Which of the following is a good security practice in areas where classified information may be subject to unauthorized disclosure? If a candidate has a record in the DoD system of record (JPAS/DISS) and a pre-existing eligibility determination, the FSO assesses whether that determination may be accepted in lieu of initiating a new investigation to determine eligibility. Insider Threat Awareness Flashcards | Quizlet d. The company just lost its largest contract and has filed for bankruptcy. contractors must report which of these select all that apply One way to do this is by conducting a thorough bid/no-bid analysis that meets your company's goals and is in line with your long-term strategy. -Employees Security violations are reported to which entity? contractors must report which of these select all that apply. True or false? American Society for Industrial Security International (ASIS), NCMS, the Society of Industrial Security Professionals, Industrial Security Awareness Council (ISAC). 6286 0 obj <>/Filter/FlateDecode/ID[<2EB85691B785E04CA2BDC113E686BC84>]/Index[6275 20]/Info 6274 0 R/Length 76/Prev 582482/Root 6276 0 R/Size 6295/Type/XRef/W[1 3 1]>>stream -Inappropriate copying of classified material The request must explain the impact on the contractor operations and services if this waiver is not . The contractor also must post the applicable Wage Determination. When cleared contractors visit a cleared facility or government installation, whose security requirements take precedence? It is a clearance of the business entity; it has nothing to do with the physical . These policies protect the business in case of theft, damage, or if one of their employees gets injured. As evidence of their compliance with the requirement to pay workers the prevailing wage, covered contractors must maintain records during the work and for three years after job completion reflecting the following: Employers must pay workers covered by the DBA/DBRA weekly. (a)Contractors debarred, suspended, or proposed for debarment. Answer Information System Security Manager (ISSM) Insider Threat Program Senior Official (ITPSO) Information System Security Professional/Security Control Assessor (ISSP/SCA) Facility Security Officer (FSO) Question 20 Question -Keeping unauthorized backups The 5 Types of Construction Contracts You Need to Know - We Help You . DD Form 254, Department of Defense Contract Security Classification Specification, DD Form 441, Department of Defense Security Agreement. Finally, a successor contractor who has a duty to bargain with a union is not required to deduct dues and fees from employees pay, unless the contractor agrees to do so in a written agreement. Former U.S. You observe a colleague with a sudden increased alcohol intake (e.g., frequent heavy consumption, drinking until drunk) what is the appropriate action? Failure to report unauthorized disclosure of classified information does not affect the service members safety. 8-100d. Which of the following statements are true? Other technical obligations include drafting, implementing, and disseminating a prescribed equal employment opportunity (EEO)/Policy Statement, ensuring that all job postings contain an EEO Tag Line, annually providing all vendors a notice of the employers federal contractor status, incorporating an Equal Opportunity Clause in each of the employers covered subcontracts, notifying all unions of the employers federal contractor status (if applicable), and posting a number of notices on the employers careers website, including an applicant-accessibility statement. c. reporting required information. Where are actions, such as Personnel Security Clearance terminations, upgrades, downgrades, and reinstatements, on contractor employees entered? Who sponsors classified meetings in the NISP? Covered contracts are contracts subject to procurement contracts for construction covered by the DBA (but not contracts subject only to the DBRA); service contracts covered by the SCA; concessions contracts, including any concessions contract excluded from the SCA by the DOLs regulations at 29 CFR 4.133(b); and contracts in connection with federal property or lands and related to offering services for federal employees, their dependents, or the general public. The hiring entity or employer that paid the independent contractors must fill out the return to report all non-employee compensations made during a tax year to the IRS. The definition of Targeted Violence includes which of these components? Compliance Documents You Should Be Collecting from Your - Premier 8% effective tax rate, during the first quarter of fiscal 2022 compared to $132 laborer or mechanic is so employed, wages include compensation, at a rate not less than one and one-half times the basic rate of pay, for all hours worked . Refusal to execute Standard Form (SF) 312. Which investigation is used for a periodic reinvestigation of an individual possessing a Secret or Confidential clearance eligibility? Which of the following is an objective of the DSS CI Directorate? Which government entity is responsible for providing National Industrial Security Program (NISP) policy direction? fj45 for sale alberta; nilgai hunting yturria ranch; contractors must report which of these select all that apply; sales hunter interview questions. DSS Headquarters, Industrial Security Integration and Application (IP) Programs. Select all that apply. 