In American security and intelligence language, a Sensitive Compartmentalized Information Center (SCIF; pronounced “skiff”) is a closed area inside a building used to process classified information such as Sensitive Compartmentalized Information (SCI). CIS is classified information about or derived from analytical intelligence sources, methods or processes that must be processed under formal access control systems established by the Director of National Intelligence (DNI). Information classified as CIS may only be stored and used in a Sensitive Compartmentalized Information Facility (FRIC). RIS have specific construction requirements, and their subsequent accreditation is separate from those of controlled areas and is coordinated by the ministry`s Special Security Officer (SSO). Sensitive compartmentalized information (SCI) is a subset of classified national intelligence services. ICS is a type of U.S. classified information that relates to or is derived from sensitive intelligence sources, methods, or analytical processes. All IT must be processed under formal access control systems established by the Director of National Intelligence. While some sources refer to CIS control systems as Special Access Programs (SAPs), the intelligence community itself views CIS and AMPs as different types of access-controlled programs. Sci is not a classification. The release of SCI has been called “above top secret”, but information at any classification level can be present in an SCI control system. If this information is “unbundled”, it will not be treated differently from collateral information (confidential/secret/top secret) at the same classification level. The government may wish to limit certain types of sensitive information only to those who work directly on related programs, regardless of the collateral authorization they have.
Therefore, even someone with a Top Secret version of the government`s DoD cannot access it unless it is explicitly granted. `A programme established for a specific category of classified information which imposes protection and access requirements which go beyond those normally required for information at the same classification level.` U.S. federal government AMPs are security protocols that provide top-secret information with security measures and access restrictions that go beyond those of regular (collateral) classified information. An AMP may impose stricter investigation or arbitration requirements, special non-disclosure agreements, special terminology or markings, exclusion of standard exclusions, and centralized ticketing systems. It can be a kind of black project. An SAP can only be initiated, modified and terminated within its department or organization. Examples of PAS include SCI, NATO, CNWDI, RD, FRD and SIOP-ESI. Sensitive compartmentalized information (SCI) is a classification label that applies to data and information of a sensitive nature belonging to a specific program or service.
Data can come from several sources such as critical program information (CPI), analytical data, and/or intelligence data. The nickname SCI is usually used by national intelligence agencies and can be used for data classified as confidential up to Top Secret (TS). Access to this data is only allowed to people who have the corresponding SCI ticket with their expulsion. Sensitive compartmentalized information (SCI) is information about specific intelligence sources and methods and may contain information related to or derived from sensitive collection, analytical processing, and targeting systems. Access to ICS is only granted to individuals who have a need to know, who have received top-secret authorization from Personnel Security (PerSec) and who have been approved by the Department of Commerce`s intelligence community, and only after entering into a separate non-disclosure agreement, Form IC 4414. The Department of Commerce`s Special Security Officer (SSO) is responsible for managing the department`s Sensitive Compartmentalized Information (SCI) programs. ICS mission requirements and/or the Special Access Program (SAP) are coordinated with the OSS by the business unit that determines access needs. Questions regarding single sign-on functions, the IBS program, or determining ICS access requirements can be sent to the following address: DSSO@doc.gov As indicated in the definition of SCI, it is necessary that the individual needs to receive the information and be read in the program. It is possible to submit to the Single Scope Background Investigation (SSBI), which is necessary to access top secret information without being read in a sci program. SCI access can also be granted at the secret level. Eligibility for icS access is determined by a single-scope background investigation (SSBI) or regular review.
Since the same survey is used to issue TS authorizations, the two are often written together as TS/SCI. Eligibility alone does not give access to a particular SCI material – it is simply a qualification. You must obtain explicit permission to access an SCI system or control compartment. This process may include a polygraph or other approved investigative or arbitration action. Once it is determined that a person should have access to a sci subject, they sign a non-disclosure agreement (NDA), are “read” or indoctrinated, and the fact of that access is recorded in a local access registry or computer database. In the event of termination of a specific compartment, the employee re-signs the non-disclosure agreement.  The National Industrial Security Program (NISPOM) Operations Manual states that SAP access is a decision of the responsible authority (club sponsor). In other words, all employees who are approved for the SECRET and TOP SECRET levels are generally entitled to SAP access. All they need is an invitation from someone who has determined their need to know.
Once the successful candidate has had access to SCI, they must sign an SCI non-disclosure agreement and receive an initial information session. The Cognizant Security Authority (CSA) presents both. The Cognizant Security Authority is also required to provide annual refresher briefings for individuals with access to classified documents. People with access to THE SC/ICS must be re-screened regularly every five years. If SCI access is no longer required, Cognizant`s security authority is responsible for debriefing the data subject. After the debriefing, the person must sign a security debriefing confirmation form. The Special Access Program (SAP) is a high level of forced need to know and only a minimum number of exempt employees have access to SAP information. .