{"id":110,"date":"2015-12-01T18:34:11","date_gmt":"2015-12-01T18:34:11","guid":{"rendered":"https:\/\/www.jsums.edu\/researchcompliance\/?page_id=110"},"modified":"2018-07-23T09:39:39","modified_gmt":"2018-07-23T09:39:39","slug":"security","status":"publish","type":"page","link":"https:\/\/www.jsums.edu\/researchcompliance\/security\/","title":{"rendered":"Security"},"content":{"rendered":"<p style=\"font-size: 13px\">\n\tThis section covers information that will be presented in 2 parts, Personal and Information.&nbsp; There is a third security component that being Physical which covers construction standards, lighting, locks, CCTV, fencing, doors, vaults, etc. makes up a very small portion of the security requirement at JSU.&nbsp; Consequently if you need advice or information regarding physical security please contact ORS via e-mail or telephone.\n<\/p>\n<p style=\"font-size: 13px\">\n\t<strong><span style=\"text-decoration: underline\">Personal<\/span><\/strong>\n<\/p>\n<p style=\"font-size: 13px\">\n\tThe main aspect of this section will focus on personal clearance levels or PCL.&nbsp; For those obtaining a U.S. Government security clearance the following information is what you need to read:\n<\/p>\n<ul style=\"font-size: 13px\">\n<li>\n\t\t<a href=\"https:\/\/www.jsums.edu\/researchcompliance\/files\/2018\/07\/Clearance-Process-Final.pdf\" target=\"_blank\">Clearance Process<\/a>\n\t<\/li>\n<li>\n\t\t<a href=\"https:\/\/www.jsums.edu\/research\/files\/2013\/06\/Questionnaire-for-National-Security-Positions-SECURED.pdf\" target=\"_blank\">Questionnaire for National Security Positions SF 86<\/a>\n\t<\/li>\n<li>\n\t\t<a href=\"http:\/\/www.opm.gov\/investigations\/e-qip-application\/\" target=\"_blank\">Electronic Questionnaires for Investigations Processing (e-QIP)<\/a>\n\t<\/li>\n<li>\n\t\t<a href=\"https:\/\/enrol.dss.mil\/courseware\/SF86\/index.htm\" target=\"_blank\">Guide to Filling Out the SF86<\/a>\n\t<\/li>\n<li>\n\t\t<a href=\"https:\/\/www.jsums.edu\/research\/files\/2013\/06\/DOD_industry_procedures_eqip_applicant_information_sheet-1.pdf\" target=\"_blank\">DOD Industry Procedures (e-Qip Applicant Information Sheet)<\/a>\n\t<\/li>\n<li>\n\t\t<a href=\"https:\/\/www.jsums.edu\/research\/files\/2013\/06\/Fingerprint-Instructions-New-Electronic-Transmissions.docx\" target=\"_blank\">Fingerprint Instructions<\/a>\n\t<\/li>\n<li>\n\t\t<a href=\"https:\/\/www.jsums.edu\/researchcompliance\/files\/2018\/07\/Cleared-Employee-Reporting-Requirements.pdf\" target=\"_blank\">Cleared Employee Reporting Requirements<\/a>\n\t<\/li>\n<\/ul>\n<p style=\"font-size: 13px\">\n\t<span style=\"text-decoration: underline\"><strong>U.S. Government Facility Access &#8211; Facility Visits<\/strong><\/span>\n<\/p>\n<p style=\"font-size: 13px\">\n\t<strong><em><span style=\"font-size: small\">Access to federal government facilities may be virtual (electronically only); physical visit; or by residency as a sub-contractor, researcher, or student worker\/intern. A Facility Visit Letter or JPAS Facility Visit from the FSO is required.&nbsp;<\/span><\/em><\/strong>\n<\/p>\n<p style=\"font-size: 13px\">\n\tFor those of you requiring such access or perhaps an account to access a U.S. Government computer system, then a lower level of investigation is required.&nbsp; This is taken care of by the Questionnaire for Public Trust Positions SF85P.&nbsp; You will need to read the following:\n<\/p>\n<ul style=\"font-size: 13px\">\n<li>\n\t\t<a href=\"https:\/\/www.jsums.edu\/research\/files\/2013\/06\/Questionnaire-for-Public-Trust-Positions.pdf\" target=\"_blank\">Questionnaire for Public Trust Positions SF85P&nbsp;<\/a>\n\t<\/li>\n<li>\n\t\t<a href=\"https:\/\/www.jsums.edu\/researchcompliance\/files\/2018\/07\/U.S.