Information Security Protocols v2.2


Information security protocols often are too long to be usable.  This protocol is a single page with only five key guidelines.  It has proven easy to remember and use in real life.


[REDACTED] recognizes that criminals, terrorists, and TLIs 1 may all on occasion threaten the safety, activities, or finances of [REDACTED], its partnering agencies, and volunteer or paid nationals. Not all threats can be prevented, but [REDACTED] attempts to mitigate threat scenarios through the protocols provided in the remainder of this document.

This protocol covers all [REDACTED] mass communications. It does not cover communications to a specific individual or a small group of people, as long as it is sent from a [REDACTED] (or other approved) address. Examples of covered communications include print newsletters and brochures, email newsletters, instant messages, and social media such as Facebook and Twitter. Examples of communications to which this protocol does not apply include emails from a [REDACTED] account to specific individuals and church missions ministries.

These protocols apply to all [REDACTED] operations. Regional Area Directors may specify additional communications guidelines.

Communications regarding a crisis involving [REDACTED] must comply with the [REDACTED] Crisis Management Communications Policy located in [REDACTED] General Policy Manual. See the Executive Vice-President or Regional Area Director for details.

1 TLI: Three Letter Initial; any agency of a national government engaged in a wide variety of activities.

[This document is available by request.]

APA Citation:
Fierbaugh (2012, April) Information Security Protocols v2.2. Dallas: [REDACTED]
Publication Date:
Sunday, April 1, 2012 – 09:00