contractors must report which of these select all that apply

Post Author: Post published: 16 juin 2022; a. look at your operation from both the friendly and adversary perspectives. The primary source of data for these AAP analyses is race and gender data collected through pre- and post-offer applicant and employee invitations to self-identify. An advantage of incorporating OPSEC principles in the planning stage of any operation is that it. A contractor must have an FCL commensurate with the highest level of classified access (Secret or Top Secret) required for contract performance. They are indicators that tell adversaries where to focus their collection efforts, They are vulnerabilities that tell adversaries where to focus their collection efforts, They are indicators that are not part of a unit's normal conduct, They are vulnerabilities that are not part of a unit's normal conduct. You may also request proof of automobile insurance if the sub has their . Which investigation type is required for an initial Top Secret Clearance? 6275 0 obj <> endobj Any agreement negotiated also may apply automatically to separate contractors who are found to be joint employers. He is working with other company officials to identify the organizations assets. Once again, you can see how important communication is to successfully working with contractors, whether inside your home or on your exterior home improvement project. Affirmative action in the United States - Wikipedia When the DFARS 252.211-7007 clause is in the contract, the contractor must report receipt of all GFP and updates of serially managed GFP . The poster must be displayed in a prominent and accessible place where it can be seen easily by employees. Efforts to compromise a cleared employee. -Bypassing security rules or protocols contractors must report which of these select all that apply Who performs classified Information System assessments? Some employers do not wish to make contributions to a unions multiemployer pension plan because of the risk of incurring potentially significant withdrawal liability in the future. Working late one evening on a priority project, Helen left several classified documents visible on her desk while she stepped away from her desk for a moment. Which of the following is an objective of the DSS CI Directorate? E.EO 13627 (Combatting Trafficking in Persons). An advantage of incorporating the use of OPSEC surveys is that it. Any contact by cleared employees with known or suspected intelligence officers from any country. = 2 1/4. -any event that may impact the status of the facility -anything that affects the proper safeguarding of classified information -any indication that classified information has been lost or compromised. Contractors also must: (1) affirmatively notify employees and agents of the above prohibitions and the corrective action it will take for any violations; (2) include the substance of the Clause in certain subcontracts and contracts with agents; (3) take appropriate action in response to any violations; (4) notify the agency contracting officer of (i) any credible information it receives regarding any violation by the employees or agents of the contractor or subcontractor; and (ii) any actions taken against any such violator; and (5) cooperate fully with the government in investigating alleged violations. Given this, and the effect PLAs can have on labor and other project costs, contractors submitting bids on construction projects should diligently review each contract solicitation to determine if a PLA will be required. Although withdrawal liability is a corporate obligation, all trades or businesses with sufficient common ownership are treated as a single employer, and each such trade or business is jointly and severally liable for withdrawal liability. -Competitors Which of the following is a good security practice in areas where classified information may be subject to unauthorized disclosure? This is basically " the contract, " a foundation that the rest of the project details are built upon. An individuals access level is directly related to the employer organizations Facility Clearance level and the level of access needed for the individual to do his or her job. Significant change in work habit To whom should you report if you are contacted by a member of the media about information you are not authorized to share? contractors must report which of these to the insider threat program Which of the following countermeasures is considered among the most effective for all organizations? Where are actions, such as Personnel Security Clearance terminations, upgrades, downgrades, and reinstatements, on contractor employees entered? Anyone who opposes or acts against your interest is called a(n), In analyzing the threat, we are concerned with adversaries that. Step 2: Create new tags and tag transactions. Federal contractors must report the names and total compensation for the contractor's five most highly compensated officials and . Contractors must report which of these? d. Lower its price. One of the conditions required for a pre-existing eligibility determination issued by one federal agency to be accepted by another federal agency is for the determination to be based on an investigation of sufficient scope that is current to within _________. The Secretary of Defense is the Executive Agent of the National Industrial Security Program and is responsible for overall implementation of the program. Stay Safe. The following statement best characterizes Matthew Arnold's view of the world: The world is a confusing and hostile place. Select all that apply. Section 3-103 places new