Self-Inspection Handbook for NISP Contractors, Suggested Contract File Folder Headings job aid. Anyone who opposes or acts against your interest is called a(n), In analyzing the threat, we are concerned with adversaries that. This would be impractical unless the contractor chooses to adopt the CBA and the health insurance was provided through a union-sponsored plan. According to the DCAA, [T]imekeeping procedures and controls on labor charges are areas of utmost concern. One area of the DCAAs attention is whether the contractor has a timekeeping system to track an employees time spent on each work activity. a. The development of a countermeasure focuses directly on the. What is the preferred method of assessing the risk to your organization? You are interested in the number that believe that same-sex couples should have the right to legal marital status. By Dion Y. Kohler, Laura A. Mitchell, Michael H. Neifach, Amy L. Peck, Robert R. Perry and Patricia Anderson Pryor. Any agreement negotiated also may apply automatically to separate contractors who are found to be joint employers. Here is a list of the most common construction contract documents, and what they include. If after a contractor has a duty to bargain and before a CBA is negotiated, the contractor must discuss suspending or terminating an employee with the union before so doing, unless exigent circumstances exist. Any individual or group that represents a foreign government is considered a security threat. Select all that apply. allows for any changes in OPSEC factors over time. The Davis-Bacon Act (DBA) establishes the requirement for paying prevailing wages on projects involving the construction, alteration, or repair (including painting and decorating) of public buildings or public works. 3. This EO amends EO 11246, which imposes anti-discrimination and affirmative action requirements upon federal contractors, to prohibit discrimination on the basis of sexual orientation and gender identity. DD Form 254, Department of Defense Contract Security Classification Specification, DD Form 441, Department of Defense Security Agreement. To whom should you report if you are contacted by a member of the media about information you are not authorized to share? contractors must report which of these select all that apply Given the complexities involved, employers would be well-served to address their particular situations with experienced counsel. Select all that apply. Select all that apply. -Any event that may impact an individual's personnel security clearance -Any event that may impact the status of the facility -Anything that affects the proper safeguarding of classified information -Any indication that classified information has been lost or compromised How is the applicants FSO notified if the applicant receive an unfavorable eligibility determination? DD Form 254, DoD Contract Security Classification Specification, Transportation, Delivery, and Relocation Solutions (TDRS), Schedule 48. An insider threat is anyone with authorized access to the information or things an organization values most, and who uses that access, either wittingly or unwittingly, to inflict harm to the organization or national security. = 15 * 3/20 16/9 = Weegy: Whenever an individual stops drinking, the BAL will decrease slowly. NISPOM paragraph 1-300 states that contractors must report certain events to the government. prioritize the distribution of resources for applying countermeasures. (Select all that apply.). Lack of proper training, use of non-secure communications, and poor system design are all examples of. This need to be reported to the companys IS Rep? 20/3 Inform the DSS IS Representative that all visitors to the area must wear a badge, Inform the project manager of the heightened risk and ensure the visitor has an escort. possess the ability to acquire and exploit our critical information. Under the NLRA, a joint employment relationship will be found when one employer directly controls the terms and conditions of employment for another. A successor contractor can satisfy its obligation to provide the same health insurance benefits of the predecessor contractor by matching the benefit. They must implement written codes of business ethics and conduct, an employee awareness and compliance program, and an internal control system. The Government Funding Transparency Act of 2008 (GFTA) requires the Office of Management and Budget (OMB) to establish a free, public website containing full disclosure of all federal contract award information. After returning from a recent professional conference, Franklin received a request for classified information from an uncleared person that he met at the conference. Which of the following are things that adversaries want to know? What is a final security control in the NISP when the purpose of a visit has been accomplished? Under the final regulations, which became effective on January 11, 2016, employers entering into new contracts (or modifying existing contracts) after January 11, 2016, must incorporate proscribed nondiscrimination language into their nondiscrimination policies, as well as have required postings on their websites and in their workplaces. When setting its negotiating strategy and objectives, the contractor should know which cost increases are budgeted for the contractor to pay and which expenses are reimbursable by the government client. -Former employees The thirteen adjudicative guidelines involve assessing a candidate using criteria that addresses a specific concern that can impact the candidates ability to protect national security. The domestic delivery services approved for overnight domestic delivery of Secret and Confidential information are listed in the ______________________. How many steps are there in the OPSEC process? True or false? None. Office of the Director of National Intelligence (ODNI), works for a company with a Facility Clearance (FCL), requires access to classified information. Contractors must report which of these? Events that require the facility to be open outside of regular business hours, Events that affect the proper safeguarding of classified information, Any change in the number of GSA security containers being used at the contractor facility to protect classified information, An increase or decrease in the number of classified documents stored at the contractor facility. Security violations are reported to which entity? These requirements apply not only to the contractor's employees working directly on a federal contract, but generally to their entire workforce, including locations where no federal contract work is performed. Generally, the employers