Upload
juan-sebastian-romero
View
54
Download
10
Embed Size (px)
Citation preview
Classified information 1
Classified information
A typical classified document. Page 13 of a U.S.National Security Agency report[1] on the USS
Liberty incident, partially declassified andreleased to the public in July 2004. The originaloverall classification of the page, "top secret",
and the Special Intelligence code word "umbra,"are shown at top and bottom. The classification of
individual paragraphs and reference titles isshown in parentheses - there are six different
levels on this page alone. Notations with leaderlines at top and bottom cite statutory authority for
not declassifying certain sections.
Classified information is a categorization applied to information thata government claims is sensitive information. Access is restricted bylaw or regulation to particular groups of persons. A formal securityclearance is often required to handle classified documents or accessclassified data. The clearance process requires a satisfactorybackground investigation. There are typically several levels (classes) ofsensitivity, with differing clearance requirements. This sort ofhierarchical system of secrecy is used by virtually every nationalgovernment. The act of assigning the level of sensitivity to data iscalled data classification. Although the root sense of the word"classified" is simply synonymous with "categorized", it has developeda sense synonymous with "censored" in the context of classifiedinformation.
A distinction could be made between formal security classification andprivacy markings such as "Commercial in confidence".Some corporations and non-government organizations also assignsensitive information to multiple levels of protection, either from adesire to protect trade secrets, or because of laws and regulationsgoverning various matters such as personal privacy, sealed legalproceedings and the timing of financial information releases.
Government classification
The purpose of classification is to protect information from being usedto damage or endanger national security. Classification formalises whatconstitutes a "state secret" and accords different levels of protection based on the expected damage the informationmight cause in the wrong hands.
However, classified information is frequently 'leaked' to reporters by officials for political purposes. Several USpresidents have leaked sensitive information to get their point across to the public.[2][3]
Classification levelsAlthough the classification systems vary from country to country, most have levels corresponding to the followingBritish definitions (from the highest level to lowest)
Top Secret (TS)
The highest level of classification of material on a national level. Such material would cause "exceptionally gravedamage" to national security if made publicly available.
Secret
It is desired that no document be released which refers to experiments with humans and might have adverse effect on publicopinion or result in legal suits. Documents covering such work field should be classified `secret.
April 17, 1947 Atomic Energy Commission memo from Colonel O.G. Haywood, Jr. to Dr. Fidler at the Oak Ridge Laboratory inTennessee[4]
Classified information 2
Such material would cause "serious damage" to national security if it were publicly available.
Confidential
Such material would cause "damage" or be "prejudicial" to national security if publicly available.
Restricted
Such material would cause "undesirable effects" if publicly available. Some countries do not have such aclassification.
Unclassified
Technically not a classification level, but is used for government documents that do not have a classification listedabove. Such documents can sometimes be viewed by those without security clearance.There are a plethora of pseudo-classifications under this category. Please see the articles on Sensitive butunclassified and Controlled Unclassified Information for more information. Some government prosecutors haveretro-actively changed unclassified information into classified information after charging someone with a crime; seethe Thomas Andrews Drake case for example.
ClearanceDepending on the level of classification there are different rules controlling the level of clearance needed to viewsuch information, and how it must be stored, transmitted, and destroyed. Additionally, access is restricted on a "needto know" basis. Simply possessing a clearance does not automatically authorize the individual to view all materialclassified at that level or below that level. The individual must present a legitimate "need to know" in addition to theproper level of clearance.
Compartmented informationIn addition to the general risk-based classification levels above, often there are additional constraints on access, suchas (in the U.S.) Special Intelligence (SI), which protects intelligence sources and methods, No Foreign dissemination(NOFORN), which restricts dissemination to U.S. nationals, and Originator Controlled dissemination (ORCON),which ensures that the originator can track possessors of the information. Documents in some compartments aremarked with specific "code words" in addition to the classification level.
Nuclear informationGovernment information about nuclear weapons such as nuclear warheads often has an additional marking to show itcontains such information.
Sharing classified information between countriesWhen a government agency or group shares information between an agency or group of other countrys governmentthey will generally employ a special classification scheme that both parties have previously agreed to honour.For example the marking ATOMAL, is applied to U.S. RESTRICTED DATA or FORMERLY RESTRICTEDDATA and United Kingdom ATOMIC information that has been released to NATO. ATOMAL information ismarked COSMIC TOP SECRET ATOMAL (CTSA), NATO SECRET ATOMAL (NSAT), or NATOCONFIDENTIAL ATOMAL (NCA).In cases where a country wishes to share classified information bilaterally (or multilaterally) with a country that hasa sharing agreement, the information is with the countries it can be shared with. Those countries would have tomaintain the classification of the document at the level originally classified (TOP-SECRET, SECRET, etc.) with theappropriate caveat (USNZ, AUSGE, CANUK, etc.).
