contractors employees active duty military The definition of Targeted Violence includes which of these components? One such requirement, defined in the NISPOM, states that contractors must report certain events to the appropriate government agencies, that may have an effect on the status of the entity's or an employee's eligibility for access to classified information. The EEO-1 report collects gender and race/ethnicity data by type of position. Changes in a facility's storage capability are reported how? This material may be considered attorney advertising in some jurisdictions. What is a final security control in the NISP when the purpose of a visit has been accomplished? The true about technology and insider threat is: Technology changes the scale of risk from insider threats. This answer has been confirmed as correct and helpful. Evidence of tampering with your facility's classified storage container is an example of what type of security threat? Suppose that you randomly pick eight first-time, full-time freshmen from the survey. Section 503 also imposes a number of technical obligations and restrictions similar to those of the Americans with Disabilities Act. Your knowledge of which factors impact your capability to analyze your vulnerabilities? Contractors must report which of these? Of the following types of personnel-related information, which is NOT reported to PSMO-I? What are some of the indicators Adam should look out for? Select all that apply All 4 answers A coworker shares that she and her husband are facing foreclosure, and she doesn't know what to do. Otherwise, a contractor would need to wait until it is required to file an EEO-1 report and receive an EEO-1 identifier to register for the portal. Knowledge of the threat supports all other steps in the OPSEC process. Which paragraph of the AT plan lists the specific task for each subordinate unit? DoD Insider Threat Awareness Quiz_ Nov 2022 (Answered). What kind of report should be submitted? Specific clearance and access requirements, Authorization to generate classified information, A method for denying an adversary access to our critical information. -A desire to appear well-informed Federal contractors must report the names and total compensation for the contractors five most highly compensated officials and first-tier subcontractor awards on contracts expected to reach at least $25,000. What security control measure outlines the specific export-controlled information that has been authorized for release during a foreign visit and delineates how a company will control access? b. Select all that apply. = 2 1/4. 1:43 pm junio 7, 2022. raquel gonzalez height. As just one example, changing the design of a tile floor is much easier to do before the tile is ordered, rather than after it's installed. If a candidate has a record in the DoD system of record (JPAS/DISS) and a pre-existing eligibility determination, the FSO assesses whether that determination may be accepted in lieu of initiating a new investigation to determine eligibility. contractors must report which of these to the insider threat program select all that apply Contractors must report the following to the insider threat program: Efforts to obtain unauthorized access to classified or proprietary information. Grievances: As the union should not direct any grievances to the government client, consider including a provision stating that the union will only use the procedure in the CBA to raise and remedy grievances and not direct any grievances to the government client. How is the applicants FSO notified if the applicant receive an unfavorable eligibility determination? contractors are adequate for the protection of classified information. If you are contacted by a member of the media about information you are not authorized to share, you should take down which of the following details? t. e. Affirmative action in the United States is a set of laws, policies, guidelines, and administrative practices "intended to end and correct the effects of a specific form of discrimination" [1] that include government-mandated, government-approved, and voluntary private programs. -Keeping unauthorized backups Prime contractors must meet certain reporting requirements before they are able to submit a bid that valued at $50 million or more as of the year 2016. They must provide the contracting agency, also weekly, a certified copy of all payrolls providing the information above for the previous weeks payroll period. -Bypassing security rules or protocols Companies doing business with the federal government must comply with a litany of complex laws and regulations that affect their day-to-day business operations. (a)Contractors debarred, suspended, or proposed for debarment. Confidentiality of the records or information is not a valid reason to withhold the requested information, but the contractor can require a non-disclosure agreement. American Society for Industrial Security International (ASIS), NCMS, the Society of Industrial Security Professionals, Industrial Security Awareness Council (ISAC). Where can elicitation techniques be used? contractors must report which of these select all that apply. Which of the following statements is true about technology and the insider threat? DoDM 5200.01, Volume 1, Enclosure 3, DoD Information Security Program. What security control measures must the host organization implement for a classified meeting? The PPA creates additional contribution responsibilities for employers obligated to contribute to critical status or red zone MPPs and the minimum funding rules, which