withdrawal liability obligation is satisfied by making annual payments determined by a formula intended to approximate the employers annual contributions to the MPP. Contractor Portal Frequently Asked Questions - DOL Which investigation type is required for an initial Top Secret Clearance? Training records management: Contractors must create and maintain records of all employee insider threat awareness programs initial and refresher training and those records must be available for review during DSS security vulnerability assessments. Select all that apply. When this need has been established, a procuring agency of the government, or a cleared contractor (in the case of subcontracting), may request the clearance for the bidding contractor. Security control measures are the responsibility of the Government Contracting Activity. An employees need for a Personnel Security Clearance (PCL) is determined by the program manager, but the clearance level is determined by the Government Contracting Activity (GCA). An advantage of incorporating the use of OPSEC surveys is that it. Efforts to obtain unauthorized access to classified or proprietary information Any contact by cleared employees with known or suspected intelligence officers from any country Compliance Documents You Should Be Collecting from Your - Premier International visit requirements apply when information to be disclosed is classified or unclassified but related to classified contracts or otherwise subject to export controls under the International Traffic in Arms Regulations (ITAR) or Export Administration Regulations (EAR). U.S. Government employees and contractors must report which of the following? -Allowing large amounts of data to be accessed The FSO is not notified but must look for eligible employees in the DoD system of record. Which step in the OPSEC process requires you to look at your operation through the eyes of the adversary? Jorge is a security official for a DoD organization. contractors must report which of these select all that apply. d. The company just lost its largest contract and has filed for bankruptcy. The contractor must also report any such equipment, systems, or services discovered during contract performance; this requirement flows down to subcontractors. -Gather information on personnel That's why we put together the global hiring guide.But here's a quick recap of five common scenarios for US companies hiring independent contractors both locally and abroad. contractors must report which of these select all that apply OPSEC focuses on what type of critical information? Refusal to execute Standard Form (SF) 312. DoD Insider Threat Awareness Quiz_ Nov 2022 (Answered How is the FSO notified that a cleared employee may be due for a periodic reinvestigation? 12 Fam 270 Security Reporting Requirements A union may request anything reasonably related to the unions performance of representation duties, such as bargaining, contract administration and enforcement, and investigating and pursuing potential grievances. -Bypassing technology-associated protocols According to section 10.2.8, the general contractor should report any work-related accident in writing to the owner, and will be responsible for any costs the owner incurs related to the accident. Which contracting document provides a record of the contractors commitment to comply with the National Industrial Security Program Operating Manual (NISPOM)? This will allow the contractor to understand the extent to which the PLA will affect the costs of the work and bid accordingly. The ______________ has been designated as the Cognizant Security Office (CSO) for the DoD and over 30 other non-DoD agencies. contractors must report which of these to the insider threat program select all that apply Contractors must report the following to the insider threat program: Efforts to obtain unauthorized access to classified or proprietary information. Government Contractors Required to Provide Insider Threat Awareness Joint Staff Insider Threat Awareness Flashcards | Quizlet Some federal contracts and subcontracts may require the contractor to provide paid sick leave. Which of the following is a technology-related indicator? The following statement best characterizes Matthew Arnold's view of the world: The world is a confusing and hostile place. Which of the following is a secure online environment offered by the OPM Center for Federal Investigative Services? Insurance certificates or proof of insurance. Which of the following is an objective of the DSS CI Directorate? Where are actions, such as Personnel Security Clearance terminations, upgrades, downgrades, and reinstatements, on contractor employees entered? What type of violation has occurred? Construction contractors with a federal construction contract or federally assisted construction contract, or subcontract, of at least $10,000 must follow the non-discrimination and related provisions of EO 11246. Report the concerning behavior to your security officer. Under VEVRAA, covered employers must engage in documented outreach efforts to attract qualified protected veterans in a good faith effort to annually attain a veteran hiring benchmark of 5.9%. The EO gives federal agencies the authority to require contractors to enter into PLAs for large-scale construction projects, each of which is a project with a total cost exceeding $25 million. Physical security systems provide the means to counter threats only during wartime. User: She worked really hard on the project. A Bridge Agreement is designed to be short-term to fill the gap until a completely new CBA can be negotiated. -Unauthorized disclosure of classified material. -Actual, probable, or possible subversive activities Suspected compromise of classified information. Federal contractors and subcontractors with a single government contract or subcontract of at least $150,000 must follow the non-discrimination and related provisions concerning protected veterans covered under the Vietnam Era Veterans Readjustment Assistance Act (VEVRAA). Step 2: Create new tags and tag transactions. What system may be used to verify a companys Facility Clearance status? Federal contractors must report the names and total compensation for the contractors five most highly compensated officials and first-tier subcontractor awards on contracts expected to reach at least $25,000. What DSS organization provides security education and training to DoD and other U.S. government personnel and contractors? Some federal contracts require contractors to have the ability to access classified information. The definition of Targeted Violence includes which of these components? If the visitor organization