This will allow the contractor to understand the extent to which the PLA will affect the costs of the work and bid accordingly. a. When a bargaining impasse occurs, the employer may implement terms it proposed to the union during bargaining. A cleared U.S. company received a request to sell export-controlled technology to an Eastern European security organization. This need to be reported to the companys IS Rep? Visitors Facility Security Officer (FSO), DSS Headquarters Industrial Security Integration and Application (IP) Programs. Risk of civil and criminal exposure also exist under the False Claims Act if a contractor knowingly allows employees to make false charges in connection with a federal contract. User: 3/4 16/9 Weegy: 3/4 ? When the DFARS 252.211-7007 clause is in the contract, the contractor must report receipt of all GFP and updates of serially managed GFP . -Bypassing security rules or protocols %PDF-1.6 % Which of the following is a secure online environment offered by the OPM Center for Federal Investigative Services? Some federal contracts require contractors to have the ability to access classified information. Under VEVRAA, covered employers must engage in documented outreach efforts to attract qualified protected veterans in a good faith effort to annually attain a veteran hiring benchmark of 5.9%. An adversary's capability is defined as his ability to do which of the following? Added 77 days ago|11/12/2022 9:28:04 PM -A desire to be polite In the case of public works projects, contractors must pay their workers on a weekly basis. Additionally, such employers must follow non-discrimination and related provisions, as well as comply with a host of recordkeeping, data collection, and technical obligations. If a candidate has a record in the DoD system of record (JPAS/DISS) and a pre-existing eligibility determination, the FSO assesses whether that determination may be accepted in lieu of initiating a new investigation to determine eligibility. -Improper use of privileged access OPSEC is a systematic, proven process to identify, control and protect classified information about a mission, operation or activity, and, thus, denying/mitigating adversary's ability to compromise/interrupt that mission, operation or activity. DoD Directive 5240.06, CI Awareness and Reporting (CIAR), DoD 5220.22-M, the National Industrial Security Program Operating Manual (NISPOM). contractors must report which of these select all that apply. Additionally, beginning January 1, 2020, tipped employees performing work on or in connection with covered contracts generally must be paid a minimum cash wage of $7.55 an hour. Incorporating counterintelligence and threat awareness into a security program can potentially prevent theft, espionage, and loss of life. The new employee has a current Top Secret eligibility, which was granted by her previous employer. Insurance certificates or proof of insurance. DoD Insider Threat Awareness Quiz_ Nov 2022 (Answered). Each payroll submitted must include a Statement of Compliance, which is provided in the WH-347. Foreign Ownership, Control, or Influence (FOCI) Operations Division, Personnel Security Management Office for Industry (PSMO-I), Center for Development of Security Excellence (CDSE). An interim eligibility determination grants the applicant permanent access to classified information by bypassing the remainder of the PCL process. Which of the following are reasons why AT plan exercises are important? Select ALL the correct responses. Who might be interested in non-public information that an insider can provide? Contractors must recognize that their obligations under these laws and executive orders also apply to their subcontractors. 2019 - The South African Department of Employment & Labour Disclaimer PAIA As just one example, changing the design of a tile floor is much easier to do before the tile is ordered, rather than after it's installed. 6286 0 obj <>/Filter/FlateDecode/ID[<2EB85691B785E04CA2BDC113E686BC84>]/Index[6275 20]/Info 6274 0 R/Length 76/Prev 582482/Root 6276 0 R/Size 6295/Type/XRef/W[1 3 1]>>stream Both the foreign contracting company and the sponsoring foreign government. The transfer of classified or proprietary information to a system not approved for the classification level or unaccredited or unauthorized systems, individuals, applications, or media is a _________________. June 17, 2022 . 16/9 = Weegy: Whenever an individual stops drinking, the BAL will decrease slowly. A company cleared at the Secret level hires a new employee. 2. Therefore, consider including a clause providing that the requirement that the employer terminate an employee for failing to maintain good standing with the union will not be enforced if the termination would cause the employer to be non-compliant with its contract with the government client or to incur additional overtime expense. Recipients should consult with counsel before taking any actions based on the information contained within this material. Focused on labor and employment law since 1958, Jackson Lewis P.C. Covered employers with at least 50 employees must prepare annually a written affirmative action plan (AAP) for each of their establishments (physical work locations) with at least 50 employees. 