The DoD has released an update to its Information Security Program (DoD 5200.01 Vol 1-4).
The summaries and documents are:
Volume 2: Marking of Classified Information
Volume 3: Protection of Classified Information
Volume 4: Controlled Unclassified Information
Incoming search terms:dod 5200 01, dodm 5200 01, dod 5200, 5200 01, DODM5200 01, 5200 01 v1, dodm 5200 01 vol 1-4, dodm 5200 01 volume 4, dodm 5200 01 volumes 1-4, 5200 01 v1-4, dod 5200 01 vol 1, dodm 5200 01 v1
New release: DoD 5200.01, Volume 4 is the DoD Information Security Program: Controlled Unclassified Information (CUI) manual. Volume 4 applies to OSD, the Military Departments, the Office of the Chairman of the Joint Chiefs of Staff and the Joint Staff, the Combatant Commands, the Office of the Inspector General of the Department of Defense, the Defense Agencies, the DoD Field Activities, and all other organizational entities within the Department of Defense (hereinafter referred to collectively as the “DoD Components”). It does not alter existing authorities and responsibilities of the Director of National Intelligence (DNI) or of the heads of elements of the Intelligence Community pursuant to policies issued by the DNI.
Incoming search terms:chief tecumseh poem poster, DOD CUI Awareness, cui training, dod controlled unclassified information training, controlled unclassified information training army, dod controlled unclassified information cert, cui training certificate, army cui training, controlled unclassified information cert, controlled classified information training, army dod cui training, police military security cyber military army navy mail
New release: DoD 5200.01, Volume 3 is the DoD Information Security Program: Protection of Classified Information manual. Volume 3 describes the DoD Information Security Program and provides guidance for safeguarding, storage, destruction, transmission, and transportation of classified information. It also identifies security education and training requirements and processes for handling of security violations and compromise of classified information. And also addresses information technology (IT) issues of which the security manager must be aware.