c. reporting required information. The domestic delivery services approved for overnight domestic delivery of Secret and Confidential information are listed in the ______________________. Whose primary responsibility is working with Industrial Security Representatives (IS Reps) and contractor personnel to authorize and maintain classified Information Systems? They provide a way to assess and identify vulnerabilities and resources. Select all that apply. An advantage of using good OPSEC principles during contingencies is that it. The Secretary of Defense is the Executive Agent of the National Industrial Security Program and is responsible for overall implementation of the program. A Bridge Agreement is designed to be short-term to fill the gap until a completely new CBA can be negotiated. Which of the following organizations conducts periodic Security Vulnerability Assessments (SVAs) of contractor facilities as the CSO to the Department of Defense? -Use strong passwords Which of the following is considered a potential insider threat vulnerability? None. What security control measure outlines the specific export-controlled information that has been authorized for release during a foreign visit and delineates how a company will control access? User: contractors must report which of these? MPPs are subject to the withdrawal liability rules under Title IV of ERISA. Shift its marginal cost curve upward. True or false? They must provide the contracting agency, also weekly, a certified copy of all payrolls providing the information above for the previous weeks payroll period. Which of the following BEST identifies the goal of OPSEC? On January 1, 2020, the rate was increased to $10.80 an hour. OPSEC is a systematic, proven process to identify, control and protect classified information about a mission, operation or activity, and, thus, denying/mitigating adversary's ability to compromise/interrupt that mission, operation or activity. You may also request proof of automobile insurance if the sub has their . What factor takes into account the impact that a compromise would have on your operation? 2019 - The South African Department of Employment & Labour Disclaimer PAIA Service contracts: The small business prime contractor must provide at least 50% of the contract cost for personnel. A contractor must have an FCL commensurate with the highest level of classified access (Secret or Top Secret) required for contract performance. 2e9Th)0vo
Vq -,234b3##V\;h6 !f$eE63F $tN8a *qjcE. F.EO 13658 (Minimum Wage for Contractors). 1. contractors must report which of these to the insider threat program select all that apply Contractors must report the following to the insider threat program: Efforts to obtain unauthorized access to classified or proprietary information. The ATO is responsible for leveraging the capabilities of the organizations AT Working Group to assist with creating the AT plan. look at your operation from both the friendly and adversary perspectives. No specific terms or language is required to be included in a CBA. Former U.S. For construction contractors, there is no employee-count threshold. Foreign Ownership, Control, or Influence (FOCI) Operations Division, Personnel Security Management Office for Industry (PSMO-I), Center for Development of Security Excellence (CDSE). Within the first six months after eligibility is granted. -Employees Chief among the data requirements is the obligation to track and maintain applicant data for analyses. Many CBAs provide that the agreement applies to any subcontractor used by the contractor to perform work done by covered employees, and the contractor is responsible for the subcontractors failure to comply with the terms of the CBA. Likewise, employers who are covered by the VEVRAA must submit VETS-4212 reports. Prime contractors must meet certain reporting requirements before they are able to submit a bid that valued at $50 million or more as of the year 2016. A federal contractor with a contract for a term of performance of at least 120 days and with a value of at least $100,000 ($3,000 for subcontractors) must agree to use E-Verify to verify the . Hostile entities may use social media to _______________ ? -Actual, probable, or possible espionage -Keeping unauthorized backups Contractors also are required to include this language in their contracts and purchase orders. ]. Any contact by cleared employees with known or suspected intelligence officers from any country. Select all that apply. Arbitration: Consider a provision that limits the arbitrators authority. This is basically " the contract, " a foundation that the rest of the project details are built upon. Insurance certificates or proof of insurance. endstream
endobj
startxref
