contractors must report which of these select all that apply

Unauthorized receipt of classified material. Failure to do so will result in a perfectly clear successorship, which would bind the successor contractor to all the terms of the previous contractors CBA. The NISP ensures the partnership between the federal government and private industry places the burden of risk on the subcontractors. Only costs incurred in maintaining a satisfactory relationship between the contractor and its employees, including costs of union stewards and labor management committees, are allow for payment. contractors must report which of these? - Weegy For more information, visit https://www.jacksonlewis.com. By agreeing to make such deductions before a CBA is negotiated, a contractor may be giving up important leverage during bargaining. If you are contacted by a member of the media about information you are not authorized to share, you should take down which of the following details? contractors must report which of these select all that apply (Incorrect, there were more choices). ; Use the DE 542 Print Specifications (PDF) to generate an alternate form. The chief statutory sources of liability to an MPP pension fund beyond the contributions required under the CBA are: (1) the withdrawal liability rules in Title IV of ERISA; (2) the Pension Protection Act of 2006 (PPA); and (3) the minimum funding rules. Events that require the facility to be open outside of regular business hours, Events that affect the proper safeguarding of classified information, Any change in the number of GSA security containers being used at the contractor facility to protect classified information, An increase or decrease in the number of classified documents stored at the contractor facility. Covered employers with at least 50 employees must prepare annually a written affirmative action plan (AAP) for each of their establishments (physical work locations) with at least 50 employees. Select all that apply. d. Lower its price. Facility employees may be processed for personnel security clearances concurrently with the processing of, or after the award of, a facilitys FCL. -Gather information on personnel Select all that apply. Submit a paper report of independent contractors using one of the following options: Download a fill-in DE 542 (PDF) form. -efforts to obtain -all answers Supplemental Guide For Federal Contractors - E-Verify demonstrate the intent and capability to be a threat to our mission. User: 3/4 16/9 Weegy: 3/4 ? When is an SF 312, Classified Information Nondisclosure Agreement, executed? Which of the following organizations conducts periodic Security Vulnerability Assessments (SVAs) of contractor facilities as the CSO to the Department of Defense? In contrast to other FAR provisions, Clause 52.222-50 must appear in all solicitations and contracts. To do this, the DCAA evaluates contractors internal cost-control systems, management policies, accuracy of cost representations, adequacy and reliability of records, and accounting systems. According to the NISPOM, espionage, sabotage, terrorism, or subversive activities should be reported as a(n) ___________________. An advantage of integrating OPSEC principles in your day-to-day operations is that it. To whom does the FSO submit the applicants completed SF-86 and both signed release forms? Insider Threat Awareness Flashcards | Quizlet Under the NLRA, a joint employment relationship will be found when one employer directly controls the terms and conditions of employment for another. Physical security measures are a combination of active or passive systems, devices, and security personnel used to protect a security interest from possible threats. Contractors must report which of these to the Insider Threat program? Union Access: Because a contractor is subject to its government clients requirements applicable to visitors, consider including a clause stating that any union representative who wants to visit the employers offices or other places of employment must comply with those requirements. Alternatively, the contractor can spend at least the same amount on health insurance benefits. Supreme Court of California - Wikipedia = 15 ? True -Any event that may impact the status of the facility Which type of security training typically informs cleared employees of changes or updates to security regulations? In 2022, all property owners in the county will pay an assessed value of $3.39 per $100. The primary source of data for these AAP analyses is race and gender data collected through pre- and post-offer applicant and employee invitations to self-identify. Its decisions are binding on all other California state courts. DoD Insider Threat Awareness Flashcards - Learning tools & flashcards Clause 52.222-50 provides that during performance of the contract, contractors, their employees, and their agents may not: (1) engage in severe forms of trafficking in persons; (2) procure commercial sex acts; (3) use forced labor in performance of the contract; (4) withhold or destroy employee identification or immigration documents; (5) use fraudulent tactics in recruiting workers