Download Incoming Visitors San Diego Industrial Security PowerPoint Presentation

Login   OR  Register

Iframe embed code :

Presentation url :


Description :

PowerPoint presentation on Incoming Visitors San Diego Industrial Security, download now ppt of Incoming Visitors San Diego Industrial Security

Tags :

Incoming Visitors San Diego Industrial Security

Home / News & Politics / News & Politics Presentations / Incoming Visitors San Diego Industrial Security PowerPoint Presentation

Incoming Visitors San Diego Industrial Security PowerPoint Presentation

Ppt Presentation Embed Code   Zoom Ppt Presentation

About This Presentation

Description : PowerPoint presentation on Incoming Visitors San Diego Industrial Security, download now ppt of Inco... Read More

Tags : Incoming Visitors San Diego Industrial Security

Published on : Jan 08, 2015
Views : 343 | Downloads : 0

Download Now

Share on Social Media


User Presentation
SlidesFinder: Advertise with us
Related Presentation
Free PowerPoint Templates
Donuts Free PowerPoint Template


Views : 611

Meditation Free PowerPoint Template


Views : 212

Injecting Free PowerPoint Template


Views : 260

Email Free PowerPoint Template


Views : 276

Obesity Free PowerPoint Template


Views : 647

Happy Birthday Free PowerPoint Template

Happy Birthday

Views : 384

Heart Free PowerPoint Template


Views : 280

Nature Abstract Free PowerPoint Template

Nature Abstract

Views : 274

Agriculture Free PowerPoint Template


Views : 643

Butterfly Free PowerPoint Template


Views : 390

Synapse Free PowerPoint Template


Views : 515

Laboratory Free PowerPoint Template


Views : 457

Airplane Free PowerPoint Template


Views : 217

Dollar Free PowerPoint Template


Views : 265

Herbal Pills Free PowerPoint Template

Herbal Pills

Views : 377

Dental Brush Free PowerPoint Template

Dental Brush

Views : 301

Bales Free PowerPoint Template


Views : 363

Quit Smoking Free PowerPoint Template

Quit Smoking

Views : 414

Slide 1 - Incoming Visitors San Diego Industrial Counterintelligence Working Group This document is intended solely for the use and information of the client to whom it is addressed. Version 1 - 07/09/2012
Slide 2 - Table of Contents Visit Purpose Vulnerabilities and Collection Techniques Countermeasures Reporting Requirements 2
Slide 3 - Visit – Knowledge Collection Types Contractually based Exploratory Unsolicited Benefits Face-to-face collaboration Relationship building Scientific and technical exchange Share successes Dispute resolution Promote products and services 3
Slide 4 - An Inherent Threat Although the majority of visits are valid with well intention, visits are a low risk manner for a collector to obtain access to information and/or materials Unclassified and/or Private/Proprietary information more likely to be target of collection due to access Threat not limited to Foreign Visitors 4
Slide 5 - Collection Techniques The possibility of a trained collector within the visit delegation The unannounced visitor or last minute addition to the planned visit delegation The wandering visitor Taking photographs, excessive notes, or collecting materials Probing questions beyond the scope of the meeting Easily concealed recording device(s) 5
Slide 6 - Countermeasures Identification and Badging Require visitors to provide U.S.-based identification In turn, require visitors to display identification while on site Host briefing reinforcing Need-to-Know principle Pre-visit survey Determine before the visit meeting space and tour routes Ensure affected areas are clear of potentially sensitive information 6
Slide 7 - Countermeasures Inform affected employees about the presence and purpose of visitors prior to the meeting Employees may need to be reminded to protect sensitive information or materials Opportunity for employees to be an extra set of eyes and ears regarding the visitor activities and whereabouts Visitor briefing Control the potential for inappropriate activities by informing visitors they must remain under escort, they may not use audio or visual recording devices, etc. If visitors require network access consider a guest network or standalone system to prevent visitor access to your company information Acknowledge non-compliance of security and safety regulations will result in an immediate end to the meeting 7
Slide 8 - Countermeasures Technology Control Plan (TCP) may be required for long term foreign visitors Details badging, escort, work areas, awareness trainings/briefings, etc., all aimed at preventing unauthorized access. TCP requires active signature acknowledgment from both affected employees and long term visitors. National Industrial Security Program Operating Manual (NISPOM) 2-307, TCP within the framework of Foreign Ownership, Control, or Influence (FOCI) NISPOM 10-508 & 10-509, TCP when hosting on-site foreign nationals 8
Slide 9 - Reporting Requirements Post visit follow-up with host and/or affected employees NISPOM 1-302 requires reporting of suspicious contacts to the CSA Report anything questionable Benefits of reporting something seemingly inconsequential outweigh the negative impact of not reporting at all Your report may be the missing piece of the puzzle or the beginning of a trend 9
Slide 10 - ppt slide no 10 content not found