-Government-Facility-Access-Facility-Visits.pdf\" target=\"_blank\">U.S. Government Facility Access &#8211; Facility Visits&nbsp;<\/a>\n\t<\/li>\n<li>\n\t\t<a href=\"https:\/\/www.jsums.edu\/research\/files\/2013\/06\/Fingerprint-Instructions-New-Electronic-Transmissions1.docx\" target=\"_blank\">Fingerprint Instructions&nbsp;<\/a>\n\t<\/li>\n<\/ul>\n<p style=\"font-size: 13px\">\n\t<span style=\"text-decoration: underline\"><strong>General Information<\/strong><\/span>\n<\/p>\n<p style=\"font-size: 13px\">\n\tInformation security covers all media that is used to communicate; consequently it can be a laptop or desktop computer, a cell phone or pda.&nbsp; Perhaps the largest impact for research is the DOD requirement for the protection of unclassified sensitive data at rest.&nbsp; The memorandum requiring this is contained below as well as other tips for safeguarding information.\n<\/p>\n<ul style=\"font-size: 13px\">\n<li>\n\t\t<a href=\"https:\/\/www.jsums.edu\/research\/files\/2013\/06\/DOD-Memo-Encryption-for-Data-at-Rest.pdf\" target=\"_blank\">DOD Memo Encryption for Data at Rest&nbsp;<\/a>\n\t<\/li>\n<li>\n\t\t<a href=\"https:\/\/www.jsums.edu\/research\/files\/2013\/06\/faq_dar_encryption_policy_memo_18mar08_update-6_final.docx\" target=\"_blank\">FAQ&#039;s for DOD Memo Encryption for Data at Rest&nbsp;<\/a>\n\t<\/li>\n<li>\n\t\t<a href=\"https:\/\/www.jsums.edu\/research\/files\/2013\/06\/10-Essential-Things-Companies-Should-Teach-Employees-About-Security.pdf\" target=\"_blank\">10 Essential Things Companies Should Teach Employees About Security&nbsp;<\/a>\n\t<\/li>\n<li>\n\t\t<a href=\"https:\/\/www.jsums.edu\/research\/files\/2013\/06\/Avoiding-Social-Engineering-and-Phishing-Attacks.pdf\" target=\"_blank\">Avoiding Social Engineering and Phishing Attacks&nbsp;<\/a>\n\t<\/li>\n<li>\n\t\t<a href=\"https:\/\/www.jsums.edu\/research\/files\/2013\/06\/Cell-Phone-Vulnerabilities-1.pdf\" target=\"_blank\">Cell Phone Vulnerabilities&nbsp;<\/a>\n\t<\/li>\n<li>\n\t\t<a href=\"https:\/\/www.jsums.edu\/research\/files\/2013\/06\/The-Corporate-Cyberspace-Menace-You-Dont-Know.pdf\" target=\"_blank\">The Corporate Cyberspace Menace You Don&#039;t Know<\/a>\n\t<\/li>\n<\/ul>\n<p style=\"font-size: 13px\">\n\t&nbsp;\n<\/p>\n<h5>\n\t<strong>&nbsp;<\/strong><br \/>\n<\/h5>\n","protected":false},"excerpt":{"rendered":"<p>This section covers information that will be presented in 2 parts, Personal and Information.&nbsp; There is a third security component that being Physical which covers construction standards, lighting, locks, CCTV, fencing, doors, vaults, etc. makes up a very small portion of the security requirement at JSU.&nbsp; Consequently if you need advice or information regarding physical [&hellip;]<\/p>\n","protected":false},"author":80,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.jsums.edu\/researchcompliance\/wp-json\/wp\/v2\/pages\/110"}],"collection":[{"href":"https:\/\/www.jsums.edu\/researchcompliance\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.jsums.edu\/researchcompliance\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.jsums.edu\/researchcompliance\/wp-json\/wp\/v2\/users\/80"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jsums.edu\/researchcompliance\/wp-json\/wp\/v2\/comments?post=110"}],"version-history":[{"count":2,"href":"https:\/\/www.jsums.edu\/researchcompliance\/wp-json\/wp\/v2\/pages\/110\/revisions"}],"predecessor-version":[{"id":177,"href":"https:\/\/www.jsums.edu\/researchcompliance\/wp-json\/wp\/v2\/pages\/110\/revisions\/177"}],"wp:attachment":[{"href":"https:\/\/www.jsums.edu\/researchcompliance\/wp-json\/wp\/v2\/media?parent=110"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}