0 Personnel security clearance investigation stage, Initiate personnel security clearance process stage. Whenever an individual stops drinking, the BAL will ________________. Finally, a successor contractor who has a duty to bargain with a union is not required to deduct dues and fees from employees pay, unless the contractor agrees to do so in a written agreement. the contractor's record of- (1)Conforming to requirements and to standards of good workmanship; (2)Forecasting and controlling costs; (3)Adherence to schedules, including the administrative aspects of performance; (4)Reasonable and cooperative behavior and commitment to customer satisfaction; (5)Complying with the requirements = 45/20 -Anything that affects the proper safeguarding of classified information Which of the following countermeasures can you implement to help reduce technology-associated insider threats? Hes not sure if he should report it, but he knows it is better not to report an incident or behavior than to make a potentially false report. Which of the following are reportable behavioral indicators? To use leave, employees need only make an oral or written request to the employer, with the expected duration of leave, at least seven days before the scheduled leave, or as soon as practicable if the need for leave is unforeseeable. Which form should the company receive with the contract that provides specific guidance about what information is classified and at what classification level? -A desire to appear well-informed . EO 13672 prohibits discrimination based on sexual orientation and gender identity. Office of the Director of National Intelligence (ODNI), works for a company with a Facility Clearance (FCL), requires access to classified information. In order to make the bid/no-bid decision, there are a number of factors to consider to make an objective, rather than a subjective, decision. Which of the following is NOT a step in the OPSEC process? For contracts in excess of $500,000 for supplies (other than for commercial off-the-shelf or COTS) acquired outside the U.S. or for services performed outside the U.S., the contractor must develop an appropriate compliance plan that, at a minimum, includes certain proactive steps. What document does DSS publish and post on its website to change or clarify existing policy requirements in the NISPOM? Provide for the early detection and referral of potential espionage cases. An insider threat is anyone with authorized access to the information or things an organization values most, and who uses that access, either wittingly or unwittingly, to inflict harm to the organization or national security. defines the initial requirements for the product/service. Contractors may decide whether they want to use E-Verify for all new hires and all existing non-exempt employees assigned to a federal contract, or for their entire non-exempt workforce (all new hires and all existing employees) throughout the entire company. -Active duty military. Which step in the OPSEC process requires you to look at your operation through the eyes of the adversary? In addition, because a contractor cannot require a successor contractor to reinstate the grievant, the CBA should state that the contractors back pay and reinstatement obligations end when the contract ends. Once again, you can see how important communication is to successfully working with contractors, whether inside your home or on your exterior home improvement project. A coworker shares that she and her husband are facing foreclosure, and she doesn't know what to do. Once there is a duty to bargain, the contractor must respond to the unions information requests within a reasonable time. Federal contractors and subcontractors with a single government contract or subcontract of at least $150,000 must follow the non-discrimination and related provisions concerning protected veterans covered under the Vietnam Era Veterans Readjustment Assistance Act (VEVRAA). An individuals access level is directly related to the employer organizations Facility Clearance level and the level of access needed for the individual to do his or her job. In order to determine our critical information, we need to consider both the friendly and adversary points of view. As soon as the completed SF 86 is reviewed by the FSO. Which of the following countermeasures may be necessary if routine activities provide an adversary with tip-offs to critical information? A successor contractor for a contract to provide services of a predecessor contractor with a collective bargaining agreement (CBA) in place which replaced the U.S. Department of Labors (DOL) Wage Determination for the contract must honor the wage rates and covered fringe benefit provisions of that CBA for the first year of the contract. He is working with other company officials to identify the organizations assets. Select all that apply. When considering assets, she knows that the greatest target of our adversaries is ___________. Subjects may include the issues presented by the employer or the union that have been processed through the grievance procedure, the terms of the CBA, and the type of