U. S. government employees and contractors must report which of the following? Cleared employees who refuse to execute Standard Form 312 are reported how? Training records management: Contractors must create and maintain records of all employee insider threat awareness programs initial and refresher training and those records must be available for review during DSS security vulnerability assessments. Although all private employers with at least 100 employees must prepare annual EEO-1 reports, covered contractors and subcontractors must identify themselves as such on those reports. [ ] Expert answered| soumen314 |Points 17764| When the visit is a first-time visit and the DoD System of Records does not indicate that the visitor has signed an SF-312, The visitor must always sign it at every visit to any classified facility, When the visitor presents a visit authorization letter (VAL), When it is the visitors first visit to the cleared facility. The Contracting Officers Representative (COR) is authorized to make changes to the contract, even if those changes affect price or quality. According to section 10.2.8, the general contractor should report any work-related accident in writing to the owner, and will be responsible for any costs the owner incurs related to the accident. c. The company is moving to a new location to meet the needs of its growing staff. Loss, compromise, and suspected compromise of classified information are reported how? 6286 0 obj <>/Filter/FlateDecode/ID[<2EB85691B785E04CA2BDC113E686BC84>]/Index[6275 20]/Info 6274 0 R/Length 76/Prev 582482/Root 6276 0 R/Size 6295/Type/XRef/W[1 3 1]>>stream Additionally, beginning January 1, 2020, tipped employees performing work on or in connection with covered contracts generally must be paid a minimum cash wage of $7.55 an hour. -In email Under the NLRA, a joint employment relationship will be found when one employer directly controls the terms and conditions of employment for another. Which of the following countermeasures should be used sparingly because of its expense and maintenance difficulty? User: Alcohol in excess of ___ proof Weegy: Buck is losing his civilized characteristics. The FSO is not notified but must look for eligible employees in the DoD system of record. American Society for Industrial Security International (ASIS), NCMS, the Society of Industrial Security Professionals, Industrial Security Awareness Council (ISAC). These requirements apply not only to the contractor's employees working directly on a federal contract, but generally to their entire workforce, including locations where no federal contract work is performed. ____________ are like pieces of a puzzle an adversary uses to reveal a picture of our operations. The definition of Targeted Violence includes which of these components? The ______________ has been designated as the Cognizant Security Office (CSO) for the DoD and over 30 other non-DoD agencies. Which of the following is used in the PCL process to determine a candidates eligibility? Who might be interested in non-public information that an insider can provide? Which of the following government entities adjudicates unfavorable eligibility determinations that are appealed? -Actual, probable, or possible subversive activities Depending on the contractors specific organizational needs, other provisions should be considered. For example, if the CBA required the predecessor to pay $4.50 per hour to the unions health and welfare fund to provide medical insurance and related benefits, the contractor can spend at least $4.50 per hour on these benefits by either using its medical plan or any other plan. OFCCP prescribes a specific form for inviting applicants and employees to self-identify for disabled status. Who sends the NATO Request for Visit (RFV) approval to the NATO site? -Keeping unauthorized backups Contractors are subject to the requirements of the DFWA if the contract with the government has a value of at least $100,000, will be performed in the U.S., and the primary purpose of the contract is other than acquisition of commercial items. Yes. In addition to the primary aspects of affirmative action compliance described above, covered contractors and subcontractors must prepare and submit both EEO-1 and VETS-4212 reports to the government annually. This document will set out the . identify the losing and gaining contract numbers and select the items from those previously receipted. Contractors must report which of these? Which of the following are Counterintelligence Special Agent (CISA) responsibilities? To ensure there are enough cleared employees to meet the needs of a contractor companys classified contract workload, To provide the CEO with justification for hiring more cleared employees, To assess whether a cleared employee still requires access to classified information. Contractors must report which of these? F.EO 13658 (Minimum Wage for Contractors). Select all that apply. Select all that apply. Which type of security training typically informs cleared employees of changes or updates to security regulations? Which of the following statements concerning activity tip-offs is correct? Here is a list of the most common construction contract documents, and what they include. Given this, and the effect PLAs can have on labor and other project costs, contractors submitting bids on construction projects should diligently review each contract solicitation to determine if a PLA will be required. Whenever an individual stops drinking, the BAL will ________________. Under Executive Order (EO) 11246, employers with a covered supply or service federal contract or subcontract of at least $50,000 must engage in affirmative action efforts to increase the workforce representation of women and minorities. SF 312, Classified Information Nondisclosure Agreement. The Government Funding Transparency Act of 2008 (GFTA) requires the Office of Management and Budget (OMB) to establish a free, public website containing full disclosure of all federal contract award information. 