In addition, when a CBA expires, the parties must maintain the terms and conditions at the status quo while negotiations take place. Pursuant, T.C.A. Contractors must report which of these to the insider threat program? What is a final security control in the NISP when the purpose of a visit has been accomplished? Which of the following are reportable behavioral indicators? Gopuff Background Check Requirementscom with instructions, or you can log into the Checkr applicant portal to view the status of your background check. Any contact by cleared employees with known or suspected intelligence officers from any country. The poster must be displayed in a prominent and accessible place where it can be seen easily by employees. There are two types of business insurance that all subcontractors should have: general liability and workers compensation. (Select all that apply.). -Terrorist organizations how long is chickpea pasta good for in the fridge. = 2 1/4. . -In person. [ Any contact that suggests the employee may be the target of attempted exploitation by the intelligence service of another country. None. The Davis-Bacon Act (DBA) establishes the requirement for paying prevailing wages on projects involving the construction, alteration, or repair (including painting and decorating) of public buildings or public works. assess the level of risk to your operation. That's why we put together the global hiring guide.But here's a quick recap of five common scenarios for US companies hiring independent contractors both locally and abroad. -Contractors Select all that apply. Depending on the contractors specific organizational needs, other provisions should be considered. -Use strong passwords Weegy: A basic position in American foreign policy has been that America must defend its foreign interests related to Weegy: 15 ? classic chevy trucks for sale in california. -Non-state actors. Which of the following statements are true? Any form of violence Directed at an individual or group For a specific reason A member of your team openly discusses her financial difficulties and her inability to meet her financial obligations. The more we know about an adversary's intent and capability, the better we can judge how and why he may collect the information that he needs. True or false? Affirmative Action, OFCCP and Government Contract Compliance, Corporate Governance and Internal Investigations, Restrictive Covenants, Trade Secrets and Unfair Competition, Disability Access Litigation and Compliance, Diversity and Inclusion Efforts that Really Work, Drug Testing and Substance Abuse Management, Environmental, Social and Governance (ESG), OSHA's COVID-19 Vaccination and Testing Emergency Temporary Standard, Employee Rights under the Davis-Bacon Act, E-Verify Manual for Federal Contractors and Subcontractors, Federal Funding Accountability Transparency Act Subaward Reporting System, Labor Board Reinstates Standard Restricting Employee Severance Agreements, Top Five Labor Law Developments for January 2023, Illinois Paid Leave for All Workers Act is Ready for Governors Signature, Name, address, and Social Security Number of each employee, Hourly rates of pay and contributions for fringe benefits or their cash equivalents, If applicable, detailed information on fringe benefits and approved apprenticeship or trainee programs. What is the last step in the OPSEC process? In writing to your IS Rep at the DSS field office. Which of the following are Counterintelligence Special Agent (CISA) responsibilities? defines the initial requirements for the product/service. Any contact by cleared employees with known or suspected intelligence officers from any country. Information Security Oversight Office (ISOO). contractors must report which of these select all that applywhat do yellow license plates mean in ohio? Contractors must report which of these? When the host organization approves a visit request, this approval constitutes _____. Contractors must report which of these? In addition, because a contractor cannot require a successor contractor to reinstate the grievant, the CBA should state that the contractors back pay and reinstatement obligations end when the contract ends. Many successor contractors negotiate a Bridge Agreement or a new CBA with the union that represented employees of the previous contractor. _____ describes the level of information to which a person is authorized access based on a background investigation. The contractor must also report any such equipment, systems, or services discovered during contract performance; this requirement flows down to subcontractors. Which of the following is reported to PSMO-I? Which contracting document provides a record of the contractors commitment to comply with the National Industrial Security Program Operating Manual (NISPOM)? -Actual, probable, or possible subversive activities Joint Personnel Adjudication System (JPAS). They are indicators that tell adversaries where to focus their collection efforts, They are vulnerabilities that tell adversaries where to focus their collection efforts, They are indicators that are not part of a unit's normal conduct, They are vulnerabilities