remedy available to an aggrieved employee. Prior results do not guarantee a similar outcome. In all cases, these events should be recorded in the contractor's property management system. Contractors Active duty military Former employees (select all 4 answers) Which of the following is a reportable behavioral indicator? This material may be considered attorney advertising in some jurisdictions. True or false? Since 1850, the court has issued many influential decisions in a variety of areas . U.S. Government employees and contractors must report the following: Personal foreign travel; foreign contacts; speeches or books including information about involvement with the intelligence community. Security officials should seek out and consider threat information only from official, government sources. allows for any changes in OPSEC factors over time. To whom does the FSO submit the applicants completed SF-86 and both signed release forms? What are some of the indicators Adam should look out for? Evidence of tampering with your facility's classified storage container is an example of what type of security threat? Suggest she contact EAP, Report to security officer Who sponsors classified meetings in the NISP? When the visit is a first-time visit and the DoD System of Records does not indicate that the visitor has signed an SF-312, The visitor must always sign it at every visit to any classified facility, When the visitor presents a visit authorization letter (VAL), When it is the visitors first visit to the cleared facility. If the visitor organization and host organization both use the DoD System of Record, visit notifications are sent electronically, which speeds the approval process. When the visit is a contract-related classified visit, When the request needs to be submitted and approved quickly, When one or both organizations do not utilize the web-based DoD System of Record, When either the visitors or host organization does not utilize the Industrial Security Facilities Database. Shift its marginal cost curve upward. What should you do? The request must explain the impact on the contractor operations and services if this waiver is not . What document signed by President Reagan directed the establishment of OPSEC programs, and in what year did this document become law? Which of the following means to deliberately destroy, damage, or obstruct, especially for political or military advantage? Select all that apply. U.S. Government employees and contractors must report the following: Personal foreign travel; foreign contacts; speeches or books including information about involvement with the intelligence community. What is the preferred method of assessing the risk to your organization? Answer Information System Security Manager (ISSM) Insider Threat Program Senior Official (ITPSO) Information System Security Professional/Security Control Assessor (ISSP/SCA) Facility Security Officer (FSO) Question 20 Question Which of the following are Counterintelligence Special Agent (CISA) responsibilities? Enforcement of such a union security provision can leave a contractor with inadequate staffing. The tax rate ($3.39) must be multiplied by 100 to find the total. Patterns, stereotypes, and predictable actions are all types of which of the following? Which of the following roles are filled by contractor employees? WINDOWPANE is the live-streaming app for sharing your life as it happens, without filters, editing, or anything fake. contractors must report which of these select all that applymobile homes for rent in pontotoc, ms. stairway to heaven metaphor. After a need is identified, the Government Contracting Activity (GCA) ___________________. The true about technology and insider threat is: Technology changes the scale of risk from insider threats. The Supreme Court of California is the highest and final court of appeals in the courts of the U.S. state of California.It is headquartered in San Francisco at the Earl Warren Building, but it regularly holds sessions in Los Angeles and Sacramento. Your knowledge of which factors impact your capability to analyze your vulnerabilities? Which of the following BEST identifies the goal of OPSEC? The Wage and Hour Division of the DOL has created a standard form (WH-347) that contractors can use to submit the information. -Over the phone Submit a paper report of independent contractors using one of the following options: Download a fill-in DE 542 (PDF) form. It is critical, therefore, to maintain labor-charging internal control systems and educate employees on their responsibility to accurately record their time charges on federal contract work. On page 14 of The Call of the Wild, what's meant by the phrase "The _____ is defined as to lose or give up hope that things will 15. 