Block 2 Flashcards

1
Q

What are the 3 FOIA Program Objectives?

A

Compliance, Openness with the Public, and Avoidance of Procedural Obstacles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which Program Objective is necessary to provide uniformity in implementation of the program and create conditions that will promote public trust?

A

Compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which Program Objective conducts activities in an open manner consistent with need for security and adherence to law/regulation?

A

Openness with the Public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which Program Objective must not unnecessarily impede a requester from obtaining DoD records promptly?

A

Avoidance of Procedural Obstacles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Who is able to submit a FOIA request?

A

Any person, excluding fugitives and Federal Agencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Where can FOIA records be requested from?

A

Executive department, military department, government corporations, government controlled corporation, and other establishments in the executive branch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of records are the most frequently requested?

A

Military records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 2 types of FOIA requests?

A

Simple and Complex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which type of FOIA request can be processed quickly with limited impact on the responding unit?

A

Simple

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which type of FOIA request may be classified, originated from non-government source, privileged or part of AF decision-making process?

A

Complex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Who is the person who submits the request in writing to the FOIA agency?

A

The Requester

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Who is appointed in writing by each Installation Commander and receives, tracks, and coordinates all request for the base using eFOIA software?

A

FOIA Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Who is the organization that prepared or is responsible for the record(s) requested and provides requested records and indicates withheld parts annotated with FOIA exemptions?

A

Office of Primary Responsibility (OPR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Who is the point of contact with an OPR and is tasked within the OPR to locate the record(s)?

A

The FOIA Monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Who ensures FOIA representatives follow all law & instructions and performs thorough review of the request before releasing/denying?

A

The Legal Office

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Who receives all content after OPR and Legal Office concur on a request denial and has the authority to withhold records requested under FOIA for one or more of the nine exemptions?

A

Initial Denial Authority (IDA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How many FOIA exemptions are there?

A

9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What was established to prevent the release of information that could be harmful to the government or private interest?

A

FOIA Exemptions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Upon receipt of a FOIA request, what is sent to the requester along with a tracking number?

A

A letter of acknowledgement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How many working days does it take to process a FOIA request?

A

20

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What system is used to document all communications with requesters?

A

eFOIA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the steps for reviewing End of Year Reports?

A

Step 1. Access http://www.foia.af.mil
Step 2. Select Annual Reports
Step 3. Select the applicable report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What would be defined as a dissemination control applied by the Department of Defense (DoD) to unclassified information when disclosure to the public of that particular record would reasonably be expected to cause harm to an interest protected by one or more FOIA Exemptions 2 through 9?

A

For Official Use Only (FOUO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Who determines whether information qualifies as FOUO and applies markings?

A

The document originator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What must the subject begin with if the email contains FOUO information?

A

FOUO\

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What must the body begin with if the email contains FOUO information?

A

This e-mail contains FOR OFFICIAL USE ONLY (FOUO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What type of information is contained in a document labeled SF 706?

A

Top Secret

28
Q

What type of information is contained in a document labeled SF 707?

A

Secret

29
Q

What type of information is contained in a document labeled SF 708?

A

Confidential

30
Q

What type of information is contained in a document labeled SF 710?

A

Unclassified

31
Q

What protective measures must you take during the duty day to secure FOUO information?

A

Cover and place out of sight and use privacy screens on monitors if available

32
Q

What protective measures must you take after the duty day in an unsecured building to secure FOUO information?

A

Store in locked desks, file cabinets, book cases, locked rooms, etc.

33
Q

What is the act of releasing all relevant information that may influence a decision?

A

Disclosure

34
Q

What must you do when an individual gains access to any information without permission?

A

Take immediate action to secure the information and correct the process that led to the unauthorized disclosure

35
Q

What are methods of disposal for information labeled FOUO?

A

Shredding, burning, pulping, macerating, etc.

36
Q

How are records on magnetic media destroyed?

A

Degaussing or overwriting

37
Q

What established a code of fair information practices that governs their collection, maintenance, use and dissemination of information about individuals that is maintained in systems of records by federal agencies?

A

The Privacy Act (PA) of 1974

38
Q

What is the sole purpose of the Privacy Act?

