C188.8.131.52. What are the prohibitions and limitations on
C184.108.40.206. What are the basic markings that must appear on
C220.127.116.11. What are the general standards and procedures for
C18.104.22.168. What are the requirements and standard for
creating, maintaining and publishing security classification
C9.3.3. Declassification Authorities Other Than Original
Classifiers. The security education and training provided
declassification authorities other than original classifiers shall, as a
minimum, address each of the following:
C22.214.171.124. What are the standards, methods and procedures for
declassifying information under Executive Order 12958 (reference
(e)) and this Regulation?
C126.96.36.199. What are the standards for creating and using
C188.8.131.52. What is contained in the Component's
C184.108.40.206. What are the Component's responsibilities for the
establishment and maintenance of a declassification
C9.3.4. Derivative Classifiers, Security Personnel and
Others. Individuals specifically designated as responsible for
derivative classification, security managers, classification management
officers, security specialists or any other personnel whose duties
significantly involve the management and oversight of classified information
shall receive training that, as a minimum, addresses the following:
C220.127.116.11. What are the original and derivative
classification processes and the standards applicable to each?
C18.104.22.168. What are the proper and complete classification
markings to be applied to classified information?
C22.214.171.124. What are the authorities, methods and processes
for downgrading and declassifying information?
C126.96.36.199. What are the methods for the proper use, storage,
reproduction, transmission, dissemination and destruction of classified
C188.8.131.52. What are the requirements for creating and
updating classification and declassification guides?
C184.108.40.206. What are the requirements for controlling access
to classified information?
C220.127.116.11. What are the procedures for investigating and
reporting instances of actual or potential compromise of classified
information and the penalties that may be associated with violation of
established security policies and procedures?
C18.104.22.168. What are the requirements for creating,
maintaining, and terminating special access programs, and the mechanisms
for monitoring such programs?
C22.214.171.124. What are the procedures for the secure use,
certification and accreditation of automated information systems and
networks which use, process, store, reproduce, or transmit classified
C126.96.36.199. What are the requirements for oversight of the
security classification program, including
C9.3.5. Others. Additional security education and
training may be required for personnel who:
C188.8.131.52. Use automated information systems to store,
process, or transmit classified information;
C184.108.40.206. Will be traveling to foreign countries where
special concerns about possible exploitation exist or will be attending
professional meetings or conferences where foreign attendance is
C220.127.116.11. Will be escorting, hand carrying, or serving as a
courier for classified material;
C18.104.22.168. Are authorized access to classified information
requiring special control or safeguarding measures; or
C22.214.171.124. Are involved with international programs; or
C126.96.36.199. Are involved with acquisition programs subject to
DoD Directive 5000.1 (reference