Contractors must report which of these? A successor contractor for a contract to provide services of a predecessor contractor with a collective bargaining agreement (CBA) in place which replaced the U.S. Department of Labors (DOL) Wage Determination for the contract must honor the wage rates and covered fringe benefit provisions of that CBA for the first year of the contract. 's 950+ attorneys located in major cities nationwide consistently identify and respond to new ways workplace law intersects business. Who sponsors classified meetings in the NISP? Specific reporting procedures vary widely across agencies and contractor facilities. The EEO-1 report collects gender and race/ethnicity data by type of position. This is an example of _____________________. They must be allowed to carry over unused paid sick leave from year to year, although contractors can limit accrual to 56 hours. allows for any changes in OPSEC factors over time. It is not intended to constitute legal advice nor does it create a client-lawyer relationship between Jackson Lewis and any recipient. What kind of report should be submitted? Contractors are subject to the requirements of the DFWA if the contract with the government has a value of at least $100,000, will be performed in the U.S., and the primary purpose of the contract is other than acquisition of commercial items. What is the level of FCL required by the contractor? As defined in the NISPOM, ______ is the administrative determination that an individual is eligible for access to classified information. Contractors must report which of these to the Insider Threat program? All executive departments and agencies with national security missions. It is critical, therefore, to maintain labor-charging internal control systems and educate employees on their responsibility to accurately record their time charges on federal contract work. Which of the following is a technology-related indicator? The programs tend to focus on access to education and . Section 3-103 places new burdens on contractors to mitigate this threat. This behavior may include (select all that apply): -violation of workplace policies -failure to follow standard procedures (SOP) -legal difficulties When is it appropriate for the visitors organization to submit a visit authorization letter (VAL)? -In email When the visit is a contract-related classified visit, When the request needs to be submitted and approved quickly, When one or both organizations do not utilize the web-based DoD System of Record, When either the visitors or host organization does not utilize the Industrial Security Facilities Database. Answer Information System Security Manager (ISSM) Insider Threat Program Senior Official (ITPSO) Information System Security Professional/Security Control Assessor (ISSP/SCA) Facility Security Officer (FSO) Question 20 Question To ensure any classified material that may be of use in a follow-on contract is transported securely to the visitors organization, To ensure that all classified material has been properly stored and inventoried. To assist government contractors, this guide discusses some of the labor and employment laws and regulations that should be considered when pricing and performing a government contract. He is invited to speak at a foreign conference. True or false? contractors must report which of these select all that apply. FAR Clause 52.222-50 prohibits trafficking in persons, including certain defined trafficking-related activities. NISPOM paragraph 1-300 states that contractors must report certain events to the government. Whenever an individual stops drinking, the BAL will ________________. You can help reduce technology-associated insider threats by: Eliminating accessing data through portable devices (Incorrect). This need to be reported to the companys IS Rep? The definition of Targeted Violence includes which of these components? b. annual clearance justification reviews Select all that apply. After a need is identified, the Government Contracting Activity (GCA) ___________________. -A desire to be polite This behavior may include (select all that apply): Authorized access to DoD information and resources may be granted based on a person's ____________. These requirements apply not only to the contractor's employees working directly on a federal contract, but generally to their entire workforce, including locations where no federal contract work is performed. 4 / 10. Any shortfall can be paid to the employee in cash or be contributed to a retirement plan (such as a 401k plan) on the employees behalf. ], Witch one of the following statements best characterizes Arnold s view of world, WHICH OF THE FOLLOWING STATEMENTS IS TRUE ABOUT TECHNOLOGY AND INSIDER THREAT. Section 503 also imposes a number of technical obligations and restrictions similar to those of the Americans with Disabilities Act. What legally binding document must be executed between the Department of Defense and a contractor to obtain a facility clearance? These policies protect the business in case of theft, damage, or if one of their employees gets injured. Shift its marginal cost curve upward. Contractors who participate in a multiemployer pension plan (MPP) through a CBA may be subject to significant liabilities created by statute. Weegy: A basic position in American foreign policy has been that America must defend its foreign interests related to Weegy: 15 ? Gopuff Background Check Requirementscom with instructions, or you can log into the Checkr applicant portal to view the status of your background check. We need to identify an adversary's intent. Security violations are reported to which entity? Covered contracts are contracts subject to procurement contracts for construction covered by the DBA (but not contracts subject only to the DBRA); service contracts covered by the SCA; concessions contracts, including any concessions contract excluded from the SCA by the DOLs regulations at 29 CFR 4.133(b); and contracts in connection with federal property or lands and related to offering services for federal employees, their dependents, or the