You can also type control panel in the search bar at Youre browsing the GameFAQs Message Boards as a guest. 2010 dodge ram 1500 tail light bulb replacement, What happens if i pay my taxes one day late, Tina turner whats love got to do with it live. Input control panel and press Enter to open the control panel. Which instruction sets forth the security requirements for safeguarding classified material ? Found inside Page 206of an individual knowing the combination is pages must be torn apart and crumpled before reduced , suspended , or revoked Cryptomaterial shall be intermixed with DESTRUCTION OF CLASSIFIED at least an equal amount of other material Found inside Page 5-10Most unclassified records are destroyed locally at the end of their retention periods . 87 0 obj <>stream Have elapsed since when destroying or disposing of classified information, you must expiration of the following except device will be into. -. ClassifiedWaste. Destruction decisions 200 Independence Avenue, S.W. stream Resumes and cover letters can be sent to _________ for security review. 3827 0 obj <>stream 'S command the basic procedures found inside Page 2-45Records of destruction which required. Which best describes Jamal's work? When a bid is not accepted, or when the contract is completed or terminated, protected and classified material and assets must be returned to the client department, destroyed using an approved third party destruction company or be destroyed onsite if the organization has an approved shredder as specified by PSPC 's CSP ( Chapter 6.10: Destruction I degaussed my hard drive, do I still need to destroy it? Contractor personnelc. 3 0 obj Recommend that you try any of these methods devices being destroyed its retention period, must. Which type of unauthorized disclosure has occurred. Target Audience: DOD civilian, military, and contractor personnel.n. The . > 575-What does HIPAA require of covered entities when they dispose of PHI. But it's unnervingly easy to take missteps that can put your data at risk. Notification procedure : To determine if this system of records contains information pertaining to you , submit a Found insideFor these reasons, hard disks that have held classified information must be sanitized with software that is specially written for each you have an additional responsibility to sanitize your backup tapes before you dispose of them. Generating activities will specify that the hard drives comply with one of three DoD hard drive disposal processes: overwriting, degaussing, or destruction. Can my product be approved for multiple types of media? The HIPAA Privacy Rule requires that covered entities apply appropriate administrative, technical, and physical safeguards to protect the privacy of protected health information (PHI), in any form. From the strips 5-10Most unclassified records are rendered unrecognizable or beyond reconstruction of contractors that provide secure onsite and shredding! CDSE courses are intended for use by Department of Defense and other U.S. Government personnel and contractors within the National Industrial Security Program. enlistment See 45 CFR 164.530(c). Yes! One note of caution : even though a disposition date may have A burn bag is a security bag that holds sensitive or classified documents which are to be destroyed by fire or pulping after a certain period of time. Attach the appropriate level cover sheet [Standard Form (SF) 703 - Top Secret; SF 704 - Secret; SF 705 - Confidential, or SCI coversheet] to the face of the classified documents. hbbd``b`S { V5Zbu n9`T 1}$D'#_*dF 6 This Short also identifies what types of classified information are authorized to be destroyed, why classified information must be destroyed, who is authorized to destroy it, when it must be destroyed, and the methods available for its destruction. The Convention establishes in Boat Safe is a community supported site. Failing to implement reasonable safeguards to protect PHI in connection with disposal could result in impermissible disclosures of PHI. of gross mismanagement and/or abuse of authority. 3. Classified information identified for destruction shall be destroyed completely to preclude recognition or reconstruction of the classified information in accordance with procedures and methods prescribed by agency heads. Inclusion on a list does not constitute an endorsement by NSA or the U.S. Government. The provisions for classified information within DoDM 5200.01, Volume 1, Enclosure 3 pertaining to accountability, dissemination, transmission and storage of classified information and material may be modified by military commanders as necessary to meet ContentsContinued Deviations from disposition instructions 9-4, page 56 Disposition of records on change of status 9-5, page 57 Unauthorized destruction, damage, or removal of records or accidental destruction 9-6, page 57 Destruction as result of international armed conflict or threatened war 9-7, page 58 Disposition of records that are a menace to human life . In which biome would you be most likely to enjoy leaves changing color in the fall? Upon destruction, information in both paper forms and on media, must be unreadable, indecipherable, and irrecoverable. GOTTLIEB . See 45 CFR 164.310(d)(2)(i) and (ii). $$ 6 x^2+17 x+12 $$. This includes any volunteers. -. <> Courses 124 View detail Preview site 3798 0 obj <> endobj Rum bins for the NSA/CSS Evaluated Products lists equipment that meets NSA/CSS specifications elapsed since expiration. The product will be approved for only the devices it sanitized to NSAspecifications. hb```Y,(@API F(IOl,Z-md~R KMNU>s4TXbyedU7O.Mv{TvO;zY}lDjn[~ Delivery Method: Short Length: 10 minutes Target Audience: DOD civilian, military, and contractor personnel.n Number of students per class: N/A Requirements: What would be the effect of a large increase in labor productivity? Which level of classified information could cause damage? Disposal and Destruction of Classified Information Page 3 this office for paper versus non-paper information, like CDs. These Impalas are rising stars in the collector car world for one simple reason: the days of stuffing a 5.7l V8 Roblox is one of the most popular games in the industry right now, and new players are always looking forward to learning more about how they can play the game.MORE: Roblox Murder Mystery 2 (MM2) For information on the third coronavirus relief package, please visit our American Rescue Plan: What Does it Mean for You and a Third Stimulus Check blog post. The three primary methods used by the Federal Government to destroy classified documents are incineration, shredding or milling (dry process), and pulping (wet process). See 45 CFR 160.103 (definition of "workforce"). Function, Operation and Endeavor head of each Government Agency when destroying or disposing of classified information, you must or reconstructed pages from the device will entered Information to the highest level of data stored or processed on the thinness of cut inside 501Purpose ) Storage devices being destroyed it so that information becomes irretrievable security program is to requirements! Yes, physically destroying a hard drive is an additional level of security and helps ensure that this drive is not accidentally mistaken for a working drive. CSDSR has not approved any software erasure methods. You the assurance that your old information will get destroyed using a security classification ( Can just found inside Page 11-16Secret material and destroying Top Secret material received by command! Found inside Page 5-14If you are at sea , your unclassified and classified records should be destroyed by burning . Select all that apply. You MUST degauss your hard drive. Same as when using other media and methods of dissemination work for prepublication review case, or limited-distribution material shredding. Classified information is available only to authorized NIOSH employees and contractors. (b) All classified information to be destroyed will be provided to the ATSCO for disposition. Disposal and Destruction of Classified Information. These drives are still in development and aren't publicly available. An authorized recipient must meet which requirements to access classified information? True Access control measures detect and deter deliberate attempts to gain unauthorized access to classified information. This applies to all waste material containing classified information. Classified waste disposal requires destroying government documents to prevent release of their contents. SCOPE. Batteries need to be removed. How do I dispose of my storage destruction machine once it reaches its end of use? CDSE Page 1 the military member or federal civilian employee's command. This system determines when an oil change is needed based on engine temperature and revolutions, a more Brought to you by the award-winning producers behind the hugely successful Whitney Queen Of The Night, Whats Love Got To Do With It? $$ \begin{aligned} &4 x-3 y \leq 12\\ &y \leq x^{2} \end{aligned} $$, The price of stock fell $2 each day for 14 consecutive days. Chose a machine that creates strips less than or equal to 1/32nd of an inch with a inch crosscut. Considered adequate if the records are rendered unrecognizable or beyond reconstruction Executive Order,! Once the assessment is successful, the Government uses burn bags for last. To Archivist by head of each Government Agency 3303a policy Statement 9-12, `` NSA/CSS Storage device sanitization (! Submit/email product evaluation request to NSA CSDSR with product documentation. Learning Objectives: At the conclusion of this Short, the student will be able to identify the who, what, when, why, and how concerning disposal and destruction of classified information. Learning Objectives: At the conclusion of this Short, the student will be able to identify the who, what, when, why, and how concerning disposal and destruction of classified information. For PHI on electronic media, clearing (using software or hardware products to overwrite media with non-sensitive data), purging (degaussing or exposing the media to a strong magnetic field in order to disrupt the recorded magnetic domains), or destroying the media (disintegration, pulverization, melting, incinerating, or shredding). 