that are not part of a unit's normal conduct. Some federal contracts and subcontracts may require the contractor to provide paid sick leave. -Any indication that classified information has been lost or compromised. c. Lower its output. How is the applicants FSO notified if the applicant receive an unfavorable eligibility determination? The contractor also must post the applicable Wage Determination. Select all that apply. The 20-year limitation on annual payments does not apply in the event of a mass withdrawal; this can result in the employer making withdrawal liability payments in perpetuity. -In written communications Any contact by cleared employees with known or suspected intelligence officers from any country. Only select Cognizant Security Agencies (CSAs) have hotlines for reporting industrial security issues. -Employees To provide you with a holistic picture of your operation, To protect your operation by properly controlling classified information, To establish a systematic process to assess the requirements for mission success, To control information about your capabilities and intentions. According to the DCAA, [T]imekeeping procedures and controls on labor charges are areas of utmost concern. One area of the DCAAs attention is whether the contractor has a timekeeping system to track an employees time spent on each work activity. -Hoarding files and data Events that require the facility to be open outside of regular business hours, Events that affect the proper safeguarding of classified information, Any change in the number of GSA security containers being used at the contractor facility to protect classified information, An increase or decrease in the number of classified documents stored at the contractor facility. Here is a list of the most common construction contract documents, and what they include. He knows seminars, conventions, and exhibits can be used by adversaries to target knowledgeable resources like him. To protect the integrity of their mission. The Higher Education Research Institute at UCLA collected data from 203,967 incoming first-time, full-time freshmen from 270 four-year colleges and universities in the U.S. 71.3%71.3 \%71.3% of those students replied that, yes, they believe that same-sex couples should have the right to legal marital status. Phovoir/Shutterstock. Contractors must recognize that their obligations under these laws and executive orders also apply to their subcontractors. SF 312, Classified Information Nondisclosure Agreement. An advantage of using good OPSEC principles during contingencies is that it. They must be allowed to carry over unused paid sick leave from year to year, although contractors can limit accrual to 56 hours. Give the group a name. The records of a contractor with a contract with the U.S. Department of Defense (DoD) are subject to audit by the Defense Contract Audit Agency (DCAA), which also performs audits for other government agencies. contracts. Additionally, such employers must follow non-discrimination and related provisions, as well as comply with a host of recordkeeping, data collection, and technical obligations. contractors must report which of these select all that apply. Who must submit the RFV when a foreign national needs to visit a U.S. contractor facility to discuss classified information? b. annual clearance justification reviews The NISP ensures the partnership between the federal government and private industry places the burden of risk on the subcontractors. What is the level of FCL required by the contractor? = 15 * 3/20 Office of the Director of National Intelligence (ODNI), works for a company with a Facility Clearance (FCL), requires access to classified information. Specific clearance and access requirements, Authorization to generate classified information, A method for denying an adversary access to our critical information. The only requirement for employees to access classified information is to have a favorable eligibility determination. It also should state that the employer is not required to terminate the employee until a replacement has been hired, cleared, and trained. Which AT plan exercise(s) uses scenario driven events to test specific portions of the AT plan? The contractor also must process grievances filed by the union before a formal grievance procedure has been negotiated. Before conducting an interview with an employee that could lead to disciplinary action, the employee is entitled to union representation during the interview upon request. ; Order the DE 542 form from our Online Forms and Publications. These must be trained in counterintelligence; response procedures; applicable laws and regulations; and applicable civil liberties and privacy issues. This material is provided for informational purposes only. contractors must report which of these to the insider threat program select all that apply Contractors must report the following to the insider threat program: Efforts to obtain unauthorized access to classified or proprietary information. Given the complexities involved, employers would be well-served to address their particular situations with experienced counsel. Which of the following