Department of the Army Information Security Program
Total Page:16
File Type:pdf, Size:1020Kb
Army Regulation 380–5 Security Department of the Army Information Security Program Headquarters Department of the Army Washington, DC 29 September 2000 UNCLASSIFIED SUMMARY of CHANGE AR 380–5 Department of the Army Information Security Program This revision-- o Emphasizes the responsibilities of Headquarters Department of the Army, the Commander, the Command Security Manager, the Supervisor, and the Individual (chap 1). o Updates information relating to Restricted Data, Formerly Restricted Data, Sensitive Compartmented Information, Communications Security Information, and Special Access Program Information (chap 1). o Expands and clarifies exceptional situations and waivers (chap 1). o Specifies the process for applying original classification (chap 2). o Removes the declassification statement Originating Officials Determination Required or “OADR” (para 2-11). o Changes the distribution process for security classification guides (para 2- 18). o Outlines the procedures for challenges to classification (para 2-22). o Updates information regarding the Army Declassification Program (chap 3). o Updates information relating to the deadline for automatic declassification, adding an additional 18 months (para 3-5). o Gives clearer information in regards to destruction, declassification, purging, and clearing (chap 3). o Replaces the statement “US ONLY” with “NOFORN” (para 4-6). o Updates Warning Notices for printed documents and those on Automated Information Systems (para 4-12). o Lists the obsolete restrictions and control markings (para 4-13). o Outlines the requirements relating to For Official Use Only (FOUO) information (chap 5). o Replaces the statement “Limited Official Use” with “Sensitive But Unclassified” (para 5-7). o Outlines the requirements relating to Drug Enforcement Administration Sensitive Information (chap 5). o Outlines the requirements relating to Department of Defense Unclassified Controlled Nuclear Information (chap 5). o Outlines the requirements relating to sensitive information and the Computer Security Act of 1987 (chap 5). o Outlines the requirements relating to distribution statements on scientific and technical documents (para 5-24). o Outlines the requirements regarding the SF 312 (Classified Information Nondisclosure Agreement (NDA) (chap 6). o Explains the requirements to access Department of the Army classified information by individuals or agencies outside the Executive Branch (para 6- 8). o Adds guidance to the use of speakerphones (para 6-14). o Updates guidance on classified meetings, conferences, and acquisition meetings (para 6-18). o Removes the requirement for the Entry/Exit Inspection Program and the Two- Person Integrity Program (para 6-36). o Updates the federal specifications for locks (para 7-4). o Updates procedures for handcarrying of classified material (chap 8). o Outlines requirements for transportation plans (para 8-7). o Emphasizes annual refresher training requirements for the security education program (para 9-7). o Rescinds DA Form 2134 (Security Violation(s) Report) (para 10-3). o Updates security controls on dissemination and marking of warning notices on intelligence information to include the latest version of Director of Central Intelligence Directive 1/7 (app D). o Addresses security procedures for documents created for and on automated information systems and Internet web-based display (app E). o Updates the Management Control Evaluation Checklist (app F, section I). o Lists and describes the modern army recordkeeping system file numbers associated with this Regulation (app F, section II). o Updates information of Special Access Programs (app I). o Updates the abbreviations and terminology lists (glossary). Headquarters *Army Regulation 380–5 Department of the Army Washington, DC 29 September 2000 Effective 31 October 2000 Security Department of the Army Information Security Program the policy for classification, downgrading, This regulation contains management con- declassification, and safeguarding of in- trol provisions and identifies key manage- formation requiring protection in the inter- ment controls that must be evaluated. est of national security. Applicability. This regulation applies to S u p p l e m e n t a t i o n . S u p p l e m e n t a t i o n o f all military and civilian members of the this regulation is permitted at command Active Army, Army National Guard of option, but is not required. the United States (ARNGUS), and U.S. Army Reserve (USAR) and Department Suggested Improvements. Users are of the Army (DA) personnel. During mo- invited to send comments and suggestions bilization, chapters and policies contained o n D A F o r m 2 0 2 8 , R e c o m m e n d e d in this regulation may be modified