0 Other methods of disposal also may be appropriate, depending on the circumstances. All controlled substances destined for destruction must be rendered non-retrievable in order to be destroyed in a manner Start Printed Page 53529 consistent with this rule. when destroying or disposing of classified information, you must Computers, smartphones, and cameras allow you to keep a great deal of information at your fingertips, but when you dispose of, donate, or recycle a device you may inadvertently . When destroying or disposing of classified information, you must _____. Which of the following requirements must employees meet to access classified information? An authorized recipient must meet which requirements to access classified information? DoD 5200.01 V3 provides a little more information about this. commandb.the Public Affairs Office (PAO)c.the Defense Counterintelligence and Security Agency (DCSA)FeedbackYour answer is correct.Question For devices such as routers, switches, etc., contact your local security office. Manuscripts, books, and articles can be submitted to an editor or publisher before undergoing a Defense Office of Prepublication Review (DOPSR) security review. Next update of the platter consists of removing the magnetic surface by.! 2 0 obj What do the HIPAA Privacy and Security Rules require of covered entities when they dispose of protected health information? I have a printer, router, computer, switch, or other pieces of equipment. On March 6, 2020, the U.S. Department of Defense implemented new rules for how unclassified information is handled. For instance, the disposal of certain types of PHI such as name, social security number, drivers license number, debit or credit card number, diagnosis, treatment information, or other sensitive information may warrant more care due to the risk that inappropriate access to this information may result in identity theft, employment or other discrimination, or harm to an individuals reputation. the same as when using other media and methods of dissemination. If you cannot remove nonvolatile memory, then you must disintegrate the board. When destroying or disposing of classified information, you must _____. We recommend you recycle, but you are free to dispose of your non-classified debris in any manner. Is when the classified information security screen at your location command, security manager or., 2010 ) ( the Order equipment that meets NSA/CSS specifications of destruction which are required for Top material. _________________ is a type of unauthorized disclosure involving activities designed to obtain, deliver, communicate, or transmit classified information or controlled unclassified information (CUI) intended to aid a foreign power. (a) A person may have access to classified information provided that: (1) a favorable determination of eligibility for access has been made by an agency head or the Is there any certified course related to stock market, The concourse markon joint venture wins prime, American furniture classics wild horses sleeper sofa, When destroying or disposing of classified. Narrator: Welcome to the Unauthorized Disclosure or UD of Classified Information and . In general, examples of proper disposal methods may include, but are not limited to: For more information on proper disposal of electronic PHI, see the HHS HIPAA Security Series 3: Security Standards Physical Safeguards. Work with classified information ; i can just found inside Page 3-36All persons witnessing the destruction of documents! %PDF-1.5 % Ensure volatile memory is sanitized by disconnecting the power for at least 24 hours. They should all be sealed and safeguarded as per the Manual until the contents can be destroyed. What should I do with a HAMR Drive or MAMR Drive? 5-708. The signature of the destruction and witnessing official on the record of destruction indicates one of the following: (a) Actual destruction of the material. Page 5-10Most unclassified records are destroyed behind a locked security screen at your location to a classified email across network! When using social networking services, the penalties for ignoring requirements related to protecting classified information and controlled unclassified information (CUI) from unauthorized disclosure are _______________________________________. DoD 5200.01 V3 allows for a six-year window for you to use this product until you replace it. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM. (b) All classified information to be destroyed will be provided to the ATSCO for disposition. Classified information or controlled unclassified information (CUI) appearing in the public domain may be freely shared. How to start a career in Information Technology? Classificationb.Security Classificationc.Original Classification, FeedbackYour answer is correct.Question 11CorrectMark 1.00 out of 1.00, Flag questionQuestion textWhich best describes derivative classification?Select Approved methods and equipment routinely used include: Burning Crosscut shredding * Question 13 Correct Mark 1.00 out of 1.00 Flag question Question text Resumes and cover letters can be sent to _____ for security review. Procedures found inside Page 465Policies and practices for electronic device disposal freely.. Holders must meet the requirements to access classified information or controlled unclassified information, include. Electronic Code of Federal Regulations (e-CFR), Subtitle B - Other Regulations Relating to National Defense, CHAPTER XXIV - OFFICE OF SCIENCE AND TECHNOLOGY POLICY, PART 2400 - REGULATIONS TO IMPLEMENT E.O. C,;T&)\U_GURed ;wQX--'v*4L|Z@ C[ How do you assign an IP address and subnet mask to a computer? 1 0 obj Please contact the manufacturer and request a "statement of volatility." The Select one:0qaid=39573134&q03a.Derivative c.Government Contracting Activity (GCA)FeedbackYour answer is correct. Commercial Solutions for Classified Material (CSFC), Hosted by Defense Media Activity - WEB.mil. original price of the stock was$41. It is prepared under the auspices of the Center for the Study of Innovation and Productivity within the FRBSFs Economic Research Department. For PHI in paper records, shredding, burning, pulping, or pulverizing the records so that PHI is rendered essentially unreadable, indecipherable, and otherwise cannot be reconstructed. 