Suggested Contractor File Folder Headings
|
|
|
- Chloe Henry
- 9 years ago
- Views:
Transcription
1 Suggested Contractor File Folder Headings 1. Facility Clearance 2. Personnel Clearances 3. Recurring Security Education 4. Self-Inspection 5. Security Correspondence 6. Standard Practice Procedures 7. Incident Reports 8. Suspicious Contact Reports 9. Visits-Incoming 10. Visit Letters Incoming Non-Contract Related 11. Visit Letters Incoming Foreign 12. Visit Letters Outgoing Foreign 13. DD Form 254 Active Contracts 14. DD Form 254-Completed Contracts/Retention 15. Security Container Combination Change Record 16. Information Management System (IMS) 17. Classified Material Receipts Outgoing/Suspense 18. Physical Security Information 19. Destruction Certificates 20. IS Accreditation Letters 21. International 22. Industrial Security Letters (ISLs) NOTE: JPAS is the system of record to verify Personnel Access and Eligibility information, briefings and terminations. As a result, contractors are not required to maintain obsolete paper records (e.g. Visit Letters, SF 312 s, briefings, etc.). Suggest adding folder for Outgoing Visits. Classified visits to non-dod customers (e.g. State Department) may require the FSO to still send a paper visit letter to the customer with a hard copy printout of the person s JPAS clearance eligibility information.
2 File Folders #1 through #5 should be maintained by ALL cleared facilities. FOLDER #1 FACILITY CLEARANCE 1. Every cleared facility should have: a. DD Form 441 DoD Security Agreement or DD Form Appendage to Security Agreement (if a division or operating location of an MFO) b. KMP List (also include those KMP s who are excluded from access) c. SF 328 Certificate Pertaining to Foreign Interests 2. The following should be retained when applicable: a. Resolution for Exclusion of Certain Officers and/or Directors b. Letter temporarily Excluding Certain Officers and/or Directors from Access to Classified Material Pending a Formal Resolution by the Board c. Resolution for Exemption of Parent Organization d. Subsidiary Board Resolution Noting Parent s Exclusion and Resolution to Exclude Parent Organization e. Certificates by Officers and/or Directors (Interlocking Officers and/or Directors) f. Resolution of the Board of Directors of a Subsidiary Noting Non-Disclosure Certificates by Cleared KMP s serving in the same or similar capacities or positions with both the Subsidiary and Parent Organization (Interlocking Officers and/or Directors) g. Certificate Covering Licenses, Patents, and other Foreign Affiliations (Resolution by the Board of Directors) h. Letter indicating Assignment of CAGE Code FOLDER #2 PERSONNEL CLEARANCES 1. JPAS is your official record of all cleared employees at your facility. 2. SF 86 and signed releases are required to be maintained until the time that the eligibility process is complete (these records should then be destroyed or returned to individual). 3. Consultant Agreement, if applicable. 4. Additional records you may elect to keep but are not required: a. Copy of SF 312 b. Special briefings/refresher briefings
3 c. Violations d. Clearance justification, if applicable e. Evidence of citizenship f. Extra fingerprint cards g. Anything else you might find beneficial FOLDER #3 RECURRING SECURITY EDUCATION 1. Date and List of employees briefed. 2. Description of what was briefed to include copies of any materials provided: newsletters or articles used, etc. FOLDER #4 CONTRACTOR SELF-INSPECTION 1. Date self-inspection was conducted. 2. Maintain results of the self-inspection to include any corrective action taken. NISPOM Paragraph 1-206b states: Contractors shall review their security program on a continuing basis and shall also conduct a formal self-inspection at intervals consistent with risk management principles. Additional Guidance for Self-Inspection Records: a. Suggest placing a copy of the SELF-INSPECTION HANDBOOK in this folder. It is a helpful guide to you when performing your self-review. This handbook can be found at: b. Suggest that you review the report in JPAS that reflects all personnel associated with your PSM-Net prior to conducting your self-inspection. Not only will this report assist you in determining who in your company is eligible for access to classified, but it can also be used to determine when periodic reinvestigations are required to be submitted. FOLDER #5 SECURITY CORRESPONDENCE 1. File by latest date on top.