A

To protect individuals from unwarranted invasion of their privacy

39
Q

What are the objectives of the Privacy Act?

A

Restrict disclosure, increased rights of access to agency records, amendment of agency records, and establish basic requirements

40
Q

What is designated at each organizational level to manage and implement the Air Force PA Program?

A

Privacy Act Office of Primary Responsibility (PA OPR)

41
Q

What informs individuals of why information is being collected and how it is going to be used and assures information is accurate, relevant, complete, and up-to-date before disclosing to others?

A

Privacy Act Mandates

42
Q

Who is the liaison between unit and Base Privacy Manager?

A

Unit Privacy Monitor

43
Q

Which two forms can you use to cover documents containing PA information when not in storage?

A

AF Form 3227, Privacy Act Cover Sheet or DD form 2923, Privacy Act Data Cover Sheet

44
Q

What is a legal document that describes the kinds of personal data collected and maintained in a System of Record (SOR) and describes what the records are used for and how individuals may access or contest the records in the system?

A

System of Record Notice (SORN)

45
Q

What is the official journal of the federal government of the United States that contains government agency rules, proposed rules, and public notices?

A

The Federal Register (FR)

46
Q

What is an allegation that an agency or its employee violated a provision of the PA?

A

Privacy Act Complaint

47
Q

What is an agency or individual knowingly or willfully fails to comply with the provisions of the PA?

A

Privacy Act Violation

48
Q

How many Privacy Act exemptions are there?

A

8

49
Q

How many steps are there to process a Privacy Act request?

A

5

50
Q

How can verification of a Privacy Act request be accomplished?

A

Visually, by having personal knowledge of the requester, by signed letter, notarized statement, or unsworn statement

51
Q

How many days do you have to acknowledge a Privacy Act request?

A

10 work days upon receipt

52
Q

How often must Privacy Impact Assessments (PIA) be reviewed?

A

Annually

53
Q

Which Office of Management Budget (OMB) states that PII is defined as information which can be used to distinguish or trace an individual’s identify?

A

OMB 07-16

54
Q

Which Office of Management Budget (OMB) states that the definition of PII is not anchored to any single category of information or technology and that it’s a case-by-case assessment of the specific risk that an individual can be identified?

A

OMB 10-22

55
Q

What is used to assist in identifying PII that is maintained in a SOR and stored on removable electronic media?

A

The Air Force Visual Aid (AFVA) 33-276

56
Q

What must you do when using e-mail to send PII?

A

Digitally sign and encrypt the e-mail, ensure all attachments are password protected, and ensure all recipients have an official need to receive the information

57
Q

What is an AF systems of record for Information Technology Compliance management data?

A

Enterprise Information Technology Data Repository (EITDR)

58
Q

What is an application used to securely exchange files and is designed as an alternative file sharing method to e-mail?

A

Safe Access File Exchange (SAFE)

59
Q

What is defined as an actual or possible loss of control, compromise or any unauthorized disclosure of PII whether electronic or physical?

A

A PII breach

60
Q

Incidents and/or breaches that affect government information systems are reported to whom?

A

United States Computer Emergency Readiness Team (US-CERT)

61
Q

How long do System Owners have to notify US-CERT of a confirmed Federal Government system compromise?

A

60 minutes

62
Q

The AF Privacy Officer shall upload the report into the Defense Privacy and Civil Liberties Office (DPCLO) Reporting Management Tool within how many hours of a PII breach notification?

A

48 hours

63
Q

The Privacy Official where the incident occurred shall notify the senior official in the chain of command by official unencrypted e-mail within how many hours of the incident/breach?

A

24 hours

64
Q

The appropriate level Privacy Official shall notify the AF Privacy Office by official unencrypted email attaching the preliminary report within how many hours of being notified?

A

24 hours

65
Q

The Commanders/Directors will ensure individuals impacted are notified within how many working days after a breach is confirmed and identities are ascertained?

A

10 working days

66
Q

What consequence does the individual(s) responsible for cause of the breach receive?

A

DISA Identifying and Safeguarding Personally Identifiable Information refresher training

67
Q

Which IG tool is used to capture IG investigative and administrative activity AF-wide?

A

Automated Case Tracking System (ACTS)