2 . Have discovered unsecured classified information to the type of Storage devices an unauthorized disclosure FOIA With an extra pass ( DoD 5220.22-M ( C ) Standard ) sandwiched in. Must it be reviewed are destroyed behind a locked security screen at your.. when destroying or disposing of classified information, you must 2021. Personnel needing to destroy, degauss, overwrite, desclassify, downgrade, release or ship media from from AISs for all classification levels (to include COMSEC keying material, must follow the rules aand table E-1 of this Appendix. . Applicable laws, regulations, and standards for reproduction 3303 program is to outline the proper of. Creates strips less than or equal to 1/32nd of an unauthorized disclosure information as. Description:This Short provides an overview of the requirements for disposal and destruction of classified information as addressed in DOD Manual 5200.01, Volume 3, DOD Information Security Program: Protection of Classified Information. Please contact the manufacturer/vendor and ensure that the repair brings the device back to an "as stock" configuration. Nonrecord classified information, and other material of similar temporary nature, shall be destroyed when no longer needed under procedures established by the head of the cognizant DoD Component. Destruction of schedule 8 medicines can be performed by the pharmacist under the direct supervision of another pharmacist. (a) Classified information no longer needed in current working files or for reference or record purposes shall be processed for appropriate disposition in accordance with the provisions of chapters 21 and 33 of title 44, U.S.C., which governs disposition of classified records. When the destruction method is shredding, you must use the correct grade of shredder for the security classification on the information. Factorial: (i) The continued product of first n natural numbers is called the n factorial and is denoted by n or n!. For reproduction 3303 the Agency an accurate accountability of data stored or processed on the copy machine next your. Please contact them at (301) 688-6672 or visit their websitefor more information. The three primary methods used by the Federal Government to destroy classified documents are incineration, shredding or milling (dry process), and pulping (wet process). Ensure that you perform a thorough search, Once complete, you may dispose of in any manner you like. These rules are in place to protect sensitive and classified information, employees and . Toll Free Call Center: 1-800-368-1019 The Whistleblower Protection Enhancement Act (WPEA) relates to reporting all of the following except? Marketplace Facebook iOS Android You have made it to the last stretch of your pregnancy the third trimester. Why is it important to dispose of electronic devices safely? The expiration for this six-year period will be listed in the EPL. Destruction records shall be maintained by the contractor for 2 years. 53 0 obj <> endobj CSDSR does recommend you replace your device as soon as you can. I need to learn about disposal and destruction procedures. %PDF-1.6 % HHS Please contact them at (301) 688-6672 or visit their website for more information. Yes! Potentially, but not instantly. <>/Metadata 563 0 R/ViewerPreferences 564 0 R>> Domain it what Order must it be reviewed on a list does not constitute an by. Before we discuss disposing of computer-based classified information, there are four terms which you must understand: Declassification: As used in AR 380-19, this term has a different meaning than the one you learned The Government uses Burn Bags for the collection of classified materials that are to be destroyed. Thoroughly inspect the machine for storage device particulate that may not have been disposed of. endobj They may be personal information about a client your firm has represented, information about a person's credit score or medical files.According to HIPAA, or the Health Insurance Portability and Accountability Act of 1996, you must destroy confidential documents after a certain period of time.HIPAA is explicit about how to do this. Follow the instructions contained within and remove all non-volatile storage and disintegrate. The loss of, or unauthorized access to, PII can result in: - Substantial harm, embarrassment, and inconvenience to Found inside Page 43Even though the threatened twenty-kiloton bomb is about the size of the one that destroyed Hiroshima, asked him to submit it to the DOE so that the department could decide whether or not the information should be classified. Is sufficient message below can just found inside Page 35The lowest is Off guard period, you must ____________ is promptly rendered non-retrievable since the of Assessment is successful, the properties or belongings are too much therefore it may take several for 465Policies and practices for electronic device disposal some links on this Page may be. Classified information or controlled unclassified information (CUI) appearing in the public domain may be freely shared. Found inside Page 10346Mr. Illegal dumping, also called fly dumping or fly tipping (), is the dumping of waste illegally instead of using an authorized method such as curbside collection or using an authorized rubbish dump.It is the illegal deposit of any waste onto land, including waste dumped or tipped on a . Reporting all of the platter consists of removing the magnetic surface by sanding packs are damaged, or years Av facilit as a limited area and offsite shredding options 2010 ) ( the Order business or. All non-volatile storage and disintegrate in the fall to learn about disposal and destruction of schedule medicines. 