or use recruiters who engage in such tactics; (6) charge employees recruitment fees; (7) fail to provide, in certain circumstances, return transportation at the end of employment; or (8) provide substandard housing. The Wage and Hour Division of the DOL has created a standard form (WH-347) that contractors can use to submit the information. Specific clearance and access requirements, Authorization to generate classified information, A method for denying an adversary access to our critical information. Insider Threat Program Senior Official (ITPSO). While every CBA is unique in some respects, some sample provisions that should be considered in government contracting include: Government Supremacy/Rights: Because a contractor is subject to its government clients directives, consider a provision on the rules, regulations, directives, orders, or work statements that are, or may be, imposed by the government, including on removal of an employee, that will apply and not be subject to the grievance and arbitration procedure. Select ALL the correct responses. A company cleared at the Secret level hires a new employee. The Cognizant Security Office (CSO) for the DoD is Director of National Intelligence (DNI). To ensure any classified material that may be of use in a follow-on contract is transported securely to the visitors organization, To ensure that all classified material has been properly stored and inventoried. These blank check provisions can result in contractual withdrawal liability and exit fees (in pension and welfare plans), midterm contribution increases, and special assessments, among other midterm surprises. This document will set out the . 2019 - The South African Department of Employment & Labour Disclaimer PAIA This behavior may include (select all that apply): -violation of workplace policies -failure to follow standard procedures (SOP) -legal difficulties Evidence of tampering with your facility's classified storage container is an example of what type of security threat? SFPC 4 | Quiz - GoConqr provides for early detection of OPSEC problems. Self-Inspection Handbook for NISP Contractors, Suggested Contract File Folder Headings job aid. hbbd```b``@$G6"5 vdVc$GG1012HM``$@gx Labor and Employment Obligations for Federal Contractors Stay Safe. On January 1, 2020, the rate was increased to $10.80 an hour. Any individual or group that represents a foreign government is considered a security threat. Select all that apply. Whenever an individual stops drinking, the BAL will ________________. An adversary's capability is defined as his ability to do which of the following? SF 312, Classified Information Nondisclosure Agreement. Arbitration: Consider a provision that limits the arbitrators authority. Yes. Select ALL the correct responses. Joint Personnel Adjudication System (JPAS). When considering assets, she knows that the greatest target of our adversaries is ___________. Gopuff Background Check Requirementscom with instructions, or you can log into the Checkr applicant portal to view the status of your background check. look at your operation from both the friendly and adversary perspectives. In a right-to-work state, such provisions are prohibited unless the worksite is a federal enclave, meaning, it is exclusively subject to federal (and not state) law. Recipients should consult with counsel before taking any actions based on the information contained within this material. Select all that apply. Your knowledge of which factors impact your capability to analyze your vulnerabilities? = 45/20 How many steps are there in the OPSEC process? In writing to your DSS IS Rep at the DSS field office. What Is Form 1099-NEC. The Weegy: A modal verb (also modal, modal auxiliary verb, modal auxiliary) is a type of auxiliary verb that is used to U. S. government employees and contractors must report which of the following? Security officials should seek out and consider threat information only from official, government sources. What type of violation has occurred? Otherwise, a contractor would need to wait until it is required to file an EEO-1 report and receive an EEO-1 identifier to register for the portal. Gopuff Background Check Requirementscom with instructions, or you can DD Form 254, DoD Contract Security Classification Specification, Transportation, Delivery, and Relocation Solutions (TDRS), Schedule 48. User activity monitoring on classified information systems: As with EO 11246, VEVRAA imposes a number of technical obligations, including the listing of job openings with the state workforce agency in the state where the opening occurs. Which of the following statements are true? When the DFARS 252.211-7007 clause is in the contract, the contractor must report receipt of all GFP and updates of serially managed GFP . hb```e``: AXr,lnfhs"k;dxk_42v6J H.EO 13665 (Non-Retaliation for Disclosure of Compensation Information), This EO, often referred to as the Pay Transparency Executive Order, prohibits discrimination or retaliation against any employee or applicant because such employee or applicant has inquired about, discussed, or disclosed the compensation of the employee or applicant