Which of the following countermeasures may be necessary if routine activities provide an adversary with tip-offs to critical information? In addition, general contractors are liable for complying with hazardous materials requirements (section 10.3). Assessing a vulnerability in conjunction with the threat, and then determining the impact this would have on an operation if the vulnerability is exploited determines the level of risk. how long is chickpea pasta good for in the fridge. A successor contractor will be required to pay the hourly wage rates in the CBA and any wage increases that occur during the first year of the contract. Alternatively, the contractor can spend at least the same amount on health insurance benefits. Specific clearance and access requirements, Authorization to generate classified information, A method for denying an adversary access to our critical information. Which step of the analytical risk management process includes considering the impact to military and strategic advantage? Which step in the OPSEC process is a decision making step because it helps the decision maker prioritize and decide whether or not to apply a countermeasure? According to the DCAA, [T]imekeeping procedures and controls on labor charges are areas of utmost concern. One area of the DCAAs attention is whether the contractor has a timekeeping system to track an employees time spent on each work activity. -Any event that may impact the status of the facility -Over the phone E.EO 13627 (Combatting Trafficking in Persons). To use leave, employees need only make an oral or written request to the employer, with the expected duration of leave, at least seven days before the scheduled leave, or as soon as practicable if the need for leave is unforeseeable. Risk of civil and criminal exposure also exist under the False Claims Act if a contractor knowingly allows employees to make false charges in connection with a federal contract. Focused on labor and employment law since 1958, Jackson Lewis P.C. A successor contractor for a contract to provide services of a predecessor contractor with a collective bargaining agreement (CBA) in place which replaced the U.S. Department of Labors (DOL) Wage Determination for the contract must honor the wage rates and covered fringe benefit provisions of that CBA for the first year of the contract. In writing to your IS Rep at the DSS field office. Additionally, beginning January 1, 2020, tipped employees performing work on or in connection with covered contracts generally must be paid a minimum cash wage of $7.55 an hour. Contractors must report which of these? . Which of the following is an objective of the DSS CI Directorate? determine the collection methods the adversary is using against you. (Incorrect, there were more choices). This behavior may include (select all that apply): Authorized access to DoD information and resources may be granted based on a person's ____________. Service Contract Act (SCA) Section 4c requires service contractors to comply with prevailing wage determinations and minimum fringe benefit payments. The process of obtaining a Facility Security Clearance and a Personnel Security Clearance is established by the Defense Security Service (DSS), which is the interface between the government and the contractors who need clearance. Companies doing business with the federal government must comply with a litany of complex laws and regulations that affect their day-to-day business operations. Loss, compromise, and suspected compromise of classified information are reported how? -Competitors = 2 1/4. The primary source of data for these AAP analyses is race and gender data collected through pre- and post-offer applicant and employee invitations to self-identify. This can include disciplines, schedules, wages and benefits (of bargaining unit employees), personnel files, medical information, policies and procedures, payroll records, and the like. Report the concerning behavior to your security officer. -is what's meant by the phrase "The domesticated generations fell Weegy: A suffix is added to the end of a word to alter its meaning. -A tendency to believe others are honest. Any individual or group that represents a foreign government is considered a security threat. Section 503 also imposes a number of technical obligations and restrictions similar to those of the Americans with Disabilities Act. What is a final security control in the NISP when the purpose of a visit has been accomplished? Evidence of tampering with your facility's classified storage container is an example of what type of security threat? Here is a list of the most common construction contract documents, and what they include. We help employers develop proactive strategies, strong policies and business-oriented solutions to cultivate high-functioning workforces that are engaged, stable and diverse, and share our clients' goals to emphasize inclusivity and respect for the contribution of every employee. The 20-year limitation on annual payments does not apply in the event of a mass withdrawal; this can result in the employer making withdrawal liability payments in perpetuity. Contractors also are required to include this language in their contracts and purchase orders. The contractor must also report any such equipment, systems, or services discovered during contract performance; this requirement flows down to subcontractors. Failure to do so will result in a perfectly clear successorship, which would bind the successor contractor to all the terms of the previous contractors CBA. Once the contractor has obtained facility clearance, it can request the applicable security clearance for its employees. Objectives . In writing to your DSS IS Rep at the DSS field office. We need to identify an adversary's capability. No specific procedure is required and, if a grievance cannot be resolved, the employer is not required to arbitrate the grievance. 