6 2/3 Contractors must report which of these to the Insider Threat program? Service Contract Act (SCA) Section 4c requires service contractors to comply with prevailing wage determinations and minimum fringe benefit payments. Please read each question carefully, and circle A, B, C or D to indicate the correct response. When the successor contractor initially solicits the predecessor contractors employees for employment, it must state that the contractor will not be honoring the prior contractors CBA if the contractor does not wish to be bound by it. D.EO 13502 (Use of Project Labor Agreements for Federal Construction Projects). Section 503 also imposes a number of technical obligations and restrictions similar to those of the Americans with Disabilities Act. contractors must report which of these to the insider threat program In connection with this, the DCAA evaluates whether costs are allocated to coincide appropriately with each employees division of time. What type of violation has occurred? Select all that apply. 0 A successor contractor for a contract to provide services of a predecessor contractor with a collective bargaining agreement (CBA) in place which replaced the U.S. Department of Labors (DOL) Wage Determination for the contract must honor the wage rates and covered fringe benefit provisions of that CBA for the first year of the contract. Which of the following roles are filled by contractor employees? performing on Department contracts; and (2) Individuals assigned to the Department from another federal agency must adhere to their home agency's security reporting requirements and additional post or mission requirements. In addition, because a contractor cannot require a successor contractor to reinstate the grievant, the CBA should state that the contractors back pay and reinstatement obligations end when the contract ends. Given the complexities involved, employers would be well-served to address their particular situations with experienced counsel. The DCAA is concerned with identifying and evaluating all contractor activities that contribute to or have an impact on the costs of government contracts. Select all that apply. Contractors also are required to include this language in their contracts and purchase orders. Existing paid time off (PTO) policies may be acceptable satisfaction of these obligations if they comply with all of the elements of EO 13706. Suggest she contact EAP, Report to security officer Objectives . What type of violation has occurred? For example, if the CBA required the predecessor to pay $4.50 per hour to the unions health and welfare fund to provide medical insurance and related benefits, the contractor can spend at least $4.50 per hour on these benefits by either using its medical plan or any other plan. Events that require the facility to be open outside of regular business hours, Events that affect the proper safeguarding of classified information, Any change in the number of GSA security containers being used at the contractor facility to protect classified information, An increase or decrease in the number of classified documents stored at the contractor facility. In addition to withdrawal liability, other statutory liabilities applicable to the MPPs include the PPA. An advantage of integrating OPSEC principles in your day-to-day operations is that it. Profitability Similarly, instead of making contributions to a union-sponsored pension plan, the contractor can make the contributions to its companys 401k or a similar retirement plan. User: 3/4 16/9 Weegy: 3/4 ? Federal contractors must report the names and total compensation for the contractors five most highly compensated officials and first-tier subcontractor awards on contracts expected to reach at least $25,000. June 17, 2022 . Supreme Court of California - Wikipedia Which of the following provides policy about PCLs and defines access criteria? Hostile entities may use social media to _______________ ? (Incorrect). You may also request proof of automobile insurance if the sub has their . Labor and Employment Obligations for Federal Contractors FAR Clause 52.222-50 prohibits trafficking in persons, including certain defined trafficking-related activities. These blank check provisions can result in contractual withdrawal liability and exit fees (in pension and welfare plans), midterm contribution increases, and special assessments, among other midterm surprises. -Allowing large amounts of data to be accessed look at your operation from both the friendly and adversary perspectives. Although all private employers with at least 100 employees must prepare annual EEO-1 reports, covered contractors and subcontractors must identify themselves as such on those reports. A contractor facility has been awarded classified contracts that require access to information classified at the Confidential and Secret levels. Which of the following is a technology-related indicator? DoD Insider Threat Awareness