general public. Information Security Oversight Office (ISOO). When the visit is a first-time visit and the DoD System of Records does not indicate that the visitor has signed an SF-312, The visitor must always sign it at every visit to any classified facility, When the visitor presents a visit authorization letter (VAL), When it is the visitors first visit to the cleared facility. The five main types of construction contracts are lump sum, time and materials, cost-plus, unit price, and guaranteed maximum price (GMP). True or false? The DBA prevailing wage requirements is extended by the Davis-Bacon Related Acts (DBRA) to many federally funded or assisted construction activities. = 45/20 Other technical obligations include drafting, implementing, and disseminating a prescribed equal employment opportunity (EEO)/Policy Statement, ensuring that all job postings contain an EEO Tag Line, annually providing all vendors a notice of the employers federal contractor status, incorporating an Equal Opportunity Clause in each of the employers covered subcontracts, notifying all unions of the employers federal contractor status (if applicable), and posting a number of notices on the employers careers website, including an applicant-accessibility statement. 6294 0 obj
<>stream
Online. -Keeping unauthorized backups The primary objective of Section 503 is documented outreach efforts to attract qualified individuals with disabilities such that the employer attains a utilization goal for disabled individuals in each of its AAP job groups of 7%. Which AT plan exercise(s) uses scenario driven events to test specific portions of the AT plan? . -Active duty military. AAPs require a number of annual workforce and personnel activity analyses, including a Workforce Analysis, Job Group Analysis, Utilization Analysis, and Placement Goals. Joint Personnel Adjudication System (JPAS). 5.1 Overview of the evaluation and selection of contractors. 6 2/3 contractors must report which of these select all that applywhat do yellow license plates mean in ohio? Please read each question carefully, and circle A, B, C or D to indicate the correct response. -Foreign contacts It also requires: (1) inclusion of sexual orientation and gender identity in EEO Taglines where protected statuses are listed (rather than abbreviated Taglines), and (2) posting of updated EEO is the Law posters. For example, if the CBA required the predecessor to pay $4.50 per hour to the unions health and welfare fund to provide medical insurance and related benefits, the contractor can spend at least $4.50 per hour on these benefits by either using its medical plan or any other plan. makes OPSEC principles second nature to your employees. When the DFARS 252.211-7007 clause is in the contract, the contractor must report receipt of all GFP and updates of serially managed GFP . 3. Select all that apply. = 2 5/20 Reports on changes in KMP are required only when there is a change in the president, CEO, or FSO. Security control measures are the responsibility of the Government Contracting Activity. In writing to your IS Rep at the DSS field office. provides for early detection of OPSEC problems. d. The company just lost its largest contract and has filed for bankruptcy. Federal contractors and subcontractors with a single government contract or subcontract of at least $150,000 must follow the non-discrimination and related provisions concerning protected veterans covered under the Vietnam Era Veterans Readjustment Assistance Act (VEVRAA). Given the complexities involved, employers would be well-served to address their particular situations with experienced counsel. The Secretary of Defense is the Executive Agent of the National Industrial Security Program and is responsible for overall implementation of the program. This EO established the minimum wage $10.10 an hour for employees of covered federal contractors and made it effective for new contracts entered into on or after January 1, 2015, and existing contracts if modified by the contracting agency to include the requirement. b. MPPs are subject to the withdrawal liability rules under Title IV of ERISA. They must provide the contracting agency, also weekly, a certified copy of all payrolls providing the information above for the previous weeks payroll period. -Employees The process of obtaining a Facility Security Clearance and a Personnel Security Clearance is established by the Defense Security Service (DSS), which is the interface between the government and the contractors who need clearance. Lesser disciplinary actions may be discussed with the union after the action is taken. E.EO 13627 (Combatting Trafficking in Persons). importance of the critical information item. In addition, when a CBA expires, the parties must maintain the terms and conditions at the status quo while negotiations take place. Which resource guides Facility Security Officers (FSOs) through the self-inspection process and provides techniques to improve the quality of self-inspections? dixie county times newspaper. (1)Notwithstanding the debarment, suspension, or proposed debarment of a contractor, agencies may continue contracts or subcontracts in existence at the time the contractor was debarred, suspended, or proposed for debarment unless Insider Threat Program Senior Official (ITPSO). The Wage and Hour Division of the DOL has created a standard form (WH-347) that contractors can use to submit the information. This material may be considered attorney advertising in some jurisdictions. Although the EO and the corresponding regulations apply only to large-scale construction projects, the wording of both the EO and the implementing rules reiterate federal contracting agencies are not prohibited from requiring PLAs on projects that do not fall within the $25-million threshold. How is the FSO notified that a cleared employee may be due for a periodic reinvestigation? We need to identify an adversary's capability. ; Order the DE 542 form from our Online Forms and Publications. According to the DCAA, [T]imekeeping procedures and controls on labor charges are areas of