contractors must report which of these select all that apply

-A desire to appear well-informed AAPs require a number of annual workforce and personnel activity analyses, including a Workforce Analysis, Job Group Analysis, Utilization Analysis, and Placement Goals. U.S. Government employees and contractors must report the following: Personal foreign travel; foreign contacts; speeches or books including information about involvement with the intelligence community. What security control measure outlines the specific export-controlled information that has been authorized for release during a foreign visit and delineates how a company will control access? Section 3-103 places new burdens on contractors to mitigate this threat. contractors are adequate for the protection of classified information. A successor contractor for a contract to provide services of a predecessor contractor with a collective bargaining agreement (CBA) in place which replaced the U.S. Department of Labors (DOL) Wage Determination for the contract must honor the wage rates and covered fringe benefit provisions of that CBA for the first year of the contract. 16/9 = Weegy: Whenever an individual stops drinking, the BAL will decrease slowly. Select all that apply. One way to do this is by conducting a thorough bid/no-bid analysis that meets your company's goals and is in line with your long-term strategy. International visit requirements apply when information to be disclosed is classified or unclassified but related to classified contracts or otherwise subject to export controls under the International Traffic in Arms Regulations (ITAR) or Export Administration Regulations (EAR). Any contact by cleared employees with known or suspected intelligence officers from any country. Profitability Knowledge of the threat supports all other steps in the OPSEC process. What are some of the indicators Adam should look out for? How many steps are there in the OPSEC process? Hostile entities may use social media to _______________ ? To do this, the DCAA evaluates contractors internal cost-control systems, management policies, accuracy of cost representations, adequacy and reliability of records, and accounting systems. Which of the following includes all the steps necessary for processing a facility clearance and a list of the documents and information that the Facility Security Officer (FSO) must gather to prepare for the Facility Clearance Branch (FCB) telephonic survey? Events that require the facility to be open outside of regular business hours, Events that affect the proper safeguarding of classified information, Any change in the number of GSA security containers being used at the contractor facility to protect classified information, An increase or decrease in the number of classified documents stored at the contractor facility. Where are actions, such as Personnel Security Clearance terminations, upgrades, downgrades, and reinstatements, on contractor employees entered? Interference and discrimination based on the use of sick leave are prohibited. Joint Personnel Adjudication System (JPAS). After a need is identified, the Government Contracting Activity (GCA) ___________________. The only requirement for employees to access classified information is to have a favorable eligibility determination. True or false? Its decisions are binding on all other California state courts. Stay Safe. -is what's meant by the phrase "The domesticated generations fell Weegy: A suffix is added to the end of a word to alter its meaning. Pursuant, T.C.A. Security officials should seek out and consider threat information only from official, government sources. Details on E-Verify are available in the E-Verify Manual for Federal Contractors and Subcontractors. This also fails to apply if an arbitration agreement is already in place. -Actual, probable, or possible espionage There are two types of business insurance that all subcontractors should have: general liability and workers compensation. Given the complexities involved, employers would be well-served to address their particular situations with experienced counsel. They must implement written codes of business ethics and conduct, an employee awareness and compliance program, and an internal control system. The tax rate ($3.39) must be multiplied by 100 to find the total. 6294 0 obj <>stream A trained elicitor may gather information by exploiting natural human tendencies, such as (select all that apply): -A tendency to gossip Industrial Security Facilities Database (ISFD), National Industrial Security Program Operating Manual (NISPOM). 