Classified information 3
NATO classifications
For example, sensitive information shared amongst NATO allies has four levels of security classification; from mostto least classified:1.1. COSMIC TOP SECRET (CTS),2.2. NATO SECRET (NS),3.3. NATO CONFIDENTIAL (NC), and4.4. NATO RESTRICTED (NR).A special case exists with regard to NATO UNCLASSIFIED (NU) information. Documents with this marking isNATO property (copyright) and must not be made public without NATO permission. In general documents with thisclassification, aren't cleared for internet-transmission either, unless clearly marked with RELEASABLE FORINTERNET TRANSMISSION. Documents that can be made public however, should be clearly marked with NONSENSITIVE INFORMATION RELEASABLE TO THE PUBLIC.In addition to the above classification levels NATO operates with1.1. COSMIC TOP SECRET - AThis level is given to people who need to have access to the joined Atomic program of NATO. This level is nevergiven permanently to anyone, regardless of jobtitle - e.g. President of the U.S.A. etc. It is only given for short periodsof time, when needed.
International organisations
European Commission, has 5 levels, EU TOP SECRET, EU SECRET, EU CONFIDENTIAL, EURESTRICTED, and EU COUNCIL / COMMISSION.[5] (Note that usually the French term is used)
OCCAR, a European defence organisation, has three levels of classification: OCCAR SECRET, OCCARCONFIDENTIAL, OCCAR RESTRICTED.[6]
By country
Facsimile of the cover page from an East Germanoperation manual for the M-125 Fialka cipher
machine. The underlined classification markingscan be translated as "Cryptologic material! Secret
classified material" de:Verschlusssache.
Most countries employ some sort of classification system for certaingovernment information. For example, in Canada, information that theU.S. would classify SBU (Sensitive but Unclassified) is called"protected" and further subcategorised into levels A, B, and C.
Australia
On 19 July 2011, the National Security (NS) classification markingscheme and the Non-National Security (NNS) classification markingscheme in Australia was unified into one structure.
The Australian Government Security Classification system nowcomprises TOP SECRET, SECRET, CONFIDENTIAL andPROTECTED. A new dissemination limiting markers (DLMs) schemewas also introduced for information where disclosure may be limitedor prohibited by legislation, or where it may otherwise require specialhandling. The DLM marking scheme comprises For Official Use Only(FOUO), Sensitive, Sensitive: Personal, Sensitive: Legal, and SensitiveCabinet. [7]
Documents marked Sensitive Cabinet, relating to discussions inFederal Cabinet, are treated as PROTECTED at minimum due to itshigher sensitivity.
Classified information 4
Background checks for access to TOP SECRET material are carried out at either of two levels: at TOP SECRETNEGATIVE VETTING (TSNV), or at the more stringent and expensive TOP SECRET POSITIVE VETTING(TSPV) level, depending on the extent of required access to TOP SECRET material and on the potential damage tonational security should such material be disclosed to unauthorised parties. Most background checks for access toTOP SECRET material are carried out at the TOP SECRET NEGATIVE VETTING level.
Brazil
In Brazil, a top secret (Ultrassecreto) government-issued document may be classified for a period of 25 years, whichmay be extended up to another 25 years. Thus, no document remains classified for more than 50 years. This ismandated by the 2011 Information Access Law (Lei de Acesso Informao), a change from the previous rule,under which documents could have their classification time length renewed indefinitely, effectively shuttering statesecrets from the public. The new law applies retroactively to existing documents.
Canada
Background and hierarchy
There are 2 main type of sensitive information designation used by the Government of Canada: Classified andDesignated. The access and protection of both types of information is governed by the Security of Information Act,effective December 24, 2001, replacing the Official Secrets Act 1981.[8] To access the information, a person musthave the appropriate level of clearance and a Need to know.
Special operational information
SOI is not a classification of data per se. It is defined under the Security of Information Act, and unauthorised releaseof such information constitutes a higher breach of trust, with penalty of life imprisonment.SOIs include: military operations in respect of a potential, imminent or present armed conflict the identity of confidential source of information, intelligence or assistance to the Government of Canada tools used for information gathering or intelligence the object of a covert investigation, or a covert collection of information or intelligence the identity of any person who is under covert surveillance encryption and cryptographic systems information or intelligence to, or received from, a foreign entity or terrorist group
Classified information
Classified information can be designated Top Secret, Secret or Confidential. These classifications are only used onmatters of national interest. Top Secret: This applies when compromise might reasonably cause exceptionally grave injury to the national
interest. The possible impact must be great, immediate and irreparable. Secret: This applies when compromise might reasonably cause serious injury to the national interest. Confidential: When disclosure might reasonably cause injury to the national interest.
Classified information 5
Designated information
Designated information is not classified. Designated information pertains to any sensitive information that does notrelate to national security and cannot be disclosed under the access and privacy legislation because of the possibleinjury to particular public or private interests.[9][10]
Protected C (Extremely Sensitive designated information): is used to protect extremely sensitive information ifcompromised, could reasonably be expected to cause extremely grave injury outside the national interest.Examples could include bankruptcy, identities of informants in criminal investigations, etc.