establish mandatory annual contribution requirements. XYZ Industries is a cleared facility that is moving its headquarters to a less expensive office space. Focused on labor and employment law since 1958, Jackson Lewis P.C. authority to obtain a Facility Verification Request, authority to request additional special access authorizations. Physical security systems provide the means to counter threats only during wartime. Report the concerning behavior to your security officer. -Any event that may impact an individual's personnel security clearance To ensure there are enough cleared employees to meet the needs of a contractor companys classified contract workload, To provide the CEO with justification for hiring more cleared employees, To assess whether a cleared employee still requires access to classified information. An employers right to seek medical certification for the leave is limited. = 2 5/20 The FSO submits the applicants completed SF-86 using which of the following? In the NISPOM, what location does 1-302 represent? In fact, the government mandates that contractors who are awarded a contract above a certain threshold ($5.5 million to be performed over at least 120 days) MUST have a code of business ethics and conduct and, for large, noncommercial items contractors, a business ethics awareness program and internal control system. Some existing federal contracts may also be bilaterally modified to include the FAR EVerify clause after the effective date of the rule. In contrast to other FAR provisions, Clause 52.222-50 must appear in all solicitations and contracts. In the case of public works projects, contractors must pay their workers on a weekly basis. Similarly, instead of making contributions to a union-sponsored pension plan, the contractor can make the contributions to its companys 401k or a similar retirement plan. Covered contracts are contracts subject to procurement contracts for construction covered by the DBA (but not contracts subject only to the DBRA); service contracts covered by the SCA; concessions contracts, including any concessions contract excluded from the SCA by the DOLs regulations at 29 CFR 4.133(b); and contracts in connection with federal property or lands and related to offering services for federal employees, their dependents, or the general public. Contractors also must: (1) affirmatively notify employees and agents of the above prohibitions and the corrective action it will take for any violations; (2) include the substance of the Clause in certain subcontracts and contracts with agents; (3) take appropriate action in response to any violations; (4) notify the agency contracting officer of (i) any credible information it receives regarding any violation by the employees or agents of the contractor or subcontractor; and (ii) any actions taken against any such violator; and (5) cooperate fully with the government in investigating alleged violations. Covered employees must be allowed to accrue leave up to at least 56 hours annually. possess the ability to acquire and exploit our critical information. d. Lower its price. Where can he find reporting procedures that pertain to his organization? Jack is his organizations Facility Security Officer. The domestic delivery services approved for overnight domestic delivery of Secret and Confidential information are listed in the ______________________. When the visit is a first-time visit and the DoD System of Records does not indicate that the visitor has signed an SF-312, The visitor must always sign it at every visit to any classified facility, When the visitor presents a visit authorization letter (VAL), When it is the visitors first visit to the cleared facility. U.S. Government employees and contractors must report the following: Personal foreign travel; foreign contacts; speeches or books including information about involvement with the intelligence community. 2e9Th)0vo Vq -,234b3##V\;h6 !f$eE63F $tN8a *qjcE. Likewise, employers who are covered by the VEVRAA must submit VETS-4212 reports. Contractors must report which of these to the insider threat program? Which of the following topics is NOT included in the National Industrial Security Program Operating Manual (NISPOM)? Some federal contracts require contractors to have the ability to access classified information. When a successor contractor hires a majority of the predecessor contractors employees, it must recognize and bargain with any union that represents those employees regarding wages, benefits, and all other terms of employment. An advantage of incorporating the use of OPSEC surveys is that it. This EO amends EO 11246, which imposes anti-discrimination and affirmative action requirements upon federal contractors, to prohibit discrimination on the basis of sexual orientation and gender identity. When this need has been established, a procuring agency of the government, or a cleared contractor (in the case of subcontracting), may request the clearance for the bidding contractor. Which of the following, when looked at by itself or in conjunction with something else, can point to a vulnerability that an adversary can exploit? Which of the following should Sam refer to for counterintelligence and threat awareness requirements for contractors? Additionally, beginning January 1, 2020, tipped employees performing work on or in connection with covered contracts generally must be paid a minimum cash wage of $7.55 an hour. The company has merged with another company and is under new ownership. Most inside offenders display concerning behaviors before acting directly against their