secret - (SPAWAR) is - The US Navy
secret - (SPAWAR) is - The US Navy secret - (SPAWAR) is - The US Navy
EX81BIT 2A GUIDEL12fBS ~011COIQUU?D SECURITY INSTRUCTION SBCHAVINST 5510.36 17 MAR Iggg 1. The eecurity manager shall assess the vulnerability of the command classified information to loss or compromise. This includes obtaining information on tie local threat, volume and ecope of classified information, miseion of the command, countermeasures available end the cost, and the effectiveness of alternative courses of action. Results of this assessment shall be ueed to develop a command eecurity instruction which will emulate the organization of this regulation and Identify any unigue command requirements. The command security instruction shall ~ this regulation and other directives from authorities in the command administrative and operational chain. Incorporate the following into the command security ;;struction: The purpose, applicability, and relationship to other dire~~ives, particularly this regulation. b. Identify the chain of command. Deecribe the security organization and identify posi%ons. d. Cite and append SSAS, if applicable. e. Describe procedures for internal and subordinate security reviews and inspection. f. Specify internal procedures for reporting and investigating loss, compromise, and other eecurity discrepancies. Establieh procedures to report CI matters to the nearest NCISgoffice. h. Develop an ISP eecurity education program. Aesign responsibilities for briefings and debriefings. i. State whether the commanding officer and any other command officials have b-eendelegated Top Secret or Secret originel classification authority. BECNAVIM8F 5510.36 2A-1
SEXl?AVIiWT 5510.36 17 M~81999 j. Establish procedures for the review of classified information prepared in the command to ensure correct classification and marking. Identify the sources of security claeeification guidance commonly used, and where they are located. k. Develop an industrial security program and identify key pereonnel, euch ae the CQR, if applicable. 1. Specify command responeibilitiee and controls on any special typee of classified and controlled unclassified information. m. Establieh reproduction controls to include compliance with reproduction limitation and any special controls placed on information by originator. Identify requirements for the safeguarding of classified info~ation to include how classified information ehall be protected during vorking hours; stored vhen not in use; eecorted or handcarried in and out of the command; and protected vhile in a travel status. Other elemente of command security vhich may be included are key and lock control; safe and door combination changee; location of records of eecurity container combinations; procedures for emergency access to locked security containers; protecting telephone conversation; conducting classified meetings; the safeguarding of U.S. claeeified information located in foreign countries; AIS proceeding equipment; and residential etorage arrangements. Establieh command destruction procedure. Identify dest%ction facilities or equipment available. Attach a command emergency destruction plan, as a supplement, when required. P. Establish command visitor control procedures to accommodate vieits to the command involving access to, or disclosure of, Classified information. Identify procedures to include verification of personnel security clearances and need-to-knov. 3. Refer to SECNAVINST 551O.3OA for guidance concerning personnel security inveetigations, adjudications, and clearances. 2A-2 SEC!MAV12JST S510.36 ‘1
- Page 1 and 2: SECNAV INSTRUCTION 5510.36 CHANGE T
- Page 3 and 4: .) , DEPARTMENT OF THE NAVY &f%i$i
- Page 5 and 6: SKXAVIIWT 17MAR1999 f. Chapter 5. S
- Page 7 and 8: TABLE OF CONT_S SECWAVIIJST 5510.36
- Page 9 and 10: 6-9 6-10 6-11 6-12 6-13 6-14 6-15 6
- Page 11 and 12: SEC3?AVIIJST5510.36 17MAII1999 9-13
- Page 13 and 14: APPENDICES SKNAVINST 5510.36 IIMIR
- Page 15 and 16: SECMAV137ST 5510.S6 1? MAR 1999 b.
- Page 17 and 18: SECNAVINBT 5510.36 17MMI 1999 compl
- Page 19 and 20: 8ECNAVINST 5510.36 I7 MAR1999 2.
