tazzygirl
Posts: 37833
Joined: 10/12/2007 Status: offline
|
2–1. All Army personnel Operations security is everyone’s responsibility. Failure to properly implement OPSEC measures can result in serious injury or death to our personnel, damage to weapons systems, equipment and facilities, loss of sensitive technologies and mission failure. OPSEC is a continuous process and an inherent part of military culture and as such, must be fully integrated into the execution of all Army operations and supporting activities. All Department of the Army (DA) personnel (active component, reserve component to include U.S. Army Reserve, Army National Guard, and DA civilians), and DOD contractors will— a. Know what their organization considers to be critical information, where it is located, who is responsible for it, how to protect it, and why it needs to be protected. b. Protect from disclosure any critical information and sensitive information to which they have personal access. (1) Commanders will issue orders, directives, and policies for unit or organization personnel to protect critical and sensitive information in order to clearly define the specific OPSEC measures that all personnel should practice. (2) A failure to comply with these orders, directives, or policies may be punished as violations of a lawful order under Article 92 of the Uniform Code of Military Justice (UCMJ) or under other disciplinary, administrative, or other actions as applicable. (3) Personnel not subject to the UCMJ who fail to protect critical and sensitive information from unauthorized disclosure may be subject to administrative, disciplinary, contractual, or criminal action. c. Prevent disclosure of critical and sensitive information in any public domain to include but not limited to the World Wide Web, open source publications, and the media. (1) Do not publicly disseminate, or publish photographs displaying critical or sensitive information. Examples include but are not limited to Improvised Explosive Device (IED) strikes, battle scenes, casualties, destroyed or damaged equipment, personnel killed in action (KIA), both friendly and adversary, and the protective measures of military facilities. (2) Do not publicly reference, disseminate, or publish critical or sensitive information that has already been compromised as this provides further unnecessary exposure of the compromised information and may serve to validate it. d. Implement OPSEC measures as ordered by the Commander, director, or an individual in an equivalent position. e. Actively encourage others (including family members and family readiness groups (FRGs)) to protect critical and sensitive information. f. Know who their unit, activity, or installation OPSEC Officer is and contact them for questions, concerns, or recommendations for OPSEC-related topics. g. Consult with their immediate supervisor and their OPSEC Officer for an OPSEC review prior to publishing or posting information in a public forum. (1) This includes, but is not limited to letters, resumes, articles for publication, electronic mail (e-mail), Web site postings, web log (blog) postings, discussion in Internet (2) Supervisors will advise personnel to ensure that sensitive and critical information is not to be disclosed. Each unit or organization’s OPSEC Officer will advise supervisors on means to prevent the disclosure of sensitive and critical information.h. Process, store, or transmit classified information no higher than the approved accreditation level of a DOD computer system, including all related equipment, networks and network devices (including Internet access) and removable media devices. (1) DOD computer systems may be monitored for all lawful purposes, to ensure that their use is authorized, for management of the system, to facilitate protection against unauthorized access, and to verify security procedures, survivability, and operational security. Network monitoring is done in accordance with AR 25–2 and AR 380–53. (2) Unauthorized use of a DOD computer system may subject the user to criminal prosecution. Evidence of unauthorized use collected during monitoring may be used for administrative, criminal or other adverse action. Use of a DOD computer system constitutes consent for all lawful purposes. http://www.fas.org/irp/doddir/army/ar530-1.pdf All Army personnel g. Consult with their immediate supervisor and their OPSEC Officer for an OPSEC review prior to publishing or posting information in a public forum. (1) This includes, but is not limited to letters, resumes, articles for publication, electronic mail (e-mail), Web site postings, web log (blog) postings, discussion in Internet information forums, discussion in Internet message boards or other forms of dissemination or documentation. (2) Supervisors will advise personnel to ensure that sensitive and critical information is not to be disclosed. Each unit or organization’s OPSEC Officer will advise supervisors on means to prevent the disclosure of sensitive and critical information. You seem to think the second sub section comes before the first, which is never the case. You may want to read this a little bit closer, willbe.
_____________________________
Telling me to take Midol wont help your butthurt. RIP, my demon-child 5-16-11 Duchess of Dissent 1 Dont judge me because I sin differently than you. If you want it sugar coated, dont ask me what i think! It would violate TOS.
|