8-100d. The Construction Agreement. Increase its output. Risk of civil and criminal exposure also exist under the False Claims Act if a contractor knowingly allows employees to make false charges in connection with a federal contract. Select all that apply. What is the probability that at most five of the freshmen reply "yes"? As defined in the NISPOM, ______ is the administrative determination that an individual is eligible for access to classified information. Contractors may decide whether they want to use E-Verify for all new hires and all existing non-exempt employees assigned to a federal contract, or for their entire non-exempt workforce (all new hires and all existing employees) throughout the entire company. He is invited to speak at a foreign conference. Anyone who opposes or acts against your interest is called a(n), In analyzing the threat, we are concerned with adversaries that. Select all that apply. c. Lower its output. The Higher Education Research Institute at UCLA collected data from 203,967 incoming first-time, full-time freshmen from 270 four-year colleges and universities in the U.S. 71.3%71.3 \%71.3% of those students replied that, yes, they believe that same-sex couples should have the right to legal marital status. Employers with at least 50 employees and a single federal contract or subcontract of at least $50,000 must comply with non-discrimination and affirmative action provisions of Section 503 of the Vocational Rehabilitation Act, including the requirement to annually prepare a written AAP for each establishment with at least 50 employees. Incorporating counterintelligence and threat awareness into a security program can potentially prevent theft, espionage, and loss of life. The minimum wage rate is annually increased by the Secretary of Labor. Insider Threat Program Senior Official (ITPSO). You may also request proof of automobile insurance if the sub has their . In the case of public works projects, contractors must pay their workers on a weekly basis. True or false? hb```e``: AXr,lnfhs"k;dxk_42v6J Therefore, consider including a clause providing that the requirement that the employer terminate an employee for failing to maintain good standing with the union will not be enforced if the termination would cause the employer to be non-compliant with its contract with the government client or to incur additional overtime expense. contracts. Select all that apply. Prime contractors must meet certain reporting requirements before they are able to submit a bid that valued at $50 million or more as of the year 2016. Anna is her organizations Facility Security Officer. Who might be interested in non-public information that an insider can provide? Why do we need to have threat information? Read the publication. No specific procedure is required and, if a grievance cannot be resolved, the employer is not required to arbitrate the grievance. Suggest she contact EAP, Report to security officer The NISP ensures that restrictions on continuous monitoring activities are in place before any classified work may begin. Section 503 also imposes a number of technical obligations and restrictions similar to those of the Americans with Disabilities Act. classic chevy trucks for sale in california. Which of the following government entities adjudicates unfavorable eligibility determinations that are appealed? Under Executive Order (EO) 11246, employers with a covered supply or service federal contract or subcontract of at least $50,000 must engage in affirmative action efforts to increase the workforce representation of women and minorities. (a)Contractors debarred, suspended, or proposed for debarment. What document signed by President Reagan directed the establishment of OPSEC programs, and in what year did this document become law? Which of the following means to deliberately destroy, damage, or obstruct, especially for political or military advantage? Contractors must recognize that their obligations under these laws and executive orders also apply to their subcontractors. If members of the ECBs Governing Council do decide to take formal votes on monetary policy decisions, do you think these votes should be published? In 2022, all property owners in the county will pay an assessed value of $3.39 per $100. Foreign Ownership, Control, or Influence (FOCI) Operations Division, Personnel Security Management Office for Industry (PSMO-I), Center for Development of Security Excellence (CDSE). When a successor contractor hires a majority of the predecessor contractors employees, it must recognize and bargain with any union that represents those employees regarding wages, benefits, and all other terms of employment. It is not intended to constitute legal advice nor does it create a client-lawyer relationship between Jackson Lewis and any recipient. OPSEC focuses on what type of critical information? During a periodic reinvestigation of a cleared individual, During the applicants initial PCL investigation, Only when the applicant is seeking Top Secret clearance eligibility. Security violations are reported to which entity? The following are some of the Executive Orders currently in effect that have significant implications for federal contractors. Similarly, instead of making contributions to a union-sponsored pension plan, the contractor can make the contributions to its companys 401k or a similar retirement plan. Shift its marginal cost curve upward. Contractors must report to the DSS IS Rep only those violations that result in the loss, compromise, or suspected compromise of classified information. When does a host need to coordinate with the visitors organization regarding the Classified Information Nondisclosure Agreement (SF-312)? DoD Directive 5240.06, CI Awareness and Reporting (CIAR), DoD 5220.22-M, the National Industrial Security Program Operating Manual (NISPOM). -Any