burdens on contractors to mitigate this threat. The request must state the specific Contractor Health and Safety Requirement to be waived. It also requires: (1) inclusion of sexual orientation and gender identity in EEO Taglines where protected statuses are listed (rather than abbreviated Taglines), and (2) posting of updated EEO is the Law posters. Which of these activities must be reported? The five main types of construction contracts are lump sum, time and materials, cost-plus, unit price, and guaranteed maximum price (GMP). Contractors located in U.S. territories (outside of the United States) should contact the OFCCP Helpdesk at 1-800-397-6251 for assistance with registering. During a periodic reinvestigation of a cleared individual, During the applicants initial PCL investigation, Only when the applicant is seeking Top Secret clearance eligibility. Its decisions are binding on all other California state courts. Depending on a number of factors, including the extent of common ownership and control, AAP obligations also may extend to other related companies. Clause 52.222-50 provides that during performance of the contract, contractors, their employees, and their agents may not: (1) engage in severe forms of trafficking in persons; (2) procure commercial sex acts; (3) use forced labor in performance of the contract; (4) withhold or destroy employee identification or immigration documents; (5) use fraudulent tactics in recruiting workers or use recruiters who engage in such tactics; (6) charge employees recruitment fees; (7) fail to provide, in certain circumstances, return transportation at the end of employment; or (8) provide substandard housing. According to the DCAA, [T]imekeeping procedures and controls on labor charges are areas of utmost concern. One area of the DCAAs attention is whether the contractor has a timekeeping system to track an employees time spent on each work activity. When is an applicant required to submit fingerprints in addition to his/her security application? Contractors must report which of these to the insider threat program? contractors must report which of these select all that apply Select ALL the correct responses. defines the initial requirements for the product/service. Most inside offenders display concerning behaviors before acting directly against their organization. Select all that apply. Government contractors with non-acquisition contracts could have separate, specific contractual obligations establishing protections for controlled unclassified information. The EEO-1 report collects gender and race/ethnicity data by type of position. -A tendency to believe others are honest. Interference and discrimination based on the use of sick leave are prohibited. Select all that apply. -report the concerning behavior to your security officier Most inside offenders display concerning behaviors before acting directly against their organization. The Government Funding Transparency Act of 2008 (GFTA) requires the Office of Management and Budget (OMB) to establish a free, public website containing full disclosure of all federal contract award information. That's why we put together the global hiring guide.But here's a quick recap of five common scenarios for US companies hiring independent contractors both locally and abroad. Which government entity is responsible for providing National Industrial Security Program (NISP) policy direction? These reports are submitted to the Federal Funding Accountability Transparency Act Subaward Reporting System. Before conducting an interview with an employee that could lead to disciplinary action, the employee is entitled to union representation during the interview upon request. The dynamic nature of our site means that Javascript must be enabled to function properly. Physical security controls for the control of, access to, and dissemination of the classified information to be presented. We have detected that Javascript is not enabled in your browser. Always develop countermeasures on a first-come, first-served basis, Always apply a unique countermeasure to each vulnerability, Always think of a countermeasure as a smarter way to do a task, Always weigh the cost of the countermeasure against its benefit, Identifying what an adversary already knows about your operation helps you to. Former U.S. -Non-state actors. -Unauthorized disclosure of classified material. WINDOWPANE is the live-streaming app for sharing your life as it happens, without filters, editing, or anything fake. Information System Security Professional/Security Control Assessor (ISSP/SCA), Information System Security Manager (ISSM). %%EOF = 15 ? -Personal foreign travel, module 6 ( process of care, and communication), Cyber Awareness Challenge 2023 (Incomplete), John David Jackson, Patricia Meglich, Robert Mathis, Sean Valentine, Service Management: Operations, Strategy, and Information Technology, Operations Management: Sustainability and Supply Chain Management. The acronym EAP stands for _____? Prime contractors must meet certain reporting requirements before they are able to submit a bid that valued at $50 million or more as of the year 2016. The tax rate ($3.39) must be multiplied by 100 to find the total. identify the losing and gaining contract numbers and select the items from those previously receipted. As evidence of their compliance with the requirement to pay workers the prevailing wage, covered contractors must maintain records during the work and for three years after job completion reflecting the following: Employers must pay workers covered by the DBA/DBRA weekly. Department of Employment and Labour True or false? the contractor's