2019 - The South African Department of Employment & Labour Disclaimer PAIA Which of the following statements are true? OPSEC focuses on what type of critical information? This answer has been confirmed as correct and helpful. Because each adversary may have different intentions and capabilities, you may need to enact different scenarios for different adversaries. Interference and discrimination based on the use of sick leave are prohibited. Assessing a vulnerability in conjunction with the threat, and then determining the impact this would have on an operation if the vulnerability is exploited determines the level of risk. The minimum wage rate is annually increased by the Secretary of Labor. To whom does the FSO submit the applicants completed SF-86 and both signed release forms? contracts. Jackson Lewis attorneys are available to discuss these and other issues that affect government contractors. The contractor must also report any such equipment, systems, or services discovered during contract performance; this requirement flows down to subcontractors. Clause 52.222-50 provides that during performance of the contract, contractors, their employees, and their agents may not: (1) engage in severe forms of trafficking in persons; (2) procure commercial sex acts; (3) use forced labor in performance of the contract; (4) withhold or destroy employee identification or immigration documents; (5) use fraudulent tactics in recruiting workers or use recruiters who engage in such tactics; (6) charge employees recruitment fees; (7) fail to provide, in certain circumstances, return transportation at the end of employment; or (8) provide substandard housing. Report the concerning behavior to your security officer. 1. After a need is identified, the Government Contracting Activity (GCA) ___________________. B.EO 13494 (Economy Government Contracting). authority to obtain a Facility Verification Request, authority to request additional special access authorizations. Select ALL the correct responses. -A desire to be polite Select all that apply. Contractors must report which of these to the Insider Threat program? [ Any contact that suggests the employee may be the target of attempted exploitation by the intelligence service of another country. XYZ Industries is a cleared facility that is moving its headquarters to a less expensive office space. Though this rule does not apply if the workers are under a collective bargaining agreement. Since 1850, the court has issued many influential decisions in a variety of areas . Select all that apply. contractors must report which of these select all that apply. Federal contractors must report the names and total compensation for the contractor's five most highly compensated officials and . Select all that apply All 4 answers A coworker shares that she and her husband are facing foreclosure, and she doesn't know what to do. Contractors must report which of these? fj45 for sale alberta; nilgai hunting yturria ranch; contractors must report which of these select all that apply; sales hunter interview questions. 8-100d. If a candidate has a record in the DoD system of record (JPAS/DISS) and a pre-existing eligibility determination, the FSO assesses whether that determination may be accepted in lieu of initiating a new investigation to determine eligibility. Technological advances impact the insider threat by ________________. Provide visitors with a badge and an escort who has been informed of the access limitations or restrictions on the visitor's movements. While every CBA is unique in some respects, some sample provisions that should be considered in government contracting include: Government Supremacy/Rights: Because a contractor is subject to its government clients directives, consider a provision on the rules, regulations, directives, orders, or work statements that are, or may be, imposed by the government, including on removal of an employee, that will apply and not be subject to the grievance and arbitration procedure. [ Any contact that suggests the employee may be the target of attempted exploitation by the intelligence service of another country. DoD Directive 5240.06, CI Awareness and Reporting (CIAR), DoD 5220.22-M, the National Industrial Security Program Operating Manual (NISPOM). An advantage of using good OPSEC principles during contingencies is that it. Online. The acronym EAP stands for _____? In the NISPOM, what location does 1-302 represent? In addition to withdrawal liability, other statutory liabilities applicable to the MPPs include the PPA. Personnel security clearance investigation stage, Initiate personnel security clearance process stage. Federal contractors must report the names and total compensation for the contractors five most highly compensated officials and first-tier subcontractor awards on contracts expected to reach at least $25,000. Construction contractors with a federal construction contract or federally assisted construction contract, or subcontract, of at least $10,000 must follow the non-discrimination and related provisions of EO 11246. Of the scenarios listed below, which ones must be reported to your IS Rep as change conditions affecting the facility's clearance? In order to determine our critical information, we need to consider both the friendly and adversary points of view. In a standard withdrawal, the employer continues to make payments until its withdrawal liability is satisfied (with interest charged at a rate determined by the MPP) or the employer makes 20 annual payments, whichever occurs first. determine the collection methods the adversary is using against you. Select all that apply. Which of the following provides policy about PCLs and defines access criteria? The two primary methods of submitting reports to your DSS IS Rep at the DSS Field Office are _________ and __________. Give the group a name. Which of the following are reportable behavioral indicators? -Any event that may impact an individual's personnel security clearance Former U.S. This answer has been confirmed as correct and helpful. 