Give the group a name. Which of the following are things that adversaries want to know? Select ALL the correct responses. Security violations are reported to which entity? Your knowledge of which factors impact your capability to analyze your vulnerabilities? However, the results of negotiations will depend on a variety of factors, such as the parties leverage, bargaining strategy, bargaining objectives, the unions willingness to strike, the contractors ability to continue operating during a strike, the scope and degree of changes desired, the level of support for the union among employees, and the resolve of the contractors management and the government client to resist union pressure. Once again, you can see how important communication is to successfully working with contractors, whether inside your home or on your exterior home improvement project. Interference and discrimination based on the use of sick leave are prohibited. Weegy: A basic position in American foreign policy has been that America must defend its foreign interests related to Weegy: 15 ? -Improper use of privileged access An MPP also may impose additional costs on employers pursuant to trust documents, which usually are incorporated by reference in the CBA or participation agreement. Although all private employers with at least 100 employees must prepare annual EEO-1 reports, covered contractors and subcontractors must identify themselves as such on those reports. OPSEC focuses on what type of critical information? -is what's meant by the phrase "The domesticated generations fell Weegy: A suffix is added to the end of a word to alter its meaning. When a CBA does not exist and the contractor is negotiating an agreement with the union, if the contractor becomes involved in the subcontractors union negotiations, the contractor can become a joint employer of the subcontractor and responsible for violations committed by the subcontractor. Which of the following is considered a potential insider threat vulnerability? Information Security Oversight Office (ISOO). contractors must report which of these select all that apply. possess the ability to acquire and exploit our critical information. Contractors must maintain three years of EEO-1 reports as part of their AAPs. DD Form 254, DoD Contract Security Classification Specification, Transportation, Delivery, and Relocation Solutions (TDRS), Schedule 48. -Former employees Any contact by cleared employees with known or suspected intelligence officers from any country. The Cognizant Security Office (CSO) does which of the following? The Contracting Officers Representative (COR) is authorized to make changes to the contract, even if those changes affect price or quality. After returning from a recent professional conference, Franklin received a request for classified information from an uncleared person that he met at the conference. Details on E-Verify are available in the E-Verify Manual for Federal Contractors and Subcontractors. The minimum wage rate is annually increased by the Secretary of Labor. When considering assets, she knows that the greatest target of our adversaries is ___________. User activity monitoring on classified information systems: This behavior may include (select all that apply): Authorized access to DoD information and resources may be granted based on a person's ____________. There is no evidence that anyone had access to the material while she was out, but nobody can confirm that the materials were safe from disclosure. IDENTIFY THE VARIOUS METHODS OF CONTRACTING FOR A SUPPLY OR SERVICE:Contracting methods available which can streamline the contracting timeframe include: . Additionally, beginning January 1, 2020, tipped employees performing work on or in connection with covered contracts generally must be paid a minimum cash wage of $7.55 an hour. A cleared employee has received an industry award, A cleared employees citizenship has changed, An uncleared employees citizenship has changed. Which of these activities must be reported? -report the concerning behavior to your security officier Most inside offenders display concerning behaviors before acting directly against their organization. Contractors with a federal acquisition contract or subcontract must apply 15 basic cybersecurity safeguarding requirements and procedures to protect federal contract information. The requirements are based on security requirements published in the National Institute of Standards and Technologys (NIST) Special Publication (SP) 800-171, Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations. Specific requirements are in FAR Subpart 4.19 and FAR Clause 52.204-21. Which of the following organizations conducts periodic Security Vulnerability Assessments (SVAs) of contractor facilities as the CSO to the Department of Defense? An individuals access level is directly related to the employer organizations Facility Clearance level and the level of access needed for the individual to do his or her job. Contractors must report which of these? If a monopolist is producing a level of output where MR is less than MC, then it should. Which of the following must be reported to the Defense Counterintelligence and Security Agency and the FBI? Working late one evening on a priority project, Helen left several classified documents visible on her desk while she stepped away from her desk for a moment. The 20-year limitation on annual payments does not apply in the event of a mass withdrawal; this can result in the employer