Asked by: Libasse Rol
asked in category: General Last Updated: 15th January, 2020

What should you do when you are working on an unclassified system and receive an email with a classified attachment?

What should you do when you are working on an unclassified system and receive an email with a classified attachment? Call your security point of contact immediately to alert them.

Click to see full answer.


Herein, what is the best protection method for sharing personally identifiable information?

Digitally sign and encrypt the email.

Similarly, what should you do if a reporter asks you about potentially classified information? +Neither confirm nor deny the information is classified. -Deny the information is classified. -Explain that you are not authorized to discuss this classified project over the phone but could meet in person.

is it permitted to share an unclassified draft document?

Is it permitted to share an unclassified draft document with a non-DoD professional discussion group? As long as the document is cleared for public release, you may share it outside of DoD. Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI) token approves for access to the NIPRNET.

What advantages do insider threats have over others?

What advantages do "insider threats" have over others that allows them to be able to do extraordinary damage to their organizations? They are trusted and have authorized access to Government information systems.

24 Related Question Answers Found

What is the best example of personally identifiable information?

How do you protect personally identifiable information?

How should you protect your Common Access Card?


What is the best way to protect your common access card?

What results from the loss of control of customers personally identifiable information?

Is PII sensitive or confidential?


Why is it important to protect PII?

How can you protect your information when using wireless technology?

Who can access classified information?


Who can be permitted to access classified data?

What is spillage cyber awareness?

What is an individual's personally identifiable information considered cyber awareness?


Which classification level is given to information?

What are some potential insider threat indicators cyber awareness?