In spite of the best security policies, restrictive controls, and random review procedures, incidents of leakage of classified data to unclassified mobile devices are bound to occur. In these instances, the organization must have a set of defined procedures to be implemented when classified data is discovered on mobile devices. Failure to have incident handling procedures defined could result in confusion in the proper handling of the incident by organization personnel, or, worst case, classified data being disclosed to unauthorized sources. This requirement applies to mobile operating system (OS) smartphones and tablets.
This requirement also applies to sensitive DoD information stored on mobile OS devices that are not authorized to connect to DoD networks or store/process sensitive DoD information. Sensitive DoD data or information is defined as any data/information that has not been approved for public release by the site/Command Public Affairs Officer (PAO).
|