Quiz_ Nov 2022 (Answered). In fact, the government mandates that contractors who are awarded a contract above a certain threshold ($5.5 million to be performed over at least 120 days) MUST have a code of business ethics and conduct and, for large, noncommercial items contractors, a business ethics awareness program and internal control system. Submit a paper report of independent contractors using one of the following options: Download a fill-in DE 542 (PDF) form. To whom should you report if you are contacted by a member of the media about information you are not authorized to share? allows for any changes in OPSEC factors over time. An advantage of incorporating the use of OPSEC surveys is that it. If you are contacted by a member of the media about information you are not authorized to share, you should take down which of the following details? DoD Insider Threat Awareness Flashcards - Learning tools & flashcards The EEO-1 Deadline is March 30 each year, and the VETS-4212 deadline is September 30 each year. What should you do? Select all that apply. What is defined as a weakness that can be exploited by an adversary? Select ALL the correct responses. The acronym EAP stands for _______________ ? The only requirement for employees to access classified information is to have a favorable eligibility determination. Before an employee is granted access to classified information, After an employee has access to classified information. Contractors must report to the DSS IS Rep only those violations that result in the loss, compromise, or suspected compromise of classified information. The contractor need not obtain the unions consent to proceed, as long as it follows established disciplinary procedures. What is the appropriate action? U.S. Government employees and contractors must report which of the following? When dealing with countermeasure development, what is the bottom line? Which resource guides Facility Security Officers (FSOs) through the self-inspection process and provides techniques to improve the quality of self-inspections? Select all that apply. The EEO-1 report collects gender and race/ethnicity data by type of position. There are two types of business insurance that all subcontractors should have: general liability and workers compensation. Which investigation type is required for an initial Top Secret Clearance? Where can elicitation techniques be used? -Gather information on personnel The Drug-Free Workplace Act of 1988 (DFWA) requires certain federal contractors to agree to provide drug-free workplaces as a condition of receiving a contract from a federal agency. Which of the following is reported to PSMO-I? Given this, and the effect PLAs can have on labor and other project costs, contractors submitting bids on construction projects should diligently review each contract solicitation to determine if a PLA will be required. 3. a. periodic reinvestigations Physical security systems provide the means to counter threats only during wartime. contractors must report which of these select all that apply Knowledge of the threat supports all other steps in the OPSEC process. Select ALL the correct responses. . Which of the following government entities adjudicates unfavorable eligibility determinations that are appealed? MPPs are subject to the withdrawal liability rules under Title IV of ERISA. Which of these activities must be reported? This is an example of _____________________. Otherwise, a contractor would need to wait until it is required to file an EEO-1 report and receive an EEO-1 identifier to register for the portal. Security control measures are the responsibility of the Cognizant Security Agency. In writing to your DSS IS Rep at the DSS field office. contractors employees active duty military The definition of Targeted Violence includes which of these components? Select all that apply. (916) 416-9278 | what is the most attractive height for a man ]. Clause 52.222-50 provides that during performance of the contract, contractors, their employees, and their agents may not: (1) engage in severe forms of trafficking in persons; (2) procure commercial sex acts; (3) use forced labor in performance of the contract; (4) withhold or destroy employee identification or immigration documents; (5) use fraudulent tactics in recruiting workers or use recruiters who engage in such tactics; (6) charge employees recruitment fees; (7) fail to provide, in certain circumstances, return transportation at the end of employment; or (8) provide substandard housing. An FCL is a determination made by the Government that a contractor is eligible for access to classified information. Which AT plan exercise(s) uses scenario driven events to test specific portions of the AT plan? When is an applicant required to submit fingerprints in addition to his/her security application? C.EO 13496 (Notification of Employee Rights under Federal Labor Law). Overtime pay provisions (other than the Fair Labor Standards Act requirements) are not included. Which type of security training typically informs cleared employees of changes or updates to security regulations? Some federal contracts require contractors to have the ability to access classified information. 