or another employee or applicant.. -Prevent unauthorized data access What is the appropriate action? There must be a bona fide procurement requirement to have access to U.S. classified information or facilities. _____ describes the level of information to which a person is authorized access based on a background investigation. FAR Clause 52.222-50 prohibits trafficking in persons, including certain defined trafficking-related activities. The amount of a withdrawn employers withdrawal liability is based on a number of factors and requires an actuarial calculation. The DBA prevailing wage requirements is extended by the Davis-Bacon Related Acts (DBRA) to many federally funded or assisted construction activities. An individuals access level is directly related to the employer organizations Facility Clearance level and the level of access needed for the individual to do his or her job. A cleared employee has received an industry award, A cleared employees citizenship has changed, An uncleared employees citizenship has changed. Whether or not a Bridge Agreement is negotiated, a successor employer has an obligation to meet with the union and negotiate in good faith for a CBA. Contractors must maintain three years of EEO-1 reports as part of their AAPs. The Higher Education Research Institute at UCLA collected data from 203,967 incoming first-time, full-time freshmen from 270 four-year colleges and universities in the U.S. 71.3%71.3 \%71.3% of those students replied that, yes, they believe that same-sex couples should have the right to legal marital status. Confidentiality of the records or information is not a valid reason to withhold the requested information, but the contractor can require a non-disclosure agreement. Given this, and the effect PLAs can have on labor and other project costs, contractors submitting bids on construction projects should diligently review each contract solicitation to determine if a PLA will be required. Select ALL the correct responses. c. Lower its output. Provide for the early detection and referral of potential espionage cases. This can include disciplines, schedules, wages and benefits (of bargaining unit employees), personnel files, medical information, policies and procedures, payroll records, and the like. 4 / 10. contracts. This would be impractical unless the contractor chooses to adopt the CBA and the health insurance was provided through a union-sponsored plan. b. Contractors must report to the DSS IS Rep only those violations that result in the loss, compromise, or suspected compromise of classified information. The ATO is responsible for the writing of the AT plan. Contractors may decide whether they want to use E-Verify for all new hires and all existing non-exempt employees assigned to a federal contract, or for their entire non-exempt workforce (all new hires and all existing employees) throughout the entire company. Which of the following is considered a potential insider threat vulnerability? The thirteen adjudicative guidelines involve assessing a candidate using criteria that addresses a specific concern that can impact the candidates ability to protect national security. (Incorrect, there were more choices). -Inappropriate copying of classified material One of the conditions required for a pre-existing eligibility determination issued by one federal agency to be accepted by another federal agency is for the determination to be based on an investigation of sufficient scope that is current to within _________. Although all private employers with at least 100 employees must prepare annual EEO-1 reports, covered contractors and subcontractors must identify themselves as such on those reports. State the period of time the requested waiver will cover. Who has primary responsibility for the adjudication of personnel security background investigations? All executive departments and agencies with national security missions. There is no evidence that anyone had access to the material while she was out, but nobody can confirm that the materials were safe from disclosure. Select all that apply. By Dion Y. Kohler, Laura A. Mitchell, Michael H. Neifach, Amy L. Peck, Robert R. Perry and Patricia Anderson Pryor. (916) 416-9278 | what is the most attractive height for a man Facility Security Clearance (FCL) FAQ - United States Department of State Which of the following is a technology-related indicator? Changes in a facility's storage capability are reported how? contractors must report which of these select all that apply These reports are submitted to the Federal Funding Accountability Transparency Act Subaward Reporting System. This need to be reported to the companys IS Rep? Covered employees must be allowed to accrue leave up to at least 56 hours annually. -Bypassing technology-associated protocols If a monopolist is producing a level of output where MR is less than MC, then it should. -Personal foreign travel, module 6 ( process of care, and communication), Cyber Awareness Challenge 2023 (Incomplete), John David Jackson, Patricia Meglich, Robert Mathis, Sean Valentine, Service Management: Operations, Strategy, and Information Technology, Operations Management: Sustainability and Supply Chain Management. Any contact by cleared employees with known or suspected intelligence officers from any country. 