making withdrawal liability payments in perpetuity. Since 1850, the court has issued many influential decisions in a variety of areas . Select all that apply. He knows seminars, conventions, and exhibits can be used by adversaries to target knowledgeable resources like him. What is the level of FCL required by the contractor? In a right-to-work state, such provisions are prohibited unless the worksite is a federal enclave, meaning, it is exclusively subject to federal (and not state) law. The terms of a CBA apply to all employees in the bargaining unit, regardless of whether they join the union. For contracts in excess of $500,000 for supplies (other than for commercial off-the-shelf or COTS) acquired outside the U.S. or for services performed outside the U.S., the contractor must develop an appropriate compliance plan that, at a minimum, includes certain proactive steps. The security requirements of the contractors home facility, The security requirements of the host activity/facility. We need to identify an adversary's intent. Which of the following countermeasures can you implement to help reduce technology-associated insider threats? Existing paid time off (PTO) policies may be acceptable satisfaction of these obligations if they comply with all of the elements of EO 13706. determine the collection methods the adversary is using against you. -In email This need to be reported to the companys IS Rep? Phovoir/Shutterstock. As just one example, changing the design of a tile floor is much easier to do before the tile is ordered, rather than after it's installed. A contractor facility may access and store classified material as soon as the Facility Clearance (FCL) is granted. d. The company just lost its largest contract and has filed for bankruptcy. (Incorrect, there were more choices). Service contracts: The small business prime contractor must provide at least 50% of the contract cost for personnel. makes OPSEC principles second nature to your employees. The ATO is responsible for leveraging the capabilities of the organizations AT Working Group to assist with creating the AT plan. Select all that apply. Select ALL of the correct responses. Which of the following statements is true about technology and the insider threat? Failure to report unauthorized disclosure of classified information does not affect the service members safety. contracts. -is what's meant by the phrase "The domesticated generations fell Weegy: A suffix is added to the end of a word to alter its meaning. = 2 5/20 Physical security systems provide the means to counter threats only during wartime. In addition to the primary aspects of affirmative action compliance described above, covered contractors and subcontractors must prepare and submit both EEO-1 and VETS-4212 reports to the government annually. The acronym EAP stands for _______________ ? Which step in the OPSEC process requires you to look at your operation through the eyes of the adversary? Select all that apply. What system may be used to verify a companys Facility Clearance status? DSS Headquarters, Industrial Security Integration and Application (IP) Programs. The contractor must also report any such equipment, systems, or services discovered during contract performance; this requirement flows down to subcontractors. H.EO 13665 (Non-Retaliation for Disclosure of Compensation Information), This EO, often referred to as the Pay Transparency Executive Order, prohibits discrimination or retaliation against any employee or applicant because such employee or applicant has inquired about, discussed, or disclosed the compensation of the employee or applicant or another employee or applicant.. Government contractors with non-acquisition contracts could have separate, specific contractual obligations establishing protections for controlled unclassified information. Whether or not a Bridge Agreement is negotiated, a successor employer has an obligation to meet with the union and negotiate in good faith for a CBA. = 2 1/4. 6 2/3 = 15 * 3/20 The dynamic nature of our site means that Javascript must be enabled to function properly. Other technical obligations include drafting, implementing, and disseminating a prescribed equal employment opportunity (EEO)/Policy Statement, ensuring that all job postings contain an EEO Tag Line, annually providing all vendors a notice of the employers federal contractor status, incorporating an Equal Opportunity Clause in each of the employers covered subcontracts, notifying all unions of the employers federal contractor status (if applicable), and posting a number of notices on the employers careers website, including an applicant-accessibility statement. The company has hired 12 new employees to support a new major contract. When they identify assets, they should include only classified information. Report the concerning behavior to your security officer. There must be a bona fide procurement requirement to have access to U.S. classified information or facilities. -Any event that may impact an individual's personnel security clearance -Any event that may impact the status of the facility -Anything that affects the proper safeguarding of classified information -Any indication that classified information has been lost or compromised These blank check provisions can result in contractual withdrawal liability and exit fees (in pension and welfare plans), midterm contribution increases, and special assessments, among other midterm surprises. Profitability Assessing a vulnerability in conjunction with the threat, and then determining the impact this would have on an operation if the vulnerability is exploited determines the level of risk. G.EO 13672 (Sexual Orientation and Gender Identity Nondiscrimination). To assist government contractors, this guide discusses some of the labor and employment laws and regulations that should be considered when pricing and performing a government contract. Under these rules, an employer who completely or partially withdraws from the MPP is liable for their allocable share of the MPPs unfunded vested benefits. 