indication that classified information has been lost or compromised. Otherwise, a contractor would need to wait until it is required to file an EEO-1 report and receive an EEO-1 identifier to register for the portal. (Incorrect). Please read each question carefully, and circle A, B, C or D to indicate the correct response. -any event that may impact the status of the facility -anything that affects the proper safeguarding of classified information -any indication that classified information has been lost or compromised. Refusal to execute Standard Form (SF) 312. This is discussed in more detail below. -Unauthorized disclosure of classified material. The Wage and Hour Division of the DOL has created a standard form (WH-347) that contractors can use to submit the information. Every contractor or subcontractor who performs work covered by the DBA/DBRA must post an Employee Rights under the Davis-Bacon Act poster at the worksite. SF 312, Classified Information Nondisclosure Agreement. The Drug-Free Workplace Act of 1988 (DFWA) requires certain federal contractors to agree to provide drug-free workplaces as a condition of receiving a contract from a federal agency. The amount of a withdrawn employers withdrawal liability is based on a number of factors and requires an actuarial calculation. Although the EO and the corresponding regulations apply only to large-scale construction projects, the wording of both the EO and the implementing rules reiterate federal contracting agencies are not prohibited from requiring PLAs on projects that do not fall within the $25-million threshold. It's impossible to cover all the possible combinations of nationalities between companies and contractors in this blog post. Select all that apply. OPSEC differs from other programs because it requires you to look at yourself through the eyes of the adversary. An insider threat is anyone with authorized access to the information or things an organization values most, and who uses that access, either wittingly or unwittingly, to inflict harm to the organization or national security. Contractors who participate in a multiemployer pension plan (MPP) through a CBA may be subject to significant liabilities created by statute. -In written communications To issue a Facility Clearance (FCL), the Facility Clearance Branch (FCB) reviews which of the following? 20/3 Patterns, stereotypes, and predictable actions are all types of which of the following? When is it appropriate for the visitors organization to submit a visit authorization letter (VAL)? User: contractors must report which of these? B.EO 13494 (Economy Government Contracting). An advantage of using good OPSEC principles during contingencies is that it. Select ALL the correct responses. Which of the following are reasons why AT plan exercises are important? Give the group a name. When the successor contractor initially solicits the predecessor contractors employees for employment, it must state that the contractor will not be honoring the prior contractors CBA if the contractor does not wish to be bound by it. DoD Insider Threat Awareness Quiz_ Nov 2022 (Answered). What security control measures must the host organization implement for a classified meeting? When setting its negotiating strategy and objectives, the contractor should know which cost increases are budgeted for the contractor to pay and which expenses are reimbursable by the government client. -Actual, probable, or possible subversive activities Which of these may be targeted by foreign entities? A contractor awarded a covered contract or subcontract requiring use of E-Verify, if not already enrolled, will have 30 calendar days after the contract award date to enroll in the E-Verify program. The applicant is never required to submit a fingerprint card, but it is a best practice. Once the contractor has obtained facility clearance, it can request the applicable security clearance for its employees. If a candidate has a record in the DoD system of record (JPAS/DISS) and a pre-existing eligibility determination, the FSO assesses whether that determination may be accepted in lieu of initiating a new investigation to determine eligibility. possess the ability to exploit our critical information. determine the collection methods the adversary is using against you. Weegy: A basic position in American foreign policy has been that America must defend its foreign interests related to Weegy: 15 ? The five main types of construction contracts are lump sum, time and materials, cost-plus, unit price, and guaranteed maximum price (GMP). Employees desiring not to perform on classified work, Change conditions affecting the facility clearance. = 2 1/4. The E-Verify system must be used for checking the eligibility of individuals only after the employee has been offered and has accepted the job. A successor contractor will be required to pay the hourly wage rates in the CBA and any wage increases that occur during the first year of the contract. Contractors must report which of these to the Insider Threat program? Provide for the early detection and referral of potential espionage cases. DBA states that all government construction contracts over $2,000 to which a federal agency or the