Short Answer
Adam should first identify the nature of the incident affecting security, then report it to his designated security Point of Contact (POC) for appropriate handling. He must follow security protocols and avoid attempting to retrieve or verify any involved documents to maintain the integrity of the investigation.
Step 1: Identify the Incident
Adam should first clearly identify the nature of the incident that has occurred. This involves understanding what specific event took place that may impact security, such as unauthorized access to Sensitive Compartmented Information (SCI). Identifying the incident helps in accurately reporting it and aids in taking the appropriate next steps.
Step 2: Contact the Security POC
Once the incident is identified, Adam must then contact his designated security Point of Contact (POC) to report the situation. This action is crucial as it allows trained security personnel to handle the matter in line with security protocols. Adam should provide detailed information regarding the incident to assist in the investigation and response efforts.
Step 3: Follow Security Protocols
After reporting the incident, Adam should ensure that he adheres to all relevant security protocols. This includes refraining from trying to retrieve or verify any documents involved in the incident. Following proper procedures helps maintain the integrity of the investigation and ensures that the situation is resolved without further complications.