ADP EQUIPMENT SECURITY
must be retyped. It is up to you to ensure the proper care
and maintenance of all disks that you use to preclude
Security has been, is, and always will be a major
any unwarranted problems.
c o n c e r n i n t h e N a v y. S e c u r i t y i s ev e r y o n e 's
For further information regarding ADP
responsibility. You play an important part in your
p r o c e d u r e s , c o n s u l t U t i l i z a t i o n o f Au t o m a t e d
command's security program by protecting and
Information Systems (AIS) COMOMAGINST 5230.1.
safeguarding your computer hardware and software.
PUBLICATIONS MAINTENANCE
Hardware Security
You, as a Mineman, use many different pub-
Your workspace normally provides sufficient
lications that apply to your job. Now it is your job to
physical security to protect against unauthorized
ensure that these publications are properly maintained
access and theft of material. Where possible, access to
and updated and that a full allowance is on board
spaces where computer hardware is stored and
according to the mine bill of material (MBOM).
operated is restricted to authorized personnel only. If,
at any time, unauthorized personnel require access to
A publication may contain anything from the
the area, ensure that proper safeguards are used to
description of a weapons system, to test procedures, to
protect your equipment. At the completion of a normal
a parts breakdown, to information on ordering needed
workday or when your activity is not manned, ensure
p a r t s . Wi t h o u t p r o p e r m a i n t e n a n c e o f t h e s e
that all computer hardware is stored in a secure area to
publications, erroneous or outdated information could
prevent access by unauthorized personnel.
be used.
Software Security
This section discusses publication changes and
technical manual reports.
The primary storage location for information is the
floppy disk. The disks that you normally use are not
PUBLICATION CHANGES
much more than 3 inches in diameter. Their small
size makes them easily hidden. It is also easy for
Publications are updated by the issuance of
anyone to make copies of disks. All computer software
changes and revisions. These modifications ensure that
must be given proper safeguard to prevent theft, loss, or
the publication is technically correct, accurate, and
destruction. The following actions are a partial list of
adequate for its intended use. Publication changes
security requirements:
include advance change notices, permanent changes,
Always attach an external label to all disks to
and revisions.
reflect the security classification of the material
Advance Change Notice
on individual disks. See figure 1-2.
Always, to limit access, store all disks in a secure
An advance change notice (ACN) permits rapid
container when they are not in use.
response to technical difficulties encountered in the
fleet's use of a publication. Its incorporation into the
Remember, once you lose the information on a
publication is mandatory.
disk, it is unlikely that it can be retrieved. It usually
BLUE LABEL
RED LABEL
GREEN LABEL
This medium is
This medium is classified
This medium is classified
SECRET
CONFIDENTIAL
UNCLASSIFIED
U.S. Government Property
U.S. Government Property
Protect it from unauthorized
Protect it from unauthorized
U.S. Government Property
disclosure in compliance with
disclosure in compliance with
applicable executive orders,
applicable executive orders,
SF 710 (1-87)
statutes, and regulations.
statutes, and regulations.
STANDARD FORM
STANDARD FORM
STANDARD FORM
SF 710
SF 708
SF 707
MNf01015
Figure 1-2.--Security classification labels.
1-16