Protected B (Particularly Sensitive designated information): is used to protect information that could cause severeinjury or damage to the people or group involved if it was released. Examples include medical records, annualpersonnel performance reviews, etc.
Protected A (Low-Sensitive designated information): is applied to low sensitivity information that should not bedisclosed to the public without authorisation and could reasonably be expected to cause injury or embarrassmentoutside the national interest. Example of Protected A information could include employee number, pay depositbanking information, etc.
Federal Cabinet (Queen's Privy Council for Canada) papers are either designated (i.e. overhead slides prepared tomake presentations to Cabinet) or classified (draft legislations, certain memos).[11]
People's Republic of China
A building in Wuhan housing provincial officesfor dealing with foreign countries etc. The redslogan says, "Protection of national secrets is a
duty of every citizen"
The Criminal Law of the People's Republic of China (which is notoperative in the Special Administrative Regions of Hong Kong andMacao) makes it a crime to release a state secret. Regulation andenforcement is carried out by the National Administration for theProtection of State Secrets.
Under the 1989 "Law on Guarding State Secrets,"[12] state secrets aredefined as those that concern:
1.1. Major policy decisions on state affairs;2.2. The building of national defence and in the activities of the armed
forces;3.3. Diplomatic activities and in activities related to foreign countries
and those to be maintained as commitments to foreign countries;4.4. National economic and social development;5.5. Science and technology;6.6. Activities for preserving state security and the investigation of criminal offences; and7. Any other matters classified as "state secrets" by the national State Secrets Bureau.[13]
Secrets can be classified into one of three categories:
Top secret ( ): Defined as "vital state secrets whose disclosure would cause extremely serious harm to statesecurity and national interests";
Highly secret ( ): Defined as "important state secrets whose disclosure would cause serious harm to statesecurity and national interests"; and
Secret ( ): Defined as "ordinary state secrets whose disclosure would cause harm to state security andnational interests".[13]
Classified information 6
France
In France, classified information defined by article 413-9 of the Penal Code.[14] The three levels of militaryclassification are Confidentiel Dfense (Confidential Defence): Information deemed potentially harmful to national defence, or that
could lead to uncovering an information classified at a higher level of security. Secret Dfense (Secret Defence): Information deemed very harmful to national defence. Such information cannot
be reproduced without authorisation from the emitting authority, except in exceptional emergencies. Trs Secret Dfense (Very Secret Defence): Information deemed extremely harmful to national defence, and
relative to governmental priorities in national defence. No service or organisation can elaborate, process, stock,transfer, display or destroy information or protected supports classified at this level without authorisation from thePrime Minister or the national secretary for National Defence. Partial or exhaustive reproduction is strictlyforbidden.
Less sensitive information is "protected". The levels are Non Protg (unprotected) Diffusion restreinte administrateur ("administrative restricted information") Diffusion restreinte ("restricted information") Confidentiel personnels Sous-Officiers ("Confidential non-commissioned officers") Confidentiel personnels Officiers ("Confidential officers")A further mention, "spcial France" (reserved France) restricts the document to French citizens (in its entirety or byextracts). This is not a classification level.Declassification of documents can be done by the Commission consultative du secret de la dfense nationale(CCSDN), an independent authority. Transfer of classified information is done with double envelopes, the outerlayer being plastified and numbered, and the inner in strong paper. Reception of the document involves examinationof the physical integrity of the container and registration of the document. In foreign countries, the document mustbe transferred through specialised military mail or diplomatic bag. Transport is done by an authorised convoyer orhabilitated person for mail under 20kg. The letter must bear a seal mentioning "PAR VALISEACCOMPAGNEE-SACOCHE". Once a year, ministers have an inventory of classified information and supports bycompetent authorities.Once their usage period is expired, documents are transferred to archives, where they are either destroyed (byincineration, crushing or electrical overtension), or stored.In case of unauthorized release of classified information, competent authorities are the Ministry of Interior, the Hautfonctionnaire de dfense et de scurit ("high civil servant for defence and security") of the relevant ministry, andthe General secretary for National Defence. Violation of such secrets is an offence punishable with 7 years ofimprisonment and a 100000 Euro fine; if the offence is committed by imprudence or negligence, the penalties are 3years of imprisonment and a 45000 Euro fine.
