dod directive 5240.06

Dod directive 5240.06

September 30,80 FR Any individual involved, or suspected of being involved, in intelligence collection on behalf of a foreign government or foreign terror organization which may harm PFPA employees, U.

Training requirements. Once the web-based training has been completed, personnel will receive an automated training certificate to their usmc. Training data includes: 1 The organization that received the web-based training, 2 The amount of personnel who completed the training, and 3 Date s of training. Threat reporting and procedures. Per enclosure 4, section 5 of reference a , personnel shall report activities, indicators, and behaviors as potential foreign intelligence threats against the Department of Defense, its personnel, information, material, facilities, and activities, or against U. Personnel are directed to report potential foreign intelligence threats to their security officer, supervisor, commander, assigned intelligence section, or G-2X within 72 hours.

Dod directive 5240.06

.

Individuals who provide information that is relevant to the case, such as victims or witnesses, and individuals who report such crimes or acts. All individuals granted access to this system of records receives annual Information Assurance and Privacy Act training, dod directive 5240.06.

.

Search over , librarian-selected resources related to homeland security policy, strategy, and organizational management. Save your search criteria and we will automatically email you a list of any matching resources added in the last week. The HSDL librarians are homeland security experts. Ask for their guidance on brief, factual, mission-related inquiries. Hamas is a Palestinian Sunni Islamist organization that is… More about the event. August , Hurricane Idalia formed from a low-pressure area across Central America and grew along the Western part of the Caribbean Sea until it became a tropical storm and received its name. The hurricane developed into a Category 4 along the Gulf of Mexico and made landfall in Southern… More about the event.

Dod directive 5240.06

This Directive: a. Lists reportable contacts, activities, indicators, and behaviors associated with foreign intelligence entities FIEs , a term that includes international terrorists. Establishes that civilian employees under their respective jurisdictions who violate specific provisions of this issuance may be subject to appropriate disciplinary action under regulations governing civilian employees. Includes reportable FIE-associated cyberspace contacts, activities, indicators, and behaviors. This Directive applies to: a. DoDD Active and reserve military personnel, as well as DoD civilian employees hereinafter referred to collectively as DoD personnel. The requirements of this Directive will be incorporated into DoD contracts, as appropriate, and made applicable to those contracts.

Universal studios hollywood costco annual pass

An exemption rule for this system has been promulgated in accordance with requirements of 5 U. For additional information contact the system manager. Also used as a management tool for statistical analysis, tracking, reporting, evaluating program effectiveness, and conducting research. While not specifically requested, the information will be retained in the record if it is deemed beneficial to the inquiry. Training data includes: 1 The organization that received the web-based training, 2 The amount of personnel who completed the training, and 3 Date s of training. Individuals who provide information that is relevant to the case, such as victims or witnesses, and individuals who report such crimes or acts. Training requirements. Security officers, supervisors, commanders, and intelligence sections are directed to forward reported threat information to their assigned G-2X, or if no G-2X is assigned to the organization, to their servicing NCIS Field Office or Resident Agency within 72 hours. Periodic security audits are maintained to document access to data. Per enclosure 4, section 5 of reference a , personnel shall report activities, indicators, and behaviors as potential foreign intelligence threats against the Department of Defense, its personnel, information, material, facilities, and activities, or against U.

.

As such, allowing individuals full exercise of the Privacy Act would compromise the existence of any criminal, civil, or administrative enforcement activity. Data Breach Remediation Purposes Routine Use: A record from a system of records maintained by a Component may be disclosed to appropriate agencies, entities, and persons when 1 The Component suspects or has confirmed that the security or confidentiality of the information in the system of records has been compromised; 2 the Component has determined that as a result of the suspected or confirmed compromise there is a risk of harm to economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other systems or programs whether maintained by the Component or another agency or entity that rely upon the compromised information; and 3 the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with the Components efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm. Individuals may voluntarily offer additional personal information in an effort to establish their identity. Data on suspect: Name; other names used former and aliases ; other identification ID numbers e. This system of records is exempt from the following provisions of 5 U. Once the web-based training has been completed, personnel will receive an automated training certificate to their usmc. An official website of the United States government Here's how you know. Disclosure of Information to the National Archives and Records Administration Routine Use: A record from a system of records maintained by a DoD Component may be disclosed as a routine use to the National Archives and Records Administration for the purpose of records management inspections conducted under authority of 44 U. Any individual involved, or suspected of being involved, in intelligence collection on behalf of a foreign government or foreign terror organization which may harm PFPA employees, U. Firewalls are in place to control the incoming and outgoing data traffic based on an applied rule set. Skip to main content Press Enter. September 30, , 80 FR Files relating to U. Congressional Inquiries Disclosure Routine Use: Disclosure from a system of records maintained by a DoD Component may be made to a congressional office from the record of an individual in response to an inquiry from the congressional office made at the request of that individual. Security officers, supervisors, commanders, and intelligence sections are directed to forward reported threat information to their assigned G-2X, or if no G-2X is assigned to the organization, to their servicing NCIS Field Office or Resident Agency within 72 hours.

0 thoughts on “Dod directive 5240.06

Leave a Reply

Your email address will not be published. Required fields are marked *