What regulation covers key control?
Key control and accountability must be established per 4 AR 190–51 • 30 September 1993 Page 11 appendix D. Aircraft keys will not be issued for personal retention. Duplicate keys will not serve as operational keys at maintenance facilities.
What regulation covers entry control point Army?
Standards: Prevent unauthorized personnel, packages, and/or vehicles from entering or leaving the restricted area.
What are considered sensitive items Army?
AR 710-2 and AR 735-5 both cover the Army policy for property accountability. Some sensitive items are your weapon, military ID card, communication equipment, etcetera. Sensitive items are anything that can be used by opposing forces or the enemy to counter attack, weaken forces, and gain information, and so on.
What is DA Form 7708 used for?
This regulation provides instruction to use the DA Form 7708 (Personnel Reliability Screening and Evaluation). The purpose of the form is to help review records to determine the suitability of a person to perform a certain duty assignment or gain access to certain materials.
What is DOD physical security?
1.1. The physical security program is that part of security concerned with active and passive measures designed to prevent unauthorized access to personnel, equipment, installations, information, and to safeguard them against espionage, sabotage, terrorism, damage, and criminal activity.
What does Arims stand for?
Army Records Information Management System
The Army Records Information Management System (ARIMS)
Which of the following implements DoD policies and minimum standards for the physical protection of DoD assets?
the Physical Security Program regulation
DoD 5200.08-R, the Physical Security Program regulation, implements DoD policies and minimum standards for the physical protection of DoD personnel, installations, operations, and related resources.
What ICD 705?
Intelligence Community Directive (ICD) 705 established that all Intelligence Community (IC) SCIF comply with uniform IC physical and technical security requirements.