What should Adam do when he sees a coworker without …

Business Questions

What should Adam do when he sees a coworker without the required clearance handling a printed document marked as Sensitive Compartmented Information (SCI)?

Short Answer

Adam should first identify the nature of the incident affecting security, then report it to his designated security Point of Contact (POC) for appropriate handling. He must follow security protocols and avoid attempting to retrieve or verify any involved documents to maintain the integrity of the investigation.

Step-by-Step Solution

Step 1: Identify the Incident

Adam should first clearly identify the nature of the incident that has occurred. This involves understanding what specific event took place that may impact security, such as unauthorized access to Sensitive Compartmented Information (SCI). Identifying the incident helps in accurately reporting it and aids in taking the appropriate next steps.

Step 2: Contact the Security POC

Once the incident is identified, Adam must then contact his designated security Point of Contact (POC) to report the situation. This action is crucial as it allows trained security personnel to handle the matter in line with security protocols. Adam should provide detailed information regarding the incident to assist in the investigation and response efforts.

Step 3: Follow Security Protocols

After reporting the incident, Adam should ensure that he adheres to all relevant security protocols. This includes refraining from trying to retrieve or verify any documents involved in the incident. Following proper procedures helps maintain the integrity of the investigation and ensures that the situation is resolved without further complications.

Related Concepts

Incident Identification

The process of recognizing and understanding the specifics of an event that may threaten security, such as unauthorized access

Security Point Of Contact (Poc)

A designated individual responsible for managing security-related issues and communications following an incident

Security Protocols

Established procedures and guidelines to be followed in response to security incidents, aimed at ensuring proper handling and integrity of information during investigations.

Scroll to Top