utmost concern. One area of the DCAAs attention is whether the contractor has a timekeeping system to track an employees time spent on each work activity. Before conducting an interview with an employee that could lead to disciplinary action, the employee is entitled to union representation during the interview upon request. Risk of civil and criminal exposure also exist under the False Claims Act if a contractor knowingly allows employees to make false charges in connection with a federal contract. The acronym EAP stands for _______________ ? During a periodic reinvestigation of a cleared individual, During the applicants initial PCL investigation, Only when the applicant is seeking Top Secret clearance eligibility. A successor contractor can satisfy its obligation to provide the same health insurance benefits of the predecessor contractor by matching the benefit. [ ], u.s. government employees and contractors must report which of the following. -efforts to obtain -all answers in. DoD Insider Threat Awareness Quiz_ Nov 2022 (Answered). ; Use the DE 542 Print Specifications (PDF) to generate an alternate form. In addition to withdrawal liability, other statutory liabilities applicable to the MPPs include the PPA. look at your operation from both the friendly and adversary perspectives. When she returned, she found a member of the cleaning crew straightening the classified documents on her desk. When is an applicant required to submit fingerprints in addition to his/her security application? contractors must report which of these select all that apply. Within the first six months after eligibility is granted. One purpose of the National Industrial Security Program (NISP) is to preserve our nations economic and technological interests. As just one example, changing the design of a tile floor is much easier to do before the tile is ordered, rather than after it's installed. Which international standard has recently been developed to address the socially responsible behavior of firms? -Over the phone D.EO 13502 (Use of Project Labor Agreements for Federal Construction Projects). C.EO 13496 (Notification of Employee Rights under Federal Labor Law). The primary source of data for these AAP analyses is race and gender data collected through pre- and post-offer applicant and employee invitations to self-identify. -Actual, probable, or possible subversive activities 6286 0 obj
<>/Filter/FlateDecode/ID[<2EB85691B785E04CA2BDC113E686BC84>]/Index[6275 20]/Info 6274 0 R/Length 76/Prev 582482/Root 6276 0 R/Size 6295/Type/XRef/W[1 3 1]>>stream
Contractors Active duty military Former employees (select all 4 answers) Which of the following is a reportable behavioral indicator? Contractors located in U.S. territories (outside of the United States) should contact the OFCCP Helpdesk at 1-800-397-6251 for assistance with registering. Every contractor or subcontractor who performs work covered by the DBA/DBRA must post an Employee Rights under the Davis-Bacon Act poster at the worksite. While imminent threats should be reported directly to the FBI, employees should use their agencys or facilitys reporting procedures to report other threats through their chain of command. = 2 1/4. The domestic delivery services approved for overnight domestic delivery of Secret and Confidential information are listed in the ______________________. Who might be interested in non-public information that an insider can provide? There are two types of business insurance that all subcontractors should have: general liability and workers compensation. Grievances: As the union should not direct any grievances to the government client, consider including a provision stating that the union will only use the procedure in the CBA to raise and remedy grievances and not direct any grievances to the government client. A coworker shares that she and her husband are facing foreclosure, and she doesn't know what to do. When the host organization approves a visit request, this approval constitutes _____. Unauthorized receipt of classified material. contractors must report which of these to the insider threat program select all that apply Contractors must report the following to the insider threat program: Efforts to obtain unauthorized access to classified or proprietary information. F.EO 13658 (Minimum Wage for Contractors). possess the ability to acquire and exploit our critical information. The transfer of classified or proprietary information to a system not approved for the classification level or unaccredited or unauthorized systems, individuals, applications, or media is a _________________. 2. Because each adversary may have different intentions and capabilities, you may need to enact different scenarios for different adversaries. What should you do? This answer has been confirmed as correct and helpful. Step 2: Create new tags and tag transactions. Affirmative Action, OFCCP and Government Contract Compliance, Corporate Governance and Internal Investigations, Restrictive Covenants, Trade Secrets and Unfair Competition, Disability Access Litigation and Compliance, Diversity and Inclusion Efforts that Really Work, Drug Testing and Substance Abuse Management, Environmental, Social and Governance (ESG), OSHA's COVID-19 Vaccination and Testing Emergency Temporary Standard, Employee Rights under the Davis-Bacon Act, E-Verify Manual for Federal Contractors and Subcontractors, Federal Funding Accountability Transparency Act Subaward Reporting System, Labor Board Reinstates Standard Restricting Employee Severance Agreements, Top Five Labor Law Developments for January 2023, Illinois Paid Leave for All Workers Act is Ready for Governors Signature, Name, address, and Social Security Number of each employee, Hourly rates of pay and contributions for fringe benefits or their cash equivalents, If applicable, detailed information on fringe benefits and approved apprenticeship or trainee programs. The E-Verify federal contractor rule only affects federal contractors who are awarded a new contract on or after the effective date of the rule, September 8, 2009, that includes the Federal