14648 Sylvan St, Van Nuys, Ca 91411, Articles D

REF (N) IS DODI 1035.01, TELEWORK POLICY.// ( ( tO"n#g)]k4J}C-irFU4g&57s T"Y) H ~q+Ok"f[T T ( ( 3.b.2. ( ( This MARADMIN supplements the direction provided in references (a) through (k), amplifies the direction provided in reference (j), reiterates direction provided in reference (k), and applies to all Marine Corps military, civilian, and support contractor personnel. This interactive training explains security issues associated with unclassified government-provided and government-authorized mobile devices, as well as personal mobile devices used in a government setting. R(T0T0 BC#CC=#3=cc\}#Cb@. Om 2. 3 0 obj If you are an administrator, please go to Access Policy >> Reports: All Sessions page and look up the session reference number displayed above. Do not use NFC to communicate passwords or sensitive data. ( ( 1. 6. ( Categories . ( ( This includes, but is not limited to: commercial wireless networks and Portable Electronic Devices (PED) such as laptop computers with wireless capability, cellular/Personal . ( ( Therefore, these devices provide a means for our adversaries to hack into our network / systems 24/7 without warning. View Portable Electronic Devices and Removable Storage Media v2.0 HTML.docx from IS MISC at American Military University. ( :yB+Y?=Igg!C!Ts/UU~+3`rN{ 7x]mU#v]`*JY,K62= \XkYn!U?uudaq5tSP%.lHE88B=pW~4,{[PoV,U"DIn'cB'}cn*7uP=89q)CNQvX*U^o%UepH~|o8k)]H[{'{$G.mdNLdJ ( Personnel bringing wearable fitness devices and headphones into DoD accredited spaces are consenting to inspection and monitoring of the devices. GENTEXT/REMARKS/1. It outlines various types of mobile devices and wireless radio technologies and their vulnerabilities, reviews which personal mobile devices may be used in a government setting and under what conditions, and discusses methods of protecting unclassified government-provided and government-authorized mobile devices. 4. )9PEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPUFLk^#`U1O 4I*OG4wAF@q[vwui. ( ( ( ( hb```, ea8 ( ( ( ( Acronyms are usually formed from the initial letters of words, as in NATO (North Atlantic Treaty Organization), but sometimes use syllables, as in Benelux (short for Belgium, the Netherlands, and Luxembourg), NAPOCOR (National Power Corporation), and TRANSCO (National Transmission Corporation). 3.a.1. ( ( ( ( Electronic devices and media are often reused in the normal course of business. CES HR Operational eGuide ( 150 0 obj <> endobj REF (F) IS DOD MANUAL 5200.01, VOL 3, DOD INFORMATION SECURITY PROGRAM: PROTECTION OF CLASSIFIED INFORMATION. Examples of portable devices covered by the . For example new employees often receive workstations used by previous . ( ( If the device is recovered, it can be submitted to IT for re- ( ( SUBJ/MODIFICATION TO POLICY FOR PORTABLE ELECTRONIC DEVICES (PEDS), UPDATE FOR CONTROLLED USE IN CLASSIFIED SPACES, UPDATE ON AUTHORIZED TELEWORK CAPABILITIES// ( 0 ( ( Wireless devices, services, and technologies that are integrated or connected to DoD networks are considered part of those networks, and must comply with DoD Directive 8500.01E (reference (d)) and DoD Instruction 8500.02 (reference (e)) and be certified and accredited in accordance with DoD Instruction 5200.40 (reference (f)). ( Photo by Tech Sgt. A subsidiary of the American Telephone and Telegraph Company for most of its lifespan, it served as the primary equipment manufacturer, supplier, and purchasing agent for the Bell System from 1881 until 1984, when the system was dismantled. portable electronic devices (PEDs) and mobile computing devices, such as laptops, fitness bands, tablets, smartphones, electronic readers, and Bluetooth devices, have similar features. ( ( Removable media takes many forms today (jump drives, flash memory storage, portable storage devices, etc.). However, these. ( ( 2 0 obj Today Comment: All "smart" devices are capable of staying connected full-time to the internet, via satellite, Wi-Fi, cable, etc. ( stream ( 10.8.26 Wireless and Mobile Device Security Policy 10.8.26.1 Program Scope and Objectives 10.8 .26.1.1 . ( 0 R 091720Z SEP 20 ( This MARADMIN will remain in effect until cancelled or superseded. ( ( ( 4 0 obj ( ( ( endstream endobj 1029 0 obj <. % MSGID/GENADMIN/CMC DCI IC4 WASHINGTON DC// DoDI 8330.01, Interoperability of Information Technology (IT), Including National Security Systems. Webcam User Agreement Forms are available on the IC4/ICC CY Portal at https:(slash)(slash)eis.usmc.mil/sites/c4/cy1/doclib/forms/forms_templates.aspx. KDDvCyo2HLUU. ( endstream