Skip to Main Content
Idaho State University home

Glossary

Filter:
# A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
S
S
S&T
SAO
SAP
SAV
Say
SCG
SCI
SCP
SDR
Set
S-F
SFA
SI
SIG
SMM
SMO
SMU
SO
SOH
SON
SOS
SOW
SPK
Spl
SPO
SPS
Spy
SRI
SRP
SRR
SSE
SSO
SSR
STD
STI
STS
STU
STX
SUB
SYN
Special Access Program(s) (SAP)
  • Any programs imposing need-to-know or related security requirements or constraints which are beyond those normally provided for the protection of information classified in one of the three security classification designations; i. e. , Confidential, Secret, or Top Secret. Such a program includes but is not limited to, special clearance, adjudicative, or investigative requirements, special designation of officials authorized to determine need-to-know, or special lists or briefings of personnel determined to have a need-to-know. SIOP-ESI is an example of a DOD Special Access Program. Other sources of additional access control or other pertinent security requirements, not generally applicable to the same security classification category within DOD include: (a) the Atomic Energy Act of 1954; (b) procedures based on International Treaty requirements; and (c) programs for the collection of foreign intelligence or under the jurisdiction of the National Foreign Intelligence Board or the U. S. Communications Security Board. (OPNAVINST 5239. l A) (OPNAVINST 5239. 1A;, DODD 5200. 28;)
  • Any program imposing need-to-know or access controls beyond those normally required for access to Confidential, Secret, or Top Secret information. Such a program includes, but is not limited to, special clearance of investigative requirements, special designation of officials authorized to determine need-to-know, or special lists of persons determined to have a need-to-know. (AFR 205-16; DOE 5635. lA)
  • (SAP) Any program created under the authority of Executive Order that imposes additional controls governing access to classified information. *Any program established under Executive Order 12356 that imposes additional controls governing access to classified information involved with such programs beyond those required by normal management and safeguarding practices. These programs may include, but are not limited to, access approval, adjudication or investigative requirements, special designation of officials authorized to determine a need-to-know, or special lists of persons determined to have a need-to-know. (IC Staff, Glossary of Intelligence Terms and Definitions, 6/89)