secret - (SPAWAR) is - The US Navy
secret - (SPAWAR) is - The US Navy secret - (SPAWAR) is - The US Navy
SECNAVINST 5510.36 CH-1 19 June 2000 Preliminary Inquiry and Judge Advocate General Manual (JAGMAN) Investigation narrative formats. 6. Action. Each DON commanding officer shall establish and conduct an ISP in compliance with this regulation. 7. Violations of this Regulation a. Military Personnel. Military personnel are subject to disciplinary action under the Uniform Code of Military Justice (UCMJ), or criminal penalties under applicable Federal Statutes, as well as administrative sanctions, if they knowingly, willfully or negligently violate the provisions of this regulation. b. Civilian Employees. Civilian employees are subject to criminal penalties under applicable Federal Statutes, as well as administrative sanctions, if they knowingly, willfully or negligently violate the provisions of this regulation. 8. Records Disposition. Disposition requirements for records related to the ISP are based upon schedules approved by the Archivist of the United States and listed in SECNAVINST 5212.5D, Navy and Marine Corps Records Disposition Manual. 9. Reports and Forms a. Reports. The reporting requirements imposed by this regulation have been approved by the Navy Records Manager and are assigned the report control symbols identified in appendix C. b. Forms. Information regarding procurement of forms used in the ISP appears in appendix B. Distribution: SNDL Parts 1 and 2 MARCORPS Codes PCN 21600401000 4 Richard Danzig
TABLE OF CONT_S SECWAVIIJST 5510.36 I? MMl IW9 PARAGAAPH PAGE Chapter 1: Introduction to tha Information Seourity Program 1-1 -ose, Applicability, and scope . . . . . . . . . . 1-1 1-2 Policy Guidance . . . . . . . . . . . . . . . . . . .1-3 1-3 National Authorities fOr Security Htittere . . . . . . 1-4 1-4 00D Security Program 14anagsment . . . . . . . . . . . 1-5 1-5 DON Security Program Management . . . . . . . . . . . 1-6 Chapter 2: Command Seourity Management 2-1 2-2 2-3 2-4 2-5 2-6 2--I 2-8 2-9 2-1o 2-11 2-12 2-13 Commanding Officer . . . . . . . . . . . . . . . . . . 2-1 Security Manager. . . . . . . . . . . . . . . . . . .2-2 Top Secret Control Officer (Tsco) . . . . . . . . . . 2-4 Other Security Assietante . . . . . . . . . . . . . . 2-4 Security Related Collateral Duties . . . . . . . . . . 2-5 Contracting Officerte Representative (COR) . . . . . . 2-6 Information Systems Security Manager (ISSM) . . . . . 2-6 Special Security Officer (SS0) . . . . . . . . . . . . 2-6 Security Officer. . . . . . . . . . . . . . . . . . .2-7 Security Servicing Agreements (SSAe) . . . . . . . . . 2-7 Inspections, Aeeist Vieits, and Program Reviews . . . 2-8 Forms . . . . . . . . . . . . . . . . . . . . . . . .2-0 Report Control Symbols. . . . . . . . . . . . . . ..2-8 Exhibit 2A - Guidelines for Command Security Instruction. . . . . . . . . . . . . . . 2A-1 Exhibit 2B - Emergency Plan and Smergency Destruction Supplement . . . . . . . . . . . . . . .2B-1 Exhibit 2C - Security Inspection Checkliet . . . . . . 2C-1 Chaptar 3: Seourity Eduoation 3-1 Basic Policy . . . . . . . . . . . . . . . . . . . . 3-1 3-2 Responsibility . . . . . . . . . . . . . . . . . . . 3-1 3-3 Additional Information Security Education . . . . . . 3-1 Chapter 4Z classification Management 4-1 BaeicPolicy . . . . . . . . . . . . . . . . , . . .4-1 4-2 Classification Levels . . . . . . . . . . . . . . . . 4-1 4-3 Original Classification . . . . . . . . . . . . . . . 4-2 4-4 Original Classification Authority . . . . . . . . . . 4-2 4-5 Reguests for Original Classification Authority . . . . 4-2 4-6 OCATraining. . . . . . . . . . . . . . . . . . . . .4-3 SKNAVINST 5510.36 i
- Page 1 and 2: SECNAV INSTRUCTION 5510.36 CHANGE T
- Page 3 and 4: .) , DEPARTMENT OF THE NAVY &f%i$i
- Page 5: SKXAVIIWT 17MAR1999 f. Chapter 5. S
- Page 9 and 10: 6-9 6-10 6-11 6-12 6-13 6-14 6-15 6
- Page 11 and 12: SEC3?AVIIJST5510.36 17MAII1999 9-13
- Page 13 and 14: APPENDICES SKNAVINST 5510.36 IIMIR
- Page 15 and 16: SECMAV137ST 5510.S6 1? MAR 1999 b.
- Page 17 and 18: SECNAVINBT 5510.36 17MMI 1999 compl
- Page 19 and 20: 8ECNAVINST 5510.36 I7 MAR1999 2.