endobj 262 0 obj <> endobj 263 0 obj <>>>>>/Resources<>>>/Rotate 0/Type/Page>> endobj 264 0 obj <>stream Only government furnished equipment (GFE) approved for acquisition within the U.S government is authorized for use. DLA Director Army Lt. Gen. Darrell Williams recently signed a policy restricting use of PEDs in agency-owned or controlled spaces, Read the latest news from the Energy Major Subordinate Command of the Defense Logistics Agency. However, these devices are vulnerable to cyberattack or theft, resulting in exposure of . GSA ORDER. ( USB chargers) Have DoD devices serviced by unauthorized personnel Use DoD procured and/or owned removable storage media on non-government networks and computers Move data between unclassified and classified computing devices using 2 0 obj ( Government-issued PEDs are allowed in areas approved for open storage and processing of classified information if Wi-Fi and Bluetooth capabilities are disabled. ( ( ( ( ( ( ( ( 588 0 obj <>stream ( ( An organization may choose to dispose of media by charitable donation, internal or external transfer, or by recycling it in accordance with applicable laws and regulations if the media is obsolete or no longer usable. ( Last Revised. DOD issuances contain the various policies and procedures the govern and regulate activities and missions across the defense enterprise. DOD IA and CND Policy DocumentsA-1 Authorization (Accreditation) A-1 Ports, Protocols, and Services (PPS . This may be due to a failure to meet the access policy requirements. Removable media is personal, removable, and portable which introduces risk into the organization whenever it is used to store sensitive information. ;$Q*(` +Sn_a4c^*! 3.a.3. g. %PDF-1.5 % ( ( local & delicious. This STIG provides policy, training, and operating procedure security controls for the use of mobile devices and systems in the DoD environment. aNiwsJ>tWN+lw YhPhaAZ"@K -CxS~HuN*7EJ_cS(&FE!|4aBU[ {(`Dg.,Kg}kb$fg(CIX/Z#x]99z(F)b04[b=&QQ'L+WxS*J^(7tAm=,Q#hGF$t:WK5TtGc9|Pq_Q[slnfL ( 3.a.7. ( ( ( Designated the Director, National Security Agency as the Federal Executive Agent for interagency OPSEC training. stream ( ( 3.a. The DoD Cyber Exchange is sponsored by ( ( This is a coordinated Headquarters, U.S. Marine Corps (HQMC), Deputy Commandant for Information (DC I), Information Command, Control, Communications, and Computers (IC4) Division and Marine Forces Cyber Command (MARFORCYBERCOM) message. 1 0 obj Secure .gov websites use HTTPS ( Access is . This includes (but is not limited to) printers, scanners, storage devices (e.g., hard drives), wireless/bluetooth keyboards or mice, or smart display devices. ( True Because of the security risks associated with PEDs and removable storage media, the DoD has a policy that requires DoD data stored on these devices to be encrypted. A covered entity's . HWr8}W `/c)MeWx` ( Do not bring devices near other unknown electronic devices. ( The same rules and protections apply to both. ( ( ( ( A new mobile device strategy for the United States Defense Department addresses the need to secure the use of mobile devices for the military but provides few specifics on how to furnish security, at least not in the non-classified version the DoD made public this month. <> ( ( The DoD Cyber Exchange HelpDesk does not provide individual access to users. 5. ( v>w7w/6Mp+>i[hpIt,~P5sZwF=c]fS! DQ Gnga|,O. ( ( ( 3.b.5. ( ( ( DoD policy states that Federal Government communication systems and equipment (including Government owned telephones, facsimile machines, electronic mail, internet systems, and commercial systems), when use of such systems and equipment is paid for by the Federal Government, will be for official use and authorized purposes only. ( ( Place electronic devices in checked bags Use unknown computers for charging DoD devices (e.g. ( ( ( ( ( ( 3. %%EOF hb```V|af`0pd0 rp$u0y1A)(|(b1Dc b}ua}kGGGGCkCk@HHQAA! ( ( REF/J/GENADMIN/CMC DCI IC4 WASHINGTON DC/241240Z APR 20/MARADMIN 263-20// Prior to use of webcams, microphones, or headphones/headsets on unclassified systems within collateral classified spaces, a designated security representative (e.g., ISSO) will perform a walkthrough to validate that prescribed mitigations are in place. The policy applies to civilian and military employees as well as contractors and visitors to DLA. Mobile Devices (CMD), Portable Electronic Devices (PED), and laptops are DoD mobile endpoints. 3.b.1. Our Other Offices, An official website of the United States government. (