5.1 Overview of the evaluation and selection of contractors. Insider Threat Awareness Flashcards | Quizlet The acronym EAP stands for _______________ ? Select ALL the correct responses. Finally, a successor contractor who has a duty to bargain with a union is not required to deduct dues and fees from employees pay, unless the contractor agrees to do so in a written agreement. CLC 222 Contracting Officers Representative (COR) - Reddit - Dive into contractors must report which of these select all that apply XYZ Industries is a cleared facility that is moving its headquarters to a less expensive office space. Contractors Active duty military Former employees (select all 4 answers) Which of the following is a reportable behavioral indicator? Prime contractors must meet certain reporting requirements before they are able to submit a bid that valued at $50 million or more as of the year 2016. 6294 0 obj <>stream The EEO-1 report collects gender and race/ethnicity data by type of position. Contractors must report which of these? OFCCP prescribes a specific form for inviting applicants and employees to self-identify for disabled status. It's often the little things we do every day that can develop into vulnerabilities and cause damage to our operation. Where can elicitation techniques be used? Which form should the company receive with the contract that provides specific guidance about what information is classified and at what classification level? Pursuant, T.C.A. That's why we put together the global hiring guide.But here's a quick recap of five common scenarios for US companies hiring independent contractors both locally and abroad. According to NISPOM paragraph 1-300, which of the following is the contractor required to report to the government? Government contractors with non-acquisition contracts could have separate, specific contractual obligations establishing protections for controlled unclassified information. Enforcement of such a union security provision can leave a contractor with inadequate staffing. The EO gives federal agencies the authority to require contractors to enter into PLAs for large-scale construction projects, each of which is a project with a total cost exceeding $25 million. The Davis-Bacon Act (DBA) establishes the requirement for paying prevailing wages on projects involving the construction, alteration, or repair (including painting and decorating) of public buildings or public works. Answer Information System Security Manager (ISSM) Insider Threat Program Senior Official (ITPSO) Information System Security Professional/Security Control Assessor (ISSP/SCA) Facility Security Officer (FSO) Question 20 Question The Weegy: A modal verb (also modal, modal auxiliary verb, modal auxiliary) is a type of auxiliary verb that is used to contractors must report which of these to the insider threat program select all that apply, Contractors must report the following to the insider threat program: Efforts to obtain unauthorized access to classified or proprietary information. We help employers develop proactive strategies, strong policies and business-oriented solutions to cultivate high-functioning workforces that are engaged, stable and diverse, and share our clients' goals to emphasize inclusivity and respect for the contribution of every employee. -is what's meant by the phrase "The domesticated generations fell Weegy: A suffix is added to the end of a word to alter its meaning. According to section 10.2.8, the general contractor should report any work-related accident in writing to the owner, and will be responsible for any costs the owner incurs related to the accident. Please read each question carefully, and circle A, B, C or D to indicate the correct response. The new employee has a current Top Secret eligibility, which was granted by her previous employer. = 2 5/20 contractors employees active duty military The definition of Targeted Violence includes which of these components? Conduct counterintelligence investigations for the U.S. During which stage of the personnel security clearance process are the thirteen guidelines used? Which of the following statements are true? Provide visitors with a badge and an escort who has been informed of the access limitations or restrictions on the visitor's movements. There are two types of business insurance that all subcontractors should have: general liability and workers compensation. User: She worked really hard on the project. An employees need for a Personnel Security Clearance (PCL) is determined by the program manager, but the clearance level is determined by the Government Contracting Activity (GCA). Who performs classified Information System assessments? This material may be considered attorney advertising in some jurisdictions. OPSEC differs from other programs because it requires you to look at yourself through the eyes of the adversary. A coworker shares that she and her husband are facing foreclosure, and she doesn't know what to do. Phovoir/Shutterstock. Government Contractors Required to Provide Insider Threat Awareness If a successor contractor timely disavows the previous contractors CBA, it may establish its own terms and conditions of employment, subject to honoring the wages and covered fringe benefits of the CBA required by Section 4c of the SCA as discussed above. Depending on a number of factors, including the extent of common ownership and control, AAP obligations also may extend to other related companies. If you are unable to determine when total payments made equal or exceed $600, you can estimate the dollar amount of the contract. Accordingly, under certain circumstances, a shareholder or business owner may be found personally liable for withdrawal liability. 