{"id":1274,"date":"2023-08-11T02:26:50","date_gmt":"2023-08-11T02:26:50","guid":{"rendered":"https:\/\/www.jsums.edu\/jsu-cyber-awareness\/?page_id=1274"},"modified":"2025-09-23T16:33:21","modified_gmt":"2025-09-23T16:33:21","slug":"cui-resources","status":"publish","type":"page","link":"https:\/\/www.jsums.edu\/jsu-cyber-security\/cui-resources\/","title":{"rendered":"CUI RESOURCES"},"content":{"rendered":"<h3><\/h3>\n<p>The following CUI resources include CUI cover sheets, destruction labels, email templates and tips and more. All resources and templates are provided by the CUI Executive Agent and can be found at the following National Archives page:\u00a0 <a href=\"https:\/\/www.archives.gov\/cui\/additional-tools\">Click Here<\/a><\/p>\n<p><a href=\"https:\/\/www.archives.gov\/files\/cui\/documents\/2017-Audio-Photo-Video-bifold-v1.pdf\"><strong>CUI Audio, Photography and Video Markings\u00a0Brochure<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/www.archives.gov\/cui\/registry\/category-list\"><strong>CUI Categories<\/strong><\/a><\/p>\n<p><strong><a href=\"https:\/\/www.gsa.gov\/cdnstatic\/SF901-18a.pdf?forceDownload=1\">CUI Coversheet<\/a><\/strong><\/p>\n<p>Agencies may use a coversheet\u00a0to identify CUI, alert observers that CUI is present from a distance, and serve as a shield to protect CUI from inadvertent disclosure. If an agency chooses to use a coversheet, it must use CUI EA-approved coversheet\u00a0<a href=\"https:\/\/www.gsa.gov\/cdnstatic\/SF901-18a.pdf?forceDownload=1\">Standard Form 901<\/a>.<\/p>\n<p><a href=\"https:\/\/www.archives.gov\/files\/cui\/documents\/cui-destruction-label-20170907.pdf\"><strong>CUI Destruction Label<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/www.archives.gov\/files\/cui\/documents\/cui-email-marking-tip-20180605.pdf\"><strong>CUI Email Marking Tip<\/strong><\/a><\/p>\n<p><strong><a href=\"https:\/\/www.archives.gov\/files\/cui\/documents\/20181119-limited-disemination-control-markings.pdf\">CUI Limited Dissemination Control Markings<\/a><\/strong><\/p>\n<p><a href=\"https:\/\/www.archives.gov\/cui\/registry\/category-marking-list\"><strong>CUI Markings<\/strong><\/a>(List)<\/p>\n<p><strong><a href=\"https:\/\/www.archives.gov\/files\/cui\/documents\/20161206-cui-marking-handbook-v1-1-20190524.pdf\">CUI Marking Handbook<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/www.archives.gov\/files\/cui\/documents\/2016-marking-trifold-v1.pdf\">CUI Marking Trifold Brochure<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The following CUI resources include CUI cover sheets, destruction labels, email templates and tips and more. All resources and templates are provided by the CUI Executive Agent and can be found at the following National Archives page:\u00a0 Click Here CUI Audio, Photography and Video Markings\u00a0Brochure CUI Categories CUI Coversheet Agencies may use a coversheet\u00a0to identify [&hellip;]<\/p>\n","protected":false},"author":131,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/pages\/1274"}],"collection":[{"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/users\/131"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/comments?post=1274"}],"version-history":[{"count":5,"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/pages\/1274\/revisions"}],"predecessor-version":[{"id":1463,"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/pages\/1274\/revisions\/1463"}],"wp:attachment":[{"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/media?parent=1274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}