Although the EO and the corresponding regulations apply only to large-scale construction projects, the wording of both the EO and the implementing rules reiterate federal contracting agencies are not prohibited from requiring PLAs on projects that do not fall within the $25-million threshold. One of the conditions required for a pre-existing eligibility determination issued by one federal agency to be accepted by another federal agency is for the determination to be based on an investigation of sufficient scope that is current to within _________. Information System Security Professional/Security Control Assessor (ISSP/SCA), Information System Security Manager (ISSM). User: She worked really hard on the project. In the NISPOM, what location does 1-302 represent? When a successor contractor hires a majority of the predecessor contractors employees, it must recognize and bargain with any union that represents those employees regarding wages, benefits, and all other terms of employment. defines the initial requirements for the product/service. Select all that apply. In addition, covered contractors must conduct annual analyses of their applicant flow, hiring, promotion, termination, and compensation practices. 2W151 Volume 1: Safety and Security - Quiz 7, 2W151 Volume 1: Safety and Security - Quiz 6. Select ALL the correct responses. Industrial Security Representative (IS Rep). U.S. Government employees and contractors must report the following: Personal foreign travel; foreign contacts; speeches or books including information about involvement with the intelligence community. Service Contract Act (SCA) Section 4c requires service contractors to comply with prevailing wage determinations and minimum fringe benefit payments. Which of the following topics is NOT included in the National Industrial Security Program Operating Manual (NISPOM)? There are three sub-sections. Government contractors with non-acquisition contracts could have separate, specific contractual obligations establishing protections for controlled unclassified information. Which investigation type is required for an initial Secret clearance? Profitability Select all that apply. hbbd```b``@$G6"5 vdVc$GG1012HM``$@gx authority to obtain a Facility Verification Request, authority to request additional special access authorizations. Where can elicitation techniques be used? Any form of violence Directed at an individual or group For a specific reason A member of your team openly discusses her financial difficulties and her inability to meet her financial obligations. Otherwise, a contractor would need to wait until it is required to file an EEO-1 report and receive an EEO-1 identifier to register for the portal. Which contracting document provides a record of the contractors commitment to comply with the National Industrial Security Program Operating Manual (NISPOM)? Both the foreign contracting company and the sponsoring foreign government. Existing paid time off (PTO) policies may be acceptable satisfaction of these obligations if they comply with all of the elements of EO 13706. Identifying a unit based upon how they deploy their equipment is an example of. Select all that apply. The contractor need not obtain the unions consent to proceed, as long as it follows established disciplinary procedures. Any agreement negotiated also may apply automatically to separate contractors who are found to be joint employers. Which of the following statements are true? What are some of the indicators Adam should look out for? makes OPSEC principles second nature to your employees. Stan has recently witnessed some unusual behavior from a co-worker. Generally, the employers withdrawal liability obligation is satisfied by making annual payments determined by a formula intended to approximate the employers annual contributions to the MPP. Former U.S. Reporting information as required under this policy does not fulfill or diminish the Its decisions are binding on all other California state courts. Events that require the facility to be open outside of regular business hours, Events that affect the proper safeguarding of classified information, Any change in the number of GSA security containers being used at the contractor facility to protect classified information, An increase or decrease in the number of classified documents stored at the contractor facility. The thirteen adjudicative guidelines involve assessing a candidate using criteria that addresses a specific concern that can impact the candidates ability to protect national security. Failure to report unauthorized disclosure of classified information does not affect the service members safety. Select all that apply. Contact Us! Which of the following statements is true about technology and the insider threat? The Cognizant Security Office (CSO) does which of the following? When the visit is a contract-related classified visit, When the request needs to be submitted and approved quickly, When one or both organizations do not utilize the web-based DoD System of Record, When either the visitors or host organization does not utilize the Industrial Security Facilities Database. Patterns, stereotypes, and predictable actions are all types of which of the following? If the contractor agrees to provide for increased wages and benefits and its client refuses reimbursement, these additional costs must be paid by the contractor. There is no evidence that anyone had access to the material while she was out, but nobody can confirm that the materials were safe from disclosure. Adam is an expert in his organizations dual use technology. According to the DCAA, [T]imekeeping procedures and controls on labor charges are areas of utmost concern. One area of the DCAAs attention is whether the contractor has a timekeeping system to track an employees time spent on each work activity. Information Security Oversight Office (ISOO). The Davis-Bacon Act (DBA) establishes the requirement for paying prevailing wages on projects involving the construction, alteration, or repair (including painting and decorating) of public buildings or public works. Each payroll submitted must include a Statement of Compliance, which is provided in the WH-347. If the visitor organization and host organization both use the DoD System of Record, visit notifications are sent electronically, which speeds the approval process. These policies protect the business in case of theft, damage, or if one of their employees gets injured. When the visit is a first-time visit