4 2. All material in this folder should be reviewed for disposition during each self-inspection File folders #6 through #27 should be maintained ONLY if they apply to the classified activities at your facility. FOLDER #6 STANDARD PRACTICE PROCEDURE (SPP) 1. Copy of your Standard Practice Procedure (SPP), if applicable. NISPOM Paragraph states: The contractor shall implement all terms of the Manual applicable to each of its cleared facilities. Written procedures shall be prepared when the FSO believes them to be necessary for effective implementation of this Manual or when the Cognizant Security Office (CSO) determines them to be necessary to reasonably exclude the possibility of loss or compromise of classified information. NOTE: Discuss this requirement with your Industrial Security Representative and decide whether or not a SPP would be of benefit to your company s classified operation. FOLDER #7 INCIDENT REPORTS 1. In addition to completing the electronic Incident Report in JPAS, contractors may, if necessary, provide supplemental documentation (in hardcopy) relating to the incident report directly to the designated DSS entity. 2. Place in order by date of submission, last date on top, in alphabetical order by employee s name or in any other order you prefer. FOLDER #8 SUSPICIOUS CONTACT REPORTS 1. File all suspicious contact reports received, last date on top. FOLDER #9 VISITS (INCOMING) 1. Although not required by the NISPOM, some contractors elect to maintain a record of incoming classified visitors. (Records are still required for foreign visitors - maintain for 1 year - and NATO visitors -maintain for 3 years.)
5 2. JPAS is authorized to verify the visitor s personnel security access level (the visitor s access level and affiliation must be reflected in JPAS), thereby, eliminating the requirement for classified Visit Authorization Letters (VAL s). 3. If the visitor s personnel security access level cannot be verified in JPAS, a Visit Authorization Letter is required. a. Facilities must still have procedures in place to verify the identification of visitors and determining need-to-know prior to disclosing classified information. FOLDER #10 VISIT LETTERS (INCOMING-IF APPLICABLE) 1. Place in order by date of the letter, last date on top, in alphabetical order by the visitor s name, by company name or in any other order you prefer. FOLDER #11 VISIT LETTERS (INCOMING FOREIGN) 1. Pertains to personnel visiting your facility from foreign countries. 2. Place in order by date of the letter, last date on top, in alphabetical order by visitor s name or by any other order you prefer. 3. Maintain for one year. FOLDER #12 VISIT LETTERS (OUTGOING FOREIGN) 1. Pertains to employees making visits described in Chapter 10, Section 5, Paragraph , NISPOM. 2. Place in order by date of the letter, last date on top, in alphabetical order by employee s name or by any other order you prefer. FOLDER #13 DD FORM 254 (ACTIVE CONTRACTS) 1. DD Form 254(s) pertaining to active contracts and solicitations. 2. A listing of all current classified contracts should be placed in the front of each of these folders. 3. Copies of classification guides received for all classified contracts. 4. Public Disclosure Requests (see NISPOM paragraph 5-511a).