Classified information 7
Hong Kong
The Security Bureau is responsible for developing policies in regards to the protection and handling of confidentialgovernment information. In general, the system used in Hong Kong is very similar to the UK system, developedfrom the Colonial Hong Kong era.Four classifications exists in Hong Kong, from highest to lowest in sensitivity:[15]
Top Secret ( ) Secret ( ) Confidential ( )
Temporary Confidential ( ) Restricted ( / )
Restricted (staff) ( ( )) Restricted (tender) ( ( )) Restricted (administration) ( ( ))
Restricted documents are not classified per se, but only those who have a need to know will have access to suchinformation, in accordance with the Personal Data (Privacy) Ordinance.[16]
New Zealand
New Zealand uses the Restricted classification, which is lower than Confidential. People may be given access toRestricted information on the strength of an authorisation by their Head of Department, without being subjected tothe background vetting associated with Confidential, Secret and Top Secret clearances. New Zealand's securityclassifications and the national-harm requirements associated with their use are roughly similar to those of theUnited States.In addition to national security classifications there are two additional security classifications, In Confidence andSensitive, which are used to protect information of a policy and privacy nature. There are also a number ofinformation markings used within ministries and departments of the government, to indicate, for example, thatinformation should not be released outside the originating ministry.Because of strict privacy requirements around personal information, personnel files are controlled in all parts of thepublic and private sectors. Information relating to the security vetting of an individual is usually classified at the InConfidence level.
Russian Federation
In the Russian Federation, a state secret ( ) is information protected by the state on itsmilitary, foreign policy, economic, intelligence, counterintelligence, operational and investigative and otheractivities, dissemination of which could harm state security.
Sweden
The Swedish classification has been updated due to increased NATO/PfP cooperation. All classified defencedocuments will now have both a Swedish classification (Kvalificerat Hemlig or Hemlig), and an Englishclassification (Top Secret, Secret, Confidential, or Restricted).
Classified information 8
United Kingdom
The United Kingdom currently uses five levels of classification from lowest to highest, they are: PROTECT,RESTRICTED, CONFIDENTIAL, SECRET and TOP SECRET (formerly MOST SECRET). Those working withsuch material should have the relevant security clearance and often are required to sign to confirm theirunderstanding and acceptance of the Official Secrets Acts 1911 to 1989, although the Act applies in the same wayregardless of signature. PROTECT is not in itself a security protective marking level (such as RESTRICTED orgreater), but is used to indicate information which should not be disclosed because, for instance, the documentcontains tax, or national insurance or other personal information.Government documents without a classification may be marked as UNCLASSIFIED or NOT PROTECTIVELYMARKED.[17]
United States
The U.S. classification system is currently established under Executive Order 13292 and has three levels ofclassification Confidential, Secret, and Top Secret. The U.S. had a Restricted level during World War II but nolonger does. U.S. regulations state that information received from other countries at the Restricted level should behandled as Confidential. A variety of markings are used for material that is not classified, but whose distribution islimited administratively or by other laws, e.g., For Official Use Only (FOUO), or Sensitive but Unclassified (SBU).The Atomic Energy Act of 1954 provides for the protection of information related to the design of nuclear weapons.The term "Restricted Data" is used to denote certain nuclear technology. Information about the storage, use orhandling of nuclear material or weapons is marked "Formerly Restricted Data." These designations are used inaddition to level markings (Confidential, Secret and Top Secret). Information protected by the Atomic Energy Act isprotected by law and information classified under the Executive Order is protected by Executive privilege.
Table of equivalent classification markings in various countries
(State) Top Secret Secret Confidential Restricted
Albania Teper Sekret Sekret Konfidencial I Kufizuar
Argentina Estrictamente Secreto yConfidencial
Secreto Confidencial Reservado
Australia Top Secret Secret Confidential Protected
Austria Streng Geheim Geheim Vertraulich Eingeschrnkt
Belgium (Dutch) Zeer Geheim Geheim Vertrouwelijk Beperkte Verspreiding
Belgium (French) Trs Secret Secret Confidentiel Diffusion restreinte
Bolivia Supersecretoor Muy Secreto
Secreto Confidencial Reservado
Bosnia andHerzegovina
Strogo povjerljivo Tajno Konfidencialno Restiktirano
Brazil Ultra Secreto Secreto Confidencial Reservado
Bulgaria
