= 2 5/20 In the case of public works projects, contractors must pay their workers on a weekly basis. What is the level of FCL required by the contractor? t. e. Affirmative action in the United States is a set of laws, policies, guidelines, and administrative practices "intended to end and correct the effects of a specific form of discrimination" [1] that include government-mandated, government-approved, and voluntary private programs. 5.1 Overview of the evaluation and selection of contractors. The FSO submits the applicants completed SF-86 using which of the following? %PDF-1.6
%
B.EO 13494 (Economy Government Contracting). Covered contracts are contracts subject to procurement contracts for construction covered by the DBA (but not contracts subject only to the DBRA); service contracts covered by the SCA; concessions contracts, including any concessions contract excluded from the SCA by the DOLs regulations at 29 CFR 4.133(b); and contracts in connection with federal property or lands and related to offering services for federal employees, their dependents, or the general public. When the host organization approves a visit request, this approval constitutes _____. Select ALL of the correct responses. Which of the following statements BEST describes the risk status if any one element of risk shrinks to zero? The chief statutory sources of liability to an MPP pension fund beyond the contributions required under the CBA are: (1) the withdrawal liability rules in Title IV of ERISA; (2) the Pension Protection Act of 2006 (PPA); and (3) the minimum funding rules. Any event that may impact an individual's personnel security clearanceAnything that affects the proper safeguarding of classified information Any event that may impact the status of the facility Any indication that classified information has been lost or compromised When the DFARS 252.211-7007 clause is in the contract, the contractor must report receipt of all GFP and updates of serially managed GFP . Under VEVRAA, covered employers must engage in documented outreach efforts to attract qualified protected veterans in a good faith effort to annually attain a veteran hiring benchmark of 5.9%. Why do we need to have threat information? To whom may eligibility decisions be appealed if the DoD CAF denies eligibility? In addition, if required by the government contract, consider requiring reinstatement be subject to approval by the government client. You may also request proof of automobile insurance if the sub has their . Select all that apply. Facility employees may be processed for personnel security clearances concurrently with the processing of, or after the award of, a facilitys FCL. 1. Security control measures are the responsibility of the Government Contracting Activity. Select all that apply. As defined in the NISPOM, ______ is the administrative determination that an individual is eligible for access to classified information. State the period of time the requested waiver will cover. Select all that apply. Bargaining impasse often is difficult to establish; the employer must demonstrate both that the parties are deadlocked and that further discussions likely will not lead to an agreement. Enforcement of such a union security provision can leave a contractor with inadequate staffing. To use leave, employees need only make an oral or written request to the employer, with the expected duration of leave, at least seven days before the scheduled leave, or as soon as practicable if the need for leave is unforeseeable. -Personal foreign travel, module 6 ( process of care, and communication), Cyber Awareness Challenge 2023 (Incomplete), John David Jackson, Patricia Meglich, Robert Mathis, Sean Valentine, Service Management: Operations, Strategy, and Information Technology, Operations Management: Sustainability and Supply Chain Management. Confidentiality of the records or information is not a valid reason to withhold the requested information, but the contractor can require a non-disclosure agreement. Why should organizations use and practice OPSEC? identify the losing and gaining contract numbers and select the items from those previously receipted. Jack is his organizations Facility Security Officer. U. S. government employees and contractors must report which of the following? The Bridge Agreement should address differences among the previous contractor and the successor contractor in pay periods and paydays, benefits plans, and employer-specific policies addressing work rules and disciplinary procedures, attendance, leave procedures, drug testing, and similar matters. June 17, 2022 . G.EO 13672 (Sexual Orientation and Gender Identity Nondiscrimination). What document does DSS publish and post on its website to change or clarify existing policy requirements in the NISPOM? Similarly, instead of making contributions to a union-sponsored pension plan, the contractor can make the contributions to its companys 401k or a similar retirement plan. The company has merged with another company and is under new ownership. When considering assets, she knows that the greatest target of our adversaries is ___________. Contractors Active duty military Former employees (select all 4 answers) Which of the following is a reportable behavioral indicator? They must implement written codes of business ethics and conduct, an employee awareness and compliance program, and an internal control system. This is discussed in more detail below. Which of the following government entities adjudicates unfavorable eligibility determinations that are appealed? Report this information to your organization's security office. The Cognizant Security Office (CSO) does which of the following? During a periodic reinvestigation of a cleared individual, During the applicants initial PCL investigation, Only when the applicant is seeking Top Secret clearance eligibility. Select all that apply. An advantage of incorporating OPSEC principles in the planning stage of any operation is that it. It's often the little things we do every day that can develop into vulnerabilities and cause damage to our operation. They