organization. An advantage of using good OPSEC principles during contingencies is that it. In a standard withdrawal, the employer continues to make payments until its withdrawal liability is satisfied (with interest charged at a rate determined by the MPP) or the employer makes 20 annual payments, whichever occurs first. Existing paid time off (PTO) policies may be acceptable satisfaction of these obligations if they comply with all of the elements of EO 13706. Bargaining impasse often is difficult to establish; the employer must demonstrate both that the parties are deadlocked and that further discussions likely will not lead to an agreement. It is critical, therefore, to maintain labor-charging internal control systems and educate employees on their responsibility to accurately record their time charges on federal contract work. As evidence of their compliance with the requirement to pay workers the prevailing wage, covered contractors must maintain records during the work and for three years after job completion reflecting the following: Employers must pay workers covered by the DBA/DBRA weekly. Online. These must be trained in counterintelligence; response procedures; applicable laws and regulations; and applicable civil liberties and privacy issues. The Construction Agreement. If you are unable to determine when total payments made equal or exceed $600, you can estimate the dollar amount of the contract. Technology changes the scale of risk from insider threats. Report this information to your organization's security office. The process of obtaining a Facility Security Clearance and a Personnel Security Clearance is established by the Defense Security Service (DSS), which is the interface between the government and the contractors who need clearance. A successor contractor for a contract to provide services of a predecessor contractor with a collective bargaining agreement (CBA) in place which replaced the U.S. Department of Labors (DOL) Wage Determination for the contract must honor the wage rates and covered fringe benefit provisions of that CBA for the first year of the contract. -Personal foreign travel, module 6 ( process of care, and communication), Cyber Awareness Challenge 2023 (Incomplete), John David Jackson, Patricia Meglich, Robert Mathis, Sean Valentine, Service Management: Operations, Strategy, and Information Technology, Operations Management: Sustainability and Supply Chain Management. demonstrate the intent and capability to be a threat to our mission. fj45 for sale alberta; nilgai hunting yturria ranch; contractors must report which of these select all that apply; sales hunter interview questions. This answer has been confirmed as correct and helpful. Office of the Director of National Intelligence (ODNI), works for a company with a Facility Clearance (FCL), requires access to classified information. When does a host need to coordinate with the visitors organization regarding the Classified Information Nondisclosure Agreement (SF-312)? Contractors with a federal acquisition contract or subcontract must apply 15 basic cybersecurity safeguarding requirements and procedures to protect federal contract information. The requirements are based on security requirements published in the National Institute of Standards and Technologys (NIST) Special Publication (SP) 800-171, Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations. Specific requirements are in FAR Subpart 4.19 and FAR Clause 52.204-21. Federal contractors and subcontractors with a single government contract or subcontract of at least $150,000 must follow the non-discrimination and related provisions concerning protected veterans covered under the Vietnam Era Veterans Readjustment Assistance Act (VEVRAA). This behavior may include (select all that apply): -violation of workplace policies -failure to follow standard procedures (SOP) -legal difficulties 2020 Jackson Lewis P.C. In order to determine our critical information, we need to consider both the friendly and adversary points of view. To whom should you report if you are contacted by a member of the media about information you are not authorized to share? Hes not sure if he should report it, but he knows it is better not to report an incident or behavior than to make a potentially false report. Hostile entities may use social media to _______________ ? Select all that apply. Depending on the contractors specific organizational needs, other provisions should be considered. In addition, if required by the government contract, consider requiring reinstatement be subject to approval by the government client. The primary source of data for these AAP analyses is race and gender data collected through pre- and post-offer applicant and employee invitations to self-identify. -Hoarding files and data Visitors Facility Security Officer (FSO), DSS Headquarters Industrial Security Integration and Application (IP) Programs. Employers with at least 50 employees and a single federal contract or subcontract of at least $50,000 must comply with non-discrimination and affirmative action provisions of Section 503 of the Vocational Rehabilitation Act, including the requirement to annually prepare a written AAP for each establishment with at least 50 employees. b. Select all that apply. (916) 416-9278 | what is the most attractive height for a man This also fails to apply if an arbitration agreement is already in place. In addition, because a contractor cannot require a successor contractor to reinstate the grievant, the CBA should state that the contractors back pay and reinstatement obligations end when the