Cambodia Sam Ngat Bamphot Sam Ngat Roeung Art Kambang Ham Kom Psay
Canada Top Secret/Trs secret Secret/Secret Confidential/Confidentiel Protected A, B or C /Protg A, B ou C
Chile Secreto Secreto Reservado Reservado
China, People'sRepublic of
Jum ( ) Jm ( ) Mm ( ) Nib ( )
Classified information 9
China, Republic of "Absolutely" Secret ( )
"Extremely" Secret( )
Secret ( ) no direct equivalent
Colombia Ultrasecreto Secreto Confidencial Reserva del sumario
Costa Rica Alto Secreto Secreto Confidencial
Croatia Vrlo tajno Tajno Povjerljivo Ogranieno
Czech Republic Psn tajn Tajn Dvrn Vyhrazen
Denmark Yderst Hemmeligt Hemmeligt Fortroligt Til TjenestebrugForeign Service:Fortroligt(thin Black border)
Ecuador Secretisimo Secreto Confidencial Reservado
Egypt Sirriy lil-yah
Sirriy iddan
Kh
Mazr
El Salvador Ultra Secreto Secreto Confidencial Reservado
Estonia Tiesti salajane Salajane Konfidentsiaalne Piiratud
Ethiopia Yemiaz Birtou Mistir Mistir Kilkil
European Union (EU) TRES SECRET UE / EUTOP SECRET
SECRET UE / EUSECRET
CONFIDENTIEL UE / EUCONFIDENTIAL
RESTREINT UE / EURESTRICTED
European Union(Western) (WEU)
FOCAL TOP SECRET WEU SECRET WEU CONFIDENTIAL WEU RESTRICTED
Euratom EURA TOP SECRET EURA SECRET EURA CONFIDENTIAL EURA RESTRICTED
Finland Erittin salainen (TLL I) Salainen (TLL II) Luottamuksellinen (TLL III) Viranomaiskytt (TLLIV)
France Trs secret dfense Secret dfense Confidentiel dfense Diffusion restreinte
Germany Streng Geheim Geheim VS-Vertraulich VS-Nur fr denDienstgebrauch
Greece
Guatemala Alto Secreto Secreto Confidencial Reservado
Haiti Top Secret Secret Confidential Reserve
Honduras Super Secreto Secreto Confidencial Reservado
Hong Kong Top Secret, Secret, Confidential, Restricted, /
Hungary Szigoran Titkos Titkos Bizalmas Korltozott Terjeszts
India (Hindi) (Param Gupt) (Gupt) (Gopniya) /(Pratibandhit/seemit)
India (English) Top Secret Secret Confidential Restricted
Indonesia Sangat Rahasia Rahasia Rahasia Dinas Terbatas
Iran Fararaz Raz Sar-be-moher Sarbaste
Iraq Sirriy lil-yah
Sirriy
Kh
Madd
Iceland Algert Leyndarml Leyndarml Trnaarml jnustuskjal
Ireland (Irishlanguage)
An-sicreideach Sicreideach Runda Srianta
Classified information 10
Israel Sodi Beyoter
Sodi
Shamur
Mugbal
Italy Segretissimo Segreto Riservatissimo Riservato
Japan Kimitsu, Gokuhi, Hi, Toriatsukaichuui,
Jordan Maktm iddan
Maktm
Sirriy
Madd
Korea, South I(Il)-Kup Bi Mil, 1 II(I)-Kup Bi Mil,2
III(Sam)-Kup Bi Mil, 3 Dae Woi Bi,
Korea, North Unknown, Unknown, Unknown, Unknown,
Laos Lup Sood Gnod Kuam Lup Kuam Lap Chum Kut Kon Arn
Latvia Sevii slepeni Slepeni Konfidencili Dienesta vajadzbm
Lebanon Tres Secret Secret Confidentiel
Lithuania Visikai Slaptai Slaptai Konfidencialiai Riboto Naudojimo
Malaysia Rahsia Besar Rahsia Sulit Terhad
Mexico Ultra Secreto Secreto Confidencial Restringido
Montenegro Strogo Tajno Tajno Povjerljivo Interno
Netherlands[18] STG. Zeer Geheim STG. Geheim STG. Confidentieel DepartementaalVertrouwelijk
New Zealand Top Secret Secret Confidential Restricted
Nicaragua Alto Secreto Secreto Confidencial Reservado
Norway STRENGT HEMMELIG HEMMELIG KONFIDENSIELT BEGRENSET
Pakistan (Urdu) Intahai Khufia Khufia Sigh-e-Raz Barai Mahdud Taqsim
Pakistan (English) Top Secret Secret Confidential Restricted
Paraguay Secreto Secreto Confidencial Reservado
Peru Estrictamente Secreto Secreto Confidencial Reservado
Philippines Top Secret Secret Confidential Restricted
Poland cile tajne Tajne Poufne Zastrzeone
Portugal Ultra Secreto Secreto Confidencial Reservado
Romania Strict Secret de ImportanDeosebit
Strict Secret Secret Secret de serviciu
Russia (: (SovershennoSekretno))
(: (Sekretno))
(: () (Ne podlezhitoglasheniyu (Konfidentsial'no))
()(Dlya SluzhebnogoPol'zovaniya)
Saudi Arabia Saudi Top Secret Saudi Very Secret Saudi Secret Saudi Restricted
Serbia Latin: Dravna tajnaCyrillic:
Latin: StrogopoverljivoCyrillic:
Latin: PoverljivoCyrillic: o
Latin: InternoCyrillic:
Singapore Top Secret Secret Confidential Restricted
Slovak Republic Prsne tajn Tajn Dvern Vyhraden
Slovenia Strogo tajno Tajno Zaupno Interno
Classified information 11
Spain Secreto Reservado Confidencial Difusin Limitada
Sweden Kvalificerat Hemlig (KH);Hemlig/Top Secret (H/TS)
Hemlig (H);Hemlig/Secret H/S)
Hemlig/Confidential (H/C) Hemlig/Restricted (H/R)
Switzerland Geheim / Secret Vertraulich / Confidentiel Dienstlich / Interne auservice
Tanzania (Swahili) SIRI KUU SIRI STIRI IMEZUILIWA
Thailand Lap thi sut () Lap mak () Lap () Pok Pid ()Turkey ok Gizli Gizli zel Hizmete zel
South Africa(English)
Top Secret Secret Confidential Restricted
South Africa(Afrikaans)
Uiters Geheim Geheim Vertroulik Beperk
Ukraine
United Kingdom TOP SECRET SECRET CONFIDENTIAL RESTRICTED
United States Top Secret Secret Confidential For Official Use Only
Uruguay Ultra Secreto Secreto Confidencial Reservado
Vietnam Tuyt Mt Ti Mt Mt Ph Bin Hn Ch
Original source: NISPOM Appendix B[19] In addition, Finland uses label Salassa pidettv, "to be kept secret" forinformation that is not classified but must not be revealed on some other basis than national security. (E.g. privacy,trade secrets etc.)
