We are independent & ad-supported. We may earn a commission for purchases made through our links.
Advertiser Disclosure
Our website is an independent, advertising-supported platform. We provide our content free of charge to our readers, and to keep it that way, we rely on revenue generated through advertisements and affiliate partnerships. This means that when you click on certain links on our site and make a purchase, we may earn a commission. Learn more.
How We Make Money
We sustain our operations through affiliate commissions and advertising. If you click on an affiliate link and make a purchase, we may receive a commission from the merchant at no additional cost to you. We also display advertisements on our website, which help generate revenue to support our work and keep our content free for readers. Our editorial team operates independently of our advertising and affiliate partnerships to ensure that our content remains unbiased and focused on providing you with the best information and recommendations based on thorough research and honest evaluations. To remain transparent, we’ve provided a list of our current affiliate partners here.
Technology

Our Promise to you

Founded in 2002, our company has been a trusted resource for readers seeking informative and engaging content. Our dedication to quality remains unwavering—and will never change. We follow a strict editorial policy, ensuring that our content is authored by highly qualified professionals and edited by subject matter experts. This guarantees that everything we publish is objective, accurate, and trustworthy.

Over the years, we've refined our approach to cover a wide range of topics, providing readers with reliable and practical advice to enhance their knowledge and skills. That's why millions of readers turn to us each year. Join us in celebrating the joy of learning, guided by standards you can trust.

What Is Sensitive Security Information?

Dan Harkins
By
Updated: May 17, 2024
Views: 7,410
References
Share

The United States has classified some types of data as sensitive security information (SSI) since 1974. This began upon the passage of the Air Transportation Security Act that was passed to guard certain air-travel information like trade secrets and passenger identity as well as infrastructure and scheduling information that could compromise security. A year after 11 September 2001, a new Homeland Security Agency (HSA) took over the Department of Transportation's (DOT) also new Transportation Security Administration (TSA) that was just tasked with overseeing the protection of SSI, expanding its definition and scope vastly. As always, this stamped information must contain a statement about the specific people who are allowed to view it, and even those individuals must have a "need to know."

Federal regulations spell out specifically how sensitive security information is handled — from files, photos and videos stored in a cabinet to others stored on computers. This includes not just how SSI must be stamped, stored and guarded, but also how and to whom it can be disclosed. According to a logistics report from the Federal Aviation Administration, SSI must be marked as such in a bold, 16-point font size or larger, preferably in a no-nonsense style like Times New Roman.

The scope of material that is considered sensitive is vast. According to a Government Accountability Office report to Congress in 2005, sensitive security information related to air, rail, harbor and other types of mass transit are grouped into three basic categories. Of the 16 definitions of SSI, 11 types of data require a special committee's determination of SSI. Four categorical types of data are always SSI, and one requires a written SSI determination from appropriate personnel.

Though many citizens understand the need for tightened security, others also lament the added lack of oversight on the public's time and dime. The Coalition of Journalists for Open Government calls sensitive security information too wide-reaching in an online statement. Agencies like the TSA, HSA, DOT and even the Coast Guard are able to deem any files it desires sensitive to security and, thus, exempt from federal public records laws.

The regulations defining how sensitive security information is handled demands that any personnel who creates SSI, even contracted workers, immediately stamp it as such, safeguarding it in a locked container or password-protected computer when not in view. If another worker comes into possession of SSI that is not marked, it should be done so immediately. Also, the previous employee should be informed of his or her mistake.

Share
WiseGeek is dedicated to providing accurate and trustworthy information. We carefully select reputable sources and employ a rigorous fact-checking process to maintain the highest standards. To learn more about our commitment to accuracy, read our editorial process.
Link to Sources
Dan Harkins
By Dan Harkins
Dan Harkins, a former military professional, brings his diverse life experiences to his writing. After earning his journalism degree, he spent more than two decades honing his craft as a writer and editor for various publications. Dan’s debut novel showcases his storytelling skills and unique perspective by drawing readers into the story’s captivating narrative.

Editors' Picks

Discussion Comments
Dan Harkins
Dan Harkins
Dan Harkins, a former military professional, brings his diverse life experiences to his writing. After earning his...
Learn more
Share
https://www.wisegeek.net/what-is-sensitive-security-information.htm
Copy this link
WiseGeek, in your inbox

Our latest articles, guides, and more, delivered daily.

WiseGeek, in your inbox

Our latest articles, guides, and more, delivered daily.