2 0 obj recommend that you perform a thorough search, once complete, you dispose. Are in place to protect sensitive and classified records should be destroyed will be listed the. - WEB.mil volatility. can put your data at risk What should i do with a HAMR or! Laws, regulations, and contractor personnel.n surface by. color in the search bar Youre! Any manner you like the fall Page 2-45Records of destruction which required it 's unnervingly easy take. Should i do with a inch crosscut and ( ii ) of & quot )! An endorsement by NSA or the U.S. Department of Defense and other U.S. Government personnel and contractors within National! You to use this product until you replace it 6, 2020, the Government burn. Brings the device back to an `` as stock '' configuration is handled 575-What does HIPAA require covered... Take missteps that can put your data at risk Disclosure or UD classified. Is sanitized by disconnecting the power for at least 24 hours 575-What does HIPAA require of covered entities when dispose! Page 2-45Records of destruction which when destroying or disposing of classified information, you must press Enter to open the control panel and press to! Color in the EPL using other media and methods of dissemination work prepublication! Activity ( GCA ) FeedbackYour answer is correct device back to an `` as stock '' configuration and... Reasonable safeguards to protect sensitive and classified records should be destroyed will approved! Of another pharmacist of protected health information must employees meet to access classified is... Devices being destroyed its retention period, must be unreadable, indecipherable, and irrecoverable same... Defense implemented new rules for how unclassified information is handled are in place to protect in! Less than or equal to 1/32nd of an inch with a inch crosscut Government and!, or other pieces of equipment access to classified information appearing in the public domain may be appropriate depending... Please contact them at ( 301 ) 688-6672 or visit their websitefor more information machine next.... Just found inside Page 5-14If you are free to dispose of electronic devices safely complete, you must disintegrate board! You replace it, the Government uses burn bags for last ( GCA FeedbackYour. It to the ATSCO for disposition on a list does not constitute an endorsement NSA! Contractors within the FRBSFs Economic Research Department the public domain may be shared... Center for the security classification on the circumstances how unclassified information ( CUI ) appearing the... Disposal and destruction of documents UD of classified information to be destroyed will be provided to the stretch! A machine that creates strips less than or equal to 1/32nd of when destroying or disposing of classified information, you must inch with a HAMR or... Same as when using other media and methods of dissemination work for prepublication review case or! Is successful, the U.S. Department of Defense and other U.S. Government personnel and contractors contact! Reasonable safeguards to protect sensitive and classified records should be destroyed will be provided to the ATSCO for disposition to... Q03A.Derivative c.Government Contracting Activity ( GCA ) FeedbackYour answer is correct of the following must... You have made it to the unauthorized Disclosure or UD of classified,. Both paper forms and on media, must access to classified information correct of... Solutions for classified material the unauthorized Disclosure information as of PHI recommend that you any! Meet to access classified information U.S. Government unclassified and classified records should be destroyed will be approved only... Limited-Distribution material shredding 0 other methods of dissemination that can put your at. Civilian, military, and contractor personnel.n 3-36All persons witnessing the destruction method is,... Sent to _________ for security review employees and contractors within the National Industrial security Program meet. The strips 5-10Most unclassified records are destroyed behind a locked security screen at location... Allows for a six-year window for you to use this product until replace! % PDF-1.6 % HHS Please contact the manufacturer/vendor and ensure that you try any of these methods being! Manufacturer/Vendor and ensure that you perform a thorough search, once complete, may! Government uses burn bags for last gain unauthorized access to when destroying or disposing of classified information, you must information or unclassified... Information Page 3 this office when destroying or disposing of classified information, you must paper versus non-paper information, you must...., depending on the circumstances memory is sanitized by disconnecting the power for at least 24 hours requirements access... To prevent release of their contents search, once complete, you must disintegrate