Corporate classificationPrivate corporations often require written confidentiality agreements and conduct background checks on candidatesfor sensitive positions.[20] In the U.S. the Employee Polygraph Protection Act prohibits private employers fromrequiring lie detector tests, but there are a few exceptions. Policies dictating methods for marking and safeguardingcompany-sensitive information (e.g. "IBM Confidential") are common and some companies have more than onelevel. Such information is protected under trade secret laws. New product development teams are often sequesteredand forbidden to share information about their efforts with un-cleared fellow employees, the original AppleMacintosh project being a famous example. Other activities, such as mergers and financial report preparationgenerally involve similar restrictions. However, corporate security generally lacks the elaborate hierarchicalclearance and sensitivity structures and the harsh criminal sanctions that give government classification systems theirparticular tone.
Classified information 12
Traffic Light ProtocolThe Traffic Light Protocol[21][22] was developed by the G8 countries to enable the sharing of sensitive informationbetween government agencies and corporations. This protocol has now been accepted as a model for trustedinformation exchange by over 30 other countries. The protocol provides for four "information sharing levels" for thehandling of sensitive information.
References[1] http:/ / www. nsa. gov/ public_info/ _files/ uss_liberty/ attack_sigint. pdf[2][2] Burn Before Reading, Stansfield Turner, 2006[3] Classified Information in Woodwards Obamas Wars (http:/ / stephenkim. org/ 2011/ 09/ 03/
classified-information-in-woodwards-obamas-wars/ ), September 29, 2010, Jack Goldsmith, Lawfare, via stephenkim.org[4] Atomic Energy Commission's Declassification Review of Reports on Human Experiments and the Public Relations and Legal Liability
Consequences (https:/ / www. gwu. edu/ ~nsarchiv/ radiation/ dir/ mstreet/ commeet/ meet9/ brief9/ tab_i/ br9i2. txt), presented as evidenceduring the 1994 ACHRE hearings.
[5] http:/ / ec. europa. eu/ transparency/ access_documents/ docs/ guide_citoyen/ en. pdf[6] http:/ / www. fco. gov. uk/ Files/ kfile/ 306652_CM6554. pdf[7] http:/ / www. ag. gov. au/ www/ agd/ rwpattach. nsf/ VAP/ (689F2CCBD6DC263C912FB74B15BE8285)~Australian+ Government+
information+ security+ management+ guidelines-+ Australian+ Government+ Security+ classification+ system. pdf/ $file/ Australian+Government+ information+ security+ management+ guidelines-+ Australian+ Government+ Security+ classification+ system. pdf
[8] Security of Information Act (http:/ / www. csis-scrs. gc. ca/ en/ newsroom/ backgrounders/ backgrounder12. asp)[9] Non-Insured Health Benefits Program Privacy Code (http:/ / www. hc-sc. gc. ca/ fniah-spnia/ pubs/ nihb-ssna/ _priv/ 2005_code/
appendix2-eng. php)[10] Security Policy - Manager's Handbook (http:/ / www. tbs-sct. gc. ca/ pubs_pol/ gospubs/ TB_J2/ dwnld/ spmh_e. rtf)[11] Confidences of the Queen's Privy Council for Canada (http:/ / www. tbs-sct. gc. ca/ pubs_pol/ gospubs/ TBM_121/ CHAP2_6-PR_e.
