contractors must report which of these select all that apply

By

contractors must report which of these select all that apply4 types of assertions convention fact opinion preference examples

What is the appropriate action? The 20-year limitation on annual payments does not apply in the event of a mass withdrawal; this can result in the employer making withdrawal liability payments in perpetuity. A successor contractor will be required to pay the hourly wage rates in the CBA and any wage increases that occur during the first year of the contract. Existing paid time off (PTO) policies may be acceptable satisfaction of these obligations if they comply with all of the elements of EO 13706. User: 3/4 16/9 Weegy: 3/4 ? Jack is his organizations Facility Security Officer. Select all that apply. Select all that apply. Physical security systems provide the means to counter threats only during wartime. determine the collection methods the adversary is using against you. Select ALL the correct responses. When she returned, she found a member of the cleaning crew straightening the classified documents on her desk. -report the concerning behavior to your security officier Most inside offenders display concerning behaviors before acting directly against their organization. The poster must be displayed in a prominent and accessible place where it can be seen easily by employees. The chief statutory sources of liability to an MPP pension fund beyond the contributions required under the CBA are: (1) the withdrawal liability rules in Title IV of ERISA; (2) the Pension Protection Act of 2006 (PPA); and (3) the minimum funding rules. The Construction Agreement. Service Contract Act (SCA) Section 4c requires service contractors to comply with prevailing wage determinations and minimum fringe benefit payments. While imminent threats should be reported directly to the FBI, employees should use their agencys or facilitys reporting procedures to report other threats through their chain of command. -Use strong passwords t. e. Affirmative action in the United States is a set of laws, policies, guidelines, and administrative practices "intended to end and correct the effects of a specific form of discrimination" [1] that include government-mandated, government-approved, and voluntary private programs. -efforts to obtain -all answers all of these are correct D.EO 13502 (Use of Project Labor Agreements for Federal Construction Projects). [ ] Expert answered| soumen314 |Points 17764| Hes not sure if he should report it, but he knows it is better not to report an incident or behavior than to make a potentially false report. Contractors who participate in a multiemployer pension plan (MPP) through a CBA may be subject to significant liabilities created by statute. An advantage of using good OPSEC principles during contingencies is that it. ; Use the DE 542 Print Specifications (PDF) to generate an alternate form. Once the contractor has obtained facility clearance, it can request the applicable security clearance for its employees. What should you do? True or false? ; Order the DE 542 form from our Online Forms and Publications. d. The company just lost its largest contract and has filed for bankruptcy. = 2 1/4. Union Security: Unions often request inclusion of a provision requiring union membership (or the payment of dues and fees by nonmembers) as a condition of employment. The DCAA is concerned with identifying and evaluating all contractor activities that contribute to or have an impact on the costs of government contracts. The E-Verify system must be used for checking the eligibility of individuals only after the employee has been offered and has accepted the job. Profitability Former U.S. Each payroll submitted must include a Statement of Compliance, which is provided in the WH-347. -Improper use of privileged access Sam is a Facility Security Officer for a cleared defense contractor. -Contractors Select all that apply. Information Security Oversight Office (ISOO). Government employees temporarily stationed at a contractor facility ______ control of their work products to the contractor. The security requirements of the contractors home facility, The security requirements of the host activity/facility. -Actual, probable, or possible subversive activities Select ALL the correct responses. (Incorrect, there were more choices). Phovoir/Shutterstock. 8% effective tax rate, during the first quarter of fiscal 2022 compared to $132 laborer or mechanic is so employed, wages include compensation, at a rate not less than one and one-half times the basic rate of pay, for all hours worked . c. The company is moving to a new location to meet the needs of its growing staff. Only costs incurred in maintaining a satisfactory relationship between the contractor and its employees, including costs of union stewards and labor management committees, are allow for payment. -Gather information on personnel What type of violation has occurred? You can help reduce technology-associated insider threats by: Eliminating accessing data through portable devices (Incorrect). If the contractor also has at least 50 employees, it must annually prepare a written AAP for each establishment with at least 50 employees. Schedule of Implementation. It also requires: (1) inclusion of sexual orientation and gender identity in EEO Taglines where protected statuses are listed (rather than abbreviated Taglines), and (2) posting of updated EEO is the Law posters. In a right-to-work state, such provisions are prohibited unless the worksite is a federal enclave, meaning, it is exclusively subject to federal (and not