6 FOLDER #14 DD FORM 254 (COMPLETED CONTRACTS) 1. DD Form 254 pertaining to inactive contracts, RFQ s, RFP s and IFB s filed in numerical order by last four or five digits of contract, RFQ, RFP or IFB. Separate by categories listed above. 2. Letter requesting authority to retain classified material, OR; 3. Final DD Form 254 or other correspondence authorizing retention of classified material beyond the automatic 2 year retention period. NOTE: You have an automatic two year retention authority from contract completion UNLESS you hear otherwise from your GCA or prime contractor. FOLDER #15 SECURITY CONTAINER COMBINATION CHANGE RECORD 1. A record of the names of persons having knowledge of the combination. 2. A record indicating the date of changes of security container combinations is optional. NISPOM paragraph list the events requiring the combination to be changed. NOTE: Combinations for containers storing NATO classified information shall be changed annually (NISPOM Paragraph b). FOLDER #16 INFORMATION MANAGEMENT SYSTEM 1. Your Information Management System (IMS) shall be capable of facilitating the retrieval and disposition of your classified holdings in a reasonable time frame. This record could be an automated or a manual system. 2. Information captured in your IMS might include any combination of the following: a. Date of material b. Date material received c. Where material was received from d. Date material sent out/transmitted e. Where material was sent f. Classification level of the material g. Unclassified description of material h. Disposition of material & date thereof (required for TOP SECRET only) i. Location of material/custodian
7 j. Contract number/retention authority for material k. Control number (if applicable) l. Number of copies (required for TOP SECRET only) m. Any other information you find beneficial 3. For TOP SECRET, material must be numbered in a series (the copy number shall be placed on TOP SECRET documents and on all associated transaction documents.) and the transmittal must be covered by a continuous receipt system both within and outside the facility. FOLDER #17 CLASSIFIED MATERIAL RECEIPTS OUTGOING/SUSPENSE 1. File in chronological order by the date the documents were sent out, earliest date on top. 2. Check weekly. Follow-up letter should be forwarded to addressee if signed receipt is not received in a reasonable length of time. 3. Remove and destroy when signed receipt is received. FOLDER #18 PHYSICAL SECURITY INFORMATION 1. Retain a copy of the DSS Form 147, Controlled Area Agreement, issued by the Cognizant Security Office. 2. Closed Area Self Approval Letter 3. UL Alarm Certificates 4. Shared Services Agreements 5. Letters Authorizing Security-In-Depth 6. MOAs or MOUs 7. Approval for Open Storage in Closed Areas 8. Any other physical security documentation that may apply to your security program.
8 FOLDER #19 DESTRUCTION CERTIFICATES-REQUIRED FOR TS ONLY 1. File in order by date the material was destroyed, last date on top. 2. Include control number assigned by the facility on the Destruction Certificate. 3. Include the words LAST ITEM under the last document listed on the form. 4. Each page of the Destruction Certificate will be signed by the destroying and witnessing official. 5. Destruction Certificates may be numbered with the last digits of the year, followed by a dash and numerical sequence (e.g., 00-01, 00-02, 00-03, etc.). 6. Could annotate/sign TOP SECRET Information Management System instead of above, if appropriate. FOLDER #20 INFORMATION SYSTEMS (IS) ACCREDITATION LETTERS 1. File all accreditation letters received from the Defense Security Service Field Office for the use of IS equipment for processing of classified material. 2. File in order by date of the authorization or by system number or identification. 3. Self-Accreditation Letters FOLDER #21 INTERNATIONAL 1. Copies of all current export licenses involving classified materials (these would be received from the Department of State). 2. Technical Assistance Agreement (TAA) 3. Technology Control Plan (TCP) 4. Any other records pertaining to your company s international operation. FOLDER #22 INDUSTRIAL SECURITY LETTERS 1. File all Industrial Security Letters (ISL s) published from January 1995 to present, last date on top. NOTE: ISL s (2006 and beyond) are also posted and available on our internet web-site at:
Self-Inspection Handbook for NISP Contractors TABLE OF CONTENTS
Self-Inspection Handbook for NISP Contractors TABLE OF CONTENTS The Contractor Security Review Requirement... 2 The Self-Inspection Handbook for NISP Contractors... 2 The Elements of Inspection... 2 Self-Inspection
Webinar Questions and Answers
