contractors must report which of these select all that apply

Contractors with federal contract awards of at least $5 million (entered into on or after December 12, 2008) are subject to Federal Acquisition Regulation ethics rules. An individuals access level is directly related to the employer organizations Facility Clearance level and the level of access needed for the individual to do his or her job. Only select Cognizant Security Agencies (CSAs) have hotlines for reporting industrial security issues. Observable and detectable items that can be pieced together through analysis to reveal sensitive information about your operation are called. How many steps are there in the OPSEC process? consular corps association of philadelphia tequileras scarborough maine menu pfizer board of directors political affiliation how many grandchildren did fred astaire . When a bargaining impasse occurs, the employer may implement terms it proposed to the union during bargaining. -Non-state actors. An advantage of integrating OPSEC principles in your day-to-day operations is that it. Any contact by cleared employees with known or suspected intelligence officers from any country. While they need not have a written AAP, they must implement an AAP that includes 16 specified requirements that are substantially similar to the obligations for supply and service contractors. The Weegy: A modal verb (also modal, modal auxiliary verb, modal auxiliary) is a type of auxiliary verb that is used to U. S. government employees and contractors must report which of the following? SF 328, Certificate Pertaining to Foreign Interests, SF 86, Questionnaire for National Security Positions. a. A coworker shares that she and her husband are facing foreclosure, and she doesn't know what to do. You are interested in the number that believe that same-sex couples should have the right to legal marital status. Which of the following is a good security practice in areas where classified information may be subject to unauthorized disclosure? Answer Information System Security Manager (ISSM) Insider Threat Program Senior Official (ITPSO) Information System Security Professional/Security Control Assessor (ISSP/SCA) Facility Security Officer (FSO) Question 20 Question Contractors must report which of these to the Insider Threat program? Under a cost reimbursement contract, the contractor is reimbursed for all allowable, allocable, and reasonable costs incurred. Given the complexities involved, employers would be well-served to address their particular situations with experienced counsel. Select all that apply. Generally, a contractor is not required to provide pricing, profit, or sensitive customer information unless the contractor uses inability to pay, its bid proposal, or lack of competitiveness as a justification for its positions during bargaining. In addition, covered contractors must self-disclose credible evidence of violations of certain criminal laws or the civil False Claims Act and significant over-payment.. Here is a list of the most common construction contract documents, and what they include. It's often the little things we do every day that can develop into vulnerabilities and cause damage to our operation. Why do we need to have threat information? As with race and gender data under EO 11246, VEVRAA and Section 503 require covered employers to invite pre- and post-offer applicants and employees to self-identify for status as a protected veteran or disabled individual. Insider Threat Program Senior Official (ITPSO). Within the first six months after eligibility is granted. The more we know about an adversary's intent and capability, the better we can judge how and why he may collect the information that he needs. During contract performance, if the contractor becomes involved in the labor relations matters of the subcontractor, it can become responsible for the subcontractors actions under federal labor laws. Recipients should consult with counsel before taking any actions based on the information contained within this material. Every contractor or subcontractor who performs work covered by the DBA/DBRA must post an Employee Rights under the Davis-Bacon Act poster at the worksite. Information System Security Professional/Security Control Assessor (ISSP/SCA), Information System Security Manager (ISSM). Which of the following topics is NOT included in the National Industrial Security Program Operating Manual (NISPOM)? Some federal contracts require contractors to have the ability to access classified information. Added 77 days ago|11/12/2022 9:28:04 PM These must be trained in counterintelligence; response procedures; applicable laws and regulations; and applicable civil liberties and privacy issues. The National Labor Relations Act (NLRA) governs the relationship between employers and the unions that represent their employees. What are some of the indicators Adam should look out for? 20/3 Under VEVRAA, covered employers must engage in documented outreach efforts to attract qualified protected veterans in a good faith effort to annually attain a veteran hiring benchmark of 5.9%. This document will set out the . contractors must report which of these to the insider threat program select all that apply Contractors must report the following to the insider threat program: Efforts to obtain unauthorized access to classified or proprietary information. Who might be interested in non-public information that an insider can provide? -Terrorist organizations As with EO 11246, VEVRAA imposes a number of technical obligations, including the listing of job openings with the state workforce agency in the state where the opening occurs. A federal contractor with a contract for a term of performance of at least 120 days and with a value of at least $100,000 ($3,000 for subcontractors) must agree to use E-Verify to verify the . Additionally, such employers must follow non-discrimination and related provisions, as well as comply with a host of recordkeeping, data collection, and technical obligations. The company has hired 12 new employees to support a new major contract. The company has merged with another company and is under new ownership. Physical security controls for the control of, access to, and dissemination of the classified information to be presented. Select all that apply. Objectives . What is the level of FCL required by the contractor? The primary source of data for these AAP analyses is race and gender data collected through pre- and post-offer applicant and employee invitations to self-identify. It also should state that the employer is not required to terminate the employee until a replacement has been hired, cleared, and trained. When the host organization approves a visit request, this approval constitutes _____. Facility employees may be processed for personnel security clearances concurrently with the processing of, or after the award of, a facilitys FCL. This will allow the contractor to understand the extent to which the PLA will affect the costs of the work and bid accordingly. FAR Clause 52.222-50 prohibits trafficking in persons, including certain defined trafficking-related activities. Stay Safe. The domestic delivery services approved for overnight domestic delivery of Secret and Confidential information are listed in the ______________________. This would be impractical unless the contractor chooses to adopt the CBA and the health insurance was provided through a union-sponsored plan. Who performs classified Information System assessments? Whenever an individual stops drinking, the BAL will ________________. Depending on a number of factors, including the extent of common ownership and control, AAP obligations also may extend to other related companies. Whether or not a Bridge Agreement is negotiated, a successor employer has an obligation to meet with the union and negotiate in good faith for a CBA. C.EO 13496 (Notification of Employee Rights under Federal Labor Law). Contractors also must: (1) affirmatively notify employees and agents of the above prohibitions and the corrective action it will take for any violations; (2) include the substance of the Clause in certain subcontracts and contracts with agents; (3) take appropriate action in response to any violations; (4) notify the agency contracting officer of (i) any credible information it receives regarding any violation by the employees or agents of the contractor or subcontractor; and (ii) any actions taken against any such violator; and (5) cooperate fully with the government in investigating alleged violations. What document signed by President Reagan directed the establishment of OPSEC programs, and in what year did this document become law? -Keeping unauthorized backups -Threat can include unathorized disclosure of national security information or through the loss or degradation of department resources or capabilities. -Report the indicator to your security office. Which of the following includes all the steps necessary for processing a facility clearance and a list of the documents and information that the Facility Security Officer (FSO) must gather to prepare for the Facility Clearance Branch (FCB) telephonic survey? In all cases, these events should be recorded in the contractor's property management system. A Bridge Agreement usually is based on the previous contractors CBA with changes to the provisions that do not apply or do not work for the new contractor for business reasons. -Employees City Of Memphis Property Tax Payment. If the contractor also has at least 50 employees, it must annually prepare a written AAP for each establishment with at least 50 employees. Which of the following organizations conducts periodic Security Vulnerability Assessments (SVAs) of contractor facilities as the CSO to the Department of Defense? Select all that apply. Which of the following are things that adversaries want to know? Foreign attendees business cards do not match stated affiliations, Excessive or suspicious photography and filming of technology and products, Conversations involving classified, sensitive, or export-controlled technologies or products. When the visit is a first-time visit and the DoD System of Records does not indicate that the visitor has signed an SF-312, The visitor must always sign it at every visit to any classified facility, When the visitor presents a visit authorization letter (VAL), When it is the visitors first visit to the cleared facility. E.EO 13627 (Combatting Trafficking in Persons). The National Industrial Security Program (NISP) is: a voluntary program for cleared contractor facilities, designed to safeguard classified information entrusted to industry. This can include disciplines, schedules, wages and benefits (of bargaining unit employees), personnel files, medical information, policies and procedures, payroll records, and the like. Contractors may decide whether they want to use E-Verify for all new hires and all existing non-exempt employees assigned to a federal contract, or for their entire non-exempt workforce (all new hires and all existing employees) throughout the entire company. c. The company is moving to a new location to meet the needs of its growing staff. Many successor contractors negotiate a Bridge Agreement or a new CBA with the union that represented employees of the previous contractor. Sharing details of your personal and professional lives of life online makes you _______________ adversaries. [ Any contact that suggests the employee may be the target of attempted exploitation by the intelligence service of another country. The request must explain the impact on the contractor operations and services if this waiver is not . t. e. Affirmative action in the United States is a set of laws, policies, guidelines, and administrative practices "intended to end and correct the effects of a specific form of discrimination" [1] that include government-mandated, government-approved, and voluntary private programs. During a periodic reinvestigation of a cleared individual, During the applicants initial PCL investigation, Only when the applicant is seeking Top Secret clearance eligibility. Once there is a duty to bargain, the contractor must respond to the unions information requests within a reasonable time. It is a clearance of the business entity; it has nothing to do with the physical . . Physical security systems provide the means to counter threats only during wartime. Failure to report unauthorized disclosure of classified information does not affect the service members safety. DoD 5200.8-R