Acquisition Regulation (FAR) E-Verify clause (73 FR 67704). Any form of violence Directed at an individual or group For a specific reason A member of your team openly discusses her financial difficulties and her inability to meet her financial obligations. Contact Us! 2020 Jackson Lewis P.C. Provide for the early detection and referral of potential espionage cases. contractors employees active duty military The definition of Targeted Violence includes which of these components? You may also request proof of automobile insurance if the sub has their . The NISP ensures that restrictions on continuous monitoring activities are in place before any classified work may begin. Which investigation is used for a periodic reinvestigation of an individual possessing a Secret or Confidential clearance eligibility? Additionally, such employers must follow non-discrimination and related provisions, as well as comply with a host of recordkeeping, data collection, and technical obligations. Conduct counterintelligence investigations for the U.S. DoDM 5200.01, Volume 1, Enclosure 3, DoD Information Security Program. Select all that apply. A member of your team openly discusses her financial difficulties and her inability to meet her financial obligations. -is what's meant by the phrase "The domesticated generations fell Weegy: A suffix is added to the end of a word to alter its meaning. Additionally, you must also pay the matching employer portion of social security and Medicare taxes as well as pay unemployment tax on wages paid to an employee. -Report the indicator to your security office. Once again, you can see how important communication is to successfully working with contractors, whether inside your home or on your exterior home improvement project. Maintain list of militarily critical technology. When an insider becomes a threat, it can have far-reaching consequences on both an organization and national security. a. U.S. Government employees and contractors must report which of the following? c. reporting required information. Suspected compromise of classified information. Office of the Director of National Intelligence (ODNI), works for a company with a Facility Clearance (FCL), requires access to classified information. OPSEC differs from other programs because it requires you to look at yourself through the eyes of the adversary. Assessing a vulnerability in conjunction with the threat, and then determining the impact this would have on an operation if the vulnerability is exploited determines the level of risk. Which form should the company receive with the contract that provides specific guidance about what information is classified and at what classification level? Which of the following BEST identifies the goal of OPSEC? Which of the following are Counterintelligence Special Agent (CISA) responsibilities? -Allowing large amounts of data to be accessed What is a final security control in the NISP when the purpose of a visit has been accomplished? Select all that apply. This is known as the duty to bargain. This will allow the contractor to understand the extent to which the PLA will affect the costs of the work and bid accordingly. The chief statutory sources of liability to an MPP pension fund beyond the contributions required under the CBA are: (1) the withdrawal liability rules in Title IV of ERISA; (2) the Pension Protection Act of 2006 (PPA); and (3) the minimum funding rules. What is the preferred method of assessing the risk to your organization? Visitors Facility Security Officer (FSO), DSS Headquarters Industrial Security Integration and Application (IP) Programs. Select all that apply. This material is provided for informational purposes only. . -Bypassing technology-associated protocols No specific procedure is required and, if a grievance cannot be resolved, the employer is not required to arbitrate the grievance. An advantage of incorporating the use of OPSEC surveys is that it. The dynamic nature of our site means that Javascript must be enabled to function properly. When an employee no longer needs access to classified information, who is responsible for removing access and debriefing the employee? -Improper use of privileged access Where can elicitation techniques be used? On January 1, 2020, the rate was increased to $10.80 an hour. For construction contractors, there is no employee-count threshold. ____________ are like pieces of a puzzle an adversary uses to reveal a picture of our operations. Increase its output. Contractors may decide whether they want to use E-Verify for all new hires and all existing non-exempt employees assigned to a federal contract, or for their entire non-exempt workforce (all new hires and all existing employees) throughout the entire company. Which of the following are true about insider threats? Select all that apply. -In written communications Give the group a name. The Cognizant Security Office (CSO) does which of the following? Recipients should consult with counsel before taking any actions based on the information contained within this material. A cleared U.S. company received a request to sell export-controlled technology to an Eastern European security organization. Focused on labor and employment law since 1958, Jackson Lewis P.C. Only costs incurred in maintaining a satisfactory relationship between the contractor and its employees, including costs of union stewards and labor management committees, are allow for payment. Companies doing business with the federal government must comply with a litany of complex laws and regulations that affect their day-to-day business operations. Why should organizations use and practice OPSEC? 2e9Th)0vo
Vq -,234b3##V\;h6 !f$eE63F $tN8a *qjcE. If the contractor also has at least 50 employees, it must annually prepare a written AAP for each establishment with at least 50 employees. User: 3/4 16/9 Weegy: 3/4 ? U. S. government employees and contractors must report which of the following? Read the publication. A CBA may not provide for less paid sick leave than required by the EO. b. Changes in a facility's storage capability are reported how?