Contractors are subject to the requirements of the DFWA if the contract with the government has a value of at least $100,000, will be performed in the U.S., and the primary purpose of the contract is other than acquisition of commercial items. Lack of proper training, use of non-secure communications, and poor system design are all examples of. DBA states that all government construction contracts over $2,000 to which a federal agency or the District of Columbia is a party must include provisions for paying workers on-site no less than the local prevailing wages and benefits as set by the DOL. -Hoarding files and data Which of the following statements are true? However, the results of negotiations will depend on a variety of factors, such as the parties leverage, bargaining strategy, bargaining objectives, the unions willingness to strike, the contractors ability to continue operating during a strike, the scope and degree of changes desired, the level of support for the union among employees, and the resolve of the contractors management and the government client to resist union pressure. Reporting information as required under this policy does not fulfill or diminish the . Conduct counterintelligence investigations for the U.S. = 2 5/20 A successor contractor can satisfy its obligation to provide the same health insurance benefits of the predecessor contractor by matching the benefit. possess the ability to exploit our critical information. -Any event that may impact an individual's personnel security clearance . Select all that apply. An employees need for a Personnel Security Clearance (PCL) is determined by the program manager, but the clearance level is determined by the Government Contracting Activity (GCA). Specific clearance and access requirements, Authorization to generate classified information, A method for denying an adversary access to our critical information. Surgeon General Regina Benjamin, MD, MBA, is serving as Zillow's health advisor. One purpose of the National Industrial Security Program (NISP) is to preserve our nations economic and technological interests. While they need not have a written AAP, they must implement an AAP that includes 16 specified requirements that are substantially similar to the obligations for supply and service contractors. Please read each question carefully, and circle A, B, C or D to indicate the correct response. Contractors should check with their government contracting official or staff to clarify their obligations. The request for clearance must come from the contracting agency; the contractor cannot apply for security clearance on its own. Office of the Director of National Intelligence (ODNI), works for a company with a Facility Clearance (FCL), requires access to classified information. -Report the indicator to your security office. Because there are so many different types of construction projects, each type of construction contract exists to satisfy the varying needs of all parties involved. Prior results do not guarantee a similar outcome. E.EO 13627 (Combatting Trafficking in Persons). (Incorrect, there were more choices). Weegy: Contractors must report the following to the insider threat program: Efforts to obtain unauthorized access to classified or proprietary information. We help employers develop proactive strategies, strong policies and business-oriented solutions to cultivate high-functioning workforces that are engaged, stable and diverse, and share our clients' goals to emphasize inclusivity and respect for the contribution of every employee. Assessing a vulnerability in conjunction with the threat, and then determining the impact this would have on an operation if the vulnerability is exploited determines the level of risk. Why should organizations use and practice OPSEC? Select all that apply. Where are actions, such as Personnel Security Clearance terminations, upgrades, downgrades, and reinstatements, on contractor employees entered? Which of the following government entities typically determines personnel security clearance eligibility? How many steps are there in the OPSEC process? Finally, a successor contractor who has a duty to bargain with a union is not required to deduct dues and fees from employees pay, unless the contractor agrees to do so in a written agreement. This behavior may include (select all that apply): Authorized access to DoD information and resources may be granted based on a person's ____________. d. The company just lost its largest contract and has filed for bankruptcy. Inform the DSS IS Representative that all visitors to the area must wear a badge, Inform the project manager of the heightened risk and ensure the visitor has an escort. This would be impractical unless the contractor chooses to adopt the CBA and the health insurance was provided through a union-sponsored plan. hbbd```b``@$G6"5 vdVc$GG1012HM``$@gx
Failure to report unauthorized disclosure of classified information does not affect the service members safety. Clause 52.222-50 provides that during performance of the contract, contractors, their employees, and their agents may not: (1) engage in severe forms of trafficking in persons; (2) procure commercial sex acts; (3) use forced labor in performance of the contract; (4) withhold or destroy employee identification or immigration documents; (5) use fraudulent tactics in recruiting workers or use recruiters who engage in such tactics; (6) charge employees recruitment fees; (7) fail to provide, in certain circumstances, return transportation at the end of employment; or (8) provide substandard housing. possess the ability to acquire and exploit our critical information. They are indicators that tell adversaries where to focus their collection efforts, They are vulnerabilities that tell adversaries