statements BEST describes the risk status if any one element of risk shrinks to zero? a. When they identify assets, they should include only classified information. We need to identify an adversary's capability. The Construction Agreement. Additionally, beginning January 1, 2020, tipped employees performing work on or in connection with covered contracts generally must be paid a minimum cash wage of $7.55 an hour. endstream endobj startxref Which of the following would not be reported to the Personnel Security Management Office for Industry (PSMO-I)? Select all that apply. -Any event that may impact the status of the facility The primary source of data for these AAP analyses is race and gender data collected through pre- and post-offer applicant and employee invitations to self-identify. Select all that apply. -A desire to be polite A successor contractor can satisfy its obligation to provide the same health insurance benefits of the predecessor contractor by matching the benefit. c. reporting required information. -Active duty military. American Society for Industrial Security International (ASIS), NCMS, the Society of Industrial Security Professionals, Industrial Security Awareness Council (ISAC). Unauthorized receipt of classified material. To whom should you report if you are contacted by a member of the media about information you are not authorized to share? Updated 284 days ago|5/24/2022 11:00:50 AM, Contractors must report the following to the insider threat program: Efforts to obtain unauthorized access to classified or proprietary information. -is what's meant by the phrase "The domesticated generations fell Weegy: A suffix is added to the end of a word to alter its meaning. 's 950+ attorneys located in major cities nationwide consistently identify and respond to new ways workplace law intersects business. F.EO 13658 (Minimum Wage for Contractors). Which of the following organizations conducts periodic Security Vulnerability Assessments (SVAs) of contractor facilities as the CSO to the Department of Defense? Form 1099-NEC is an IRS information return used to report non-employee compensations made to independent contractors by employers or businesses. When is an applicant required to submit fingerprints in addition to his/her security application? Always develop countermeasures on a first-come, first-served basis, Always apply a unique countermeasure to each vulnerability, Always think of a countermeasure as a smarter way to do a task, Always weigh the cost of the countermeasure against its benefit, Identifying what an adversary already knows about your operation helps you to. SF 328, Certificate Pertaining to Foreign Interests, SF 86, Questionnaire for National Security Positions. The ______________ has been designated as the Cognizant Security Office (CSO) for the DoD and over 30 other non-DoD agencies. Both the foreign contracting company and the sponsoring foreign government. The Wage and Hour Division of the DOL has created a standard form (WH-347) that contractors can use to submit the information. Added 77 days ago|11/12/2022 9:28:04 PM DD Form 254, Department of Defense Contract Security Classification Specification, DD Form 441, Department of Defense Security Agreement. . Facility employees may be processed for personnel security clearances concurrently with the processing of, or after the award of, a facilitys FCL. To ensure there are enough cleared employees to meet the needs of a contractor companys classified contract workload, To provide the CEO with justification for hiring more cleared employees, To assess whether a cleared employee still requires access to classified information. When she returned, she found a member of the cleaning crew straightening the classified documents on her desk. Insider Threat Program Senior Official (ITPSO). In addition, general contractors are liable for complying with hazardous materials requirements (section 10.3). You may also request proof of automobile insurance if the sub has their . Failure to report unauthorized disclosure of classified information does not affect the service members safety. Before an employee is granted access to classified information, After an employee has access to classified information. A CBA may not provide for less paid sick leave than required by the EO. -Actual, probable, or possible espionage Which type of security training typically informs cleared employees of changes or updates to security regulations? The Weegy: A modal verb (also modal, modal auxiliary verb, modal auxiliary) is a type of auxiliary verb that is used to U. S. government employees and contractors must report which of the following? Contractors who participate in a multiemployer pension plan (MPP) through a CBA may be subject to significant liabilities created by statute. Bargaining impasse often is difficult to establish; the employer must demonstrate both that the parties are deadlocked and that further discussions likely will not lead to an agreement. Select all that apply. Online. 