Example: bachelor of science

JAFAN 6-0 MAIN DOC-REV 1-FINAL 29 MAY 08 - NCMS ISP

JAFAN 6-0, Revision 1 JOINT AIR FORCE - ARMY NAVY Manual SSSpppeeeccciiiaaalll AAAcccccceeessssss PPPrrrooogggrrraaammm SSSeeecccuuurrriiitttyyy MMMaaannnuuuaaalll --- RRReeevvviiisssiiiooonnn 111 29 May, 2008 JAFAN 6-0, Revision 1 FOREWORD This manual standardizes security guidance for all Air Force, Army and Navy (hereafter referred to as service components) special access Programs (SAPs). This manual is applicable to all service component SAPs. In cases of doubt over the requirements of this manual, users should consult the Government Program Security Officer (PSO) prior to taking any action or expending program-related funds. In cases of extreme emergency requiring immediate attention, action taken should protect the Government's interest and the security of the program from compromise.

JAFAN 6-0, Revision 1 FOREWORD This manual standardizes security guidance for all Air Force, Army and Navy (hereafter referred to as service components) Special Access Programs (SAPs).

Tags:

  Special, Access, Main, Final, Jafan, Jafan 6 0 main doc rev 1 final, Special access

Information

Domain:

Source:

Link to this page:

Please notify us if you found a problem with this document:

Other abuse

Transcription of JAFAN 6-0 MAIN DOC-REV 1-FINAL 29 MAY 08 - NCMS ISP

1 JAFAN 6-0, Revision 1 JOINT AIR FORCE - ARMY NAVY Manual SSSpppeeeccciiiaaalll AAAcccccceeessssss PPPrrrooogggrrraaammm SSSeeecccuuurrriiitttyyy MMMaaannnuuuaaalll --- RRReeevvviiisssiiiooonnn 111 29 May, 2008 JAFAN 6-0, Revision 1 FOREWORD This manual standardizes security guidance for all Air Force, Army and Navy (hereafter referred to as service components) special access Programs (SAPs). This manual is applicable to all service component SAPs. In cases of doubt over the requirements of this manual, users should consult the Government Program Security Officer (PSO) prior to taking any action or expending program-related funds. In cases of extreme emergency requiring immediate attention, action taken should protect the Government's interest and the security of the program from compromise.

2 In situations where conditions or unforeseen factors render full compliance to these standards unreasonable, the PSO may apply commensurate levels of protection. Applying commensurate protective measures to a particular SAP means that equivalent protections are being used rather than following the exact wording of this manual. Commensurate levels of protection will not be designed with the intent to reduce or lessen the security protection of the area of consideration. Within 90 days of implementing commensurate protective measures, the Government PSO will notify the service component special access Program Central Office (SAPCO) for validation and final approval. On occasion, it may be necessary to waive the requirements in this manual. Requests for waivers will be provided to the appropriate service component SAPCO for approval.

3 Adherence to the standards set forth in this manual will ensure compliance with national-level policy and allow for reciprocity between service component SAPs. At a minimum, this manual will be implemented within six months of the date of publication. All contractual documents will be amended to reflect use of this manual. Any cost impacts will be forwarded to the appropriate contracting officer and forwarded to the cognizant service component SAPCO for resolution. JOHN B. HENNESSEY Director, Security, CI, and special Programs Oversight USAF MICHAEL KOBBE Director, Technology Management Office (TMO) USA JOHN E. PIC Director, special Programs Office (CNO (N89)) USN JAFAN 6-0, Revision 1 TABLE OF CONTENTS Page CHAPTER 1. GENERAL PROVISIONS AND REQUIREMENTS Section 1.

4 Introduction 1 Section 2. General Requirements 3 Section 3. Reporting Requirements 11 CHAPTER 2. SECURITY CLEARANCES Section 1. Facility Clearances 15 Section 2. Personnel Clearances and access 15 Section 3.

5 Foreign Ownership, Control, or Influence (FOCI) & National Interest Determinations (NIDs) 20 CHAPTER 3. SECURITY TRAINING AND BRIEFINGS 28 CHAPTER 4. CLASSIFICATION AND MARKING Section 1. Classification 32 Section 2. Marking Requirements 32 CHAPTER 5. SAFEGUARDING CLASSIFIED INFORMATION Section 1. General Safeguarding Requirements 34 Section 2. Control and Accountability 34 Section 3.

6 Storage and Storage Equipment 36 Section 4. Transmission 36 Section 5. Disclosure 41 Section 6. Reproduction 42 Section 7. Disposition and Retention 42 Section 8. Construction Requirements 43 Section 9.

7 Control of Portable Electronic Devices (PEDs) 44 CHAPTER 6. VISITS AND MEETINGS Section 1. Visits 45 Section 2. Meetings 46 CHAPTER 7. SUBCONTRACTING 48 CHAPTER 8. INFORMATION ASSURANCE 49 i JAFAN 6-0, Revision 1 CHAPTER 9. INTERNATIONAL SECURITY REQUIREMENTS 50 Section 1. General and Background Information 50 Section 2. Disclosure of Information to Foreign Interests 50 Section 3. Foreign Government Information (FGI) 53 Section 4. International Transfers 55 Section 5.

8 International Visits and Control of Foreign Nationals 60 Section 6. Contractor Operations Abroad 64 Section 7. NATO Information Security Requirements 65 CHAPTER 10. MISCELLANEOUS Section 1. TEMPEST 71 Section 2. Government Technical Libraries 72 Section 3. Independent Research and Development 72 Section 4. Operations Security 72 Section 5. Counterintelligence (CI) Support 73 Section 6.

9 Decompartmentation, Disposition, and Technology Transfer Procedures 73 Section 7. Close-Out Actions 74 Section 8. Patents 74 Section 9. Telephone Security 74 Section 10. Treaty Guidance 75 APPENDICES A.

10 Handle Via special access Channels Only (HVSACO) Procedures 77 B. Standard Operating Procedures (SOP) - Topical Outline 79 C. Security Documentation Retention 85 D. Operations Security (OPSEC) Plan - Topical Outline 89 E. Inspection Readiness Planning 93 F. Security Inspection Checklist 95 G. SAP Formats 109 H. SAP NID Request Package (Sample) 134 I.


Related search queries