1. A contractor facility has been awarded classified contracts that require access to information classified at the Confidential and Secret levels. Which of the following topics is NOT included in the National Industrial Security Program Operating Manual (NISPOM)? Online. We need to identify an adversary's capability. Of the scenarios listed below, which ones must be reported to your IS Rep as change conditions affecting the facility's clearance? OFCCP prescribes a specific form for inviting applicants and employees to self-identify for disabled status. That's why we put together the global hiring guide.But here's a quick recap of five common scenarios for US companies hiring independent contractors both locally and abroad. You may also request proof of automobile insurance if the sub has their . DBA states that all government construction contracts over $2,000 to which a federal agency or the District of Columbia is a party must include provisions for paying workers on-site no less than the local prevailing wages and benefits as set by the DOL. Which of the following is used in the PCL process to determine a candidates eligibility? State the period of time the requested waiver will cover. An advantage of incorporating OPSEC principles in the planning stage of any operation is that it. Why should organizations use and practice OPSEC? During which stage of the personnel security clearance process are the thirteen guidelines used? What is the highest level of classified access she may have for work performed for her new employer? The Weegy: A modal verb (also modal, modal auxiliary verb, modal auxiliary) is a type of auxiliary verb that is used to contractors must report which of these to the insider threat program select all that apply, Contractors must report the following to the insider threat program: Efforts to obtain unauthorized access to classified or proprietary information. Which investigation type is required for an initial Secret clearance? Select all that apply. Which of the following, when looked at by itself or in conjunction with something else, can point to a vulnerability that an adversary can exploit? Accordingly, under certain circumstances, a shareholder or business owner may be found personally liable for withdrawal liability. A member of your team openly discusses her financial difficulties and her inability to meet her financial obligations. provides for early detection of OPSEC problems. identify the losing and gaining contract numbers and select the items from those previously receipted. When dealing with countermeasure development, what is the bottom line? User: She worked really hard on the project. IDENTIFY THE VARIOUS METHODS OF CONTRACTING FOR A SUPPLY OR SERVICE:Contracting methods available which can streamline the contracting timeframe include: . What is a final security control in the NISP when the purpose of a visit has been accomplished? When a successor contractor hires a majority of the predecessor contractors employees, it must recognize and bargain with any union that represents those employees regarding wages, benefits, and all other terms of employment. Additionally, you must also pay the matching employer portion of social security and Medicare taxes as well as pay unemployment tax on wages paid to an employee. Technology Collection Trends in the U.S. Defense Industry. importance of the critical information item. Which of the following countermeasures is considered among the most effective for all organizations? Contractors located in U.S. territories (outside of the United States) should contact the OFCCP Helpdesk at 1-800-397-6251 for assistance with registering. = 15 ? 's 950+ attorneys located in major cities nationwide consistently identify and respond to new ways workplace law intersects business. initiative combines industry-leading health and safety standards with virtual technologies designed to keep real estate moving forward, and give our employees, customers and partners confidence and support to stay safe. Application shall be made on an SF Form 86 for DOE and NRC contractors. Once the contractor has obtained facility clearance, it can request the applicable security clearance for its employees. You must check the box on the Report of Independent Contractor(s) (DE 542) that indicates Ongoing.If there is no set contract amount, you can report when the total payments in a calendar year equal or exceed $600 and check the Ongoing box. The Cognizant Security Office (CSO) for the DoD is Director of National Intelligence (DNI). Form 1099-NEC is an IRS information return used to report non-employee compensations made to independent contractors by employers or businesses. Anyone who opposes or acts against your interest is called a(n), In analyzing the threat, we are concerned with adversaries that. When the host organization approves a visit request, this approval constitutes _____. When is an SF 312, Classified Information Nondisclosure Agreement, executed? -Report the indicator to your security office. Here is a list of the most common construction contract documents, and what they include. The Drug-Free Workplace Act of 1988 (DFWA) requires certain federal contractors to agree to provide drug-free workplaces as a condition of receiving a contract from a federal agency. Loss, compromise, and suspected compromise of classified information are reported how? (1)Notwithstanding the debarment, suspension, or proposed debarment of a contractor, agencies may continue contracts or subcontracts in existence at the time the contractor was debarred, suspended, or proposed for debarment unless Which of the following