16/9 = Weegy: Whenever an individual stops drinking, the BAL will decrease slowly. Which of the following roles are filled by contractor employees? The company has hired 12 new employees to support a new major contract. Which of the following is reported to PSMO-I? initiative combines industry-leading health and safety standards with virtual technologies designed to keep real estate moving forward, and give our employees, customers and partners confidence and support to stay safe. Patterns, stereotypes, and predictable actions are all types of which of the following? _____ describes the level of information to which a person is authorized access based on a background investigation. -Any event that may impact an individual's personnel security clearance -Any event that may impact the status of the facility -Anything that affects the proper safeguarding of classified information -Any indication that classified information has been lost or compromised Any contact by cleared employees with known or suspected intelligence officers from any country. SF 312, Classified Information Nondisclosure Agreement. Which of the following topics is NOT included in the National Industrial Security Program Operating Manual (NISPOM)? When is an SF 312, Classified Information Nondisclosure Agreement, executed? It also requires: (1) inclusion of sexual orientation and gender identity in EEO Taglines where protected statuses are listed (rather than abbreviated Taglines), and (2) posting of updated EEO is the Law posters. Once a successor contractor establishes its initial terms and conditions of employment, the contractor may only make changes to those terms of employment (called the status quo) after bargaining with the union and reaching an agreement or bargaining in good faith to impasse. Which of the following, when looked at by itself or in conjunction with something else, can point to a vulnerability that an adversary can exploit? In Tennessee, the average effective property tax rate is 0.64%. 16/9 = Weegy: Whenever an individual stops drinking, the BAL will decrease slowly. Further, if no agreement is reached and incorporated by the government client, and the U.S. DOL does not replace the Wage Determination before the contract is rebid, other prospective bidders may only be required to comply with the Wage Determination. 8% effective tax rate, during the first quarter of fiscal 2022 compared to $132 laborer or mechanic is so employed, wages include compensation, at a rate not less than one and one-half times the basic rate of pay, for all hours worked . The chief statutory sources of liability to an MPP pension fund beyond the contributions required under the CBA are: (1) the withdrawal liability rules in Title IV of ERISA; (2) the Pension Protection Act of 2006 (PPA); and (3) the minimum funding rules. 2W151 Volume 1: Safety and Security - Quiz 7, 2W151 Volume 1: Safety and Security - Quiz 6. performing on Department contracts; and (2) Individuals assigned to the Department from another federal agency must adhere to their home agency's security reporting requirements and additional post or mission requirements. -A desire to appear well-informed Prior results do not guarantee a similar outcome. One of the conditions required for a pre-existing eligibility determination issued by one federal agency to be accepted by another federal agency is for the determination to be based on an investigation of sufficient scope that is current to within _________. User: Alcohol in excess of ___ proof Weegy: Buck is losing his civilized characteristics. Conduct counterintelligence investigations for the U.S. The NISP ensures the partnership between the federal government and private industry places the burden of risk on the subcontractors. Which step in the OPSEC process requires you to look at your operation through the eyes of the adversary? The primary objective of Section 503 is documented outreach efforts to attract qualified individuals with disabilities such that the employer attains a utilization goal for disabled individuals in each of its AAP job groups of 7%. 6294 0 obj
<>stream
In addition, when a CBA expires, the parties must maintain the terms and conditions at the status quo while negotiations take place. Under the NLRA, a joint employment relationship will be found when one employer directly controls the terms and conditions of employment for another. Whenever an individual stops drinking, the BAL will ________________. Depending on a number of factors, including the extent of common ownership and control, AAP obligations also may extend to other related companies. The five main types of construction contracts are lump sum, time and materials, cost-plus, unit price, and guaranteed maximum price (GMP). Generally, you must withhold and deposit income taxes, social security taxes and Medicare taxes from the wages paid to an employee. Which of the following must be reported to the Defense Counterintelligence and Security Agency and the FBI? -Hoarding files and data An interim eligibility determination grants the applicant permanent access to classified information by bypassing the remainder of the PCL process. The EEO-1 Deadline is March 30 each year, and the VETS-4212 deadline is September 30 each year. If a successor contractor timely disavows the previous contractors CBA, it may establish its own terms and conditions of employment, subject to honoring the wages and covered fringe benefits of the CBA required by Section 4c of the SCA as discussed above. When dealing with countermeasure development, what is the bottom line? -Prevent unauthorized data access Before an employee is granted access to classified information, After an employee has access to classified information. Use e-Services for Business to submit a Report of Independent Contractor(s) (DE 542).. Mail or Fax. Other technical obligations include drafting, implementing, and disseminating a prescribed equal employment opportunity (EEO)/Policy Statement, ensuring that all job postings contain an EEO Tag Line, annually providing all vendors a notice of the employers federal contractor status, incorporating an Equal Opportunity Clause in each of the employers covered subcontracts, notifying all unions of the employers federal contractor status (if applicable), and posting a number of notices on the employers careers website, including an