Student Guide
Disposal and Destruction of Classified Information Page 2
Well, we can actually destroy it as soon as we don’t need it any more. That’s not always
practical, though. But the DoDM 5200.01 requires us to do it at least once a year. Which
for us this year is next week!
As far as who is authorized to destroy classified information, there’s no one answer. But
remember, the same people who can create it are also authorized to destroy it.
Authorized custodians or users of the information can destroy it. Sometimes specific
individuals, like you, are designated to destroy it. Specified control officers such as a
North Atlantic Treaty Organization (NATO), Communications Security (COMSEC), or
Top Secret Control Officer can destroy it. And sometimes materials need to be sent to
the National Security Agency’s Central Security Service for destruction.
As far as exactly what types of materials we’re going to destroy next week and how, I’m
sending you to the experts.
You’ll want to talk to Phil Martinez, our office manager. He was in charge of our disposal
and destruction operations last year. He’ll be able to give you a lot of help with
destroying the paper-based information around here.
For the IT-type materials, you’ll need to talk to Jackie Chen. She’ll set you right with
disposing of electronic media.
OK, go on and get started. I know they’re both in today. Please stop back in when you’re
done so we can go over some procedures for next week. Oh, and thanks again.
2. Paper-Based Material
[Speaker 2: Phil Martinez, Office Manager]
Hi, I’m Phil. Thanks for tracking me down. I’ve been very busy lately, so I really
appreciate your taking over our classified clean-out day. Since I’ve handled it before, Mr.
Jenkins asked me to tell you what I know about destroying classified information in
paper form.
Types of paper-based materials
Documents
Maps
Blueprints
Files
Plans
Let’s look at where you’ll do most of the work next week.
See the burn bag over in the corner? We use those all around the office to store
unneeded classified information until we can destroy it. The idea is to control the
information to minimize the chance for unauthorized access. We use separate bags in