and the DoD System of Records does not indicate that the visitor has signed an SF-312, The visitor must always sign it at every visit to any classified facility, When the visitor presents a visit authorization letter (VAL), When it is the visitors first visit to the cleared facility. -Non-state actors. fj45 for sale alberta; nilgai hunting yturria ranch; contractors must report which of these select all that apply; sales hunter interview questions. The primary objective of Section 503 is documented outreach efforts to attract qualified individuals with disabilities such that the employer attains a utilization goal for disabled individuals in each of its AAP job groups of 7%. Contractors are subject to the requirements of the DFWA if the contract with the government has a value of at least $100,000, will be performed in the U.S., and the primary purpose of the contract is other than acquisition of commercial items. -is what's meant by the phrase "The domesticated generations fell Weegy: A suffix is added to the end of a word to alter its meaning. ____________ are like pieces of a puzzle an adversary uses to reveal a picture of our operations. Contractors must report which of these? Select all that apply. Industrial Security Facilities Database (ISFD), National Industrial Security Program Operating Manual (NISPOM). After a need is identified, the Government Contracting Activity (GCA) ___________________. = 2 1/4. Some MPPs have a Free Look rule, which allows new employers to join the plan for up to five years without incurring any withdrawal liability, provided: (1) the new employers contributions are less than 2% of the total employer contributions for each year in the MPP; (2) the MPP had an 8-to-1 ratio of assets to benefit payments in the year before the employer was required to make contributions; (3) the MPP provides that any credit for service before the employer joined the plan will be lost on the employers early withdrawal; (4) the new employer did not previously have a free look; and (5) the MPP is not amended to remove the Free Look provision. 5.1 Overview of the evaluation and selection of contractors. An advantage of incorporating the use of OPSEC surveys is that it. Which of the following are reasons why AT plan exercises are important? The Government Funding Transparency Act of 2008 (GFTA) requires the Office of Management and Budget (OMB) to establish a free, public website containing full disclosure of all federal contract award information. Details on E-Verify are available in the E-Verify Manual for Federal Contractors and Subcontractors. In contrast to other FAR provisions, Clause 52.222-50 must appear in all solicitations and contracts. No specific procedure is required and, if a grievance cannot be resolved, the employer is not required to arbitrate the grievance. For example, if the CBA required the predecessor to pay $4.50 per hour to the unions health and welfare fund to provide medical insurance and related benefits, the contractor can spend at least $4.50 per hour on these benefits by either using its medical plan or any other plan. According to NISPOM paragraph 1-300, which of the following is the contractor required to report to the government? The acronym EAP stands for _____? Which paragraph of the AT plan lists the specific task for each subordinate unit? a. periodic reinvestigations How to verify need-to-know in the DoD System of Record before a classified discussion, Physical security procedures and access areas, Policy and procedures for transmitting and/or transporting classified material. State the period of time the requested waiver will cover. By Dion Y. Kohler, Laura A. Mitchell, Michael H. Neifach, Amy L. Peck, Robert R. Perry and Patricia Anderson Pryor. contracts. When the host organization approves a visit request, this approval constitutes _____. Step 2: Create new tags and tag transactions. F.EO 13658 (Minimum Wage for Contractors). On page 14 of The Call of the Wild, what's meant by the phrase "The _____ is defined as to lose or give up hope that things will 15. When an insider becomes a threat, it can have far-reaching consequences on both an organization and national security. This behavior may include (select all that apply): Authorized access to DoD information and resources may be granted based on a person's ____________. To assist government contractors, this guide discusses some of the labor and employment laws and regulations that should be considered when pricing and performing a government contract. Refusal to execute Standard Form (SF) 312. -Speeches or books including information about involvement with the Intelligence Community Where can he find reporting procedures that pertain to his organization? identify the losing and gaining contract numbers and select the items from those previously receipted. Visitors Facility Security Officer (FSO), DSS Headquarters Industrial Security Integration and Application (IP) Programs. The five main types of construction contracts are lump sum, time and materials, cost-plus, unit price, and guaranteed maximum price (GMP). Physical security measures are a combination of active or passive systems, devices, and security personnel used to protect a security interest from possible threats. Joint Personnel Adjudication System (JPAS). contractors employees active duty military The definition of Targeted Violence includes which of these components? The Bridge Agreement should address differences among the previous contractor and the successor contractor in pay periods and paydays, benefits plans, and employer-specific policies addressing work rules and disciplinary procedures, attendance, leave procedures, drug testing, and similar matters. classic chevy trucks for sale in california. If members of the ECBs Governing Council do decide to take formal votes on monetary policy decisions, do you think these votes should be published? Lesser disciplinary actions may be discussed with the union after the action is taken. DD Form 254, Department of Defense Contract Security Classification Specification, contains which of the following? -is what's meant by the phrase "The domesticated generations fell Weegy: A suffix is added to the end of a word to alter its meaning. [ Any contact that suggests the employee may be the target of attempted exploitation by the intelligence service of another country. Most inside offenders display concerning behaviors before acting directly against their organization. b. Post Author: Post published: 16 juin 