Webinar Questions and Answers New Facility Clearance (FCL) Sponsorship for Government Contracting Activities (GCAs) and Prime Contractors (PCs) Webinar guests submitted several questions before and during
Defense Security Service (DSS)
Defense Security Service (DSS) Center for Development of Security Excellence (CDSE) ADMINISTRATIVE INQUIRY (AI) PROCESS JOB AID July 2011 TABLE OF CONTENTS 1. INTRODUCTION... 1 1.1 Scope... 1 2. PRELIMINARY
Obtaining a Facility Security Clearance A Pinkerton Government Services White Paper
Obtaining a Facility Security Clearance A Pinkerton Government Services White Paper Robert Maydoney Vice President Sales Pinkerton Government Services, Inc. 740 North Main Street Mansfield, MA 02048 T:
1 Purpose The DOE M 470.4-4A, Information Security Manual states, All information security programs, practices, and procedures developed within DOE must be consistent with and incorporate the requirements
Defense Security Service Industrial Security Field Operations. FCL Orientation Handbook
Industrial Security Field Operations February 18, 2015 Table of Contents WELCOME MESSAGE FROM DSS DIRECTOR... 3 1.0 FCL ROADMAP... 5 2.0 FCL PROCESS REQUIREMENTS WORKSHEET... 6 3.0 BUSINESS STRUCTURE AND
DD FORM 254 Preparation Guide
Headquarters, Department of the Army, G-2 DD FORM 254 Preparation Guide FY-10 FOREWORD Within The Department of Defense, Industrial Security is identified as the portion of information security concerned
Department of Defense MANUAL
Department of Defense MANUAL NUMBER 5220.22, Volume 3 April 17, 2014 USD(I) SUBJECT: National Industrial Security Program: Procedures for Government Activities Relating to Foreign Ownership, Control, or
DEPARTMENT OF DEFENSE DEFENSE SECURITY SERVICE, INDUSTRIAL SECURITY PROGRAM OFFICE INDUSTRIAL SECURITY LETTER
DEPARTMENT OF DEFENSE DEFENSE SECURITY SERVICE, INDUSTRIAL SECURITY PROGRAM OFFICE INDUSTRIAL SECURITY LETTER Industrial Security letters will be issued periodically to inform Industry, User Agencies and
Commanding Officer and Executive Officer. Information and Personnel Security Reference Handbook
Commanding Officer and Executive Officer Information and Personnel Security Reference Handbook Assistant for Information and Personnel Security (N09N2) Office of the Chief of Naval Operations Governing
TRAINING PRODUCTS & RESOURCES
c e C e n r t e f o r D e v e l o p m e n t o f S C e n t e r i t y e c u r f o r E x D c e e v e l o p m e n l l e n t o f S e c u r i t y E x c e l l e n c e TRAINING PRODUCTS & RESOURCES Industrial
DSS Monthly Newsletter
(Sent on behalf of ISR) Dear FSO, DSS Monthly Newsletter December 2012 This is the monthly email containing recent information, policy guidance, security education and training updates. If you have any
Outside Director and Proxy Holder Training: Module 2: Managing Foreign Ownership, Control, or Influence (FOCI) Mitigation Defense Security Service
Outside Director and Proxy Holder Training: Module 2: Managing Foreign Ownership, Control, or Influence (FOCI) Mitigation Defense Security Service February 2014 Training Objectives FOCI Control Procedures
2014 DSS Vulnerability Assessment Rating Matrix Vulnerabilities and NISP Enhancement Categories
2014 DSS Vulnerability Assessment Rating Matrix Vulnerabilities and NISP Enhancement Categories Table of Contents Vulnerability Assessments... 2 Vulnerabilities... 3 NISP Enhancements... 4 1 Company Sponsored
How To Do A Vulnerability Assessment
2013 DSS Vulnerability Assessment Rating Matrix Vulnerabilities and NISP Enhancement Categories Table of Contents Vulnerability Assessments... 2 Vulnerabilities... 3 NISP Enhancements... 4 1 Company Sponsored
Outside Director and Proxy Holder Training: Module 1: Intro to DSS and Foreign Ownership, Control, or Influence (FOCI) Defense Security Service
Outside Director and Proxy Holder Training: Module 1: Intro to DSS and Foreign Ownership, Control, or Influence (FOCI) Defense Security Service February 2014 Training Objectives DSS Agency DSS Mission
Information Security Program Management Procedures and Guidelines
Directive: LPR 1620.1C Effective Date: June 20, 2014 Expiration Date: May 31, 2019 Langley Research Center Information Security Program Management Procedures and Guidelines National Aeronautics and Space
DoD 5220.22-M NATIONAL INDUSTRIAL SECURITY PROGRAM OPERATING MANUAL
DoD 5220.22-M NATIONAL INDUSTRIAL SECURITY PROGRAM OPERATING MANUAL February 28, 2006 February 28, 2006 FOREWORD As required by Executive Order 12829 and under the authority of DoD Directive 5220.22, National
Joint Personnel Adjudication System (JPAS) Account Management Policy
Defense Manpower Data Center Personnel Security & Assurance Joint Personnel Adjudication System (JPAS) Account Management Policy Document Version 7.8 9/15/2014 Table of Contents 1 PURPOSE... 4 2 BACKGROUND...