provide a way to assess and identify vulnerabilities and resources. If members of the ECBs Governing Council do decide to take formal votes on monetary policy decisions, do you think these votes should be published? Conduct counterintelligence investigations for the U.S. 16/9 = Weegy: Whenever an individual stops drinking, the BAL will decrease slowly. Recipients should consult with counsel before taking any actions based on the information contained within this material. Schedule of Implementation. -Anything that affects the proper safeguarding of classified information Phovoir/Shutterstock. Industrial Security Facilities Database (ISFD), National Industrial Security Program Operating Manual (NISPOM). It is not intended to constitute legal advice nor does it create a client-lawyer relationship between Jackson Lewis and any recipient. Select all that apply. -Keeping unauthorized backups c. The company is moving to a new location to meet the needs of its growing staff. _____ is a conversation t Less. To provide you with a holistic picture of your operation, To protect your operation by properly controlling classified information, To establish a systematic process to assess the requirements for mission success, To control information about your capabilities and intentions. The definition of Targeted Violence includes which of these components? An insider threat is anyone with authorized access to the information or things an organization values most, and who uses that access, either wittingly or unwittingly, to inflict harm to the organization or national security. Contractors must report which of these? A cleared employee has received an industry award, A cleared employees citizenship has changed, An uncleared employees citizenship has changed. DoD Directive 5240.06, CI Awareness and Reporting (CIAR), DoD 5220.22-M, the National Industrial Security Program Operating Manual (NISPOM). Working late one evening on a priority project, Helen left several classified documents visible on her desk while she stepped away from her desk for a moment. Suspected compromise of classified information. -Inappropriate copying of classified material On page 14 of The Call of the Wild, what's meant by the phrase "The _____ is defined as to lose or give up hope that things will 15. Select all that apply. Profitability Which of the following are reportable behavioral indicators? Added 77 days ago|11/12/2022 9:28:04 PM -Hoarding files and data The NISP ensures the partnership between the federal government and private industry places the burden of risk on the subcontractors. The agreement is the most fundamental document in a construction contract bundle. Select ALL the correct responses. Contractors who participate in a multiemployer pension plan (MPP) through a CBA may be subject to significant liabilities created by statute. Select all that apply. An advantage of incorporating the use of OPSEC surveys is that it. Security officials should seek out and consider threat information only from official, government sources. In all cases, these events should be recorded in the contractor's property management system. -any event that may impact the status of the facility -anything that affects the proper safeguarding of classified information -any indication that classified information has been lost or compromised. Which of the following is used in the PCL process to determine a candidates eligibility? demonstrate the intent and capability to be a threat to our mission. prioritize the distribution of resources for applying countermeasures. True or false? Select all that apply. What is the purpose of an annual clearance justification review? Which of the following is considered a potential insider threat vulnerability? c. Lower its output. The more we know about an adversary's intent and capability, the better we can judge how and why he may collect the information that he needs. Under these rules, an employer who completely or partially withdraws from the MPP is liable for their allocable share of the MPPs unfunded vested benefits. Provide for the early detection and referral of potential espionage cases. Under Executive Order (EO) 11246, employers with a covered supply or service federal contract or subcontract of at least $50,000 must engage in affirmative action efforts to increase the workforce representation of women and minorities. A trained elicitor may gather information by exploiting natural human tendencies, such as (select all that apply): -A tendency to gossip -In person. According to the NISPOM, espionage, sabotage, terrorism, or subversive activities should be reported as a(n) ___________________. To ensure any classified material that may be of use in a follow-on contract is transported securely to the visitors organization, To ensure that all classified material has been properly stored and inventoried. A successor contractor will be required to pay the hourly wage rates in the CBA and any wage increases that occur during the first year of the contract. When they identify assets, they should include only classified information. Updated 284 days ago|5/24/2022 11:00:50 AM, Contractors must report the following to the insider threat program: Efforts to obtain unauthorized access to classified or proprietary information. The process of obtaining a Facility Security Clearance and a Personnel Security Clearance is established by the Defense Security Service (DSS), which is the interface between the government and the contractors who need clearance. Simonne left a safe containing classified material open while she went out for lunch. According to section 10.2.8, the general contractor should report any work-related accident in writing to the owner, and will be responsible for any costs the owner incurs related to the accident. -Actual, probable, or possible terrorism. Patterns, stereotypes, and predictable actions are all types of which of the following? Yes. When she returned, she found a member of the cleaning crew straightening the classified documents on her desk. Stan has recently witnessed some unusual behavior from a co-worker.