where to focus their collection efforts, They are indicators that are not part of a unit's normal conduct, They are vulnerabilities that are not part of a unit's normal conduct. Who sponsors classified meetings in the NISP? In the case of public works projects, contractors must pay their workers on a weekly basis. State the period of time the requested waiver will cover. Bargaining impasse often is difficult to establish; the employer must demonstrate both that the parties are deadlocked and that further discussions likely will not lead to an agreement. Select all that apply. The more we know about an adversary's intent and capability, the better we can judge how and why he may collect the information that he needs. If after a contractor has a duty to bargain and before a CBA is negotiated, the contractor must discuss suspending or terminating an employee with the union before so doing, unless exigent circumstances exist. Insiders may include which of these groups of people? Recipients should consult with counsel before taking any actions based on the information contained within this material. Which of the following statements are true? Form 1099-NEC is an IRS information return used to report non-employee compensations made to independent contractors by employers or businesses. Overtime pay provisions (other than the Fair Labor Standards Act requirements) are not included. A cleared employee has received an industry award, A cleared employees citizenship has changed, An uncleared employees citizenship has changed. In the NISPOM, what location does 1-302 represent? To assist government contractors, this guide discusses some of the labor and employment laws and regulations that should be considered when pricing and performing a government contract. Once there is a duty to bargain, the contractor must respond to the unions information requests within a reasonable time. A project labor agreement (PLA) is a prehire CBA designed to systemize labor relations at a construction site. DD Form 254, Department of Defense Contract Security Classification Specification, contains which of the following? Contractors must report which of these to the Insider Threat program? The terms of a CBA apply to all employees in the bargaining unit, regardless of whether they join the union. The Higher Education Research Institute at UCLA collected data from 203,967 incoming first-time, full-time freshmen from 270 four-year colleges and universities in the U.S. 71.3%71.3 \%71.3% of those students replied that, yes, they believe that same-sex couples should have the right to legal marital status. ], Witch one of the following statements best characterizes Arnold s view of world, WHICH OF THE FOLLOWING STATEMENTS IS TRUE ABOUT TECHNOLOGY AND INSIDER THREAT. Focused on labor and employment law since 1958, Jackson Lewis P.C. makes OPSEC principles second nature to your employees. What is the probability that at most five of the freshmen reply "yes"? Any contact by cleared employees with known or suspected intelligence officers from any country. 8-100d. Whenever an individual stops drinking, the BAL will ________________. User: 3/4 16/9 Weegy: 3/4 ? International visit requirements apply when information to be disclosed is classified or unclassified but related to classified contracts or otherwise subject to export controls under the International Traffic in Arms Regulations (ITAR) or Export Administration Regulations (EAR). Select all that apply. The Cognizant Security Office (CSO) does which of the following? Which of the following roles are filled by contractor employees? To provide you with a holistic picture of your operation, To protect your operation by properly controlling classified information, To establish a systematic process to assess the requirements for mission success, To control information about your capabilities and intentions. Any contact by cleared employees with known or suspected intelligence officers from any country. Lesser disciplinary actions may be discussed with the union after the action is taken. How is the FSO notified that a cleared employee may be due for a periodic reinvestigation? What is the highest level of classified access she may have for work performed for her new employer? It's impossible to cover all the possible combinations of nationalities between companies and contractors in this blog post. When considering assets, she knows that the greatest target of our adversaries is ___________. -Suggest she contact the EAP As with EO 11246, VEVRAA imposes a number of technical obligations, including the listing of job openings with the state workforce agency in the state where the opening occurs. Generally, a contractor is not required to provide pricing, profit, or sensitive customer information unless the contractor uses inability to pay, its bid proposal, or lack of competitiveness as a justification for its positions during bargaining. This also fails to apply if an arbitration agreement is already in place. Contractors with federal contract awards of at least $5 million (entered into on or after December 12, 2008) are subject to Federal Acquisition Regulation ethics rules. -In person. %%EOF
