Software, Continued
Level II
Level III
Electronic
media security
Security
controls
Level II data is unclassified data that requires special protection. To assure
protection for processing Level II data, the Navy established the limited
automated information system access security mode. A system or network
operating in the limited access security mode restricts the access to data only
to individuals who by their job function have a need to access the
information.
Level III does not require the safeguards of Level I or Level II data. It does
however, require proper handling to make sure that data is not lost or
destroyed.
Computer systems and their associated peripherals require control and
safeguarding at all times. This protection includes the disks, diskettes, disk
drives, monitors, printer ribbons, and generated hard copies. In general, the
two types of electronic media are working copy media and finished media.
WORKING COPY MEDIA: Working copy media is temporary information.
It stays within the confines and control of your activity. After creating a
working copy, retain it for 180 days before destruction. Examples of
working copy media are information used and updated at frequent intervals.
FINISHED MEDIA: Finished media is permanent information. It can be
released to other commands and activities. Finished media contains
information that does not change or is pertinent for more than 180 days.
Date and mark classified electronic media when you create it. Assign disks
classified Secret or Top Secret a sequential identification number to make
tracking them easier. Control electronic media in the same manner
prescribed for classified material. Protect electronic media according to the
highest classification ever recorded on the disk. For media classified Top
Secret or Secret, maintain a master list including the overall security
classification and the identification number permanently assigned to the disk.
Continued on next page
8-10