2022; Which of these activities must be reported? Any contact by cleared employees with known or suspected intelligence officers from any country. = 2 5/20 None. A union may request anything reasonably related to the unions performance of representation duties, such as bargaining, contract administration and enforcement, and investigating and pursuing potential grievances. Wage increases and other increases conditioned upon reimbursement by the government are not permissible under the SCA. Select all that apply. Any contact by cleared employees with known or suspected intelligence officers from any country. C.EO 13496 (Notification of Employee Rights under Federal Labor Law). Contractors must report which of these to the Insider Threat program? During which stage of the personnel security clearance process are the thirteen guidelines used? Yes. -Contractors Which of the following organizations conducts periodic Security Vulnerability Assessments (SVAs) of contractor facilities as the CSO to the Department of Defense? A project labor agreement (PLA) is a prehire CBA designed to systemize labor relations at a construction site. Gopuff Background Check Requirementscom with instructions, or you can log into the Checkr applicant portal to view the status of your background check. American Society for Industrial Security International (ASIS), NCMS, the Society of Industrial Security Professionals, Industrial Security Awareness Council (ISAC). -In email The definition of Targeted Violence includes which of these components? The FSO is not notified but must look for eligible employees in the DoD system of record. The development of a countermeasure focuses directly on the. According to section 10.2.8, the general contractor should report any work-related accident in writing to the owner, and will be responsible for any costs the owner incurs related to the accident. The Higher Education Research Institute at UCLA collected data from 203,967 incoming first-time, full-time freshmen from 270 four-year colleges and universities in the U.S. 71.3%71.3 \%71.3% of those students replied that, yes, they believe that same-sex couples should have the right to legal marital status. -Competitors Security control measures are the responsibility of the Cognizant Security Agency. Contractors must report which of these? The Weegy: A modal verb (also modal, modal auxiliary verb, modal auxiliary) is a type of auxiliary verb that is used to contractors must report which of these to the insider threat program select all that apply, Contractors must report the following to the insider threat program: Efforts to obtain unauthorized access to classified or proprietary information. Additionally, beginning January 1, 2020, tipped employees performing work on or in connection with covered contracts generally must be paid a minimum cash wage of $7.55 an hour. Subjects may include the issues presented by the employer or the union that have been processed through the grievance procedure, the terms of the CBA, and the type of remedy available to an aggrieved employee. Technology Collection Trends in the U.S. Defense Industry. These requirements apply not only to the contractors employees working directly on a federal contract, but generally to their entire workforce, including locations where no federal contract work is performed. Contractors with a federal acquisition contract or subcontract must apply 15 basic cybersecurity safeguarding requirements and procedures to protect federal contract information. The requirements are based on security requirements published in the National Institute of Standards and Technologys (NIST) Special Publication (SP) 800-171, Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations. Specific requirements are in FAR Subpart 4.19 and FAR Clause 52.204-21. In addition, if required by the government contract, consider requiring reinstatement be subject to approval by the government client. -Prevent unauthorized data access A trained elicitor may gather information by exploiting natural human tendencies, such as (select all that apply): -A tendency to gossip Alternatively, the contractor can spend at least the same amount on health insurance benefits. Foreign attendees business cards do not match stated affiliations, Excessive or suspicious photography and filming of technology and products, Conversations involving classified, sensitive, or export-controlled technologies or products. A successor contractor for a contract to provide services of a predecessor contractor with a collective bargaining agreement (CBA) in place which replaced the U.S. Department of Labors (DOL) Wage Determination for the contract must honor the wage rates and covered fringe benefit provisions of that CBA for the first year of the contract. 1. Objectives . Insider Threat Program Senior Official (ITPSO). There must be a bona fide procurement requirement to have access to U.S. classified information or facilities. A member of your team openly discusses her financial difficulties and her inability to meet her financial obligations. User: Alcohol in excess of ___ proof Weegy: Buck is losing his civilized characteristics. endstream endobj startxref If a contractor or subcontractor disregards its obligations under the DBA/DBRA, in addition to being on the hook for back pay that may be owed to employees, it may be subject to contract termination and debarment from awards of future contracts for up to three years. To ensure any classified material that may be of use in a follow-on contract is transported securely to the visitors organization, To ensure that all classified material has been properly stored and inventoried. Which of the following roles are filled by contractor employees? Select all that apply. 1:43 pm junio 7, 2022. raquel gonzalez height. Which of the following provides policy about PCLs and defines access criteria? Your security office The Contracting Officers Representative (COR) is authorized to make changes to the contract, even if those changes affect price or quality. Which of the following are reportable behavioral indicators? -Keeping unauthorized backups Submit a paper report of independent contractors using one of the following options: Download a fill-in DE 542 (PDF) form. Any event that may impact an individual's personnel security clearanceAnything that affects the proper safeguarding of classified information Any event that may impact the status of the facility Any indication that classified information has been lost or compromised