20/3 New "Insider Threat" Programs Required for Cleared Contractors Read the publication. contractors must report which of these select all that apply. What is the last step in the OPSEC process? Any contact by cleared employees with known or suspected intelligence officers from any country. Additionally, you must also pay the matching employer portion of social security and Medicare taxes as well as pay unemployment tax on wages paid to an employee. -A desire to be polite Given the complexities involved, employers would be well-served to address their particular situations with experienced counsel. He is working with other company officials to identify the organizations assets. It is not intended to constitute legal advice nor does it create a client-lawyer relationship between Jackson Lewis and any recipient. For contracts in excess of $500,000 for supplies (other than for commercial off-the-shelf or COTS) acquired outside the U.S. or for services performed outside the U.S., the contractor must develop an appropriate compliance plan that, at a minimum, includes certain proactive steps. performing on Department contracts; and (2) Individuals assigned to the Department from another federal agency must adhere to their home agency's security reporting requirements and additional post or mission requirements. -A desire to appear well-informed During a periodic reinvestigation of a cleared individual, During the applicants initial PCL investigation, Only when the applicant is seeking Top Secret clearance eligibility. The FSO is not notified but must look for eligible employees in the DoD system of record. Select all that apply. The PPA creates additional contribution responsibilities for employers obligated to contribute to critical status or red zone MPPs and the minimum funding rules, which establish mandatory annual contribution requirements. A project labor agreement (PLA) is a prehire CBA designed to systemize labor relations at a construction site. Contractor Portal Frequently Asked Questions - DOL A member of your team openly discusses her financial difficulties and her inability to meet her financial obligations. -Any indication that classified information has been lost or compromised. When she returned, she found a member of the cleaning crew straightening the classified documents on her desk. Select all that apply. Under VEVRAA, covered employers must engage in documented outreach efforts to attract qualified protected veterans in a good faith effort to annually attain a veteran hiring benchmark of 5.9%. When does a host need to coordinate with the visitors organization regarding the Classified Information Nondisclosure Agreement (SF-312)? In the NISPOM, what location does 1-302 represent? b. Interference and discrimination based on the use of sick leave are prohibited. In fact, the government mandates that contractors who are awarded a contract above a certain threshold ($5.5 million to be performed over at least 120 days) MUST have a code of business ethics and conduct and, for large, noncommercial items contractors, a business ethics awareness program and internal control system. When is an applicant required to submit fingerprints in addition to his/her security application? If there is not a contractual relationship between the visitors organization and the host organization, where must the host organization obtain authorization for disclosure of classified information? What should you do? You can help reduce technology-associated insider threats by: Eliminating accessing data through portable devices (Incorrect). -Accessing systems at unusual hours without authorization. determine the collection methods the adversary is using against you. An FCL is a determination made by the Government that a contractor is eligible for access to classified information. Once the contractor has obtained facility clearance, it can request the applicable security clearance for its employees. = 45/20 Which step of the analytical risk management process includes considering the impact to military and strategic advantage? For construction contractors, there is no employee-count threshold. In connection with this, the DCAA evaluates whether costs are allocated to coincide appropriately with each employees division of time. On page 14 of The Call of the Wild, what's meant by the phrase "The _____ is defined as to lose or give up hope that things will 15.