Personnel security policy
Terms in this set (50)
implements the personnel security program withihn the DoD
Intelligence community directive 704 (ICD 70)
establishes policy governing eligibility for access to SCI
Executive order 10450
governs civilian emplyees
established standard personnel security program for the executive branch
appoints director of the office of Personnel management shall serve as the suitability executive agent
elements of personnel security program
5. continuous evaluation
designation of sensitive duties
these are duties that have a great impact on national security
this is used to monitor employees for new information or changes that could affect their status
this is part of the CEP. it is done at certain intervals based on duties or access
a report is generated from this that contains information about an individual who has been selected for special duties. the report is used to evaluate the individual for eligibility
a judgment concerning security clearance eligibility is made by evaluating the information in the PSI with DoD standards.
civilian personnel designations
four types of security briefing
destruction copies of PSI reports
destroy favorable reports
destroy unfavorable reports
incomplete dod affiliation destroy
admin determination that allows temp access pending final adjudication by CAF
Department of Defense Consolidated Adjudications Facility
The goal of the DoD Personnel Security Program is to ensure the protection of national security
The level of classification of information is not determined by the degree of damage to national security that could result from its unauthorized disclosure
The Hatch Act is considered the beginning of the present day Personnel Security Program because it is the first to focus on which one of the following characteristics the U.S. governments expects in its cleared employees?
DoD 5200.2R mandates and regulates the DoD Personnel Security Program and its major elements.
The DoD Personnel Security Program employs a comprehensive background investigative process to establish whether an individual is willing and able to carry out their security responsibilities
Which element of the Personnel Security Program involves evaluating the information contained in reports of personnel security investigations (PSIs) and other source documents?
A Limited Access Authorization (LAA) can be granted to civilian, military, or contractor personnel
Which element of the Personnel Security Program is conducted at certain intervals (based on an individual's duties or access) or on a case-by-case basis when unfavorable information about an individual arises?
Which of the following statements is correct regarding a civilian position that includes duties of varying levels of sensitivity?
The highest level of duty sensitivity determines the position's sensitivity
Which of the following civilian position sensitivity designations is applied to positions that include duties with a need to access "Secret" information?
non Critical sensitive
Which of the following civilian position sensitivity designations is typically associated with fiduciary duties requiring the highest degree of public trust
a position may be designated as critical-sensitive even though the position does not have any requirement for accessing classified information
Which of the following briefings is provided to personnel who have recently been approved and granted access to classified information?
Which of the following briefings is provided to personnel to remind them of their responsibilities under the Personnel Security Program and inform them of changes to the Personnel Security Program?
Informing personnel of how foreign intelligence services target U.S. personnel in foreign countries and how to notify U.S. security officials if approached by a foreign intelligence service are part of which type of briefing?
Foreign Travel Briefing
The holder of classified information is responsible for determining a person seeking access possesses an appropriate security clearance and a valid need to know
The Security Office uses e-QIP to initiate the personnel security investigation process
The need for regular access to classified information establishes the need for a security clearance.
Access to classified information is granted to an individual with __________.
A security clearance and an official need-to-know
The first phase of the investigative clearance process involves _________.
The initiation and completion of a personnel security investigation
Civilian in non-sensitive positions may receive security clearances
Ease of movement within a facility is an appropriate justification for obtaining a security clearance
___________ regulate(s) the federal government's authority to collect personal information on an individual
Privacy Act of 1974
A/an __________ is given each and every time information is collected from an individual during the personnel security investigation.
Privacy Act Advisement
DoD uses the personnel security investigation process to collect personal information about an individual for all of the following purposes except _________.
Assignment to sensitive duties
__________ is the investigative agency with the responsibility for conducting background investigations for the Department of Defense
The DoD CAF makes __________ after careful weighting of a number of variables known as the whole person concept against the adjudicative standards.
Making a final security determination is the responsibility of the local commander
The ultimate determination of whether the granting of eligibility for a security clearance is clearly consistent with the interests of national security must be an overall common sense determination based upon the careful consideration of the adjudication guidelines.
Information collected during the personnel security investigation is evaluated against the adjudication guidelines using the whole person concept
YOU MIGHT ALSO LIKE...
Series 7 Top-Off Exam Preparation | Knopman Marks Guide
SPēD SAPPC: PERSEC
SAPPC - Personnel Security
OTHER SETS BY THIS CREATOR
SM qtr 2nd qtr
NKO Basic first aid
Stepp dod security policies principles and programs
THIS SET IS OFTEN IN FOLDERS WITH...
SPēD SFPC: All Areas
SPēD SFPC: PERSEC
SPēD SFPC: General
SPēD SFPC: INFOSEC