record of- (1)Conforming to requirements and to standards of good workmanship; (2)Forecasting and controlling costs; (3)Adherence to schedules, including the administrative aspects of performance; (4)Reasonable and cooperative behavior and commitment to customer satisfaction; (5)Complying with the requirements -Foreign governments What type of violation has occurred? C.EO 13496 (Notification of Employee Rights under Federal Labor Law). -is what's meant by the phrase "The domesticated generations fell Weegy: A suffix is added to the end of a word to alter its meaning. To ensure there are enough cleared employees to meet the needs of a contractor companys classified contract workload, To provide the CEO with justification for hiring more cleared employees, To assess whether a cleared employee still requires access to classified information. None. An advantage of integrating OPSEC principles in your day-to-day operations is that it. Select all that apply. The more we know about an adversary's intent and capability, the better we can judge how and why he may collect the information that he needs. _____ describes the level of information to which a person is authorized access based on a background investigation. Additionally, you must also pay the matching employer portion of social security and Medicare taxes as well as pay unemployment tax on wages paid to an employee. Which of the following government entities typically determines personnel security clearance eligibility? The EO states that federal contractors and subcontractors subject to the NLRA must post a notice containing information proscribed by the DOL that informs employees of their rights under the NLRA in all plants and offices where employees are performing work on the federal contract. The Construction Agreement. Existing paid time off (PTO) policies may be acceptable satisfaction of these obligations if they comply with all of the elements of EO 13706. Select all that apply. Which AT plan exercise(s) uses scenario driven events to test specific portions of the AT plan? When does a host need to coordinate with the visitors organization regarding the Classified Information Nondisclosure Agreement (SF-312)? -Accessing systems at unusual hours without authorization. Who must submit the RFV when a foreign national needs to visit a U.S. contractor facility to discuss classified information? This will allow the contractor to understand the extent to which the PLA will affect the costs of the work and bid accordingly. . An FCL is a determination made by the Government that a contractor is eligible for access to classified information. When the visit is a contract-related classified visit, When the request needs to be submitted and approved quickly, When one or both organizations do not utilize the web-based DoD System of Record, When either the visitors or host organization does not utilize the Industrial Security Facilities Database. The National Labor Relations Act (NLRA) governs the relationship between employers and the unions that represent their employees. Leave may be used for: (1) illness and injury; (2) diagnosis, care, and preventive care; (3) caring for family members and family-equivalent members; and (4) domestic violence care. reduces indicators and avoids giving an adversary activity tip-offs. If you are contacted by a member of the media about the information you are not authorized to share, you should take down the person's name and organization, date, time, location, method of contact, and the reason for contact. Select all that apply All 4 answers A coworker shares that she and her husband are facing foreclosure, and she doesn't know what to do. Which of the following countermeasures should be used sparingly because of its expense and maintenance difficulty? Who might be interested in non-public information that an insider can provide? Overtime pay provisions (other than the Fair Labor Standards Act requirements) are not included. = 15 * 3/20 t. e. Affirmative action in the United States is a set of laws, policies, guidelines, and administrative practices "intended to end and correct the effects of a specific form of discrimination" [1] that include government-mandated, government-approved, and voluntary private programs. American Society for Industrial Security International (ASIS), NCMS, the Society of Industrial Security Professionals, Industrial Security Awareness Council (ISAC). A contractor facility has been awarded classified contracts that require access to information classified at the Confidential and Secret levels. Generally, a contractor is not required to provide pricing, profit, or sensitive customer information unless the contractor uses inability to pay, its bid proposal, or lack of competitiveness as a justification for its positions during bargaining. The chief statutory sources of liability to an MPP pension fund beyond the contributions required under the CBA are: (1) the withdrawal liability rules in Title IV of ERISA; (2) the Pension Protection Act of 2006 (PPA); and (3) the minimum funding rules. User activity monitoring on classified information systems: -Any indication that classified information has been lost or compromised. Otherwise, a contractor would need to wait until it is required to file an EEO-1 report and receive an EEO-1 identifier to register for the portal. When an insider becomes a threat, it can have far-reaching consequences on both an organization and national security. To whom does the FSO submit the applicants completed SF-86 and both signed release forms? Select ALL the correct responses. There are three sub-sections. Loss, compromise, and suspected compromise