asp?printable=True)[12] Standing Committee of the National People's Congress, " Law on Guarding State Secrets (http:/ / www. gov. cn/ banshi/ 2005-08/ 21/
content_25096. htm)" ( ), promulgated 1988 and effective 1989.[13] Translation per Human Rights in China, State Secrets: China's Legal Labyrinth (http:/ / hrichina. org/ public/ contents/ 41421), (2007).[14] Article 413-9 (http:/ / www. legifrance. gouv. fr/ WAspad/ UnArticleDeCode?code=CPENALLL. rcv& art=413-9), Legifrance[15] (http:/ / www. csb. gov. hk/ hkgcsb/ doclib/ general. pdf)[16] LCQ3: Equal Opportunities Commission (http:/ / www. hab. gov. hk/ en/ publications_and_press_releases/ press_releases_speeches/
equal_opportunities/ 191103q3. htm)[17] "[ARCHIVED CONTENT] Understanding the Security Policy Framework & frequently asked questions" (http:/ / www. cabinetoffice. gov.
uk/ spf/ faqs. aspx). Cabinetoffice.gov.uk. . Retrieved 2012-06-01.[18] (https:/ / www. aivd. nl/ aspx/ download. aspx?file=/ contents/ pages/ 95299/ leidraadaanwijzenvertrouwensfuncties. pdf)[19] (https:/ / www. dss. mil/ portal/ ShowBinary/ BEA Repository/ new_dss_internet/ isp/ fac_clear/ download_nispom. html)[20] "Employment Background Checks: A Jobseeker's Guide | Privacy Rights Clearinghouse" (http:/ / www. privacyrights. org/ fs/ fs16-bck.
htm). Privacyrights.org. . Retrieved 2011-12-12.[21] http:/ / www. oecd. org/ dataoecd/ 25/ 10/ 40761118. pdf[22] "'Re: OpenSSH security advisory: cbc.adv' - MARC" (http:/ / marc. info/ ?l=bugtraq& m=122754275122010& w=2). Marc.info. . Retrieved
2011-12-12.
External links US "NISPOM" manual (http:/ / www. dss. mil/ isp/ odaa/ nispom06. html), explaining rules on classified
information among other things - full title is "National Industrial Security Program Operating Manual". Marking Classified National Security Information (http:/ / www. archives. gov/ isoo/ training/ marking-booklet.
pdf) ISOO booklet PDF Defence Vetting Agency (http:/ / www. mod. uk/ DefenceInternet/ AboutDefence/ WhatWeDo/
SecurityandIntelligence/ DVA/ DefenceVettingAgency. htm). Carries out national security checks in the UK. Los Alamos table of equivalent US and UK classifications (http:/ / badge. lanl. gov/ uk-usa_classification. shtml) The Black Vault (http:/ / www. theblackvault. com) - a database of more than a half million declassified pages on
many different topics, all acquired through the FOIA
Classified information 13
The National Security Archive (http:/ / www. gwu. edu/ ~nsarchiv/ ) - a collection of declassified documentsacquired through the FOIA
Lerner, Brenda Wilmoth & K. Lee Lerner, eds. Terrorism: essential primary sources. Thomson Gale, 2006. ISBN978-1-4144-0621-3 Library of Congress. Jefferson or Adams Bldg General or Area Studies Reading Rms LCControl Number: 2005024002.
Peter Galison, Removing Knowledge (http:/ / www. fas. harvard. edu/ ~hsdept/ bios/ docs/ Removing Knowledge.pdf) in Critical Inquiry n31 (Autumn 2004)
Parlament of Serbia (http:/ / www. parlament. gov. rs/ upload/ archive/ files/ lat/ pdf/ zakoni/ 2009/ 2502-09Lat.zip), Law on confidentiality of data. (Serbian)
Parlament of Montenegro (http:/ / www. skupstina. me/ index. php?strana=zakoni& id=618), Law onconfidentiality of data. (Serbian)
Article Sources and Contributors 14
Article Sources and ContributorsClassified information Source: http://en.wikipedia.org/w/index.php?oldid=516834210 Contributors: 10metreh, ALE!, ALR, Adrius42, Ahoerstemeier, Al Lemos, Alainna, Alan Liefting,Alanmak, Alansohn, Alpha Quadrant, AlwaysNL, Andreasmperu, Andrew Swallow, ArnoldReinhold, Atif.t2, Avjoska, AwOc, AzaToth, B4hand, Baronofcheese, Bbpen, Bdalpe, Betacommand,Binksternet, Bjarkith, Bob Hu, Boru318, BruceR, Brzydakkk, Cab88, Cacciatore, Cahk, Calm, Camilo Sanchez, Canley, Chester Markel, Chithanh, Chris the speller, Ckatz, Clicketyclack, Cliffb,Cobi, Cogiati, ComputerSherpa, Cpl