Saturday, November 12, 2011

What is Security Clearance? And Types of Security Clearances

  

       Security Clearance

  Ø  A security clearance is an authorization that allows access to information that would otherwise be forbidden. Security clearances are commonly used in industry and government. Many jobs in information technology require security clearances. When a security clearance is required for access to specific information, the information is said to be classified. Security clearances can be issued for individuals or for groups.

      Types of Security Clearances:

Ø  Clearances are generally granted to particular level of information, so a job that requires access to confidential information would require a confidential clearance.

  Ø   Security levels are detailed below from lowest to highest:
Ø       Controlled Unclassified Information. Not a classification level, but a marker for information that cannot be distributed.

Ø       For Official Use Only (FOUO). Also known as Official Use Only (OUO). Not a classification level, but a marker for information that must be protected under the Privacy Act or other sensitive data.

Ø       Confidential. Also known as Public Trust. Provides access to information that reasonably could be expected to cause damage to national security if disclosed to unauthorized sources. Often given to military personnel. The investigation requires National Agency Check with Local Agency Check and Credit Check (NACLC) and goes back seven years. The investigation takes a few weeks to a few months. The clearance must be renewed every 15 years.


Ø       Secret. Also known as Collateral Secret or Ordinary Secret. Provides access to information that could reasonably be expected to cause serious damage to the national security if disclosed to unauthorized sources. The investigation requires an NACLC and goes back seven years. The investigation takes a few months to a year. The clearance must be renewed every 10 years.

Ø       Top Secret (TS). Provides access to national security, counterterrorism, counterintelligence or other highly sensitive data that could cause exceptionally grave damage to national security if disclosed to unauthorized sources. The investigation requires a Single Scope Background Investigation (SSBI) and goes back 10 years. The investigation takes three to 18 months. The clearance must be renewed every 5 years.


Ø       Agency-Specific Clearances

Ø       Many federal agencies use customized clearance levels such as:
Ø       L clearance -- Civilian access to nuclear materials and information (U.S. Department of Energy [DOE], Nuclear Regulatory Commission [NRC])
Ø       Q clearance -- Access specifically relating to atomic or nuclear-related materials for non-military personnel (DOE, NRC)
Ø       Bureau of Immigration (BI) clearance -- Used by U.S. Customs and Border Protection (CBP)
Ø       National Agency Check with Inquiries (NACI) -- Used by the U.S. Department of Justice (DOJ)
Ø       Yankee White -- Administrative nickname for a background check for personnel working with the president (Executive Office of the President)

Ø      Sensitive Compartmented Information (SCI)

Many agencies append Sensitive Compartmented Information (SCI) to Top Secret clearances for a combination known as TS/SCI. Information access is assigned in "compartments" for a short or extended time so that a person with access to one compartment has no access to others. Compartmented access could include cryptography, overhead reconnaissance, communications intelligence or nuclear stockpile information. Specific SCIs are known as "riders" when appended to clearances. 

The U.S. Department of Defense (DOD) uses both SCI and a similar concept, special access programs (SAP), for exceptionally vulnerable information. SAP access could include information such as stealth technology. 

Both SCI and SAP designations require an SSBI investigation plus a special adjudication process.

Non-Government Clearances


Private-sector organizations occasionally use the term "security clearance" when granting access to sensitive information.