The DoD has released an update to its Information Security Program (DoD 5200.01 Vol 1-4).
The summaries and documents are:
Volume 2: Marking of Classified Information
Volume 3: Protection of Classified Information
Volume 4: Controlled Unclassified Information
Incoming search terms:dod 5200 01, dodm 5200 01, dod 5200, 5200 01, DODM5200 01, DOD 5200 01 V 1-4, dodm 5200 01 volumes 1-4, dodm 5200 01 vol 1-4
New release: DoD 5200.01, Volume 4 is the DoD Information Security Program: Controlled Unclassified Information (CUI) manual. Volume 4 applies to OSD, the Military Departments, the Office of the Chairman of the Joint Chiefs of Staff and the Joint Staff, the Combatant Commands, the Office of the Inspector General of the Department of Defense, the Defense Agencies, the DoD Field Activities, and all other organizational entities within the Department of Defense (hereinafter referred to collectively as the “DoD Components”). It does not alter existing authorities and responsibilities of the Director of National Intelligence (DNI) or of the heads of elements of the Intelligence Community pursuant to policies issued by the DNI.
Incoming search terms:chief tecumseh poem poster, DOD CUI Awareness, army controlled unclassified information training, cui training, dod controlled unclassified information training, controlled unclassified information army cert, cui awareness training, controlled classified information training, controlled unclassified information training army, cui training certificate, dod controlled unclassified information cert, controlled unclassified information cert
New release: DoD 5200.01, Volume 3 is the DoD Information Security Program: Protection of Classified Information manual. Volume 3 describes the DoD Information Security Program and provides guidance for safeguarding, storage, destruction, transmission, and transportation of classified information. It also identifies security education and training requirements and processes for handling of security violations and compromise of classified information. And also addresses information technology (IT) issues of which the security manager must be aware.