and host organization both use the DoD System of Record, visit notifications are sent electronically, which speeds the approval process. A successor contractor for a contract to provide services of a predecessor contractor with a collective bargaining agreement (CBA) in place which replaced the U.S. Department of Labors (DOL) Wage Determination for the contract must honor the wage rates and covered fringe benefit provisions of that CBA for the first year of the contract. Gopuff Background Check Requirementscom with instructions, or you can log into the Checkr applicant portal to view the status of your background check. Significant change in work habit To whom should you report if you are contacted by a member of the media about information you are not authorized to share? How to verify need-to-know in the DoD System of Record before a classified discussion, Physical security procedures and access areas, Policy and procedures for transmitting and/or transporting classified material. OPSEC is a systematic, proven process to identify, control and protect classified information about a mission, operation or activity, and, thus, denying/mitigating adversary's ability to compromise/interrupt that mission, operation or activity. Before conducting an interview with an employee that could lead to disciplinary action, the employee is entitled to union representation during the interview upon request. -Any event that may impact the status of the facility An interim eligibility determination grants the applicant permanent access to classified information by bypassing the remainder of the PCL process. . In addition, covered contractors must conduct annual analyses of their applicant flow, hiring, promotion, termination, and compensation practices. Prime contractors must meet certain reporting requirements before they are able to submit a bid that valued at $50 million or more as of the year 2016. As with race and gender data under EO 11246, VEVRAA and Section 503 require covered employers to invite pre- and post-offer applicants and employees to self-identify for status as a protected veteran or disabled individual. Which of the following countermeasures should be used sparingly because of its expense and maintenance difficulty? performing on Department contracts; and (2) Individuals assigned to the Department from another federal agency must adhere to their home agency's security reporting requirements and additional post or mission requirements. Contractors must maintain three years of EEO-1 reports as part of their AAPs. Give the group a name. When considering assets, she knows that the greatest target of our adversaries is ___________. Which of the following BEST identifies the goal of OPSEC? There must be a bona fide procurement requirement to have access to U.S. classified information or facilities. Once there is a duty to bargain, the contractor must respond to the unions information requests within a reasonable time. Weegy: A basic position in American foreign policy has been that America must defend its foreign interests related to Weegy: 15 ? importance of the critical information item. hbbd```b``@$G6"5 vdVc$GG1012HM``$@gx makes OPSEC principles second nature to your employees. Some employers do not wish to make contributions to a unions multiemployer pension plan because of the risk of incurring potentially significant withdrawal liability in the future. What legally binding document must be executed between the Department of Defense and a contractor to obtain a facility clearance? Added 77 days ago|11/12/2022 9:28:04 PM ], Witch one of the following statements best characterizes Arnold s view of world, WHICH OF THE FOLLOWING STATEMENTS IS TRUE ABOUT TECHNOLOGY AND INSIDER THREAT. You may also request proof of automobile insurance if the sub has their . Select all that apply. Which paragraph of the AT plan lists the specific task for each subordinate unit? User activity monitoring on classified information systems: Select all that apply. The company has hired 12 new employees to support a new major contract. Similarly, instead of making contributions to a union-sponsored pension plan, the contractor can make the contributions to its companys 401k or a similar retirement plan. Since 1850, the court has issued many influential decisions in a variety of areas . Supplemental Guide For Federal Contractors - E-Verify authority to obtain a Facility Verification Request, authority to request additional special access authorizations. = 45/20 In order to make the bid/no-bid decision, there are a number of factors to consider to make an objective, rather than a subjective, decision. Which of these may be targeted by foreign entities? determine the collection methods the adversary is using against you. Who might be interested in non-public information that an insider can provide? Please read our. What kind of report should be submitted? 6 2/3 Provide visitors with a badge and an escort who has been informed of the access limitations or restrictions on the visitor's movements. c. Lower its output. Which of the following roles are filled by contractor employees? Insider Threat Awareness Flashcards | Quizlet An adversary's capability is defined as his ability to do which of the following? _____ is a conversation t Less. Risk of civil and criminal exposure also exist under the False Claims Act if a contractor knowingly allows employees to make false charges in connection with a federal contract. provides for early detection of OPSEC problems. It also must pay the covered fringe benefits in the CBA, which usually includes health insurance, disability benefits, life insurance, 401k plans, pension plans, rate differentials, premium pay provisions, holidays, vacation, paid sick leave, military pay, severance pay, jury duty pay, bereavement pay, and uniform and shoe allowances. EO 13672 prohibits discrimination based on sexual orientation and gender identity. The Drug-Free Workplace Act of 1988 (DFWA) requires certain federal contractors to agree to provide drug-free workplaces as a condition of receiving a contract from a federal agency. What document does DSS publish and post on its website to change or clarify existing policy requirements in the NISPOM? -A desire to be polite -Speeches or books including information about involvement with the Intelligence Community True -Hoarding files and data All executive departments and agencies with national security missions. Foreign attendees business cards do not match stated affiliations, Excessive or suspicious photography and filming of technology and products, Conversations involving classified, sensitive, or export-controlled technologies or products.