addresses the physical security of personnel, installations, operations, and assets of DoD Components. in. in writing; through the DoD System of Record, through the DoD System of Record; through e-FCL. importance of the critical information item. Select all that apply. Federal contractors must report the names and total compensation for the contractor's five most highly compensated officials and . The chief statutory sources of liability to an MPP pension fund beyond the contributions required under the CBA are: (1) the withdrawal liability rules in Title IV of ERISA; (2) the Pension Protection Act of 2006 (PPA); and (3) the minimum funding rules. The primary objective of Section 503 is documented outreach efforts to attract qualified individuals with disabilities such that the employer attains a utilization goal for disabled individuals in each of its AAP job groups of 7%. A successor contractor can satisfy its obligation to provide the same health insurance benefits of the predecessor contractor by matching the benefit. There are two types of business insurance that all subcontractors should have: general liability and workers compensation. To issue a Facility Clearance (FCL), the Facility Clearance Branch (FCB) reviews which of the following? Physical security measures are a combination of active or passive systems, devices, and security personnel used to protect a security interest from possible threats. To whom does the FSO submit the applicants completed SF-86 and both signed release forms? Select ALL the correct responses. What DSS organization provides security education and training to DoD and other U.S. government personnel and contractors? Only costs incurred in maintaining a satisfactory relationship between the contractor and its employees, including costs of union stewards and labor management committees, are allow for payment. There is no evidence that anyone had access to the material while she was out, but nobody can confirm that the materials were safe from disclosure. DD Form 254, Department of Defense Contract Security Classification Specification, DD Form 441, Department of Defense Security Agreement. Likewise, employers who are covered by the VEVRAA must submit VETS-4212 reports. No specific terms or language is required to be included in a CBA. One way to do this is by conducting a thorough bid/no-bid analysis that meets your company's goals and is in line with your long-term strategy. [ Any contact that suggests the employee may be the target of attempted exploitation by the intelligence service of another country. Some federal contracts and subcontracts may require the contractor to provide paid sick leave. If members of the ECBs Governing Council do decide to take formal votes on monetary policy decisions, do you think these votes should be published? For contracts in excess of $500,000 for supplies (other than for commercial off-the-shelf or COTS) acquired outside the U.S. or for services performed outside the U.S., the contractor must develop an appropriate compliance plan that, at a minimum, includes certain proactive steps. The definition of Targeted Violence includes which of these components? Always develop countermeasures on a first-come, first-served basis, Always apply a unique countermeasure to each vulnerability, Always think of a countermeasure as a smarter way to do a task, Always weigh the cost of the countermeasure against its benefit, Identifying what an adversary already knows about your operation helps you to. XYZ Industries is a cleared facility that is moving its headquarters to a less expensive office space. 20/3 F.EO 13658 (Minimum Wage for Contractors). -Foreign governments Please read our. The Higher Education Research Institute at UCLA collected data from 203,967 incoming first-time, full-time freshmen from 270 four-year colleges and universities in the U.S. 71.3%71.3 \%71.3% of those students replied that, yes, they believe that same-sex couples should have the right to legal marital status. If you are contacted by a member of the media about the information you are not authorized to share, you should take down the person's name and organization, date, time, location, method of contact, and the reason for contact. A successor contractor will be required to pay the hourly wage rates in the CBA and any wage increases that occur during the first year of the contract. In writing to your DSS IS Rep at the DSS field office. classic chevy trucks for sale in california. This behavior may include (select all that apply): Authorized access to DoD information and resources may be granted based on a person's ____________. The acronym EAP stands for _______________ ? Which step in the OPSEC process is a decision making step because it helps the decision maker prioritize and decide whether or not to apply a countermeasure? Maintain list of militarily critical technology. You can help reduce technology-associated insider threats by: Eliminating accessing data through portable devices (Incorrect). defines the initial requirements for the product/service. They provide a way to assess and identify vulnerabilities and resources. The 20-year limitation on annual payments does not apply in the event of a mass withdrawal; this can result in the employer making withdrawal liability payments in perpetuity. Which of the following roles are filled by contractor employees? What factor takes into account the impact that a compromise would have on your operation? -Inappropriate copying of classified material Select all that apply. c. reporting required information. Union Access: Because a contractor is subject to its government clients requirements applicable to visitors, consider including a clause stating that any union representative who wants to visit the employers offices or other places of employment must comply with those requirements. None. Significant change in work habit To whom should you report if you are contacted by a member of the media about information you are not authorized to share? contractors employees active duty military The definition of Targeted Violence includes which of these components?

Damaris Nicky Jam Real Life, Fallon Nv Police Reports, Kidd O'shea Boyfriend, John Michael Higgins Wife Margaret Welsh, Is Victor Vescovo Albanian, Articles C