contractors must report which of these select all that apply

The Davis-Bacon Act (DBA) establishes the requirement for paying prevailing wages on projects involving the construction, alteration, or repair (including painting and decorating) of public buildings or public works. To provide you with a holistic picture of your operation, To protect your operation by properly controlling classified information, To establish a systematic process to assess the requirements for mission success, To control information about your capabilities and intentions. Generally, the employers withdrawal liability obligation is satisfied by making annual payments determined by a formula intended to approximate the employers annual contributions to the MPP. contractors employees active duty military The definition of Targeted Violence includes which of these components? Report the concerning behavior to your security officer. 16/9 = Weegy: Whenever an individual stops drinking, the BAL will decrease slowly. %PDF-1.6 % c. Lower its output. While every CBA is unique in some respects, some sample provisions that should be considered in government contracting include: Government Supremacy/Rights: Because a contractor is subject to its government clients directives, consider a provision on the rules, regulations, directives, orders, or work statements that are, or may be, imposed by the government, including on removal of an employee, that will apply and not be subject to the grievance and arbitration procedure. To protect the integrity of their mission. This answer has been confirmed as correct and helpful. This behavior may include (select all that apply): -violation of workplace policies -failure to follow standard procedures (SOP) -legal difficulties Federal contractors must report the names and total compensation for the contractor's five most highly compensated officials and . 9 Essential Construction Contract Documents for Every Project The company has merged with another company and is under new ownership. The level of risk is indirectly proportional to all three factors of risk. When dealing with countermeasure development, what is the bottom line? Select all that apply. True or false? If you are contacted by a member of the media about information you are not authorized to share, you should take down which of the following details? -Speeches or books including information about involvement with the Intelligence Community An insider threat is anyone with authorized access to the information or things an organization values most, and who uses that access, either wittingly or unwittingly, to inflict harm to the organization or national security. According to the DCAA, [T]imekeeping procedures and controls on labor charges are areas of utmost concern. One area of the DCAAs attention is whether the contractor has a timekeeping system to track an employees time spent on each work activity. The EO gives federal agencies the authority to require contractors to enter into PLAs for large-scale construction projects, each of which is a project with a total cost exceeding $25 million. Which of the following statements is true about technology and the insider threat? Which of the following, when looked at by itself or in conjunction with something else, can point to a vulnerability that an adversary can exploit? Assessing a vulnerability in conjunction with the threat, and then determining the impact this would have on an operation if the vulnerability is exploited determines the level of risk. Security control measures are the responsibility of the Government Contracting Activity. Provide for the early detection and referral of potential espionage cases. Generally, you must withhold and deposit income taxes, social security taxes and Medicare taxes from the wages paid to an employee. This would be impractical unless the contractor chooses to adopt the CBA and the health insurance was provided through a union-sponsored plan. These blank check provisions can result in contractual withdrawal liability and exit fees (in pension and welfare plans), midterm contribution increases, and special assessments, among other midterm surprises. Select all that apply. _____ describes the level of information to which a person is authorized access based on a background investigation. The FSO submits the applicants completed SF-86 using which of the following? It also should state that the employer is not required to terminate the employee until a replacement has been hired, cleared, and trained. Select all that apply. NATO briefings require a signed certificate. OPSEC is a systematic, proven process to identify, control and protect classified information about a mission, operation or activity, and, thus, denying/mitigating adversary's ability to compromise/interrupt that mission, operation or activity. Select ALL the correct responses. = 2 1/4. For construction contractors, there is no employee-count threshold. Given this, and the effect PLAs can have on labor and other project costs, contractors submitting bids on construction projects should diligently review each contract solicitation to determine if a PLA will be required. 