Contractors must report to the DSS IS Rep only those violations that result in the loss, compromise, or suspected compromise of classified information. The FSO submits the applicants completed SF-86 using which of the following? When an insider becomes a threat, it can have far-reaching consequences on both an organization and national security. The following are some of the Executive Orders currently in effect that have significant implications for federal contractors. User activity monitoring on classified information systems: True Where can he find reporting procedures that pertain to his organization? As just one example, changing the design of a tile floor is much easier to do before the tile is ordered, rather than after it's installed. The request must state the specific Contractor Health and Safety Requirement to be waived. Contractors must maintain three years of EEO-1 reports as part of their AAPs. What is a final security control in the NISP when the purpose of a visit has been accomplished? Select ALL the correct responses. Updated 284 days ago|5/24/2022 11:00:50 AM, Contractors must report the following to the insider threat program: Efforts to obtain unauthorized access to classified or proprietary information. Government employees temporarily stationed at a contractor facility ______ control of their work products to the contractor. This behavior may include (select all that apply): -violation of workplace policies -failure to follow standard procedures (SOP) -legal difficulties Confidentiality of the records or information is not a valid reason to withhold the requested information, but the contractor can require a non-disclosure agreement. Training records management: Contractors must create and maintain records of all employee insider threat awareness programs initial and refresher training and those records must be available for review during DSS security vulnerability assessments. Who administers and oversees the contractor security program? = 2 5/20 's 950+ attorneys located in major cities nationwide consistently identify and respond to new ways workplace law intersects business. The hiring entity or employer that paid the independent contractors must fill out the return to report all non-employee compensations made during a tax year to the IRS. Select all that apply. Under the final regulations, which became effective on January 11, 2016, employers entering into new contracts (or modifying existing contracts) after January 11, 2016, must incorporate proscribed nondiscrimination language into their nondiscrimination policies, as well as have required postings on their websites and in their workplaces. Which of the following includes all the steps necessary for processing a facility clearance and a list of the documents and information that the Facility Security Officer (FSO) must gather to prepare for the Facility Clearance Branch (FCB) telephonic survey? -Threat can include unathorized disclosure of national security information or through the loss or degradation of department resources or capabilities. Given this, and the effect PLAs can have on labor and other project costs, contractors submitting bids on construction projects should diligently review each contract solicitation to determine if a PLA will be required. Which of the following is reported to PSMO-I? initiative combines industry-leading health and safety standards with virtual technologies designed to keep real estate moving forward, and give our employees, customers and partners confidence and support to stay safe. Gopuff Background Check Requirementscom with instructions, or you can log into the Checkr applicant portal to view the status of your background check. Select all that apply. Patterns, stereotypes, and predictable actions are all types of which of the following? Provide visitors with a badge and an escort who has been informed of the access limitations or restrictions on the visitor's movements. It also requires: (1) inclusion of sexual orientation and gender identity in EEO Taglines where protected statuses are listed (rather than abbreviated Taglines), and (2) posting of updated EEO is the Law posters. Suspected compromise of classified information. One such requirement, defined in the NISPOM, states that contractors must report certain events to the appropriate government agencies, that may have an effect on the status of the entity's or an employee's eligibility for access to classified information. = 45/20 The development of a countermeasure focuses directly on the. B.EO 13494 (Economy Government Contracting). Before conducting an interview with an employee that could lead to disciplinary action, the employee is entitled to union representation during the interview upon request. What security control measures must the host organization implement for a classified meeting? This answer has been confirmed as correct and helpful. Industrial Security Facilities Database (ISFD), National Industrial Security Program Operating Manual (NISPOM). Efforts to obtain unauthorized access to classified or proprietary information Any contact by cleared employees with known or suspected intelligence officers from any country
Denver Pickleball Tournaments,
Italy: Covid Restrictions,
Walnut Tree Hill Rd, Sandy Hook, Ct,
Hmas Creswell Officer Training,
John Ritter Cause Of Death,
Articles C