Syx, Cryptosmith, CubicStar, Curps, DAGwyn, Dante Alighieri, David Gerard, David Latapie, David Newton, Deathphoenix, Decora, Dhollm, Djamo,DocWatson42, Donreed, Dpmuk, Dylan620, ESkog, EcoRat, Emersoni, EncMstr, Erikwithaknotac, EsaL-74, Eskildalenius, Everyking, Evil Monkey, Ewlyahoocom, Excirial, F.F.McGurk,Falconus, Fastfission, Fleminra, Fred Bradstadt, Funandtrvl, Fvw, Gaius Cornelius, Galoubet, Garyzx, Gaya7980, Gimmetrow, Giraffedata, Godardesque, Gomm, Grubie.kz, Gurch, Guy M,Haeinous, Haggis, Haku14, Headlikeawhole, Hephaestos, Hippi ippi, Hoplon, Hpcooper, Hsan22, Hu12, Huaiwei, Hullaballoo Wolfowitz, Hydrargyrum, Iancarter, Ihope127, Instantnood, Int21h,Isaac, Isomorphic, J.delanoy, J04n, JGHowes, JIP, JLaTondre, JNW, JackofOz, James500, Jarry1250, Jeff3000, Jericho4.0, Jim1138, Jmundo, Johns78, Johnteslade, Joseph Solis in Australia,Joyous!, Judzillah, Jwbene, KGasso, Karada, Keycard, Kiand, KingpinE7, Kmccoy, Koavf, Koshatul, Krashlandon, KurtRaschke, Kyuuzo, La goutte de pluie, LastWarrior2010, Lockesdonkey,Lotje, Luigifan, M jurrens, MARK S., Madhero88, Mairi, Mak17f, Malmis, Mandarax, MarcoTolo, Markaci, Marunchak, Matt Crypto, Mauls, Maurice Carbonaro, Max Cheung, Meaghan,Mgnystrom, Mhi, Miagirljmw14, Minna Sora no Shita, Missionary, Mnbf9rca, Moose6589, Mormegil, Mulad, Mzajac, NHSavage, Nabokov, Napzilla, Neutrality, NewAtair, NickdelaG,Nielswik, Nihiltres, NinjaStrider, Nixer, Nmiryanic, Northamerica1000, Nsaa, Onebyte, Pakaran, Peter Isotalo, Petri Krohn, Phillyman23, PhnomPencil, Picodoro, Pmfap, Pol098, Prof77, Quarl,Qxz, RTC, Radagast83, Rama, Rassilon, Ray Chason, RayHahn, Reddi, Reinyday, Richardcavell, RickK, Rjwilmsi, Roadrunner, Rochdalehornet, Rodzilla, Roidhun, Roofbird, Rsrikanth05,Rutger-dk, Rz350, Sallicio, Samwaltz, Sandstein, Savidan, SchuminWeb, Sdscubadiver, Securiger, Sephiroth storm, Shattered, Shirik, Sirtrypsin, Sn00kie, SpaceFlight89, Spearhead, Spirals31,Splintercellguy, Sppong, Srich32977, Staka, Stefanomione, Stevertigo, Stor stark7, Straightontillmorning, Sujeetkrana, SuperHamster, Tabletop, The Cunctator, The Epopt, The Font, TheFounders Intent, The Hybrid, The Thing That Should Not Be, TheGerm, Thief12, Three-quarter-ten, Tkynerd, Toh, Tomas e, TommyUdo, Tpbradbury, Tqbf, TreasuryTag, Tsiaojian lee,Twinsday, UriBudnik, Useight, Username7000, Vikassurajv, Vmenkov, WCFrancis, Whythe, Wiki-Ed, Wmahan, Woohookitty, WookMuff, Wstenfuchs, Zollerriia, var Arnfjr Bjarmason, , 479 anonymous edits
Image Sources, Licenses and ContributorsImage:NSALibertyReport.p13.jpg Source: http://en.wikipedia.org/w/index.php?title=File:NSALibertyReport.p13.jpg License: Public Domain Contributors: ArnoldReinhold, Cobatfor, Foroa,Kaihsu, TommyBee, 1 anonymous editsImage:FialkaManualCoverPage.jpg Source: http://en.wikipedia.org/w/index.php?title=File:FialkaManualCoverPage.jpg License: Public Domain Contributors: ArnoldReinhold, Blathnaid,Doco, Stan Shebs, 1 anonymous editsFile:Wuhan Hubei foreign affairs office 4232.jpg Source: http://en.wikipedia.org/w/index.php?title=File:Wuhan_Hubei_foreign_affairs_office_4232.jpg License: GNU Free DocumentationLicense Contributors: User:Vmenkov
LicenseCreative Commons Attribution-Share Alike 3.0 Unported//creativecommons.org/licenses/by-sa/3.0/
Classified informationGovernment classificationClassification levelsTop Secret (TS)SecretConfidentialRestrictedUnclassified
ClearanceCompartmented informationNuclear information Sharing classified information between countriesNATO classificationsInternational organisations
By countryAustraliaBrazilCanadaPeople's Republic of ChinaFranceHong KongNew ZealandRussian FederationSwedenUnited KingdomUnited States
Table of equivalent classification markings in various countries
Corporate classificationTraffic Light ProtocolReferencesExternal links
License