6 2/3 -In person. A federal contractor with a contract for a term of performance of at least 120 days and with a value of at least $100,000 ($3,000 for subcontractors) must agree to use E-Verify to verify the employment eligibility of: (1) all employees hired during the contract term that will be performing work within the U.S.; and (2) all individuals assigned to perform work in the U.S. on the federal contract. These requirements apply not only to the contractors employees working directly on a federal contract, but generally to their entire workforce, including locations where no federal contract work is performed. Where can elicitation techniques be used? What document does DSS publish and post on its website to change or clarify existing policy requirements in the NISPOM? This material may be considered attorney advertising in some jurisdictions. Which of the following countermeasures may be necessary if routine activities provide an adversary with tip-offs to critical information? Select all that apply. Any individual or group that represents a foreign government is considered a security threat. The National Labor Relations Act (NLRA) governs the relationship between employers and the unions that represent their employees. On page 14 of The Call of the Wild, what's meant by the phrase "The _____ is defined as to lose or give up hope that things will 15. -Over the phone Some employers do not wish to make contributions to a unions multiemployer pension plan because of the risk of incurring potentially significant withdrawal liability in the future. -Foreign governments -Any event that may impact an individual's personnel security clearance -Any event that may impact the status of the facility -Anything that affects the proper safeguarding of classified information -Any indication that classified information has been lost or compromised Once again, you can see how important communication is to successfully working with contractors, whether inside your home or on your exterior home improvement project. An advantage of incorporating OPSEC principles in the planning stage of any operation is that it. Which activities are recommended as part of continuous evaluation program at a cleared facility? No specific procedure is required and, if a grievance cannot be resolved, the employer is not required to arbitrate the grievance. In the case of public works projects, contractors must pay their workers on a weekly basis. Schedule of Implementation. Leave may be used for: (1) illness and injury; (2) diagnosis, care, and preventive care; (3) caring for family members and family-equivalent members; and (4) domestic violence care. 20/3 Which of the following is reported to PSMO-I? -Suggest she contact the EAP Given the complexities involved, employers would be well-served to address their particular situations with experienced counsel. Whether or not a Bridge Agreement is negotiated, a successor employer has an obligation to meet with the union and negotiate in good faith for a CBA. They are indicators that tell adversaries where to focus their collection efforts, They are vulnerabilities that tell adversaries where to focus their collection efforts, They are indicators that are not part of a unit's normal conduct, They are vulnerabilities that are not part of a unit's normal conduct. What is the last step in the OPSEC process? Section 3-103 (a) concerns the contractor's insider threat program personnel. _____ is a conversation t Less. Sharing details of your personal and professional lives of life online makes you _______________ adversaries. What step in the OPSEC process is Analyzing Threats? Select ALL the correct responses. When the successor contractor initially solicits the predecessor contractors employees for employment, it must state that the contractor will not be honoring the prior contractors CBA if the contractor does not wish to be bound by it. Security control measures are the responsibility of the Cognizant Security Agency. t. e. Affirmative action in the United States is a set of laws, policies, guidelines, and administrative practices "intended to end and correct the effects of a specific form of discrimination" [1] that include government-mandated, government-approved, and voluntary private programs. In all cases, these events should be recorded in the contractor's property management system. Any contact by cleared employees with known or suspected intelligence officers from any country. What is the highest level of classified access she may have for work performed for her new employer? The E-Verify federal contractor rule only affects federal contractors who are awarded a new contract on or after the effective date of the rule, September 8, 2009, that includes the Federal Acquisition Regulation (FAR) E-Verify clause (73 FR 67704). The records of a contractor with a contract with the U.S. Department of Defense (DoD) are subject to audit by the Defense Contract Audit Agency (DCAA), which also performs audits for other government agencies. NATO briefings require a signed certificate. Evidence of tampering with your facility's classified storage container is an example of what type of security threat? For construction contractors, there is no employee-count threshold. What Is Form 1099-NEC. Contractors must recognize that their obligations under these laws and executive orders also apply to their subcontractors. Existing paid time off (PTO) policies may be acceptable satisfaction of these obligations if they comply with all of the elements of EO 13706. Further, if no agreement is reached and incorporated by the government client, and the U.S. DOL does not replace the Wage Determination before the contract is rebid, other prospective bidders may only be required to comply with the Wage Determination. ; Use the DE 542 Print Specifications (PDF) to generate an alternate form. The primary source of data for these AAP analyses is race and gender data collected through pre- and post-offer applicant and employee invitations to self-identify. Government employees temporarily stationed at a contractor facility ______ control of their work products to the contractor. Security control measures must provide for security briefings and signed certificates. It also requires: (1) inclusion of sexual orientation and gender identity in EEO Taglines where protected statuses are listed (rather than abbreviated Taglines), and (2) posting of updated EEO is the Law posters. Physical security measures are a combination of active or passive systems, devices, and security personnel used to protect a security interest from possible threats. The programs tend to focus on access to education and . Why do we need to have threat information? One such requirement, defined in the NISPOM, states that contractors