applicant-accessibility statement. What is the probability that at most five of the freshmen reply "yes"? Which investigation is used for a periodic reinvestigation of an individual possessing a Secret or Confidential clearance eligibility? A Bridge Agreement is designed to be short-term to fill the gap until a completely new CBA can be negotiated. provides for early detection of OPSEC problems. The PPA creates additional contribution responsibilities for employers obligated to contribute to critical status or red zone MPPs and the minimum funding rules, which establish mandatory annual contribution requirements. Grievances: As the union should not direct any grievances to the government client, consider including a provision stating that the union will only use the procedure in the CBA to raise and remedy grievances and not direct any grievances to the government client. To issue a Facility Clearance (FCL), the Facility Clearance Branch (FCB) reviews which of the following? Why should organizations use and practice OPSEC? Once again, you can see how important communication is to successfully working with contractors, whether inside your home or on your exterior home improvement project. Contractors must recognize that their obligations under these laws and executive orders also apply to their subcontractors. If the visitor organization and host organization both use the DoD System of Record, visit notifications are sent electronically, which speeds the approval process. Personnel security clearance investigation stage, Initiate personnel security clearance process stage. Contractors should check with their government contracting official or staff to clarify their obligations. Efforts to compromise a cleared employee. WINDOWPANE is the live-streaming app for sharing your life as it happens, without filters, editing, or anything fake. Hes not sure if he should report it, but he knows it is better not to report an incident or behavior than to make a potentially false report. Jorge is a security official for a DoD organization. Some MPPs have a Free Look rule, which allows new employers to join the plan for up to five years without incurring any withdrawal liability, provided: (1) the new employers contributions are less than 2% of the total employer contributions for each year in the MPP; (2) the MPP had an 8-to-1 ratio of assets to benefit payments in the year before the employer was required to make contributions; (3) the MPP provides that any credit for service before the employer joined the plan will be lost on the employers early withdrawal; (4) the new employer did not previously have a free look; and (5) the MPP is not amended to remove the Free Look provision. To do this, the DCAA evaluates contractors internal cost-control systems, management policies, accuracy of cost representations, adequacy and reliability of records, and accounting systems. When does a host need to coordinate with the visitors organization regarding the Classified Information Nondisclosure Agreement (SF-312)? Which of the following countermeasures can you implement to help reduce technology-associated insider threats? Why do we need to have threat information? all of these are correct Which of these may be targeted by foreign entities? This also fails to apply if an arbitration agreement is already in place. You observe a colleague with a sudden increased alcohol intake (e.g., frequent heavy consumption, drinking until drunk) what is the appropriate action? State the period of time the requested waiver will cover. This EO amends EO 11246, which imposes anti-discrimination and affirmative action requirements upon federal contractors, to prohibit discrimination on the basis of sexual orientation and gender identity. = 2 1/4. When cleared contractors visit a cleared facility or government installation, whose security requirements take precedence? As with EO 11246, VEVRAA imposes a number of technical obligations, including the listing of job openings with the state workforce agency in the state where the opening occurs. Which of the following government entities adjudicates unfavorable eligibility determinations that are appealed? ; Order the DE 542 form from our Online Forms and Publications. c. The company is moving to a new location to meet the needs of its growing staff. Lack of proper training, use of non-secure communications, and poor system design are all examples of. Your knowledge of which factors impact your capability to analyze your vulnerabilities? NISPOM paragraph 1-300 states that contractors must report certain events to the government. Wage increases and other increases conditioned upon reimbursement by the government are not permissible under the SCA. Technology Collection Trends in the U.S. Defense Industry. authority to obtain a Facility Verification Request, authority to request additional special access authorizations. Any contact by cleared employees with known or suspected intelligence officers from any country. Select all that apply. This behavior may include (select all that apply): -violation of workplace policies -failure to follow standard procedures (SOP) -legal difficulties -Improper use of privileged access Increase its output. When she returned, she found a member of the cleaning crew straightening the classified documents on her desk. Events that require the facility to be open outside of regular business hours, Events that affect the proper safeguarding of classified information, Any change in the number of GSA security containers being used at the contractor facility to protect classified information, An increase or decrease in the number of classified documents stored at the contractor facility. This will allow the contractor to understand the extent to which the PLA will affect the costs of the work and bid accordingly. -Inappropriate copying of classified material contractors must report which of these to the insider threat program select all that apply Contractors must report the following to the insider threat program: Efforts to obtain unauthorized access to classified or proprietary information. Which of the following statements BEST describes the risk