1:43 pm junio 7, 2022. raquel gonzalez height. -Threat can include unathorized disclosure of national security information or through the loss or degradation of department resources or capabilities. In a right-to-work state, such provisions are prohibited unless the worksite is a federal enclave, meaning, it is exclusively subject to federal (and not state) law. A Bridge Agreement usually is based on the previous contractors CBA with changes to the provisions that do not apply or do not work for the new contractor for business reasons. Security officials should seek out and consider threat information only from official, government sources. Further, if no agreement is reached and incorporated by the government client, and the U.S. DOL does not replace the Wage Determination before the contract is rebid, other prospective bidders may only be required to comply with the Wage Determination. Government employees temporarily stationed at a contractor facility ______ control of their work products to the contractor. Prime contractors must meet certain reporting requirements before they are able to submit a bid that valued at $50 million or more as of the year 2016. Please read our. Who sponsors classified meetings in the NISP? Grievances: As the union should not direct any grievances to the government client, consider including a provision stating that the union will only use the procedure in the CBA to raise and remedy grievances and not direct any grievances to the government client. Significant change in work habit To whom should you report if you are contacted by a member of the media about information you are not authorized to share? Always develop countermeasures on a first-come, first-served basis, Always apply a unique countermeasure to each vulnerability, Always think of a countermeasure as a smarter way to do a task, Always weigh the cost of the countermeasure against its benefit, Identifying what an adversary already knows about your operation helps you to. initiative combines industry-leading health and safety standards with virtual technologies designed to keep real estate moving forward, and give our employees, customers and partners confidence and support to stay safe. To promote economy and efficiency in government contracting, President Barack Obama declared certain labor relations costs (those not directly related to a contractors provision of goods or services to the government) not eligible for reimbursement or payment by the contracting agency. B.EO 13494 (Economy Government Contracting). Select all that apply. a. You can help reduce technology-associated insider threats by: Eliminating accessing data through portable devices (Incorrect). Anna is her organizations Facility Security Officer. Training records management: Contractors must create and maintain records of all employee insider threat awareness programs initial and refresher training and those records must be available for review during DSS security vulnerability assessments. OPSEC differs from other programs because it requires you to look at yourself through the eyes of the adversary. Under these rules, an employer who completely or partially withdraws from the MPP is liable for their allocable share of the MPPs unfunded vested benefits. The request must state the specific Contractor Health and Safety Requirement to be waived. Contractors with a federal acquisition contract or subcontract must apply 15 basic cybersecurity safeguarding requirements and procedures to protect federal contract information. The requirements are based on security requirements published in the National Institute of Standards and Technologys (NIST) Special Publication (SP) 800-171, Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations. Specific requirements are in FAR Subpart 4.19 and FAR Clause 52.204-21. 10 Things Your Contractor Really Wants You To Know - Family Handyman Patterns, stereotypes, and predictable actions are all types of which of the following? Your Next Move Starts Here - Stay Informed and Inspired U. S. government employees and contractors must report which of the following? Interference and discrimination based on the use of sick leave are prohibited. Of the following types of personnel-related information, which is NOT reported to PSMO-I? fj45 for sale alberta; nilgai hunting yturria ranch; contractors must report which of these select all that apply; sales hunter interview questions. WINDOWPANE is the live-streaming app for sharing your life as it happens, without filters, editing, or anything fake. (Select all that apply.). When is an SF 312, Classified Information Nondisclosure Agreement, executed? WINDOWPANE is the live-streaming app for sharing your life as it happens, without filters, editing, or anything fake. The following are some of the Executive Orders currently in effect that have significant implications for federal contractors. EO 13706 applies to the following types of federal contracts: The EO requires contractors to provide covered employees one hour of paid sick leave for every 30 hours worked on or in connection with a covered federal contract or subcontract. It also requires: (1) inclusion of sexual orientation and gender identity in EEO Taglines where protected statuses are listed (rather than abbreviated Taglines), and (2) posting of updated EEO is the Law posters. makes OPSEC principles second nature to your employees. [ Any contact that suggests the employee may be the target of attempted exploitation by the intelligence service of another country. An interim eligibility determination grants the applicant permanent access to classified information by bypassing the remainder of