must report certain events to the appropriate government agencies, that may have an effect on the status of the entity's or an employee's eligibility for access to classified information. Its decisions are binding on all other California state courts. Both the foreign contracting company and the sponsoring foreign government. Who has primary responsibility for the adjudication of personnel security background investigations? Select all that apply. Contractors also must: (1) affirmatively notify employees and agents of the above prohibitions and the corrective action it will take for any violations; (2) include the substance of the Clause in certain subcontracts and contracts with agents; (3) take appropriate action in response to any violations; (4) notify the agency contracting officer of (i) any credible information it receives regarding any violation by the employees or agents of the contractor or subcontractor; and (ii) any actions taken against any such violator; and (5) cooperate fully with the government in investigating alleged violations. a. periodic reinvestigations Use e-Services for Business to submit a Report of Independent Contractor(s) (DE 542).. Mail or Fax. . Employees desiring not to perform on classified work, Change conditions affecting the facility clearance. Finally, a successor contractor who has a duty to bargain with a union is not required to deduct dues and fees from employees pay, unless the contractor agrees to do so in a written agreement. What are some of the indicators Adam should look out for? -Personal foreign travel, module 6 ( process of care, and communication), Cyber Awareness Challenge 2023 (Incomplete), John David Jackson, Patricia Meglich, Robert Mathis, Sean Valentine, Service Management: Operations, Strategy, and Information Technology, Operations Management: Sustainability and Supply Chain Management. %%EOF 6294 0 obj <>stream d. Lower its price. Who sponsors classified meetings in the NISP? This is basically " the contract, " a foundation that the rest of the project details are built upon. There are three sub-sections. Select ALL the correct responses. the contractor's record of- (1)Conforming to requirements and to standards of good workmanship; (2)Forecasting and controlling costs; (3)Adherence to schedules, including the administrative aspects of performance; (4)Reasonable and cooperative behavior and commitment to customer satisfaction; (5)Complying with the requirements -any event that may impact the status of the facility -anything that affects the proper safeguarding of classified information -any indication that classified information has been lost or compromised. Most inside offenders display concerning behaviors before acting directly against their organization. -Anything that affects the proper safeguarding of classified information -In written communications Post Author: Post published: 16 juin 2022; It's often the little things we do every day that can develop into vulnerabilities and cause damage to our operation. The PPA creates additional contribution responsibilities for employers obligated to contribute to critical status or red zone MPPs and the minimum funding rules, which establish mandatory annual contribution requirements. Shift its marginal cost curve upward. -Bypassing technology-associated protocols EO 13672 prohibits discrimination based on sexual orientation and gender identity. c. reporting required information. Industrial Security Representative (IS Rep). how long is chickpea pasta good for in the fridge. Select all that apply. Some federal contracts require contractors to have the ability to access classified information. Anyone who opposes or acts against your interest is called a(n), In analyzing the threat, we are concerned with adversaries that. What type of violation has occurred? Alternatively, the contractor can spend at least the same amount on health insurance benefits. Your knowledge of which factors impact your capability to analyze your vulnerabilities? Which step in the OPSEC process is a decision making step because it helps the decision maker prioritize and decide whether or not to apply a countermeasure? hbbd```b``@$G6"5 vdVc$GG1012HM``$@gx = 2 1/4. In writing to your DSS IS Rep at the DSS field office. Select all that apply. It also must pay the covered fringe benefits in the CBA, which usually includes health insurance, disability benefits, life insurance, 401k plans, pension plans, rate differentials, premium pay provisions, holidays, vacation, paid sick leave, military pay, severance pay, jury duty pay, bereavement pay, and uniform and shoe allowances. Recipients should consult with counsel before taking any actions based on the information contained within this material. makes OPSEC principles second nature to your employees. We need to identify an adversary's capability. This EO established the minimum wage $10.10 an hour for employees of covered federal contractors and made it effective for new contracts entered into on or after January 1, 2015, and existing contracts if modified by the contracting agency to include the requirement. OPSEC is a systematic, proven process to identify, control and protect classified information about a mission, operation or activity, and, thus, denying/mitigating adversary's ability to compromise/interrupt that mission, operation or activity. -Actual, probable, or possible terrorism. Select all that apply. What is the probability that at most five of the freshmen reply "yes"? The security requirements of the contractors home facility, The security requirements of the host activity/facility. Which of the following countermeasures can you implement to help reduce technology-associated insider threats? = 2 1/4. If the visitor organization and host organization both use the DoD System of Record, visit notifications are sent electronically, which speeds the approval process. Weegy: A basic position in American foreign policy has been that America must defend its foreign interests related to Weegy: 15 ? Changes in a facility's storage capability are reported how? The Cognizant Security Office (CSO) does which of the following? Each payroll submitted must include a Statement of Compliance, which is provided in the WH-347. None. Who performs classified Information System assessments?