by the Changes to Publications and Blank Forms, proponent. t h r o u g h c o m m a n d c h a n n e l s t o H Q D A Proponent and exception authority. D C S I N T ( D A M I – C H ) , 2 5 1 1 J e f f e r s o n The proponent of this regulation is the Davis Highway, Suite #9300, Arlington, H i s t o r y . T h i s p u b l i c a t i o n p u b l i s h e s a D e p u t y C h i e f o f S t a f f f o r I n t e l l i g e n c e . VA 22209–3910. r e v i s i o n o f t h i s p u b l i c a t i o n . B e c a u s e t h e The Deputy Chief of Staff for Intelligence p u b l i c a t i o n h a s b e e n e x t e n s i v e l y r e v i s e d , has the authority to approve exceptions to Distribution. This publication is availa- t h e c h a n g e d p o r t i o n s h a v e n o t b e e n t h i s r e g u l a t i o n t h a t a r e c o n s i s t e n t w i t h ble in electronic media only and is in- highlighted. c o n t r o l l i n g l a w a n d r e g u l a t i o n , a n d a s tended for command levels A, B, C, D, S u m m a r y . T h i s r e g u l a t i o n i m p l e m e n t s stated in this regulation. Paragraph 1–20 and E for the Active Army, the Army the policy set forth in Executive Order (E. of this regulation further delineates waiver N a t i o n a l G u a r d , a n d t h e U . S . A r m y O.) 12958, “Classified National Security and exception to policy authority. Reserve. I n f o r m a t i o n ” , A p r i l 1 7 , 1 9 9 5 , w i t h Army management control process. amendments, and DOD 5200.1–R, “Infor- mation Security Program.” It establishes Contents (Listed by paragraph and page number) Chapter 1 General Provisions and Program Management, page 2 Section I Introduction, page 1 Purpose • 1–1, page 1 References • 1–2, page 1 Explanation of abbreviations and terms • 1–3, page 1 Section II Responsibilities, page 1 Secretary of the Army • 1–4, page 1 Headquarters Department of the Army (HQDA) • 1–5, page 1 The Commander • 1–6, page 2 The Command Security Manager • 1–7, page 2 The Supervisor • 1–8, page 3 *This regulation supersedes AR 380–5, 25 February 1988; AR 380–150, 15 September 1982; AR 381–1, 12 February 1990; DA Pamphlet 380–1, 23 March 1990, and rescinds DA Form 2134, Security Violation(s) Report, January 1983. AR 380–5 • 29 September 2000 i UNCLASSIFIED Contents—Continued The Individual • 1–9, page 3 Section III Program Management, page 4 Applicability definition • 1–10, page 4 General principles • 1–11, page 4 Legal authority • 1–12, page 4 Recordkeeping Requirements • 1–13, page 4 Section IV Program Direction, page 4 Background • 1–14, page 4 Information Security Oversight Office Responsibility • 1–15, page 5 Section V Special Types of Information, page 5 Atomic Energy Information (Restricted Data (RD)/Formerly Restricted Data (FRD)) • 1–16, page 5 Sensitive Compartmented Information, Communications Security Information, and Special Access Programs Information • 1–17, page 5 Section VI Exceptional Situations, page 5 Military Operations, Exercises, and Unit Deactivations • 1–18, page 5 Waivers and Exceptions to Policy • 1–19, page 5 Section VII Corrective Actions and Sanctions, page 6 General • 1–20, page 6 Sanctions • 1–21, page 6 Reporting of Incidents • 1–22, page 6 Section VIII Reports, page 7 Reporting Requirements • 1–23, page 7 Command security inspections • 1–24, page 7 Chapter 2 Classification, page 7 Section I Classification Principles, page 7 Original vs. derivative classification • 2–1, page 7 Policy • 2–2, page 8 Delegation of authority • 2–3, page 8 Required Training • 2–4, page 8 Section II Derivative Classification, page 8 Policy • 2–5, page 8 Accuracy responsibilities • 2–6, page 8 Section III The Original Classification Process, page 9 General • 2–7, page 9 Classification criteria • 2–8, page 9 Possibility of Protection • 2–9, page 9 ii AR 380–5 • 29 September 2000 Contents—Continued Levels of classification • 2–10, page 10 Duration of classification • 2–11, page 10 Communicating the Classification Decision • 2–12, page 11 Compilation • 2–13, page 11 Acquisition Systems • 2–14, page 11 Limitations and prohibitions • 2–15, page 11 Section IV Security Classification Guides, page 12 Policy • 2–16, page 12 Content • 2–17, page 12 Approval, distribution, and indexing • 2–18, page 12 Review, revision, and cancellation • 2–19, page 12 Section V Non–Government Information, page 13 Policy • 2–20, page 13 Classification determination • 2–21, page 13 Classification challenges • 2–22, page 14 Chapter 3 Declassification, Regrading, and Destruction, page 15 Section I Army Declassification Program, page 15 General • 3–1, page 15 Special Program Manager • 3–2, page 15 Declassification of Restricted Data and Formerly Restricted Data • 3–3, page 15 Declassification of other than Army information • 3–4, page 15 Section II The Automatic Declassification System, page 16 General