state) law. -Actual, probable, or possible terrorism. Depending on a number of factors, including the extent of common ownership and control, AAP obligations also may extend to other related companies. -A desire to appear well-informed Similarly, instead of making contributions to a union-sponsored pension plan, the contractor can make the contributions to its companys 401k or a similar retirement plan. The terms of a CBA apply to all employees in the bargaining unit, regardless of whether they join the union. Contractors with federal contract awards of at least $5 million (entered into on or after December 12, 2008) are subject to Federal Acquisition Regulation ethics rules. Because there are so many different types of construction projects, each type of construction contract exists to satisfy the varying needs of all parties involved. Select ALL the correct responses. Which step in the OPSEC process requires you to look at your operation through the eyes of the adversary? Further, payments to a contractor or subcontractor may be withheld by the funding agency to cover unpaid wages or penalties that result from overtime payment violations. Failure to do so will result in a perfectly clear successorship, which would bind the successor contractor to all the terms of the previous contractors CBA. This places the current contractor at a distinct disadvantage by permitting its competitors to avoid the effect of SCA Section 4c and bidding a lower price. Significant change in work habit To whom should you report if you are contacted by a member of the media about information you are not authorized to share? prioritize the distribution of resources for applying countermeasures. Which international standard has recently been developed to address the socially responsible behavior of firms? Select all that apply. = 15 * 3/20 -Over the phone Which of the following items must the FSO report to the PSMO-I? Whether or not a Bridge Agreement is negotiated, a successor employer has an obligation to meet with the union and negotiate in good faith for a CBA. Which of the following is reported to PSMO-I? The contractor also must post the applicable Wage Determination. . In addition, there is a Building and Construction Industry exception for withdrawal liability that allows an employer in that industry to avoid incurring withdrawal liability if they cease performing any services within the jurisdiction of the CBA. For construction contractors, there is no employee-count threshold. Which of the following are things that adversaries want to know? We need to identify an adversary's intent. = 2 5/20 When is it appropriate for the visitors organization to submit a visit authorization letter (VAL)? What should you do? What factor takes into account the impact that a compromise would have on your operation? ____________ are like pieces of a puzzle an adversary uses to reveal a picture of our operations. The Weegy: A modal verb (also modal, modal auxiliary verb, modal auxiliary) is a type of auxiliary verb that is used to U. S. government employees and contractors must report which of the following? Personnel security clearance investigation stage, Initiate personnel security clearance process stage. The five main types of construction contracts are lump sum, time and materials, cost-plus, unit price, and guaranteed maximum price (GMP). Patterns, stereotypes, and predictable actions are all types of which of the following? 5.1 Overview of the evaluation and selection of contractors. Select all that apply. Post Author: Post published: 16 juin 2022; Visitors Facility Security Officer (FSO), DSS Headquarters Industrial Security Integration and Application (IP) Programs. Anna is her organizations Facility Security Officer. In order to determine our critical information, we need to consider both the friendly and adversary points of view. Who must submit the RFV when a foreign national needs to visit a U.S. contractor facility to discuss classified information? There is no evidence that anyone had access to the material while she was out, but nobody can confirm that the materials were safe from disclosure. The transfer of classified or proprietary information to a system not approved for the classification level or unaccredited or unauthorized systems, individuals, applications, or media is a _________________. U.S. Government employees and contractors must report the following: Personal foreign travel; foreign contacts; speeches or books including information about involvement with the intelligence community. Company ABC was recently issued a facility clearance and has been awarded its first classified contract. Security control measures are the responsibility of the Government Contracting Activity. Every contractor or subcontractor who performs work covered by the DBA/DBRA must post an Employee Rights under the Davis-Bacon Act poster at the worksite. According to the DCAA, [T]imekeeping procedures and controls on labor charges are areas of utmost concern. One area of the DCAAs attention is whether the contractor has a timekeeping system to track an employees time spent on each work activity. State the period of time the requested waiver will cover. Select all that apply. 