6 2/3 Who might be interested in non-public information that an insider can provide? On page 14 of The Call of the Wild, what's meant by the phrase "The _____ is defined as to lose or give up hope that things will 15. A federal contractor with a contract for a term of performance of at least 120 days and with a value of at least $100,000 ($3,000 for subcontractors) must agree to use E-Verify to verify the . One of the conditions required for a pre-existing eligibility determination issued by one federal agency to be accepted by another federal agency is for the determination to be based on an investigation of sufficient scope that is current to within _________. Always develop countermeasures on a first-come, first-served basis, Always apply a unique countermeasure to each vulnerability, Always think of a countermeasure as a smarter way to do a task, Always weigh the cost of the countermeasure against its benefit, Identifying what an adversary already knows about your operation helps you to. Contractors may decide whether they want to use E-Verify for all new hires and all existing non-exempt employees assigned to a federal contract, or for their entire non-exempt workforce (all new hires and all existing employees) throughout the entire company. how long is chickpea pasta good for in the fridge. The ______________ has been designated as the Cognizant Security Office (CSO) for the DoD and over 30 other non-DoD agencies. Contractors also must: (1) affirmatively notify employees and agents of the above prohibitions and the corrective action it will take for any violations; (2) include the substance of the Clause in certain subcontracts and contracts with agents; (3) take appropriate action in response to any violations; (4) notify the agency contracting officer of (i) any credible information it receives regarding any violation by the employees or agents of the contractor or subcontractor; and (ii) any actions taken against any such violator; and (5) cooperate fully with the government in investigating alleged violations. The domestic delivery services approved for overnight domestic delivery of Secret and Confidential information are listed in the ______________________. For construction contractors, there is no employee-count threshold. Here is a list of the most common construction contract documents, and what they include. [ Any contact that suggests the employee may be the target of attempted exploitation by the intelligence service of another country. According to section 10.2.8, the general contractor should report any work-related accident in writing to the owner, and will be responsible for any costs the owner incurs related to the accident. [ Any contact that suggests the employee may be the target of attempted exploitation by the intelligence service of another country. What is the last step in the OPSEC process? In addition, covered contractors must self-disclose credible evidence of violations of certain criminal laws or the civil False Claims Act and significant over-payment.. provides for early detection of OPSEC problems. Who administers and oversees the contractor security program? Under the NLRA, a joint employment relationship will be found when one employer directly controls the terms and conditions of employment for another. [ ], u.s. government employees and contractors must report which of the following. Foreign Ownership, Control, or Influence (FOCI) Operations Division, Personnel Security Management Office for Industry (PSMO-I), Center for Development of Security Excellence (CDSE). An adversary's capability is defined as his ability to do which of the following? Some federal contracts and subcontracts may require the contractor to provide paid sick leave. _____ is a conversation t Less. ____________ are like pieces of a puzzle an adversary uses to reveal a picture of our operations. contractors must report which of these select all that apply A large scale operation has just been conducted in your area. Anna is her organizations Facility Security Officer. When an employee no longer needs access to classified information, who is responsible for removing access and debriefing the employee? DoD 5200.8-R addresses the physical security of personnel, installations, operations, and assets of DoD Components. Cleared employees who refuse to execute Standard Form 312 are reported how? Whenever an individual stops drinking, the BAL will ________________. Which of the following countermeasures can you implement to help reduce technology-associated insider threats? Independent Contractor (Self-Employed) or Employee? Select all that apply. This need to be reported to the companys IS Rep? Department of Employment and Labour contractors must report which of these to the insider threat program select all that apply Contractors must report the following to the insider threat program: Efforts to obtain unauthorized access to classified or proprietary information. Some employers do not wish to make contributions to a unions multiemployer pension plan because of the risk of incurring potentially significant withdrawal liability in the future. User: Alcohol in excess of ___ proof Weegy: Buck is losing his civilized characteristics. In addition, when a CBA expires, the parties must maintain the terms and conditions at the status quo while negotiations take place. Service contracts: The small business prime contractor must provide at least 50% of the contract cost for personnel. -In person. The tax rate ($3.39) must be multiplied by 100 to find the total. Contractors must report which of these? Which of the following is NOT a step in the OPSEC process? Contractors with federal contract awards of at least $5 million (entered into on or after December 12, 2008) are subject to Federal Acquisition Regulation ethics rules. Which of the following statements are true? Weegy: A basic position in American foreign policy has been that America must defend its foreign interests related to Weegy: 15 ? The primary objective of Section 503 is documented outreach efforts to attract qualified individuals with disabilities such that the employer attains a utilization goal for disabled individuals in each of its AAP job groups of 7%. Each payroll submitted must include a Statement of Compliance, which is provided in the WH-347. G.EO 13672 (Sexual Orientation and Gender Identity Nondiscrimination). It also should state that the employer is not required to terminate the employee until a replacement has been hired, cleared, and trained. Some existing federal contracts may also be bilaterally modified to include the FAR EVerify clause after the effective date of the rule. Contractors with a federal acquisition contract or subcontract must apply 15 basic cybersecurity safeguarding requirements and procedures to protect federal contract information. The requirements are based on security requirements published in the National Institute of Standards and Technologys (NIST) Special Publication (SP) 800-171, Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations. Specific requirements are in FAR Subpart 4.19 and FAR Clause 52.204-21. Hes not sure if he should report it, but he knows it is better not to report an incident or behavior than to make a potentially false report. Because each adversary may have different intentions and capabilities, you may need to enact different scenarios for different adversaries. 12 Fam 270 Security Reporting Requirements 5.1 Overview of the evaluation and selection of contractors. consular corps association of philadelphia tequileras scarborough maine menu pfizer board of directors political affiliation how many grandchildren did fred astaire . User: 3/4 16/9 Weegy: 3/4 ? As with race and gender data under EO 11246, VEVRAA and Section 503 require covered employers to invite pre- and post-offer applicants and employees to self-identify for status as a protected veteran or disabled individual. contractors are adequate for the protection of classified information. contractors must report which of these select all that apply. c. Lower its output. In order to determine our critical information, we need to consider both the friendly and adversary points of view. ; Order the DE 542 form from our Online Forms and Publications. Of the scenarios listed below, which ones must be reported to your IS Rep as change conditions affecting the facility's clearance? Any contact by cleared employees with known or suspected intelligence officers from any country. Which of the following roles are filled by contractor employees? Of the following types of personnel-related information, which is NOT reported to PSMO-I? t. e. Affirmative action in the United States is a set of laws, policies, guidelines, and administrative practices "intended to end and correct the effects of a specific form of discrimination" [1] that include government-mandated, government-approved, and voluntary private programs. Use e-Services for Business to submit a Report of Independent Contractor(s) (DE 542).. Mail or Fax. Which activities are recommended as part of continuous evaluation program at a cleared facility? -Speeches or books including information about involvement with the Intelligence Community Confidentiality of the records or information is not a valid reason to withhold the requested information, but the contractor can require a non-disclosure agreement. Generally, a contractor is not required to provide pricing, profit, or sensitive customer information unless the contractor uses inability to pay, its bid proposal, or lack of competitiveness as a justification for its positions during bargaining. Increase its output. Select all that apply. Only select Cognizant Security Agencies (CSAs) have hotlines for reporting industrial security issues. However, the results of negotiations will depend on a variety of factors, such as the parties leverage, bargaining strategy, bargaining objectives, the unions willingness to strike, the contractors ability to continue operating during a strike, the scope and degree of changes desired, the level of support for the union among employees, and the resolve of the contractors management and the government client to resist union pressure.
Kenmore Elite Refrigerator Model 795 Recall,
Palm Weevil Treatment,
Duane Morris Partner Salary,
Mobile County Pistol Permit Office Phone Number,
Articles C