contract ends. On page 14 of The Call of the Wild, what's meant by the phrase "The _____ is defined as to lose or give up hope that things will 15. hb```e``: AXr,lnfhs"k;dxk_42v6J possess the ability to exploit our critical information. According to the NISPOM, espionage, sabotage, terrorism, or subversive activities should be reported as a(n) ___________________. Jorge is a security official for a DoD organization. a. Select ALL the correct responses. -Prevent unauthorized data access As with race and gender data under EO 11246, VEVRAA and Section 503 require covered employers to invite pre- and post-offer applicants and employees to self-identify for status as a protected veteran or disabled individual. Federal contractors must report the names and total compensation for the contractor's five most highly compensated officials and . The EO states that federal contractors and subcontractors subject to the NLRA must post a notice containing information proscribed by the DOL that informs employees of their rights under the NLRA in all plants and offices where employees are performing work on the federal contract. Further, if no agreement is reached and incorporated by the government client, and the U.S. DOL does not replace the Wage Determination before the contract is rebid, other prospective bidders may only be required to comply with the Wage Determination. Which contracting document provides a record of the contractors commitment to comply with the National Industrial Security Program Operating Manual (NISPOM)? What should you do? Yes. Adam is an expert in his organizations dual use technology. Working late one evening on a priority project, Helen left several classified documents visible on her desk while she stepped away from her desk for a moment. F.EO 13658 (Minimum Wage for Contractors). When cleared contractors visit a cleared facility or government installation, whose security requirements take precedence? Select all that apply. Contractors must report which of these? This would be impractical unless the contractor chooses to adopt the CBA and the health insurance was provided through a union-sponsored plan. -Actual, probable, or possible terrorism. 8-100d. Which of the following is a secure online environment offered by the OPM Center for Federal Investigative Services? Contractors must report which of these? What system may be used to verify a companys Facility Clearance status? When the host organization approves a visit request, this approval constitutes _____. A Bridge Agreement usually is based on the previous contractors CBA with changes to the provisions that do not apply or do not work for the new contractor for business reasons. This will allow the contractor to understand the extent to which the PLA will affect the costs of the work and bid accordingly. Select all that apply. The minimum wage rate is annually increased by the Secretary of Labor. Company ABC was recently issued a facility clearance and has been awarded its first classified contract. -Improper use of privileged access %%EOF During contract performance, if the contractor becomes involved in the labor relations matters of the subcontractor, it can become responsible for the subcontractors actions under federal labor laws. None. They are indicators that tell adversaries where to focus their collection efforts, They are vulnerabilities that tell adversaries where to focus their collection efforts, They are indicators that are not part of a unit's normal conduct, They are vulnerabilities that are not part of a unit's normal conduct. c. Lower its output. B.EO 13494 (Economy Government Contracting). WINDOWPANE is the live-streaming app for sharing your life as it happens, without filters, editing, or anything fake. Many successor contractors negotiate a Bridge Agreement or a new CBA with the union that represented employees of the previous contractor. Generally, the employers withdrawal liability obligation is satisfied by making annual payments determined by a formula intended to approximate the employers annual contributions to the MPP. -In email DD Form 254, Department of Defense Contract Security Classification Specification, DD Form 441, Department of Defense Security Agreement. We need to identify an adversary's capability. Select all that apply. Why should organizations use and practice OPSEC? Whether or not a Bridge Agreement is negotiated, a successor employer has an obligation to meet with the union and negotiate in good faith for a CBA. Under Executive Order (EO) 11246, employers with a covered supply or service federal contract or subcontract of at least $50,000 must engage in affirmative action efforts to increase the workforce representation of women and minorities. Details on E-Verify are available in the E-Verify Manual for Federal Contractors and Subcontractors. Sam is a Facility Security Officer for a cleared defense contractor. c. reporting required information. Provide for the early detection and referral of potential espionage cases. The contractor also must certify annually to the contracting officer that it has implemented a compliant plan (including due diligence investigation) and that, to the best of its knowledge, it is not aware of any violations. One way to do this is by conducting a thorough bid/no-bid analysis that meets your company's goals and is in line with your long-term strategy. Contractors must report which of these? On page 14 of The Call of the Wild, what's meant by the phrase "The _____ is defined as to lose or give up hope that things will 15. dillard funeral home pickens, sc, lovett lacrosse roster,