8-100d. Events that require the facility to be open outside of regular business hours, Events that affect the proper safeguarding of classified information, Any change in the number of GSA security containers being used at the contractor facility to protect classified information, An increase or decrease in the number of classified documents stored at the contractor facility. Which of the following is NOT a step in the OPSEC process? As with EO 11246, VEVRAA imposes a number of technical obligations, including the listing of job openings with the state workforce agency in the state where the opening occurs. Which of the following must be reported to the Defense Counterintelligence and Security Agency and the FBI? possess the ability to exploit our critical information. Many successor contractors negotiate a Bridge Agreement or a new CBA with the union that represented employees of the previous contractor. Which of the following is a secure online environment offered by the OPM Center for Federal Investigative Services? In all cases, these events should be recorded in the contractor's property management system. A Bridge Agreement is designed to be short-term to fill the gap until a completely new CBA can be negotiated. Once a successor contractor establishes its initial terms and conditions of employment, the contractor may only make changes to those terms of employment (called the status quo) after bargaining with the union and reaching an agreement or bargaining in good faith to impasse. Contractors must recognize that their obligations under these laws and executive orders also apply to their subcontractors. Refusal to execute Standard Form (SF) 312. Which of the following provides policy about PCLs and defines access criteria? Where can elicitation techniques be used? -Hoarding files and data Knowledge of the threat supports all other steps in the OPSEC process. Although the EO and the corresponding regulations apply only to large-scale construction projects, the wording of both the EO and the implementing rules reiterate federal contracting agencies are not prohibited from requiring PLAs on projects that do not fall within the $25-million threshold. the contractor's record of- (1)Conforming to requirements and to standards of good workmanship; (2)Forecasting and controlling costs; (3)Adherence to schedules, including the administrative aspects of performance; (4)Reasonable and cooperative behavior and commitment to customer satisfaction; (5)Complying with the requirements Which of the following countermeasures can you implement to help reduce technology-associated insider threats? B.EO 13494 (Economy Government Contracting). Where are actions, such as Personnel Security Clearance terminations, upgrades, downgrades, and reinstatements, on contractor employees entered? Who makes the interim eligibility determination? When an insider becomes a threat, it can have far-reaching consequences on both an organization and national security. Which of the following statements BEST describes the risk status if any one element of risk shrinks to zero? Companies doing business with the federal government must comply with a litany of complex laws and regulations that affect their day-to-day business operations. Maintain list of militarily critical technology. ], Witch one of the following statements best characterizes Arnold s view of world, WHICH OF THE FOLLOWING STATEMENTS IS TRUE ABOUT TECHNOLOGY AND INSIDER THREAT. The Drug-Free Workplace Act of 1988 (DFWA) requires certain federal contractors to agree to provide drug-free workplaces as a condition of receiving a contract from a federal agency. Select all that apply. Simonne left a safe containing classified material open while she went out for lunch. allows for any changes in OPSEC factors over time. Prior results do not guarantee a similar outcome. To whom may eligibility decisions be appealed if the DoD CAF denies eligibility? Contractors must report which of these? If a successor contractor timely disavows the previous contractors CBA, it may establish its own terms and conditions of employment, subject to honoring the wages and covered fringe benefits of the CBA required by Section 4c of the SCA as discussed above. That's why we put together the global hiring guide.But here's a quick recap of five common scenarios for US companies hiring independent contractors both locally and abroad. Which step in the OPSEC process is a decision making step because it helps the decision maker prioritize and decide whether or not to apply a countermeasure? . As defined in the NISPOM, ______ is the administrative determination that an individual is eligible for access to classified information. Under the final regulations, which became effective on January 11, 2016, employers entering into new contracts (or modifying existing contracts) after January 11, 2016, must incorporate proscribed nondiscrimination language into their nondiscrimination policies, as well as have required postings on their websites and in their workplaces. A company cleared at the Secret level hires a new employee. Which government entity is responsible for providing National Industrial Security Program (NISP) policy direction? Information System Security Professional/Security Control Assessor (ISSP/SCA), Information System Security Manager (ISSM). NATO briefings require a signed certificate. The __________________ develops and implements a facilitys security program. This will allow the contractor to understand the extent to which the PLA will affect the costs of the work and bid accordingly. Arbitration: Consider a provision that limits the arbitrators authority. In order to make the bid/no-bid decision, there are a number of factors to consider to make an objective, rather than a subjective, decision. Which of the following statements is true about technology and the insider threat? defines the initial requirements for the product/service. EO 13672 prohibits discrimination based on sexual orientation and gender identity. To promote an environment in which federal contracts for goods or