is considered a potential insider threat vulnerability? These requirements apply not only to the contractors employees working directly on a federal contract, but generally to their entire workforce, including locations where no federal contract work is performed. Which of the following countermeasures should be used sparingly because of its expense and maintenance difficulty? What step in the OPSEC process is Analyzing Threats? c. Lower its output. . Select all that apply. _____ describes the level of information to which a person is authorized access based on a background investigation. Which international standard has recently been developed to address the socially responsible behavior of firms? To promote an environment in which federal contracts for goods or services will be performed by contractors whose work will not be interrupted by labor unrest, President Barack Obama signed into law a mandate that federal contractors inform employees of their rights under the NLRA. A Bridge Agreement is designed to be short-term to fill the gap until a completely new CBA can be negotiated. Which investigation is used for a periodic reinvestigation of an individual possessing a Secret or Confidential clearance eligibility? Which of these may be targeted by foreign entities? = 2 5/20 What DSS organization provides security education and training to DoD and other U.S. government personnel and contractors? -Threat can include unathorized disclosure of national security information or through the loss or degradation of department resources or capabilities. They must provide the contracting agency, also weekly, a certified copy of all payrolls providing the information above for the previous weeks payroll period. The PPA creates additional contribution responsibilities for employers obligated to contribute to critical status or red zone MPPs and the minimum funding rules, which establish mandatory annual contribution requirements. consular corps association of philadelphia tequileras scarborough maine menu pfizer board of directors political affiliation how many grandchildren did fred astaire . Which organizations are tasked with establishing OPSEC programs under the law signed by President Reagan? The definition of Targeted Violence includes which of these components? An employees need for a Personnel Security Clearance (PCL) is determined by the program manager, but the clearance level is determined by the Government Contracting Activity (GCA). c. reporting required information. These reports are submitted to the Federal Funding Accountability Transparency Act Subaward Reporting System. If a successor contractor timely disavows the previous contractors CBA, it may establish its own terms and conditions of employment, subject to honoring the wages and covered fringe benefits of the CBA required by Section 4c of the SCA as discussed above. H.EO 13665 (Non-Retaliation for Disclosure of Compensation Information), This EO, often referred to as the Pay Transparency Executive Order, prohibits discrimination or retaliation against any employee or applicant because such employee or applicant has inquired about, discussed, or disclosed the compensation of the employee or applicant or another employee or applicant.. Government contractors with non-acquisition contracts could have separate, specific contractual obligations establishing protections for controlled unclassified information. 6 2/3 [ Any contact that suggests the employee may be the target of attempted exploitation by the intelligence service of another country. One of the conditions required for a pre-existing eligibility determination issued by one federal agency to be accepted by another federal agency is for the determination to be based on an investigation of sufficient scope that is current to within _________. -Actual, probable, or possible subversive activities Service contracts: The small business prime contractor must provide at least 50% of the contract cost for personnel. contractors must report which of these select all that apply. Maintain list of militarily critical technology. -Any event that may impact an individual's personnel security clearance Some federal contracts and subcontracts may require the contractor to provide paid sick leave. In a right-to-work state, such provisions are prohibited unless the worksite is a federal enclave, meaning, it is exclusively subject to federal (and not state) law. DoDM 5200.01, Volume 1, Enclosure 3, DoD Information Security Program. b. Which paragraph of the AT plan lists the specific task for each subordinate unit? = 2 5/20 Contractors also are required to include this language in their contracts and purchase orders. contractors must report which of these to the insider threat program select all that apply Contractors must report the following to the insider threat program: Efforts to obtain unauthorized access to classified or proprietary information. The ATO is responsible for the writing of the AT plan. -Suggest she contact the EAP Report the concerning behavior to your security officer. endstream endobj startxref
Laa Patch Dragon Age 2, Neil Mehta Greenoaks Capital, Tony Adams Son, Oliver, Paycom Estimated Deductions, Articles C