8% effective tax rate, during the first quarter of fiscal 2022 compared to $132 laborer or mechanic is so employed, wages include compensation, at a rate not less than one and one-half times the basic rate of pay, for all hours worked . An FCL is a determination made by the Government that a contractor is eligible for access to classified information. Changes in a facility's storage capability are reported how? U.S. Government employees and contractors must report which of the following? (Incorrect, there were more choices). Select all that apply. The request for clearance must come from the contracting agency; the contractor cannot apply for security clearance on its own. . Grievances: As the union should not direct any grievances to the government client, consider including a provision stating that the union will only use the procedure in the CBA to raise and remedy grievances and not direct any grievances to the government client. Failure to do so will result in a perfectly clear successorship, which would bind the successor contractor to all the terms of the previous contractors CBA. On January 1, 2020, the rate was increased to $10.80 an hour. A member of your team openly discusses her financial difficulties and her inability to meet her financial obligations. The E-Verify system must be used for checking the eligibility of individuals only after the employee has been offered and has accepted the job. Select all that apply. Application shall be made on an SF Form 86 for DOE and NRC contractors. It's often the little things we do every day that can develop into vulnerabilities and cause damage to our operation. We help employers develop proactive strategies, strong policies and business-oriented solutions to cultivate high-functioning workforces that are engaged, stable and diverse, and share our clients' goals to emphasize inclusivity and respect for the contribution of every employee. XYZ Industries is a cleared facility that is moving its headquarters to a less expensive office space. Before an employee is granted access to classified information, After an employee has access to classified information. The transfer of classified or proprietary information to a system not approved for the classification level or unaccredited or unauthorized systems, individuals, applications, or media is a _________________. To issue a Facility Clearance (FCL), the Facility Clearance Branch (FCB) reviews which of the following? [ Any contact that suggests the employee may be the target of attempted exploitation by the intelligence service of another country. Where can he find reporting procedures that pertain to his organization? The Supreme Court of California is the highest and final court of appeals in the courts of the U.S. state of California.It is headquartered in San Francisco at the Earl Warren Building, but it regularly holds sessions in Los Angeles and Sacramento. Which paragraph of the AT plan lists the specific task for each subordinate unit? Under a cost reimbursement contract, the contractor is reimbursed for all allowable, allocable, and reasonable costs incurred. -Inappropriate copying of classified material To promote economy and efficiency in government contracting, President Barack Obama declared certain labor relations costs (those not directly related to a contractors provision of goods or services to the government) not eligible for reimbursement or payment by the contracting agency. Security officials should seek out and consider threat information only from official, government sources. The poster must be displayed in a prominent and accessible place where it can be seen easily by employees. Which of the following roles are filled by contractor employees? The EEO-1 report collects gender and race/ethnicity data by type of position. Select all that apply. b. ____________ are like pieces of a puzzle an adversary uses to reveal a picture of our operations. MPPs are subject to the withdrawal liability rules under Title IV of ERISA. 2020 Jackson Lewis P.C. Shift its marginal cost curve upward. The primary source of data for these AAP analyses is race and gender data collected through pre- and post-offer applicant and employee invitations to self-identify. [ ] Expert answered| soumen314 |Points 17764| -Bypassing security rules or protocols What type of violation has occurred? After a need is identified, the Government Contracting Activity (GCA) ___________________. What is the probability that at most five of the freshmen reply "yes"? Hes not sure if he should report it, but he knows it is better not to report an incident or behavior than to make a potentially false report. Clause 52.222-50 provides that during performance of the contract, contractors, their employees, and their agents may not: (1) engage in severe forms of trafficking in persons; (2) procure commercial sex acts; (3) use forced labor in performance of the contract; (4) withhold or destroy