- Page 21 and 22: SEKNAVIEJST S51O.36 t7 M~R1999 3. T
- Page 23 and 24: SECNAVIIiST 5510.36 I7 MAR1999 (k)
- Page 25 and 26: 2-1 COMMANDING OP3UCXR CHAPTBA 2 CO
- Page 27 and 28: SECNAVINST 5510.36 17M1R !999 Devel
- Page 29 and 30: BECNAVINET 5510.36 /lM~R 1999 assig
- Page 31 and 32: 8ECNAVINBT 5510.36 I? Mill1999 for
- Page 33: OECNAVINBT 5.510.36 17MI mg (h) OPN
- Page 37 and 38: BECNAVIIWT 5510.36 I7 MhR1999 after
- Page 39 and 40: SECIiAVIlfST5510.36 17M1R t999 —
- Page 41 and 42: 8ECMAVINBT 5510.36 I 7 Ml 1999 YES
- Page 43 and 44: SECllAVINST 5510.36 I7.ml 1999, YES
- Page 45 and 46: SECNAVII?ST 5510.36 17 MAfI1999 YES
- Page 47 and 48: BECNAV2NBT 5510.36 Y13BNO — . —
- Page 49 and 50: BE_~V121BT 5510.36 17 MIR1999 YEB M
- Page 51 and 52: 3-1 BASIC POLICY CEAPTER 3 SECURITY
- Page 53 and 54: SBCHAVIMST 5510.36 I7 MAfl1999 disc
- Page 55 and 56: BECNAVII?8T 5510.36 17MMI 1999 a. R
- Page 57 and 58: 3. Classifiers shall not: a. Use cl
- Page 59 and 60: BECNAV121BT 5510.36 I7 Mill1999 b.
- Page 61 and 62: BECNAVXHBT 5510.36 17 MMl1999 4-18
- Page 63 and 64: 8ECNAVINBT 5510.36 l~MAll!999 4. Th
- Page 65 and 66: SEC31AVII?ST5510.36 17M18 1999 1 de
- Page 67 and 68: BECNAV13Z8T 5510.36 17M1R 1999 (m)
- Page 69 and 70: BECNAVINBT 5510.36 t7 MAR 1999 Prog
- Page 71 and 72: SBC2?AVIM6T 5510.36 17M1111999 Dire
- Page 73 and 74: SECNAVIIJST 5510.36 17 Mlfl1999 Oce
- Page 75 and 76: SECMAVINST 5510.36 I7 MIRtggg Deput
- Page 77 and 78: 8ECNAVIX8T 5510.36 17 Mm 1999 U.S.
- Page 79 and 80: BECNAVIHBT 5510.36 I7 MMl1999 2. Un
- Page 81 and 82: 6-1 BASIC POLICY CNAPTER 6 UARKING
- Page 83 and 84: 6-5 PORTION NARXIHQS 8ECNAV131BT 55
EX81BIT 2A<br />
GUIDEL12fBS ~011COIQUU?D SECURITY INSTRUCTION<br />
SBCHAVINST 5510.36<br />
17 MAR Iggg<br />
1. <strong>The</strong> eecurity manager shall assess the vulnerability of the<br />
command classified information to loss or comprom<strong>is</strong>e. Th<strong>is</strong><br />
includes obtaining information on tie local threat, volume and<br />
ecope of classified information, m<strong>is</strong>eion of the command,<br />
countermeasures available end the cost, and the effectiveness of<br />
alternative courses of action. Results of th<strong>is</strong> assessment shall<br />
be ueed to develop a command eecurity instruction which will<br />
emulate the organization of th<strong>is</strong> regulation and Identify any<br />
unigue command requirements. <strong>The</strong> command security instruction<br />
shall ~ th<strong>is</strong> regulation and other directives from<br />
authorities in the command admin<strong>is</strong>trative and operational chain.<br />
Incorporate the following into the command security<br />
;;struction:<br />
<strong>The</strong> purpose, applicability, and relationship to other<br />
dire~~ives, particularly th<strong>is</strong> regulation.<br />
b. Identify the chain of command.<br />
Deecribe the security organization and identify<br />
posi%ons.<br />
d. Cite and append SSAS, if applicable.<br />
e. Describe procedures for internal and subordinate security<br />
reviews and inspection.<br />
f. Specify internal procedures for reporting and<br />
investigating loss, comprom<strong>is</strong>e, and other eecurity d<strong>is</strong>crepancies.<br />
Establieh procedures to report CI matters to the nearest<br />
NCISgoffice.<br />
h. Develop an ISP eecurity education program. Aesign<br />
responsibilities for briefings and debriefings.<br />
i. State whether the commanding officer and any other<br />
command officials have b-eendelegated Top Secret or Secret<br />
originel classification authority.<br />
BECNAVIM8F 5510.36 2A-1