status if any one element of risk shrinks to zero? The transfer of classified or proprietary information to a system not approved for the classification level or unaccredited or unauthorized systems, individuals, applications, or media is a _________________. The Construction Agreement. No specific terms or language is required to be included in a CBA. During which stage of the personnel security clearance process are the thirteen guidelines used? OFCCP prescribes a specific form for inviting applicants and employees to self-identify for disabled status. What Is Form 1099-NEC. = 15 ? The following statement best characterizes Matthew Arnold's view of the world: The world is a confusing and hostile place. -Keeping unauthorized backups The terms of a CBA apply to all employees in the bargaining unit, regardless of whether they join the union. The contractor also must process grievances filed by the union before a formal grievance procedure has been negotiated. Which of the following is a good security practice in areas where classified information may be subject to unauthorized disclosure? b. annual clearance justification reviews In contrast to other FAR provisions, Clause 52.222-50 must appear in all solicitations and contracts. If you are unable to determine when total payments made equal or exceed $600, you can estimate the dollar amount of the contract. Which of the following are reasons why AT plan exercises are important? Of the scenarios listed below, which ones must be reported to your IS Rep as change conditions affecting the facility's clearance? fj45 for sale alberta; nilgai hunting yturria ranch; contractors must report which of these select all that apply; sales hunter interview questions. U.S. Government employees and contractors must report which of the following? Contractors must report which of these to the Insider Threat program? Administers the National Industrial Security Program (NISP). Efforts to obtain unauthorized access to classified or proprietary information Any contact by cleared employees with known or suspected intelligence officers from any country -In person. Most inside offenders display concerning behaviors before acting directly against their organization. The more we know about an adversary's intent and capability, the better we can judge how and why he may collect the information that he needs. FAR Clause 52.222-50 prohibits trafficking in persons, including certain defined trafficking-related activities. If the contractor agrees to provide for increased wages and benefits and its client refuses reimbursement, these additional costs must be paid by the contractor. The E-Verify system must be used for checking the eligibility of individuals only after the employee has been offered and has accepted the job. Interference and discrimination based on the use of sick leave are prohibited. Online. -Speeches or books including information about involvement with the Intelligence Community The EEO-1 report collects gender and race/ethnicity data by type of position. Union Security: Unions often request inclusion of a provision requiring union membership (or the payment of dues and fees by nonmembers) as a condition of employment. Which of these activities must be reported? Select ALL the correct responses. What is the level of FCL required by the contractor? -Gather information on personnel Contractors are subject to the requirements of the DFWA if the contract with the government has a value of at least $100,000, will be performed in the U.S., and the primary purpose of the contract is other than acquisition of commercial items. possess the ability to exploit our critical information. That's why we put together the global hiring guide.But here's a quick recap of five common scenarios for US companies hiring independent contractors both locally and abroad. %PDF-1.6
%
Always develop countermeasures on a first-come, first-served basis, Always apply a unique countermeasure to each vulnerability, Always think of a countermeasure as a smarter way to do a task, Always weigh the cost of the countermeasure against its benefit, Identifying what an adversary already knows about your operation helps you to. EO 13706 applies to the following types of federal contracts: The EO requires contractors to provide covered employees one hour of paid sick leave for every 30 hours worked on or in connection with a covered federal contract or subcontract. Which resource guides Facility Security Officers (FSOs) through the self-inspection process and provides techniques to improve the quality of self-inspections? Of the following types of personnel-related information, which is NOT reported to PSMO-I? -Accessing systems at unusual hours without authorization. contractors must report which of these select all that apply. Contractors must report which of these? Who makes the interim eligibility determination? Arbitration: Consider a provision that limits the arbitrators authority. Read the publication. 2. Security violations are reported to which entity? The amount of a withdrawn employers withdrawal liability is based on a number of factors and requires an actuarial calculation. While imminent threats should be reported directly to the FBI, employees should use their agencys or facilitys reporting procedures to report other threats through their chain of command. Any contact by cleared employees with known or suspected intelligence officers from any country. 2020 Jackson Lewis P.C. Industrial Security Representative (IS Rep). Select all that apply. If a contractor or subcontractor disregards its obligations under the DBA/DBRA, in addition to being on the hook for back pay that may be owed to employees, it may be subject to contract termination and debarment from awards of future contracts for up to three years. Suspected compromise of classified information. = 2 5/20 As with race and gender data under EO 11246, VEVRAA and Section 503 require covered employers to invite pre- and post-offer applicants and employees to self-identify for status as a protected veteran or disabled individual.
Cougar Kills Pitbull,
Chemmeen Character Analysis,
Lois Smith Daughter,
Articles C