employee identification or immigration documents; (5) use fraudulent tactics in recruiting workers or use recruiters who engage in such tactics; (6) charge employees recruitment fees; (7) fail to provide, in certain circumstances, return transportation at the end of employment; or (8) provide substandard housing. Confidentiality of the records or information is not a valid reason to withhold the requested information, but the contractor can require a non-disclosure agreement. The contractor also must certify annually to the contracting officer that it has implemented a compliant plan (including due diligence investigation) and that, to the best of its knowledge, it is not aware of any violations. Former U.S. A trained elicitor may gather information by exploiting natural human tendencies, such as (select all that apply): -A tendency to gossip When dealing with countermeasure development, what is the bottom line? The ______________ has been designated as the Cognizant Security Office (CSO) for the DoD and over 30 other non-DoD agencies. -any event that may impact the status of the facility -anything that affects the proper safeguarding of classified information -any indication that classified information has been lost or compromised. C.EO 13496 (Notification of Employee Rights under Federal Labor Law). Any contact by cleared employees with known or suspected intelligence officers from any country. While every CBA is unique in some respects, some sample provisions that should be considered in government contracting include: Government Supremacy/Rights: Because a contractor is subject to its government clients directives, consider a provision on the rules, regulations, directives, orders, or work statements that are, or may be, imposed by the government, including on removal of an employee, that will apply and not be subject to the grievance and arbitration procedure. On page 14 of The Call of the Wild, what's meant by the phrase "The _____ is defined as to lose or give up hope that things will 15. importance of the critical information item. This answer has been confirmed as correct and helpful. Many successor contractors negotiate a Bridge Agreement or a new CBA with the union that represented employees of the previous contractor. _____ is a conversation t Less. If you are unable to determine when total payments made equal or exceed $600, you can estimate the dollar amount of the contract. To promote an environment in which federal contracts for goods or services will be performed by contractors whose work will not be interrupted by labor unrest, President Barack Obama signed into law a mandate that federal contractors inform employees of their rights under the NLRA. Objectives . Hostile entities may use social media to _______________ ? Covered employers with at least 50 employees must prepare annually a written affirmative action plan (AAP) for each of their establishments (physical work locations) with at least 50 employees. Technology changes the scale of risk from insider threats. Which of the following topics is NOT included in the National Industrial Security Program Operating Manual (NISPOM)? In Tennessee, the average effective property tax rate is 0.64%. -Allowing large amounts of data to be accessed American Society for Industrial Security International (ASIS), NCMS, the Society of Industrial Security Professionals, Industrial Security Awareness Council (ISAC). Because each adversary may have different intentions and capabilities, you may need to enact different scenarios for different adversaries. Which resource guides Facility Security Officers (FSOs) through the self-inspection process and provides techniques to improve the quality of self-inspections? Select all that apply. Who sends the NATO Request for Visit (RFV) approval to the NATO site? Report this information to your organization's security office. When a bargaining impasse occurs, the employer may implement terms it proposed to the union during bargaining. Overtime pay provisions (other than the Fair Labor Standards Act requirements) are not included. The Davis-Bacon Act (DBA) establishes the requirement for paying prevailing wages on projects involving the construction, alteration, or repair (including painting and decorating) of public buildings or public works. 5.1 Overview of the evaluation and selection of contractors. contractors must report which of these to the insider threat program select all that apply Contractors must report the following to the insider threat program: Efforts to obtain unauthorized access to classified or proprietary information. The NISP ensures that restrictions on continuous monitoring activities are in place before any classified work may begin. Pursuant, T.C.A. Submit a paper report of independent contractors using one of the following options: Download a fill-in DE 542 (PDF) form. Always develop countermeasures on a first-come, first-served basis, Always apply a unique countermeasure to each vulnerability, Always think of a countermeasure as a smarter way to do a task, Always weigh the cost of the countermeasure against its benefit, Identifying what an adversary already knows about your operation helps you to. -Suggest she contact the EAP Select all that apply. DBA states that all government construction contracts over $2,000 to which a federal agency or the District of Columbia is a party must include provisions for paying workers on-site no less than the local prevailing wages and benefits as set by the DOL. . Which step of the analytical risk management process includes considering the impact to military and strategic advantage? Under the NLRA, a joint employment relationship will be found when one employer directly controls the terms and conditions of employment for another. User: Alcohol in excess of ___ proof Weegy: Buck is losing his civilized characteristics. endstream