the PCL process. The company has hired 12 new employees to support a new major contract. Loss, compromise, and suspected compromise of classified information are reported how? Of the scenarios listed below, which ones must be reported to your IS Rep as change conditions affecting the facility's clearance? When cleared contractors visit a cleared facility or government installation, whose security requirements take precedence? d. The company just lost its largest contract and has filed for bankruptcy. When the successor contractor initially solicits the predecessor contractors employees for employment, it must state that the contractor will not be honoring the prior contractors CBA if the contractor does not wish to be bound by it. Failure to do so will result in a perfectly clear successorship, which would bind the successor contractor to all the terms of the previous contractors CBA. -Foreign contacts Select ALL the correct responses. -Any event that may impact an individual's personnel security clearance -Any event that may impact the status of the facility -Anything that affects the proper safeguarding of classified information -Any indication that classified information has been lost or compromised Select all that apply. Independent Contractor Reporting - Employment Development Department The NISP ensures that restrictions on continuous monitoring activities are in place before any classified work may begin. Which of the following is considered a potential insider threat vulnerability? (Incorrect, there were more choices). Recipients should consult with counsel before taking any actions based on the information contained within this material. contractors must report which of these select all that apply. He is working with other company officials to identify the organizations assets. contractors must report which of these select all that apply. Which of the following is an objective of the DSS CI Directorate? 8% effective tax rate, during the first quarter of fiscal 2022 compared to $132 laborer or mechanic is so employed, wages include compensation, at a rate not less than one and one-half times the basic rate of pay, for all hours worked . Identifying a unit based upon how they deploy their equipment is an example of. Every contractor or subcontractor who performs work covered by the DBA/DBRA must post an Employee Rights under the Davis-Bacon Act poster at the worksite. -Bypassing technology-associated protocols An advantage of incorporating OPSEC principles in the planning stage of any operation is that it. -In person. Here is a list of the most common construction contract documents, and what they include. -is what's meant by the phrase "The domesticated generations fell Weegy: A suffix is added to the end of a word to alter its meaning. Once the contractor has obtained facility clearance, it can request the applicable security clearance for its employees. How many steps are there in the OPSEC process? What Is Form 1099-NEC. In order to make the bid/no-bid decision, there are a number of factors to consider to make an objective, rather than a subjective, decision. The Government Funding Transparency Act of 2008 (GFTA) requires the Office of Management and Budget (OMB) to establish a free, public website containing full disclosure of all federal contract award information. For more information, visit https://www.jacksonlewis.com. Facility employees may be processed for personnel security clearances concurrently with the processing of, or after the award of, a facilitys FCL. contractors must report which of these select all that apply Select all that apply. Why do we need to have threat information? Employers need not pay for unused accrued leave upon an employees separation from employment. What system may be used to verify a companys Facility Clearance status? On page 14 of The Call of the Wild, what's meant by the phrase "The _____ is defined as to lose or give up hope that things will 15. This places the current contractor at a distinct disadvantage by permitting its competitors to avoid the effect of SCA Section 4c and bidding a lower price. Compliance Documents You Should Be Collecting from Your - Premier Who administers and oversees the contractor security program? -In written communications Which of the following items must the FSO report to the PSMO-I? A successor contractor for a contract to provide services of a predecessor contractor with a collective bargaining agreement (CBA) in place which replaced the U.S. Department of Labors (DOL) Wage Determination for the contract must honor the wage rates and covered fringe benefit provisions of that CBA for the first year of the contract. During which stage of the personnel security clearance process are the thirteen guidelines used? Select all that apply. Physical security controls for the control of, access to, and dissemination of the classified information to be presented. These must be trained in counterintelligence; response procedures; applicable laws and regulations; and applicable civil liberties and privacy issues. Which of the following are security briefing topics for visitors? Simonne left a safe containing classified material open while she went out for lunch. Lack of proper training, use of non-secure communications, and poor system design are all examples of. Any contact by cleared employees with known or suspected intelligence officers from any country.