8% effective tax rate, during the first quarter of fiscal 2022 compared to $132 laborer or mechanic is so employed, wages include compensation, at a rate not less than one and one-half times the basic rate of pay, for all hours worked . During a periodic reinvestigation of a cleared individual, During the applicants initial PCL investigation, Only when the applicant is seeking Top Secret clearance eligibility. The Contracting Officers Representative (COR) is authorized to make changes to the contract, even if those changes affect price or quality. b. 20/3 The E-Verify federal contractor rule only affects federal contractors who are awarded a new contract on or after the effective date of the rule, September 8, 2009, that includes the Federal Acquisition Regulation (FAR) E-Verify clause (73 FR 67704). Lesser disciplinary actions may be discussed with the union after the action is taken. Weegy: Contractors must report the following to the insider threat program: Efforts to obtain unauthorized access to classified or proprietary information. An advantage of incorporating the use of OPSEC surveys is that it. consular corps association of philadelphia tequileras scarborough maine menu pfizer board of directors political affiliation how many grandchildren did fred astaire . Some MPPs have a Free Look rule, which allows new employers to join the plan for up to five years without incurring any withdrawal liability, provided: (1) the new employers contributions are less than 2% of the total employer contributions for each year in the MPP; (2) the MPP had an 8-to-1 ratio of assets to benefit payments in the year before the employer was required to make contributions; (3) the MPP provides that any credit for service before the employer joined the plan will be lost on the employers early withdrawal; (4) the new employer did not previously have a free look; and (5) the MPP is not amended to remove the Free Look provision. A trained elicitor may gather information by exploiting natural human tendencies, such as (select all that apply): -A tendency to gossip By agreeing to make such deductions before a CBA is negotiated, a contractor may be giving up important leverage during bargaining. What are some of the indicators Adam should look out for? What type of violation has occurred? Contractors should check with their government contracting official or staff to clarify their obligations. Select all that apply. Contractors must report which of these? The minimum wage rate is annually increased by the Secretary of Labor. Which investigation type is required for an initial Top Secret Clearance? Your knowledge of which factors impact your capability to analyze your vulnerabilities? Which of the following statements is true about technology and the insider threat? H.EO 13665 (Non-Retaliation for Disclosure of Compensation Information), This EO, often referred to as the Pay Transparency Executive Order, prohibits discrimination or retaliation against any employee or applicant because such employee or applicant has inquired about, discussed, or disclosed the compensation of the employee or applicant or another employee or applicant.. Step 2: Create new tags and tag transactions. Which step of the analytical risk management process includes considering the impact to military and strategic advantage? Former U.S. When setting its negotiating strategy and objectives, the contractor should know which cost increases are budgeted for the contractor to pay and which expenses are reimbursable by the government client. Select all that apply. According to NISPOM paragraph 1-300, which of the following is the contractor required to report to the government? Simonne left a safe containing classified material open while she went out for lunch. Which step in the OPSEC process requires you to look at your operation through the eyes of the adversary? A federal contractor with a contract for a term of performance of at least 120 days and with a value of at least $100,000 ($3,000 for subcontractors) must agree to use E-Verify to verify the employment eligibility of: (1) all employees hired during the contract term that will be performing work within the U.S.; and (2) all individuals assigned to perform work in the U.S. on the federal contract. 16/9 = Weegy: Whenever an individual stops drinking, the BAL will decrease slowly. Which of the following is a technology-related indicator? How is the FSO notified that a cleared employee may be due for a periodic reinvestigation? Further, payments to a contractor or subcontractor may be withheld by the funding agency to cover unpaid wages or penalties that result from overtime payment violations. Select all that apply. Any contact by cleared employees with known or suspected intelligence officers from any country. While they need not have a written AAP, they must implement an AAP that includes 16 specified requirements that are substantially similar to the obligations for supply and service contractors. -Threat can include unathorized disclosure of national security information or through the loss or degradation of department resources or capabilities. Contractors must maintain three years of EEO-1 reports as part of their AAPs. = 45/20 OPSEC differs from other programs because it requires you to look at yourself through the eyes of the adversary. contractors