District of Columbia is a party must include provisions for paying workers on-site no less than the local prevailing wages and benefits as set by the DOL. Select all that apply. The EO states that federal contractors and subcontractors subject to the NLRA must post a notice containing information proscribed by the DOL that informs employees of their rights under the NLRA in all plants and offices where employees are performing work on the federal contract. Which of the following is a good security practice in areas where classified information may be subject to unauthorized disclosure? Select all that apply. In addition, because a contractor cannot require a successor contractor to reinstate the grievant, the CBA should state that the contractors back pay and reinstatement obligations end when the contract ends. Some federal contracts require contractors to have the ability to access classified information. How is the FSO notified that a cleared employee may be due for a periodic reinvestigation? What Is Form 1099-NEC. The Davis-Bacon Act (DBA) establishes the requirement for paying prevailing wages on projects involving the construction, alteration, or repair (including painting and decorating) of public buildings or public works. Which of these activities must be reported? Simonne left a safe containing classified material open while she went out for lunch. If you are contacted by a member of the media about the information you are not authorized to share, you should take down the person's name and organization, date, time, location, method of contact, and the reason for contact. Which of the following should Sam refer to for counterintelligence and threat awareness requirements for contractors? DD Form 254, DoD Contract Security Classification Specification, Transportation, Delivery, and Relocation Solutions (TDRS), Schedule 48. A member of your team openly discusses her financial difficulties and her inability to meet her financial obligations. Contractors with federal contract awards of at least $5 million (entered into on or after December 12, 2008) are subject to Federal Acquisition Regulation ethics rules. (Select all that apply.). possess the ability to acquire and exploit our critical information. The EEO-1 Deadline is March 30 each year, and the VETS-4212 deadline is September 30 each year. Which form should the company receive with the contract that provides specific guidance about what information is classified and at what classification level? True or false? The 20-year limitation on annual payments does not apply in the event of a mass withdrawal; this can result in the employer making withdrawal liability payments in perpetuity. -A desire to be polite contractors must report which of these select all that apply. As soon as the completed SF 86 is reviewed by the FSO. Wage increases and other increases conditioned upon reimbursement by the government are not permissible under the SCA. Whose primary responsibility is working with Industrial Security Representatives (IS Reps) and contractor personnel to authorize and maintain classified Information Systems? Covered contracts are contracts subject to procurement contracts for construction covered by the DBA (but not contracts subject only to the DBRA); service contracts covered by the SCA; concessions contracts, including any concessions contract excluded from the SCA by the DOLs regulations at 29 CFR 4.133(b); and contracts in connection with federal property or lands and related to offering services for federal employees, their dependents, or the general public. Although all private employers with at least 100 employees must prepare annual EEO-1 reports, covered contractors and subcontractors must identify themselves as such on those reports. Which of the following would not be reported to the Personnel Security Management Office for Industry (PSMO-I)? -Keeping unauthorized backups Physical security systems provide the means to counter threats only during wartime. When the DFARS 252.211-7007 clause is in the contract, the contractor must report receipt of all GFP and updates of serially managed GFP . The contractor must also report any such equipment, systems, or services discovered during contract performance; this requirement flows down to subcontractors. 5.1 Overview of the evaluation and selection of contractors. An adversary's capability is defined as his ability to do which of the following? Which of the following is an objective of the DSS CI Directorate? State the period of time the requested waiver will cover. Facility employees may be processed for personnel security clearances concurrently with the processing of, or after the award of, a facilitys FCL. -Contractors Training records management: Contractors must create and maintain records of all employee insider threat awareness programs initial and refresher training and those records must be available for review during DSS security vulnerability assessments. 6 2/3 June 17, 2022 . Specific clearance and access requirements, Authorization to generate classified information, A method for denying an adversary access to our critical information. 