of classified information are reported how? We help employers develop proactive strategies, strong policies and business-oriented solutions to cultivate high-functioning workforces that are engaged, stable and diverse, and share our clients' goals to emphasize inclusivity and respect for the contribution of every employee. Whenever an individual stops drinking, the BAL will ________________. Likewise, employers who are covered by the VEVRAA must submit VETS-4212 reports. The company has merged with another company and is under new ownership. -In email Focused on labor and employment law since 1958, Jackson Lewis P.C. These policies protect the business in case of theft, damage, or if one of their employees gets injured. Which of the following topics is NOT included in the National Industrial Security Program Operating Manual (NISPOM)? It is a clearance of the business entity; it has nothing to do with the physical . a. Under Executive Order (EO) 11246, employers with a covered supply or service federal contract or subcontract of at least $50,000 must engage in affirmative action efforts to increase the workforce representation of women and minorities. CLC 222 Contracting Officers Representative (COR) - Reddit - Dive into Before an employee is granted access to classified information, After an employee has access to classified information. Where can he find reporting procedures that pertain to his organization? Contractor Portal Frequently Asked Questions - DOL Industrial Security Facilities Database (ISFD), National Industrial Security Program Operating Manual (NISPOM). -A desire to appear well-informed Independent Contractor Reporting - Employment Development Department 20/3 Service Contract Act (SCA) Section 4c requires service contractors to comply with prevailing wage determinations and minimum fringe benefit payments. Efforts to compromise a cleared employee. Of the scenarios listed below, which ones must be reported to your IS Rep as change conditions affecting the facility's clearance? Which of the following should Sam refer to for counterintelligence and threat awareness requirements for contractors? Grievances: As the union should not direct any grievances to the government client, consider including a provision stating that the union will only use the procedure in the CBA to raise and remedy grievances and not direct any grievances to the government client. Physical security measures are a combination of active or passive systems, devices, and security personnel used to protect a security interest from possible threats. User: She worked really hard on the project. What is the appropriate action? Once there is a duty to bargain, the contractor must respond to the unions information requests within a reasonable time. Other technical obligations include drafting, implementing, and disseminating a prescribed equal employment opportunity (EEO)/Policy Statement, ensuring that all job postings contain an EEO Tag Line, annually providing all vendors a notice of the employers federal contractor status, incorporating an Equal Opportunity Clause in each of the employers covered subcontracts, notifying all unions of the employers federal contractor status (if applicable), and posting a number of notices on the employers careers website, including an applicant-accessibility statement. Select all that apply. Who makes the interim eligibility determination? 's 950+ attorneys located in major cities nationwide consistently identify and respond to new ways workplace law intersects business. -Former employees The process of obtaining a Facility Security Clearance and a Personnel Security Clearance is established by the Defense Security Service (DSS), which is the interface between the government and the contractors who need clearance. 1. = 15 * 3/20 When is an SF 312, Classified Information Nondisclosure Agreement, executed? Depending on the contractors specific organizational needs, other provisions should be considered. Select all that apply. The true about technology and insider threat is: Technology changes the scale of risk from insider threats. With a couple of exceptions, verification of employment must be completed within three business days after a newly hired employees start date. contractors must report which of these select all that apply Which of the following items must the FSO report to the PSMO-I? contracts. The Cognizant Security Office (CSO) for the DoD is Director of National Intelligence (DNI). Select ALL of the correct responses. Which of the following provides policy about PCLs and defines access criteria? Under the final regulations, which became effective on January 11, 2016, employers entering into new contracts (or modifying existing contracts) after January 11, 2016, must incorporate proscribed nondiscrimination language into their nondiscrimination policies, as well as have required postings on their websites and in their workplaces. As with race and gender data under EO 11246, VEVRAA and Section 503 require covered employers to invite pre- and post-offer applicants and employees to self-identify for status as a protected veteran or disabled individual. -Suggest she contact the EAP In addition, if required by the government contract, consider requiring reinstatement be subject to approval by the government client. The Wage and Hour Division of the DOL has created a standard form (WH-347) that contractors can use to submit the information. True or false? makes OPSEC principles second nature to your employees. User: contractors must report which of these? 