Security clearance in the context of "Need to know"

Play Trivia Questions online!

or

Skip to study material about Security clearance in the context of "Need to know"

Ad spacer

⭐ Core Definition: Security clearance

A security clearance is a status granted to individuals allowing them access to classified information (state or organizational secrets) or to restricted areas, after completion of a thorough background check. The term "security clearance" is also sometimes used in private organizations that have a formal process to vet employees for access to sensitive information. A clearance by itself is normally not sufficient to gain access; the organization must also determine that the cleared individual needs to know specific information. No individual is supposed to be granted automatic access to classified information solely because of rank, position, or a security clearance.

↓ Menu

>>>PUT SHARE BUTTONS HERE<<<

👉 Security clearance in the context of Need to know

The term "need to know" (alternatively spelled need-to-know), when used by governments and other organizations (particularly those related to military or intelligence), describes the restriction of data which is considered very confidential and sensitive. Under need-to-know restrictions, even if one has all the necessary official approvals (such as a security clearance) to access certain information, one would not be given access to such information, or read into a clandestine operation, unless one has a specific need to know; that is, access to the information must be necessary for one to conduct one's official duties. This term also includes anyone with whom the people with the knowledge deem necessary to share it.

As with most security mechanisms, the aim is to make it difficult for unauthorized access to occur, without inconveniencing legitimate access. Need-to-know also aims to discourage "browsing" of sensitive material by limiting access to the smallest possible number of people.

↓ Explore More Topics
In this Dossier

Security clearance in the context of Multilevel security

Multilevel security or multiple levels of security (MLS) is the application of a computer system to process information with incompatible classifications (i.e., at different security levels), permit access by users with different security clearances and needs-to-know, and prevent users from obtaining access to information for which they lack authorization.

There are two contexts for the use of multilevel security. One context is to refer to a system that is adequate to protect itself from subversion and has robust mechanisms to separate information domains, that is, trustworthy. Another context is to refer to an application of a computer that will require the computer to be strong enough to protect itself from subversion, and have adequate mechanisms to separate information domains, that is, a system we must trust. This distinction is important because systems that need to be trusted are not necessarily trustworthy.

↑ Return to Menu

Security clearance in the context of Classified information

Classified information is confidential material that a government, corporation, or non-governmental organisation deems to be sensitive information, which must be protected from unauthorized disclosure and that requires special handling and dissemination controls. Access is restricted by law, regulation, or corporate policies to particular groups of individuals with both the necessary security clearance and a need to know.

Classified information within an organisation is typically arranged into several hierarchical levels of sensitivity—e.g. Confidential (C), Secret (S), and Top Secret (TS). The choice of which level to assign a file is based on threat modelling, with different organisations have varying classification systems, asset management rules, and assessment frameworks. Classified information generally becomes less sensitive with the passage of time, and may eventually be reclassified or declassified and made public.

↑ Return to Menu

Security clearance in the context of Classified information in the United States

The United States government classification system is established under Executive Order 13526, the latest in a long series of executive orders on the topic of classified information beginning in 1951. Issued by President Barack Obama in 2009, Executive Order 13526 replaced earlier executive orders on the topic and modified the regulations codified to 32 C.F.R. 2001. It lays out the system of classification, declassification, and handling of national security information generated by the U.S. government and its employees and contractors, as well as information received from other governments.

The desired degree of secrecy about such information is known as its sensitivity. Sensitivity is based upon a calculation of the damage to national security that the release of the information would cause. The United States has three levels of classification: Confidential, Secret, and Top Secret. Each level of classification indicates an increasing degree of sensitivity. Thus, if one holds a Top Secret security clearance, one is allowed to handle information up to the level of Top Secret, including Secret and Confidential information. If one holds a Secret clearance, one may not then handle Top Secret information, but may handle Secret and Confidential classified information.

↑ Return to Menu

Security clearance in the context of Credential

A credential is a piece of any document that details a qualification, competence, or authority issued to an individual by a third party with a relevant or de facto authority or assumed competence to do so.

Examples of credentials include academic diplomas, academic degrees, certifications, security clearances, identification documents, badges, passwords, user names, keys, powers of attorney, and so on. Sometimes publications, such as scientific papers or books, may be viewed as similar to credentials by some people, especially if the publication was peer reviewed or made in a well-known journal or reputable publisher.

↑ Return to Menu