2020 Jackson Lewis P.C. Personnel security clearance investigation stage, Initiate personnel security clearance process stage. Although withdrawal liability is a corporate obligation, all trades or businesses with sufficient common ownership are treated as a single employer, and each such trade or business is jointly and severally liable for withdrawal liability. how long is chickpea pasta good for in the fridge. Other technical obligations include drafting, implementing, and disseminating a prescribed equal employment opportunity (EEO)/Policy Statement, ensuring that all job postings contain an EEO Tag Line, annually providing all vendors a notice of the employers federal contractor status, incorporating an Equal Opportunity Clause in each of the employers covered subcontracts, notifying all unions of the employers federal contractor status (if applicable), and posting a number of notices on the employers careers website, including an applicant-accessibility statement. Whenever an individual stops drinking, the BAL will ________________. One of the conditions required for a pre-existing eligibility determination issued by one federal agency to be accepted by another federal agency is for the determination to be based on an investigation of sufficient scope that is current to within _________. In addition, general contractors are liable for complying with hazardous materials requirements (section 10.3). -Foreign governments If a successor contractor timely disavows the previous contractors CBA, it may establish its own terms and conditions of employment, subject to honoring the wages and covered fringe benefits of the CBA required by Section 4c of the SCA as discussed above. Chief among the data requirements is the obligation to track and maintain applicant data for analyses. %PDF-1.6 % contractors must report which of these select all that apply -any event that may impact the status of the facility -anything that affects the proper safeguarding of classified information -any indication that classified information has been lost or compromised. In addition, covered contractors must self-disclose credible evidence of violations of certain criminal laws or the civil False Claims Act and significant over-payment.. Select all that apply. American Society for Industrial Security International (ASIS), NCMS, the Society of Industrial Security Professionals, Industrial Security Awareness Council (ISAC). Updated 284 days ago|5/24/2022 11:00:50 AM, Contractors must report the following to the insider threat program: Efforts to obtain unauthorized access to classified or proprietary information. contractors must report which of these to the insider threat program select all that apply Contractors must report the following to the insider threat program: Efforts to obtain unauthorized access to classified or proprietary information. Why or why not? What is the level of FCL required by the contractor? Security control measures are the responsibility of the Cognizant Security Agency. To whom may eligibility decisions be appealed if the DoD CAF denies eligibility? An advantage of incorporating the use of OPSEC surveys is that it. Details as to why it is not possible or practical to comply with the requirement. Which of the following are reportable behavioral indicators? NATO briefings require a signed certificate. According to section 10.2.8, the general contractor should report any work-related accident in writing to the owner, and will be responsible for any costs the owner incurs related to the accident. For example, if the CBA required the predecessor to pay $4.50 per hour to the unions health and welfare fund to provide medical insurance and related benefits, the contractor can spend at least $4.50 per hour on these benefits by either using its medical plan or any other plan. Which of the following statements are true? In addition, there is a Building and Construction Industry exception for withdrawal liability that allows an employer in that industry to avoid incurring withdrawal liability if they cease performing any services within the jurisdiction of the CBA. It also requires: (1) inclusion of sexual orientation and gender identity in EEO Taglines where protected statuses are listed (rather than abbreviated Taglines), and (2) posting of updated EEO is the Law posters. An employers right to seek medical certification for the leave is limited. In connection with this, the DCAA evaluates whether costs are allocated to coincide appropriately with each employees division of time. Administers the National Industrial Security Program (NISP). For more information, visit https://www.jacksonlewis.com. Select all that apply. Select ALL of the correct responses. Contractors with a federal acquisition contract or subcontract must apply 15 basic cybersecurity safeguarding requirements and procedures to protect federal contract information. The requirements are based on security requirements published in the National Institute of Standards and Technologys (NIST) Special Publication (SP) 800-171, Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations. Specific requirements are in FAR Subpart 4.19 and FAR Clause 52.204-21.

Anzac Bridge Construction, Bcp Sql Server Import Csv Example, Gunnar Crosshairs Tire Clearance, Horseback Riding On The Beach Florida, Articles C