endobj
startxref
To whom should you report if you are contacted by a member of the media about information you are not authorized to share? EO 13706 applies to the following types of federal contracts: The EO requires contractors to provide covered employees one hour of paid sick leave for every 30 hours worked on or in connection with a covered federal contract or subcontract. Select all that apply. Who might be interested in non-public information that an insider can provide? -Threat can include unathorized disclosure of national security information or through the loss or degradation of department resources or capabilities. contractors must report which of these select all that apply -any event that may impact the status of the facility -anything that affects the proper safeguarding of classified information -any indication that classified information has been lost or compromised. The development of a countermeasure focuses directly on the. Foreign attendees business cards do not match stated affiliations, Excessive or suspicious photography and filming of technology and products, Conversations involving classified, sensitive, or export-controlled technologies or products. Select ALL the correct responses. This material may be considered attorney advertising in some jurisdictions. The National Labor Relations Act (NLRA) governs the relationship between employers and the unions that represent their employees. -Contractors Contractors are subject to the requirements of the DFWA if the contract with the government has a value of at least $100,000, will be performed in the U.S., and the primary purpose of the contract is other than acquisition of commercial items. Which of the following is an objective of the DSS CI Directorate? The Higher Education Research Institute at UCLA collected data from 203,967 incoming first-time, full-time freshmen from 270 four-year colleges and universities in the U.S. 71.3%71.3 \%71.3% of those students replied that, yes, they believe that same-sex couples should have the right to legal marital status. An insider threat is anyone with authorized access to the information or things an organization values most, and who uses that access, either wittingly or unwittingly, to inflict harm to the organization or national security. The process of obtaining a Facility Security Clearance and a Personnel Security Clearance is established by the Defense Security Service (DSS), which is the interface between the government and the contractors who need clearance. Why or why not? The chief statutory sources of liability to an MPP pension fund beyond the contributions required under the CBA are: (1) the withdrawal liability rules in Title IV of ERISA; (2) the Pension Protection Act of 2006 (PPA); and (3) the minimum funding rules. Which of the following roles are filled by contractor employees? An advantage of incorporating the use of OPSEC surveys is that it. An employers right to seek medical certification for the leave is limited. Because there are so many different types of construction projects, each type of construction contract exists to satisfy the varying needs of all parties involved. What factor takes into account the impact that a compromise would have on your operation? Which of the following countermeasures is considered among the most effective for all organizations? Contractors also must: (1) affirmatively notify employees and agents of the above prohibitions and the corrective action it will take for any violations; (2) include the substance of the Clause in certain subcontracts and contracts with agents; (3) take appropriate action in response to any violations; (4) notify the agency contracting officer of (i) any credible information it receives regarding any violation by the employees or agents of the contractor or subcontractor; and (ii) any actions taken against any such violator; and (5) cooperate fully with the government in investigating alleged violations. This is known as the duty to bargain. = 2 1/4. A federal contractor with a contract for a term of performance of at least 120 days and with a value of at least $100,000 ($3,000 for subcontractors) must agree to use E-Verify to verify the . What type of violation has occurred? Which of the following are security briefing topics for visitors? Additionally, such employers must follow non-discrimination and related provisions, as well as comply with a host of recordkeeping, data collection, and technical obligations. To protect the integrity of their mission. When the visit is a first-time visit and the DoD System of Records does not indicate that the visitor has signed an SF-312, The visitor must always sign it at every visit to any classified facility, When the visitor presents a visit authorization letter (VAL), When it is the visitors first visit to the cleared facility. Efforts to compromise a cleared employee. The tax rate ($3.39) must be multiplied by 100 to find the total.
Washington International School Head Of School, Deaths In Shields Gazette Obituaries Today, Articles C
Washington International School Head Of School, Deaths In Shields Gazette Obituaries Today, Articles C