What steps are taken during personnel turnover or departure to protect CUI?

Study for the DOD Instruction 5200.48 Controlled Unclassified Information (CUI) exam. Prepare with flashcards and multiple choice questions, each with detailed hints and explanations. Ensure success on your test day!

Multiple Choice

What steps are taken during personnel turnover or departure to protect CUI?

Explanation:
Protecting CUI during turnover focuses on securing data and cutting off access before someone leaves. The best approach is to retrieve all CUI materials, revoke access to systems and networks, and ensure proper destruction or transfer of custody for any copies. This means collecting physical documents and media, reclaiming devices, and making sure digital copies stored in emails, shared drives, or cloud services are returned or access is removed. It also involves transferring any necessary CUI copies to an authorized custodian or securely destroying them according to policy, and revoking credentials to prevent post‑departure access. Working with information security, records management, and legal ensures retention and destruction rules are followed and the chain of custody is preserved. By securing both the data and the access rights, you prevent unauthorized disclosure or loss as personnel exit.

Protecting CUI during turnover focuses on securing data and cutting off access before someone leaves. The best approach is to retrieve all CUI materials, revoke access to systems and networks, and ensure proper destruction or transfer of custody for any copies. This means collecting physical documents and media, reclaiming devices, and making sure digital copies stored in emails, shared drives, or cloud services are returned or access is removed. It also involves transferring any necessary CUI copies to an authorized custodian or securely destroying them according to policy, and revoking credentials to prevent post‑departure access. Working with information security, records management, and legal ensures retention and destruction rules are followed and the chain of custody is preserved. By securing both the data and the access rights, you prevent unauthorized disclosure or loss as personnel exit.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy