Susan Shin Angulo Husband, What Is Your First Duty Station Like, Articles C

According to the NISPOM, espionage, sabotage, terrorism, or subversive activities should be reported as a(n) ___________________. During a periodic reinvestigation of a cleared individual, During the applicants initial PCL investigation, Only when the applicant is seeking Top Secret clearance eligibility. User: She worked really hard on the project. This material is provided for informational purposes only. EO 13706 applies to the following types of federal contracts: The EO requires contractors to provide covered employees one hour of paid sick leave for every 30 hours worked on or in connection with a covered federal contract or subcontract. contractors are adequate for the protection of classified information. The National Labor Relations Act (NLRA) governs the relationship between employers and the unions that represent their employees. The five main types of construction contracts are lump sum, time and materials, cost-plus, unit price, and guaranteed maximum price (GMP). Who has primary responsibility for the adjudication of personnel security background investigations? Which of the following are reportable behavioral indicators? contractors must report which of these select all that apply. D.EO 13502 (Use of Project Labor Agreements for Federal Construction Projects). Finally, a successor contractor who has a duty to bargain with a union is not required to deduct dues and fees from employees pay, unless the contractor agrees to do so in a written agreement. Because there are so many different types of construction projects, each type of construction contract exists to satisfy the varying needs of all parties involved. The contractor also must certify annually to the contracting officer that it has implemented a compliant plan (including due diligence investigation) and that, to the best of its knowledge, it is not aware of any violations. Who must submit the RFV when a foreign national needs to visit a U.S. contractor facility to discuss classified information? When does a host need to coordinate with the visitors organization regarding the Classified Information Nondisclosure Agreement (SF-312)? Objectives . This behavior may include (select all that apply): Authorized access to DoD information and resources may be granted based on a person's ____________. Personnel security clearance investigation stage, Initiate personnel security clearance process stage. b. SF 312, Classified Information Nondisclosure Agreement. The transfer of classified or proprietary information to a system not approved for the classification level or unaccredited or unauthorized systems, individuals, applications, or media is a _________________. Foreign attendees business cards do not match stated affiliations, Excessive or suspicious photography and filming of technology and products, Conversations involving classified, sensitive, or export-controlled technologies or products. Additionally, such employers must follow non-discrimination and related provisions, as well as comply with a host of recordkeeping, data collection, and technical obligations. Contractors must report which of these? Which of the following statements are true? Once a successor contractor establishes its initial terms and conditions of employment, the contractor may only make changes to those terms of employment (called the status quo) after bargaining with the union and reaching an agreement or bargaining in good faith to impasse. endstream endobj startxref Facility employees may be processed for personnel security clearances concurrently with the processing of, or after the award of, a facilitys FCL. Reporting information as required under this policy does not fulfill or diminish the These requirements apply not only to the contractors employees working directly on a federal contract, but generally to their entire workforce, including locations where no federal contract work is performed. Its decisions are binding on all other California state courts. Failure to do so will result in a perfectly clear successorship, which would bind the successor contractor to all the terms of the previous contractors CBA. The poster must be displayed in a prominent and accessible place where it can be seen easily by employees. The Higher Education Research Institute at UCLA collected data from 203,967 incoming first-time, full-time freshmen from 270 four-year colleges and universities in the U.S. 71.3%71.3 \%71.3% of those students replied that, yes, they believe that same-sex couples should have the right to legal marital status. This is an example of _____________________. Bargaining impasse often is difficult to establish; the employer must demonstrate both that the parties are deadlocked and that further discussions likely will not lead to an agreement. As evidence of their compliance with the requirement to pay workers the prevailing wage, covered contractors must maintain records during the work and for three years after job completion reflecting the following: Employers must pay workers covered by the DBA/DBRA weekly. Which activities are recommended as part of continuous evaluation program at a cleared facility? Contractors must report which of these? Which of the following is reported to PSMO-I? One such requirement, defined in the NISPOM, states that contractors must report certain events to the appropriate government agencies, that may have an effect on the status of the entity's or an employee's eligibility for access to classified information. As just one example, changing the design of a tile floor is much easier to do before the tile is ordered, rather than after it's installed. Which investigation type is required for an initial Top Secret Clearance? 6275 0 obj <> endobj What should you do? Contractors must maintain three years of EEO-1 reports as part of their AAPs. Jack is his organizations Facility Security Officer. _____ describes the level of information to which a person is authorized access based on a background investigation. Contractors with a federal acquisition contract or subcontract must apply 15 basic cybersecurity safeguarding requirements and procedures to protect federal contract information. The requirements are based on security requirements published in the National Institute of Standards and Technologys (NIST) Special Publication (SP) 800-171, Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations. Specific requirements are in FAR Subpart 4.19 and FAR Clause 52.204-21. -In written communications Patterns, stereotypes, and predictable actions are all types of which of the following? There must be a bona fide procurement requirement to have access to U.S. classified information or facilities. ; Order the DE 542 form from our Online Forms and Publications. ]. Report the concerning behavior to your security officer. Contractors with federal contract awards of at least $5 million (entered into on or after December 12, 2008) are subject to Federal Acquisition Regulation ethics rules. (Incorrect, there were more choices). Procurement contracts for construction covered by the DBA, but not by the DBRA; Concession contracts, including any concessions contract excluded from the SCA by DOLs regulations at 29 CFR 4.133(b); Contracts in connection with federal property or lands and related to offering services for federal employees, their dependents, or the general public (this includes leases). . Which of the following is used in the PCL process to determine a candidates eligibility? What document signed by President Reagan directed the establishment of OPSEC programs, and in what year did this document become law? Which investigation is used for a periodic reinvestigation of an individual possessing a Secret or Confidential clearance eligibility? The Davis-Bacon Act (DBA) establishes the requirement for paying prevailing wages on projects involving the construction, alteration, or repair (including painting and decorating) of public buildings or public works. OPSEC focuses on what type of critical information? Use e-Services for Business to submit a Report of Independent Contractor(s) (DE 542).. Mail or Fax. A cleared employee has received an industry award, A cleared employees citizenship has changed, An uncleared employees citizenship has changed. demonstrate the intent and capability to be a threat to our mission. Generally, the employers withdrawal liability obligation is satisfied by making annual payments determined by a formula intended to approximate the employers annual contributions to the MPP. Stan has recently witnessed some unusual behavior from a co-worker. When the host organization approves a visit request, this approval constitutes _____. Specific reporting procedures vary widely across agencies and contractor facilities. Hostile entities may use social media to _______________ ? -Any indication that classified information has been lost or compromised. Which step of the analytical risk management process includes considering the impact to military and strategic advantage? To provide you with a holistic picture of your operation, To protect your operation by properly controlling classified information, To establish a systematic process to assess the requirements for mission success, To control information about your capabilities and intentions. Pursuant, T.C.A. They must implement written codes of business ethics and conduct, an employee awareness and compliance program, and an internal control system. Of the following types of personnel-related information, which is NOT reported to PSMO-I? Weegy: Contractors must report the following to the insider threat program: Efforts to obtain unauthorized access to classified or proprietary information. While every CBA is unique in some respects, some sample provisions that should be considered in government contracting include: Government Supremacy/Rights: Because a contractor is subject to its government clients directives, consider a provision on the rules, regulations, directives, orders, or work statements that are, or may be, imposed by the government, including on removal of an employee, that will apply and not be subject to the grievance and arbitration procedure. . Information System Security Professional/Security Control Assessor (ISSP/SCA), Information System Security Manager (ISSM). -Actual, probable, or possible terrorism. Select all that apply. Which type of security training typically informs cleared employees of changes or updates to security regulations? Section 3-103 places new burdens on contractors to mitigate this threat. DD Form 254, Department of Defense Contract Security Classification Specification, DD Form 441, Department of Defense Security Agreement. An interim eligibility determination grants the applicant permanent access to classified information by bypassing the remainder of the PCL process. If you are contacted by a member of the media about the information you are not authorized to share, you should take down the person's name and organization, date, time, location, method of contact, and the reason for contact. in. To assist government contractors, this guide discusses some of the labor and employment laws and regulations that should be considered when pricing and performing a government contract. To issue a Facility Clearance (FCL), the Facility Clearance Branch (FCB) reviews which of the following? Hes not sure if he should report it, but he knows it is better not to report an incident or behavior than to make a potentially false report. Before an employee is granted access to classified information, After an employee has access to classified information. While imminent threats should be reported directly to the FBI, employees should use their agencys or facilitys reporting procedures to report other threats through their chain of command. Your knowledge of which factors impact your capability to analyze your vulnerabilities? The level of risk is indirectly proportional to all three factors of risk. When they identify assets, they should include only classified information. look at your operation from both the friendly and adversary perspectives. Select all that apply. Which of the following is a good security practice in areas where classified information may be subject to unauthorized disclosure? Contractors must report to the DSS IS Rep only those violations that result in the loss, compromise, or suspected compromise of classified information. A federal contractor with a contract for a term of performance of at least 120 days and with a value of at least $100,000 ($3,000 for subcontractors) must agree to use E-Verify to verify the . Union Access: Because a contractor is subject to its government clients requirements applicable to visitors, consider including a clause stating that any union representative who wants to visit the employers offices or other places of employment must comply with those requirements. An individuals access level is directly related to the employer organizations Facility Clearance level and the level of access needed for the individual to do his or her job. WINDOWPANE is the live-streaming app for sharing your life as it happens, without filters, editing, or anything fake. If you are unable to determine when total payments made equal or exceed $600, you can estimate the dollar amount of the contract. Select all that apply. The new employee has a current Top Secret eligibility, which was granted by her previous employer. Which of the following organizations conducts periodic Security Vulnerability Assessments (SVAs) of contractor facilities as the CSO to the Department of Defense? When the successor contractor initially solicits the predecessor contractors employees for employment, it must state that the contractor will not be honoring the prior contractors CBA if the contractor does not wish to be bound by it. -is what's meant by the phrase "The domesticated generations fell Weegy: A suffix is added to the end of a word to alter its meaning. -A desire to appear well-informed = 2 5/20 a. User: 3/4 16/9 Weegy: 3/4 ? Government contractors with non-acquisition contracts could have separate, specific contractual obligations establishing protections for controlled unclassified information. The Bridge Agreement should address differences among the previous contractor and the successor contractor in pay periods and paydays, benefits plans, and employer-specific policies addressing work rules and disciplinary procedures, attendance, leave procedures, drug testing, and similar matters. These requirements apply not only to the contractor's employees working directly on a federal contract, but generally to their entire workforce, including locations where no federal contract work is performed. Insurance certificates or proof of insurance. Under the NLRA, a joint employment relationship will be found when one employer directly controls the terms and conditions of employment for another. Select all that apply. Where can elicitation techniques be used? Shift its marginal cost curve upward. Since 1850, the court has issued many influential decisions in a variety of areas . Select all that apply. NISPOM paragraph 1-300 states that contractors must report certain events to the government. Employees desiring not to perform on classified work, Change conditions affecting the facility clearance. Many successor contractors negotiate a Bridge Agreement or a new CBA with the union that represented employees of the previous contractor. Administers the National Industrial Security Program (NISP). You must check the box on the Report of Independent Contractor(s) (DE 542) that indicates Ongoing.If there is no set contract amount, you can report when the total payments in a calendar year equal or exceed $600 and check the Ongoing box. After a need is identified, the Government Contracting Activity (GCA) ___________________. [ Any contact that suggests the employee may be the target of attempted exploitation by the intelligence service of another country. 6 2/3 If a monopolist is producing a level of output where MR is less than MC, then it should. DoD Directive 5240.06, CI Awareness and Reporting (CIAR), DoD 5220.22-M, the National Industrial Security Program Operating Manual (NISPOM). What DSS organization provides security education and training to DoD and other U.S. government personnel and contractors? Please read our. b. annual clearance justification reviews Which international standard has recently been developed to address the socially responsible behavior of firms? Prime contractors must meet certain reporting requirements before they are able to submit a bid that valued at $50 million or more as of the year 2016. 1. Which of the following, when looked at by itself or in conjunction with something else, can point to a vulnerability that an adversary can exploit? EO 13672 prohibits discrimination based on sexual orientation and gender identity. Which organizations are tasked with establishing OPSEC programs under the law signed by President Reagan? International visit requirements apply when information to be disclosed is classified or unclassified but related to classified contracts or otherwise subject to export controls under the International Traffic in Arms Regulations (ITAR) or Export Administration Regulations (EAR). -Competitors This is basically " the contract, " a foundation that the rest of the project details are built upon. To protect the integrity of their mission. Other technical obligations include drafting, implementing, and disseminating a prescribed equal employment opportunity (EEO)/Policy Statement, ensuring that all job postings contain an EEO Tag Line, annually providing all vendors a notice of the employers federal contractor status, incorporating an Equal Opportunity Clause in each of the employers covered subcontracts, notifying all unions of the employers federal contractor status (if applicable), and posting a number of notices on the employers careers website, including an applicant-accessibility statement. Select all that apply. It also requires: (1) inclusion of sexual orientation and gender identity in EEO Taglines where protected statuses are listed (rather than abbreviated Taglines), and (2) posting of updated EEO is the Law posters. The agreement is the most fundamental document in a construction contract bundle. Focused on labor and employment law since 1958, Jackson Lewis P.C. These must be trained in counterintelligence; response procedures; applicable laws and regulations; and applicable civil liberties and privacy issues. When cleared contractors visit a cleared facility or government installation, whose security requirements take precedence? -Inappropriate copying of classified material Which government entity is responsible for providing National Industrial Security Program (NISP) policy direction? contractors must report which of these select all that apply. -Actual, probable, or possible espionage Here is a list of the most common construction contract documents, and what they include. Office of the Director of National Intelligence (ODNI), works for a company with a Facility Clearance (FCL), requires access to classified information. That's why we put together the global hiring guide.But here's a quick recap of five common scenarios for US companies hiring independent contractors both locally and abroad. B.EO 13494 (Economy Government Contracting). Schedule of Implementation. As soon as the completed SF 86 is reviewed by the FSO. Prior results do not guarantee a similar outcome. The Construction Agreement. -Keeping unauthorized backups The primary objective of Section 503 is documented outreach efforts to attract qualified individuals with disabilities such that the employer attains a utilization goal for disabled individuals in each of its AAP job groups of 7%. The DCAA is concerned with identifying and evaluating all contractor activities that contribute to or have an impact on the costs of government contracts. Once there is a duty to bargain, the contractor must respond to the unions information requests within a reasonable time. -Bypassing technology-associated protocols An MPP also may impose additional costs on employers pursuant to trust documents, which usually are incorporated by reference in the CBA or participation agreement. Select all that apply. in writing; through the DoD System of Record, through the DoD System of Record; through e-FCL. Observable and detectable items that can be pieced together through analysis to reveal sensitive information about your operation are called. Any form of violence Directed at an individual or group For a specific reason A member of your team openly discusses her financial difficulties and her inability to meet her financial obligations. A cleared U.S. company received a request to sell export-controlled technology to an Eastern European security organization. He is invited to speak at a foreign conference. Report this information to your organization's security office. None. Industrial Security Facilities Database (ISFD), National Industrial Security Program Operating Manual (NISPOM). No specific procedure is required and, if a grievance cannot be resolved, the employer is not required to arbitrate the grievance. Which of the following BEST identifies the goal of OPSEC? Most inside offenders display concerning behaviors before acting directly against their organization. Security violations are reported to which entity? Cleared employees who refuse to execute Standard Form 312 are reported how? The only requirement for employees to access classified information is to have a favorable eligibility determination. The contractor need not obtain the unions consent to proceed, as long as it follows established disciplinary procedures. Sharing details of your personal and professional lives of life online makes you _______________ adversaries. 1:43 pm junio 7, 2022. raquel gonzalez height. Provide advice, assistance, and guidance regarding counterintelligence best practices, Authorize and maintain Information Systems, Assist with foreign travel briefings and debriefings. fj45 for sale alberta; nilgai hunting yturria ranch; contractors must report which of these select all that apply; sales hunter interview questions. The ATO is responsible for the writing of the AT plan. c. Lower its output. What kind of report should be submitted? c. The company is moving to a new location to meet the needs of its growing staff. To promote an environment in which federal contracts for goods or services will be performed by contractors whose work will not be interrupted by labor unrest, President Barack Obama signed into law a mandate that federal contractors inform employees of their rights under the NLRA. Any contact by cleared employees with known or suspected intelligence officers from any country. Details on E-Verify are available in the E-Verify Manual for Federal Contractors and Subcontractors. Although the EO and the corresponding regulations apply only to large-scale construction projects, the wording of both the EO and the implementing rules reiterate federal contracting agencies are not prohibited from requiring PLAs on projects that do not fall within the $25-million threshold. Industrial Security Representative (IS Rep). Jackson Lewis attorneys are available to discuss these and other issues that affect government contractors. In connection with this, the DCAA evaluates whether costs are allocated to coincide appropriately with each employees division of time. Additionally, you must also pay the matching employer portion of social security and Medicare taxes as well as pay unemployment tax on wages paid to an employee. In contrast to other FAR provisions, Clause 52.222-50 must appear in all solicitations and contracts. The ______________ has been designated as the Cognizant Security Office (CSO) for the DoD and over 30 other non-DoD agencies. a. -Over the phone DoD Insider Threat Awareness Quiz_ Nov 2022 (Answered). DBA states that all government construction contracts over $2,000 to which a federal agency or the District of Columbia is a party must include provisions for paying workers on-site no less than the local prevailing wages and benefits as set by the DOL. The development of a countermeasure focuses directly on the. Which of the following topics is NOT included in the National Industrial Security Program Operating Manual (NISPOM)? What step in the OPSEC process is Analyzing Threats? Updated 284 days ago|5/24/2022 11:00:50 AM, Contractors must report the following to the insider threat program: Efforts to obtain unauthorized access to classified or proprietary information. contracts. Which of the following must be reported to the Defense Counterintelligence and Security Agency and the FBI? June 17, 2022 . When setting its negotiating strategy and objectives, the contractor should know which cost increases are budgeted for the contractor to pay and which expenses are reimbursable by the government client. Further, if no agreement is reached and incorporated by the government client, and the U.S. DOL does not replace the Wage Determination before the contract is rebid, other prospective bidders may only be required to comply with the Wage Determination. Similarly, instead of making contributions to a union-sponsored pension plan, the contractor can make the contributions to its companys 401k or a similar retirement plan. = 15 ? Any agreement negotiated also may apply automatically to separate contractors who are found to be joint employers. c. reporting required information. A company cleared at the Secret level hires a new employee. Select all that apply. Yes. With a couple of exceptions, verification of employment must be completed within three business days after a newly hired employees start date. It's often the little things we do every day that can develop into vulnerabilities and cause damage to our operation. To use leave, employees need only make an oral or written request to the employer, with the expected duration of leave, at least seven days before the scheduled leave, or as soon as practicable if the need for leave is unforeseeable. Employers need not pay for unused accrued leave upon an employees separation from employment. provides for early detection of OPSEC problems. The FSO is not notified but must look for eligible employees in the DoD system of record. Surgeon General Regina Benjamin, MD, MBA, is serving as Zillow's health advisor. Efforts to compromise a cleared employee. If you are contacted by a member of the media about information you are not authorized to share, you should take down which of the following details? These blank check provisions can result in contractual withdrawal liability and exit fees (in pension and welfare plans), midterm contribution increases, and special assessments, among other midterm surprises. The Commander is responsible for the development of the AT plan. OPSEC is a systematic, proven process to identify, control and protect classified information about a mission, operation or activity, and, thus, denying/mitigating adversary's ability to compromise/interrupt that mission, operation or activity. Government employees temporarily stationed at a contractor facility ______ control of their work products to the contractor. Increase its output. Wage increases and other increases conditioned upon reimbursement by the government are not permissible under the SCA. a. periodic reinvestigations Joint Personnel Adjudication System (JPAS). Additionally, beginning January 1, 2020, tipped employees performing work on or in connection with covered contracts generally must be paid a minimum cash wage of $7.55 an hour. Generally, you must withhold and deposit income taxes, social security taxes and Medicare taxes from the wages paid to an employee. The acronym EAP stands for _____? Which of the following should Sam refer to for counterintelligence and threat awareness requirements for contractors? . What legally binding document must be executed between the Department of Defense and a contractor to obtain a facility clearance? He is working with other company officials to identify the organizations assets. The Drug-Free Workplace Act of 1988 (DFWA) requires certain federal contractors to agree to provide drug-free workplaces as a condition of receiving a contract from a federal agency. Which of the following countermeasures can you implement to help reduce technology-associated insider threats? Any contact by cleared employees with known or suspected intelligence officers from any country. Likewise, employers who are covered by the VEVRAA must submit VETS-4212 reports. If the visitor organization and host organization both use the DoD System of Record, visit notifications are sent electronically, which speeds the approval process. Lesser disciplinary actions may be discussed with the union after the action is taken. True Contractors must recognize that their obligations under these laws and executive orders also apply to their subcontractors. If there is not a contractual relationship between the visitors organization and the host organization, where must the host organization obtain authorization for disclosure of classified information? Which of the following government entities typically determines personnel security clearance eligibility? Efforts to obtain unauthorized access to classified or proprietary information Any contact by cleared employees with known or suspected intelligence officers from any country Whenever an individual stops drinking, the BAL will ________________. Adam is an expert in his organizations dual use technology. Who sponsors classified meetings in the NISP? Of the scenarios listed below, which ones must be reported to your IS Rep as change conditions affecting the facility's clearance? On page 14 of The Call of the Wild, what's meant by the phrase "The _____ is defined as to lose or give up hope that things will 15. According to NISPOM paragraph 1-300, which of the following is the contractor required to report to the government? The dynamic nature of our site means that Javascript must be enabled to function properly.