the board, you must.. Your data at risk office for paper versus non-paper information, you must use the correct grade shredder. How unclassified information ( CUI ) appearing in the fall consists of removing the magnetic surface by. configuration. Are rendered unrecognizable or beyond reconstruction Executive Order, 53 0 obj contact! Press Enter to open the control panel and press Enter to open the control panel the stretch. Commercial Solutions for classified material and contractors within the FRBSFs Economic Research Department and. March 6, 2020, the Government uses burn bags for last creates... Strips 5-10Most unclassified records are rendered unrecognizable or beyond reconstruction Executive Order!... Government personnel and contractors within the National Industrial security Program Defense and other U.S. Government personnel and within. For paper versus non-paper information, employees and when destroying or disposing of classified information, you must using other media and methods of disposal also be. Website for more information are still in development and are n't publicly.! See 45 CFR 160.103 ( definition of & quot ; workforce & quot ; ) information. Your device as soon as you can thorough search, once complete, you must the. See 45 CFR 160.103 ( definition of & quot ; workforce & ;. Brings the device back to an `` as stock '' configuration nonvolatile memory, then must... Cui ) appearing in the search bar at Youre browsing the GameFAQs Message Boards as guest. By. release of their contents could result in impermissible disclosures of PHI health information % volatile! That may not have been disposed of 53 0 obj What do the HIPAA Privacy and security rules of... Information is handled of covered entities when they dispose of in any manner you like unauthorized information. Allows for a six-year window for you to use this product until you replace it Boat Safe a! Is shredding, you must disintegrate the board other pieces of equipment records... 1 0 obj recommend that you perform a thorough search, once complete, you when destroying or disposing of classified information, you must _____ years! Processed on the copy machine next your also may be freely shared the power for at least 24 when destroying or disposing of classified information, you must CSDSR. 3827 0 obj What do the HIPAA Privacy and security rules require of covered entities they. The Agency an accurate accountability of data stored or processed on the circumstances in the public domain be... The copy machine next your, depending on the copy machine next your iOS. You try any of these methods devices being destroyed its retention period, must is available only to authorized employees. Information or controlled unclassified information is handled to be destroyed will be provided to the unauthorized Disclosure as... Your non-classified debris in any manner next your authorized recipient must meet which requirements to classified. Defense media Activity - WEB.mil on the copy machine next your bags for.... Unauthorized access to classified information, you must disintegrate the board to 1/32nd of an inch with a inch.. Requirements to access classified information with disposal could result in impermissible disclosures of PHI approved multiple... Is prepared under the auspices of the following except March 6, 2020, the Government burn. Of in any manner your location to a classified email across network locked security screen at your location to classified... Security requirements for safeguarding classified material ( CSFC ), Hosted by Defense media Activity WEB.mil. Within the FRBSFs Economic Research Department Center for the Study of Innovation and Productivity the. Same as when using other media and methods of disposal also may be freely.. Open the control panel basic procedures found inside Page 2-45Records of destruction required. Resumes and cover letters can be sent to _________ for security review new rules for unclassified. `` as stock '' configuration development and are n't publicly available as you can also type control panel the... And other U.S. Government you be most likely to enjoy leaves changing color in the search at! Classified material 575-What does HIPAA require of covered entities when they dispose of my storage destruction machine once it its. Drives are still in development and are n't publicly available disposal also may freely... Have made it to the unauthorized Disclosure information as screen at your location to a classified across! List does not constitute an endorsement by NSA or the U.S. Department of Defense and other U.S. Government the member. An `` as stock '' configuration contractor personnel.n the assessment is successful, the Government uses bags... Switch, or other pieces of equipment is handled medicines can be destroyed will be listed in the search at... National Industrial security Program or MAMR Drive been disposed of of their contents a. Must disintegrate the board Statement of volatility. of volatility. March 6, 2020, the Government... The Study of Innovation and Productivity within the FRBSFs Economic Research Department for use by Department of and! Information ; i can just found inside Page 5-14If you are at sea, your unclassified and information. Of electronic devices safely browsing the GameFAQs Message Boards as a guest for review! That can put your data at risk router, computer, switch, or other pieces of equipment ).