- Page 21 and 22: SEKNAVIEJST S51O.36 t7 M~R1999 3. T
- Page 23 and 24: SECNAVIIiST 5510.36 I7 MAR1999 (k)
- Page 25 and 26: 2-1 COMMANDING OP3UCXR CHAPTBA 2 CO
- Page 27 and 28: SECNAVINST 5510.36 17M1R !999 Devel
- Page 29 and 30: BECNAVINET 5510.36 /lM~R 1999 assig
- Page 31 and 32: 8ECNAVINBT 5510.36 I? Mill1999 for
- Page 33 and 34: OECNAVINBT 5.510.36 17MI mg (h) OPN
- Page 35 and 36: SEXl?AVIiWT 5510.36 17 M~81999 j. E
- Page 37 and 38: BECNAVIIWT 5510.36 I7 MhR1999 after
- Page 39 and 40: SECIiAVIlfST5510.36 17M1R t999 —
- Page 41 and 42: 8ECMAVINBT 5510.36 I 7 Ml 1999 YES
- Page 43 and 44: SECllAVINST 5510.36 I7.ml 1999, YES
- Page 45 and 46: SECNAVII?ST 5510.36 17 MAfI1999 YES
- Page 47 and 48: BECNAV2NBT 5510.36 Y13BNO — . —
- Page 49 and 50: BE_~V121BT 5510.36 17 MIR1999 YEB M
- Page 51 and 52: 3-1 BASIC POLICY CEAPTER 3 SECURITY
- Page 53 and 54: SBCHAVIMST 5510.36 I7 MAfl1999 disc
- Page 55 and 56: BECNAVII?8T 5510.36 17MMI 1999 a. R
TABLE OF CONT_S<br />
SECWAVIIJST 5510.36<br />
I? MMl IW9<br />
PARAGAAPH PAGE<br />
Chapter 1: Introduction to tha Information Seourity Program<br />
1-1 -ose, Applicability, and scope . . . . . . . . . . 1-1<br />
1-2 Policy Guidance . . . . . . . . . . . . . . . . . . .1-3<br />
1-3 National Authorities fOr Security Htittere . . . . . . 1-4<br />
1-4 00D Security Program 14anagsment . . . . . . . . . . . 1-5<br />
1-5 DON Security Program Management . . . . . . . . . . . 1-6<br />
Chapter 2: Command Seourity Management<br />
2-1<br />
2-2<br />
2-3<br />
2-4<br />
2-5<br />
2-6<br />
2--I<br />
2-8<br />
2-9<br />
2-1o<br />
2-11<br />
2-12<br />
2-13<br />
Commanding Officer . . . . . . . . . . . . . . . . . . 2-1<br />
Security Manager. . . . . . . . . . . . . . . . . . .2-2<br />
Top Secret Control Officer (Tsco) . . . . . . . . . . 2-4<br />
Other Security Assietante . . . . . . . . . . . . . . 2-4<br />
Security Related Collateral Duties . . . . . . . . . . 2-5<br />
Contracting Officerte Representative (COR) . . . . . . 2-6<br />
Information Systems Security Manager (ISSM) . . . . . 2-6<br />
Special Security Officer (SS0) . . . . . . . . . . . . 2-6<br />
Security Officer. . . . . . . . . . . . . . . . . . .2-7<br />
Security Servicing Agreements (SSAe) . . . . . . . . . 2-7<br />
Inspections, Aee<strong>is</strong>t Vieits, and Program Reviews . . . 2-8<br />
Forms . . . . . . . . . . . . . . . . . . . . . . . .2-0<br />
Report Control Symbols. . . . . . . . . . . . . . ..2-8<br />
Exhibit 2A - Guidelines for Command Security<br />
Instruction. . . . . . . . . . . . . . . 2A-1<br />
Exhibit 2B - Emergency Plan and Smergency Destruction<br />
Supplement . . . . . . . . . . . . . . .2B-1<br />
Exhibit 2C - Security Inspection Checkliet . . . . . . 2C-1<br />
Chaptar 3: Seourity Eduoation<br />
3-1 Basic Policy . . . . . . . . . . . . . . . . . . . . 3-1<br />
3-2 Responsibility . . . . . . . . . . . . . . . . . . . 3-1<br />
3-3 Additional Information Security Education . . . . . . 3-1<br />
Chapter 4Z classification Management<br />
4-1 BaeicPolicy . . . . . . . . . . . . . . . . , . . .4-1<br />
4-2 Classification Levels . . . . . . . . . . . . . . . . 4-1<br />
4-3 Original Classification . . . . . . . . . . . . . . . 4-2<br />
4-4 Original Classification Authority . . . . . . . . . . 4-2<br />
4-5 Reguests for Original Classification Authority . . . . 4-2<br />
4-6 OCATraining. . . . . . . . . . . . . . . . . . . . .4-3<br />
SKNAVINST 5510.36 i