secret - (SPAWAR) is - The US Navy

secret - (SPAWAR) is - The US Navy secret - (SPAWAR) is - The US Navy

spawar.navy.mil
from spawar.navy.mil More from this publisher
24.01.2013 Views

SECNAVINST 5510.36 CH-1 19 June 2000 Preliminary Inquiry and Judge Advocate General Manual (JAGMAN) Investigation narrative formats. 6. Action. Each DON commanding officer shall establish and conduct an ISP in compliance with this regulation. 7. Violations of this Regulation a. Military Personnel. Military personnel are subject to disciplinary action under the Uniform Code of Military Justice (UCMJ), or criminal penalties under applicable Federal Statutes, as well as administrative sanctions, if they knowingly, willfully or negligently violate the provisions of this regulation. b. Civilian Employees. Civilian employees are subject to criminal penalties under applicable Federal Statutes, as well as administrative sanctions, if they knowingly, willfully or negligently violate the provisions of this regulation. 8. Records Disposition. Disposition requirements for records related to the ISP are based upon schedules approved by the Archivist of the United States and listed in SECNAVINST 5212.5D, Navy and Marine Corps Records Disposition Manual. 9. Reports and Forms a. Reports. The reporting requirements imposed by this regulation have been approved by the Navy Records Manager and are assigned the report control symbols identified in appendix C. b. Forms. Information regarding procurement of forms used in the ISP appears in appendix B. Distribution: SNDL Parts 1 and 2 MARCORPS Codes PCN 21600401000 4 Richard Danzig

TABLE OF CONT_S SECWAVIIJST 5510.36 I? MMl IW9 PARAGAAPH PAGE Chapter 1: Introduction to tha Information Seourity Program 1-1 -ose, Applicability, and scope . . . . . . . . . . 1-1 1-2 Policy Guidance . . . . . . . . . . . . . . . . . . .1-3 1-3 National Authorities fOr Security Htittere . . . . . . 1-4 1-4 00D Security Program 14anagsment . . . . . . . . . . . 1-5 1-5 DON Security Program Management . . . . . . . . . . . 1-6 Chapter 2: Command Seourity Management 2-1 2-2 2-3 2-4 2-5 2-6 2--I 2-8 2-9 2-1o 2-11 2-12 2-13 Commanding Officer . . . . . . . . . . . . . . . . . . 2-1 Security Manager. . . . . . . . . . . . . . . . . . .2-2 Top Secret Control Officer (Tsco) . . . . . . . . . . 2-4 Other Security Assietante . . . . . . . . . . . . . . 2-4 Security Related Collateral Duties . . . . . . . . . . 2-5 Contracting Officerte Representative (COR) . . . . . . 2-6 Information Systems Security Manager (ISSM) . . . . . 2-6 Special Security Officer (SS0) . . . . . . . . . . . . 2-6 Security Officer. . . . . . . . . . . . . . . . . . .2-7 Security Servicing Agreements (SSAe) . . . . . . . . . 2-7 Inspections, Aeeist Vieits, and Program Reviews . . . 2-8 Forms . . . . . . . . . . . . . . . . . . . . . . . .2-0 Report Control Symbols. . . . . . . . . . . . . . ..2-8 Exhibit 2A - Guidelines for Command Security Instruction. . . . . . . . . . . . . . . 2A-1 Exhibit 2B - Emergency Plan and Smergency Destruction Supplement . . . . . . . . . . . . . . .2B-1 Exhibit 2C - Security Inspection Checkliet . . . . . . 2C-1 Chaptar 3: Seourity Eduoation 3-1 Basic Policy . . . . . . . . . . . . . . . . . . . . 3-1 3-2 Responsibility . . . . . . . . . . . . . . . . . . . 3-1 3-3 Additional Information Security Education . . . . . . 3-1 Chapter 4Z classification Management 4-1 BaeicPolicy . . . . . . . . . . . . . . . . , . . .4-1 4-2 Classification Levels . . . . . . . . . . . . . . . . 4-1 4-3 Original Classification . . . . . . . . . . . . . . . 4-2 4-4 Original Classification Authority . . . . . . . . . . 4-2 4-5 Reguests for Original Classification Authority . . . . 4-2 4-6 OCATraining. . . . . . . . . . . . . . . . . . . . .4-3 SKNAVINST 5510.36 i

TABLE OF CONT_S<br />

SECWAVIIJST 5510.36<br />

I? MMl IW9<br />

PARAGAAPH PAGE<br />

Chapter 1: Introduction to tha Information Seourity Program<br />

1-1 -ose, Applicability, and scope . . . . . . . . . . 1-1<br />

1-2 Policy Guidance . . . . . . . . . . . . . . . . . . .1-3<br />

1-3 National Authorities fOr Security Htittere . . . . . . 1-4<br />

1-4 00D Security Program 14anagsment . . . . . . . . . . . 1-5<br />

1-5 DON Security Program Management . . . . . . . . . . . 1-6<br />

Chapter 2: Command Seourity Management<br />

2-1<br />

2-2<br />

2-3<br />

2-4<br />

2-5<br />

2-6<br />

2--I<br />

2-8<br />

2-9<br />

2-1o<br />

2-11<br />

2-12<br />

2-13<br />

Commanding Officer . . . . . . . . . . . . . . . . . . 2-1<br />

Security Manager. . . . . . . . . . . . . . . . . . .2-2<br />

Top Secret Control Officer (Tsco) . . . . . . . . . . 2-4<br />

Other Security Assietante . . . . . . . . . . . . . . 2-4<br />

Security Related Collateral Duties . . . . . . . . . . 2-5<br />

Contracting Officerte Representative (COR) . . . . . . 2-6<br />

Information Systems Security Manager (ISSM) . . . . . 2-6<br />

Special Security Officer (SS0) . . . . . . . . . . . . 2-6<br />

Security Officer. . . . . . . . . . . . . . . . . . .2-7<br />

Security Servicing Agreements (SSAe) . . . . . . . . . 2-7<br />

Inspections, Aee<strong>is</strong>t Vieits, and Program Reviews . . . 2-8<br />

Forms . . . . . . . . . . . . . . . . . . . . . . . .2-0<br />

Report Control Symbols. . . . . . . . . . . . . . ..2-8<br />

Exhibit 2A - Guidelines for Command Security<br />

Instruction. . . . . . . . . . . . . . . 2A-1<br />

Exhibit 2B - Emergency Plan and Smergency Destruction<br />

Supplement . . . . . . . . . . . . . . .2B-1<br />

Exhibit 2C - Security Inspection Checkliet . . . . . . 2C-1<br />

Chaptar 3: Seourity Eduoation<br />

3-1 Basic Policy . . . . . . . . . . . . . . . . . . . . 3-1<br />

3-2 Responsibility . . . . . . . . . . . . . . . . . . . 3-1<br />

3-3 Additional Information Security Education . . . . . . 3-1<br />

Chapter 4Z classification Management<br />

4-1 BaeicPolicy . . . . . . . . . . . . . . . . , . . .4-1<br />

4-2 Classification Levels . . . . . . . . . . . . . . . . 4-1<br />

4-3 Original Classification . . . . . . . . . . . . . . . 4-2<br />

4-4 Original Classification Authority . . . . . . . . . . 4-2<br />

4-5 Reguests for Original Classification Authority . . . . 4-2<br />

4-6 OCATraining. . . . . . . . . . . . . . . . . . . . .4-3<br />

SKNAVINST 5510.36 i

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!