services will be performed by contractors whose work will not be interrupted by labor unrest, President Barack Obama signed into law a mandate that federal contractors inform employees of their rights under the NLRA. If after a contractor has a duty to bargain and before a CBA is negotiated, the contractor must discuss suspending or terminating an employee with the union before so doing, unless exigent circumstances exist. This need to be reported to the companys IS Rep? Generally, you must withhold and deposit income taxes, social security taxes and Medicare taxes from the wages paid to an employee. -In written communications Self-Inspection Handbook for NISP Contractors, Suggested Contract File Folder Headings job aid. DD Form 254, DoD Contract Security Classification Specification, Transportation, Delivery, and Relocation Solutions (TDRS), Schedule 48. Which resource guides Facility Security Officers (FSOs) through the self-inspection process and provides techniques to improve the quality of self-inspections? Here is a list of the most common construction contract documents, and what they include. -Any indication that classified information has been lost or compromised. Industrial Security Facilities Database (ISFD), National Industrial Security Program Operating Manual (NISPOM). -In email One such requirement, defined in the NISPOM, states that contractors must report certain events to the appropriate government agencies, that may have an effect on the status of the entity's or an employee's eligibility for access to classified information. %PDF-1.6 % There are two types of business insurance that all subcontractors should have: general liability and workers compensation. When the visit is a contract-related classified visit, When the request needs to be submitted and approved quickly, When one or both organizations do not utilize the web-based DoD System of Record, When either the visitors or host organization does not utilize the Industrial Security Facilities Database. The ______________ has been designated as the Cognizant Security Office (CSO) for the DoD and over 30 other non-DoD agencies. Which type of security training typically informs cleared employees of changes or updates to security regulations? Which of the following roles are filled by contractor employees? The Cognizant Security Office (CSO) does which of the following? To protect the integrity of their mission. In addition, general contractors are liable for complying with hazardous materials requirements (section 10.3). Hostile entities may use social media to _______________ ? DD Form 254, Department of Defense Contract Security Classification Specification, DD Form 441, Department of Defense Security Agreement. Of the following types of personnel-related information, which is NOT reported to PSMO-I? What are some of the indicators Adam should look out for? Union Access: Because a contractor is subject to its government clients requirements applicable to visitors, consider including a clause stating that any union representative who wants to visit the employers offices or other places of employment must comply with those requirements. They must implement written codes of business ethics and conduct, an employee awareness and compliance program, and an internal control system. The Secretary of Defense is the Executive Agent of the National Industrial Security Program and is responsible for overall implementation of the program. . In addition to the primary aspects of affirmative action compliance described above, covered contractors and subcontractors must prepare and submit both EEO-1 and VETS-4212 reports to the government annually. provides for early detection of OPSEC problems. -Actual, probable, or possible sabotage Although all private employers with at least 100 employees must prepare annual EEO-1 reports, covered contractors and subcontractors must identify themselves as such on those reports. The ATO is responsible for the writing of the AT plan. Select ALL the correct responses. OFCCP prescribes a specific form for inviting applicants and employees to self-identify for disabled status. Which of the following countermeasures may be necessary if routine activities provide an adversary with tip-offs to critical information? Weegy: Contractors must report the following to the insider threat program: Efforts to obtain unauthorized access to classified or proprietary information. assess the level of risk to your operation. The PPA creates additional contribution responsibilities for employers obligated to contribute to critical status or red zone MPPs and the minimum funding rules, which establish mandatory annual contribution requirements. What system may be used to verify a companys Facility Clearance status? Select all that apply. 1. The E-Verify federal contractor rule only affects federal contractors who are awarded a new contract on or after the effective date of the rule, September 8, 2009, that includes the Federal Acquisition Regulation (FAR) E-Verify clause (73 FR 67704). Insider Threat Program Senior Official (ITPSO). Bargaining impasse often is difficult to establish; the employer must demonstrate both that the parties are deadlocked and that further discussions likely will not lead to an agreement. contractors must report which of these select all that applymobile homes for rent in pontotoc, ms. stairway to heaven metaphor. The contractor also must certify annually to the contracting officer that it has implemented a compliant plan (including due diligence investigation) and that, to the best of its knowledge, it is not aware of any violations. An FCL is a determination made