
sguadron, ship, etc. ~~co~nding offiaersa <strong>is</strong> used throughout<br />
thie regulation as a generic term for the head of any DON command<br />
and includee commander, commanding general, director, officer in<br />
charge, etc.<br />
2. Reeponaibility and Authority. <strong>The</strong> commanding officer <strong>is</strong><br />
responsible for the effective management of the ISP within the<br />
command. Authority delegated by thie regulation to a commanding<br />
officer may be further delegated unless specifically prohibited.<br />
3. Bten&erda. Thie regulation establiehee baseline etandarde,<br />
but the commanding officer may impose more etringent requirements<br />
within the command or upon subordinates if the situation<br />
warrants. <strong>The</strong> commanding officer ehall not, however,<br />
unilaterally establ<strong>is</strong>h requirements that Impact on other commands<br />
or cleared DoD contractors, or that contradict thie regulation or<br />
reference (a).<br />
4. R<strong>is</strong>k Management. Commands confront different environments<br />
and eets of changing operational reguiremente. <strong>The</strong>refore, each<br />
commanding officer shall apply r<strong>is</strong>k management principles to<br />
determine how best to attain the required levele of protection.<br />
Employing rick management results in command dec<strong>is</strong>ione to adopt<br />
specific security measures given the relative costs and available<br />
resources.<br />
5. Implementation. <strong>The</strong> commanding officer shall designate, in<br />
writing, certain security personnel directly involved in program<br />
implementation (see paragraphs 2-2 through 2-9). Additionally,<br />
the commanding officer shall:<br />
a. Iesue a written command security instruction (eee exhibit<br />
2A) .<br />
b. Approve an emergency plan which includes prov<strong>is</strong>ions for<br />
the protection and destruction of classified information in<br />
emergency situations (see exhibit 2B).<br />
S13CNAVIMST 5510.36 2-1