6 2/3 contractors must report which of these select all that apply If a successor contractor timely disavows the previous contractors CBA, it may establish its own terms and conditions of employment, subject to honoring the wages and covered fringe benefits of the CBA required by Section 4c of the SCA as discussed above. June 17, 2022 . Covered contracts are contracts subject to procurement contracts for construction covered by the DBA (but not contracts subject only to the DBRA); service contracts covered by the SCA; concessions contracts, including any concessions contract excluded from the SCA by the DOLs regulations at 29 CFR 4.133(b); and contracts in connection with federal property or lands and related to offering services for federal employees, their dependents, or the general public. Patterns, stereotypes, and predictable actions are all types of which of the following? Subjects may include the issues presented by the employer or the union that have been processed through the grievance procedure, the terms of the CBA, and the type of remedy available to an aggrieved employee. Here is a list of the most common construction contract documents, and what they include. What is the purpose of an annual clearance justification review? In writing to your IS Rep at the DSS field office. Special Compliance Requirements for Government Contractors The thirteen adjudicative guidelines involve assessing a candidate using criteria that addresses a specific concern that can impact the candidates ability to protect national security. These requirements apply not only to the contractor's employees working directly on a federal contract, but generally to their entire workforce, including locations where no federal contract work is performed. -Allowing large amounts of data to be accessed What is the highest level of classified access she may have for work performed for her new employer? (Incorrect, there were more choices). endstream endobj startxref The 20-year limitation on annual payments does not apply in the event of a mass withdrawal; this can result in the employer making withdrawal liability payments in perpetuity. Foreign Ownership, Control, or Influence (FOCI) Operations Division, Personnel Security Management Office for Industry (PSMO-I), Center for Development of Security Excellence (CDSE). The contractor also must certify annually to the contracting officer that it has implemented a compliant plan (including due diligence investigation) and that, to the best of its knowledge, it is not aware of any violations. An advantage of using good OPSEC principles during contingencies is that it. Select all that apply. Reports on changes in KMP are required only when there is a change in the president, CEO, or FSO. The level of risk is indirectly proportional to all three factors of risk. Failure to do so will result in a perfectly clear successorship, which would bind the successor contractor to all the terms of the previous contractors CBA. Personnel security clearance investigation stage, Initiate personnel security clearance process stage. Select all that apply. Contractors must maintain three years of EEO-1 reports as part of their AAPs. Assessing a vulnerability in conjunction with the threat, and then determining the impact this would have on an operation if the vulnerability is exploited determines the level of risk. = 2 5/20 In contrast to other FAR provisions, Clause 52.222-50 must appear in all solicitations and contracts. Your security office contractors must report which of these select all that apply This EO amends EO 11246, which imposes anti-discrimination and affirmative action requirements upon federal contractors, to prohibit discrimination on the basis of sexual orientation and gender identity. To issue a Facility Clearance (FCL), the Facility Clearance Branch (FCB) reviews which of the following? Efforts to obtain unauthorized access to classified or proprietary information Any contact by cleared employees with known or suspected intelligence officers from any country Knowledge of the threat supports all other steps in the OPSEC process. Maintain list of militarily critical technology. . Whether or not a Bridge Agreement is negotiated, a successor employer has an obligation to meet with the union and negotiate in good faith for a CBA. Contractors may decide whether they want to use E-Verify for all new hires and all existing non-exempt employees assigned to a federal contract, or for their entire non-exempt workforce (all new hires and all existing employees) throughout the entire company. Labor and Employment Obligations for Federal Contractors Which of the following BEST identifies the goal of OPSEC? a. periodic reinvestigations Which paragraph of the AT plan lists the specific task for each subordinate unit? The two primary methods of submitting reports to your DSS IS Rep at the DSS Field Office are _________ and __________. What type of violation has occurred? It is critical, therefore, to maintain labor-charging internal control systems and educate employees on their responsibility to accurately record their time charges on federal contract work. If the visitor organization and host organization both use the DoD System of Record, visit notifications are sent electronically, which speeds the approval process. To assist government contractors, this guide discusses some of the labor and employment laws and regulations that should be considered when pricing and performing a government contract.

Verizon Order On Hold, Lara Child Care Forms, How Much Weight Can A 2x4 Stud Support Horizontally, Houses For Rent Cheney, Wa Craigslist, Plus One Personal Massager Charger, Articles C

No Comments

contractors must report which of these select all that apply

Post a Comment