Joint Personnel Adjudication System (JPAS) Account Request Procedures
Defense Manpower Data Center Personnel Security & Assurance Joint Personnel Adjudication System (JPAS) Account Request Procedures Document Version 4.2 7/23/2015 Table of Contents 1 New JPAS Account Checklist...
Selected Troublesome/Unacceptable Clauses Related to Information Release and Foreign Nationals
Selected Troublesome/Unacceptable Clauses Related to Information Release and Foreign Nationals (Note: Please review the applicable clause in the most current version available to you to ensure you have
COST ACCOUNTING STANDARDS NOTICES AND CERTIFICATIONS
COST ACCOUNTING STANDARDS NOTICES AND CERTIFICATIONS Usage: For Cost Accounting Standards Covered Subcontracts Certain representations and certifications must be made by the Offeror and must be submitted
Joint Personnel Adjudication System (JPAS) Account Management Policy Document Version 7.13 7/23/2015
Defense Manpower Data Center Personnel Security & Assurance Joint Personnel Adjudication System (JPAS) Account Management Policy Document Version 7.13 7/23/2015 Table of Contents 1 PURPOSE... 3 2 BACKGROUND...
DSS Electronic Facility Clearance System (e-fcl) Submission Site User Guide
U. S. Department of Defense Defense Security Service Industrial Security Program DSS Electronic Facility Clearance System (e-fcl) Submission Site User Guide June 2013 Version 7.2 1 e-fcl Submission Site
INDUSTRIAL SECURITY. 2. Welcome Ms. Mary Griggs as DSS Deputy Director for Industrial Security
DEPARTMENT OF DEFENSE DEFENSE SECURITY SERVICE, INDUSTRIAL SECURITY PROGRAM OFFICE INDUSTRIAL SECURITY LETTER Industrial Security letters will be issued periodically to inform Industry, User Agencies and
NATO SECURITY BRIEFING NATO/ATOMAL SECURITY BRIEFING
NATO SECURITY BRIEFING FOREWORD This sample security briefing contains the minimum elements of information that must be provided to individuals upon initial indoctrination for access to NATO classified
03/21/2013. Security Incident Requirements. Information Security Webinar. Administrative Announcements. Security Incident Requirements
Security Incident Requirements Information Security Webinar Security Incident Requirements Host: Lisa Rainey, SAPPC Information Security Curriculum Manager, DSS - CDSE Distinguished career-security professional
Department of Commerce Office of Security. Initial Information Security Briefing
Department of Commerce Office of Security Initial Information Security Briefing Security Clearance A security clearance is a determination of trust, which makes you eligible for access to classified information.
SIMS v7 Release Notes
SIMSSCR-605 7.11.205 Installers In response to Microsoft s policy of ending support for operating systems more than 10 years old, we can no longer support SIMS on Windows XP or Windows Server 2003 / 2003
Privacy Impact Assessment of. Personal Identity Verification Program
Official of Federal Governors Reserve seal of of the System. Board Program or application name. Privacy Impact Assessment of Personal Identity Verification Program Personal Identity Verification (PIV)
This directive applies to all DHS organizational elements with access to information designated Sensitive Compartmented Information.