by the Government that a contractor is eligible for access to classified information. As just one example, changing the design of a tile floor is much easier to do before the tile is ordered, rather than after it's installed. . When is an SF 312, Classified Information Nondisclosure Agreement, executed? With a couple of exceptions, verification of employment must be completed within three business days after a newly hired employees start date. To issue a Facility Clearance (FCL), the Facility Clearance Branch (FCB) reviews which of the following? Objectives . When a bargaining impasse occurs, the employer may implement terms it proposed to the union during bargaining. What security control measures must the host organization implement for a classified meeting? -Unauthorized disclosure of classified material. To ensure any classified material that may be of use in a follow-on contract is transported securely to the visitors organization, To ensure that all classified material has been properly stored and inventoried. Which of the following includes all the steps necessary for processing a facility clearance and a list of the documents and information that the Facility Security Officer (FSO) must gather to prepare for the Facility Clearance Branch (FCB) telephonic survey? SF 312, Classified Information Nondisclosure Agreement. DoD 5200.8-R addresses the physical security of personnel, installations, operations, and assets of DoD Components. Contractors should check with their government contracting official or staff to clarify their obligations. An adversary's capability is defined as his ability to do which of the following? -Anything that affects the proper safeguarding of classified information The National Labor Relations Act (NLRA) governs the relationship between employers and the unions that represent their employees. Employees desiring not to perform on classified work, Change conditions affecting the facility clearance. How to verify need-to-know in the DoD System of Record before a classified discussion, Physical security procedures and access areas, Policy and procedures for transmitting and/or transporting classified material. The programs tend to focus on access to education and . Section 3-103 (a) concerns the contractor's insider threat program personnel. The Weegy: A modal verb (also modal, modal auxiliary verb, modal auxiliary) is a type of auxiliary verb that is used to contractors must report which of these to the insider threat program select all that apply, Contractors must report the following to the insider threat program: Efforts to obtain unauthorized access to classified or proprietary information. According to the NISPOM, espionage, sabotage, terrorism, or subversive activities should be reported as a(n) ___________________. Anyone who opposes or acts against your interest is called a(n), In analyzing the threat, we are concerned with adversaries that. Specific clearance and access requirements, Authorization to generate classified information, A method for denying an adversary access to our critical information. -Active duty military. What is the last step in the OPSEC process? makes OPSEC principles second nature to your employees. DBA states that all government construction contracts over $2,000 to which a federal agency or the District of Columbia is a party must include provisions for paying workers on-site no less than the local prevailing wages and benefits as set by the DOL. contractors must report which of these to the insider threat program select all that apply Contractors must report the following to the insider threat program: Efforts to obtain unauthorized access to classified or proprietary information. Affirmative Action, OFCCP and Government Contract Compliance, Corporate Governance and Internal Investigations, Restrictive Covenants, Trade Secrets and Unfair Competition, Disability Access Litigation and Compliance, Diversity and Inclusion Efforts that Really Work, Drug Testing and Substance Abuse Management, Environmental, Social and Governance (ESG), OSHA's COVID-19 Vaccination and Testing Emergency Temporary Standard, Employee Rights under the Davis-Bacon Act, E-Verify Manual for Federal Contractors and Subcontractors, Federal Funding Accountability Transparency Act Subaward Reporting System, Labor Board Reinstates Standard Restricting Employee Severance Agreements, Top Five Labor Law Developments for January 2023, Illinois Paid Leave for All Workers Act is Ready for Governors Signature, Name, address, and Social Security Number of each employee, Hourly rates of pay and contributions for fringe benefits or their cash equivalents, If applicable, detailed information on fringe benefits and approved apprenticeship or trainee programs. A cleared U.S. company received a request to sell export-controlled technology to an Eastern European security organization. According to section 10.2.8, the general contractor should report any work-related accident in writing to the owner, and will be responsible for any costs the owner incurs related to the accident. An insider threat is anyone with authorized access to the information or things an organization values most, and who uses that access, either wittingly or unwittingly, to inflict harm to the organization or national security.

Stormi Webster Age Birthday, Stephanie Birkitt Letters, How To Spot An Undercover Cop Australia, Articles C

contractors must report which of these select all that apply

contractors must report which of these select all that apply

contractors must report which of these select all that apply

contractors must report which of these select all that apply