Training should include classified reproduction policy, marking classified information, derivative classification training, and should emphasize that only trained and authorized personnel are the only ones prepared to and capable of reproducing classified information.
- Review the list of authorized employees. If one doesn’t exist, create one.
- Provide authorized employees with adequate security training and briefings.
- Employ an IMS to help trace and account for classified copies.
- Trace all classified copies to determine origin and final disposition.
Jeffrey W. Bennett, ISP is the owner of Red Bike Publishing Red Bike Publishing . He regularly consults, presents security training, and recommends export compliance and intellectual property protection countermeasures. He is an accomplished writer of non-fiction books, novels and periodicals. Jeff is an expert in security and has written many security books including: "Insider's Guide to Security Clearances" and "DoD Security Clearances and Contracts Guidebook", "ISP Certification-The Industrial Security Professional Exam Manual", and NISPOM/FSO Training".