must report which of these select all that apply. Which of the following includes all the steps necessary for processing a facility clearance and a list of the documents and information that the Facility Security Officer (FSO) must gather to prepare for the Facility Clearance Branch (FCB) telephonic survey? Inform the DSS IS Representative that all visitors to the area must wear a badge, Inform the project manager of the heightened risk and ensure the visitor has an escort. Visitors Facility Security Officer (FSO), DSS Headquarters Industrial Security Integration and Application (IP) Programs. Select all that apply. As with EO 11246, VEVRAA imposes a number of technical obligations, including the listing of job openings with the state workforce agency in the state where the opening occurs. A coworker shares that she and her husband are facing foreclosure, and she doesn't know what to do. What system may be used to verify a companys Facility Clearance status? A union may request anything reasonably related to the unions performance of representation duties, such as bargaining, contract administration and enforcement, and investigating and pursuing potential grievances. ____________ are like pieces of a puzzle an adversary uses to reveal a picture of our operations. Further, if no agreement is reached and incorporated by the government client, and the U.S. DOL does not replace the Wage Determination before the contract is rebid, other prospective bidders may only be required to comply with the Wage Determination. Which of the following government entities adjudicates unfavorable eligibility determinations that are appealed? Contractors must report to the DSS IS Rep only those violations that result in the loss, compromise, or suspected compromise of classified information. By Dion Y. Kohler, Laura A. Mitchell, Michael H. Neifach, Amy L. Peck, Robert R. Perry and Patricia Anderson Pryor. The acronym EAP stands for _____? The National Industrial Security Program (NISP) is: a voluntary program for cleared contractor facilities, designed to safeguard classified information entrusted to industry. In order to determine our critical information, we need to consider both the friendly and adversary points of view. The Cognizant Security Office (CSO) does which of the following? What type of violation has occurred? A contractor must have an FCL commensurate with the highest level of classified access (Secret or Top Secret) required for contract performance. = 2 1/4. Personnel security clearance investigation stage, Initiate personnel security clearance process stage. Hostile entities may use social media to _______________ ? The terms of a CBA apply to all employees in the bargaining unit, regardless of whether they join the union. Otherwise, a contractor would need to wait until it is required to file an EEO-1 report and receive an EEO-1 identifier to register for the portal. Suppose that you randomly pick eight first-time, full-time freshmen from the survey. U.S. Government employees and contractors must report the following: Personal foreign travel; foreign contacts; speeches or books including information about involvement with the intelligence community. Incorporating counterintelligence and threat awareness into a security program can potentially prevent theft, espionage, and loss of life. Once again, you can see how important communication is to successfully working with contractors, whether inside your home or on your exterior home improvement project. Some federal contracts require contractors to have the ability to access classified information. -A desire to appear well-informed You observe a colleague with a sudden increased alcohol intake (e.g., frequent heavy consumption, drinking until drunk) what is the appropriate action? In all cases, these events should be recorded in the contractor's property management system. Section 3-103 places new burdens on contractors to mitigate this threat. Sharing details of your personal and professional lives of life online makes you _______________ adversaries. In order to make the bid/no-bid decision, there are a number of factors to consider to make an objective, rather than a subjective, decision. In addition, if required by the government contract, consider requiring reinstatement be subject to approval by the government client. The acronym EAP stands for _______________ ? The ATO is responsible for leveraging the capabilities of the organizations AT Working Group to assist with creating the AT plan. While imminent threats should be reported directly to the FBI, employees should use their agencys or facilitys reporting procedures to report other threats through their chain of command. When the visit is a first-time visit and the DoD System of Records does not indicate that the visitor has signed an SF-312, The visitor must always sign it at every visit to any classified facility, When the visitor presents a visit authorization letter (VAL), When it is the visitors first visit to the cleared facility. provides for early detection of OPSEC problems. Jackson Lewis attorneys are available to discuss these and other issues that affect government contractors.