Department of Homeland Security Management Directives System MD Number: 11043 Issue Date: 09/17/2004 SENSITIVE COMPARTMENTED INFORMATION PROGRAM MANAGEMENT I. Purpose This directive establishes Department
The Security Clearance and Investigation Process
The Security Clearance and Investigation Process OPM s Mission OPM s Mission is to Recruit, Retain and Honor a World-Class Workforce to Serve the American People OPM s Federal Investigative Services (FIS)
Using Technology Control Plans in Export Compliance. Mary Beran, Georgia Tech David Brady, Virginia Tech
Using Technology Control Plans in Export Compliance Mary Beran, Georgia Tech David Brady, Virginia Tech What is a Technology Control Plan (TCP)? The purpose of a TCP is to control the access and dissemination
Defense Security Service
Defense Security Service Electronic Fingerprint Capture Options for Industry Version 2.0 January 2013 Issuing Office: Defense Security Service Russell Knox Building 27130 Telegraph Rd Quantico VA 22134
Privacy and Data Security Update for Defense Contractors
Privacy and Data Security Update for Defense Contractors T.J. Crane May 19, 2017 Overview DoD interim rule Expanded DFAR reporting obligations New DFAR definitions Cloud services Changes to local breach
Annual DoD Security Refresher Training
Annual DoD Security Refresher Training Welcome to your annual security refresher training. The purpose of this briefing is to remind you of your personal responsibilities and liabilities under United States
Consultant Annual DoD Security Refresher
Consultant Annual DoD Security Refresher 1 About This Course This course should be taken by Consultants Only in this PDF format All others should take this course online LMPeople > LMCareers > Learning
2. Completing Specific Sections of the Questionnaire for National Security Positions (SF 86)
Contractor Facility Security Officer (FSO) Review of the Questionnaire for National Security Position (Standard Form 86 (SF-86), Revised July 2008) Last Updated March 2009 1. Key Points This document contains
A. Executive Order 12333, United States Intelligence Activities. B. Executive Order 12829, National Industrial Security Program.
1. Purpose Department of Homeland Security Management Directive System MD Number: 11045 Issue Date: 10/04/2004 PROTECTION OF CLASSIFIED NATIONAL SECURITY INFORMATION: ACCOUNTABILITY, CONTROL, AND STORAGE
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5210.87 November 30, 1998 SUBJECT: Selection of DoD Military and Civilian Personnel and Contractor Employees for Assignment to Presidential Support Activities (PSAs)
There are many examples of sensitive information falling into the wrong hands. What s the worst that can happen? The worst has already happened.
Data Spills Short Introduction There are many examples of sensitive information falling into the wrong hands. What s the worst that can happen? The worst has already happened. When data spills occur, they
Department of Defense MANUAL
Department of Defense MANUAL NUMBER 5205.07, Volume 2 November 24, 2015 USD(I) SUBJECT: Special Access Program (SAP) Security Manual: Personnel Security References: See Enclosure 1 1. PURPOSE a. Manual.
Defense Security Service
Defense Security Service Industrial Security Field Operations Office of the Designated Approving Authority Manual for the Certification and Accreditation of Classified Systems under the NISPOM Version
Gatekeeper PKI Framework. February 2009. Registration Authority Operations Manual Review Criteria
Gatekeeper PKI Framework ISBN 1 921182 24 5 Department of Finance and Deregulation Australian Government Information Management Office Commonwealth of Australia 2009 This work is copyright. Apart from
Introduction. Derivative Classification Training JOB AID
Introduction Derivative Classification Training The purpose of this job aid is to provide reference information for the responsibilities and procedures associated with derivative classification. This job
GUIDE SECURITY CLEARANCES & FACILITY CLEARANCES. WWW.FEDATTORNEY.COM or Call (202) 787-1900
GUIDE SECURITY CLEARANCES & FACILITY CLEARANCES Washington, DC Office 1800 K Street NW, Suite 1030 Washington, D.C. 20006 To schedule a consultation, call (202) 787-1900 Arlington, VA Office 1300 Wilson
EnCase Implementation Statement of Work
EnCase Implementation Statement of Work This Statement of Work ( SOW ) is an agreement by and between Guidance Software, Inc., a Delaware corporation ( GSI ) and ( Customer ), and each party
3. SUPERSEDENCE: This schedule supersedes State Agencies Records Retention Schedule S5: Higher Education Records (Revised: 01/2010).
STATE OF CONNECTICUT RECORDS RETENTION SCHEDULE S5: HIGHER EDUCATION RECORDS (Revised: 07/2011) STATE OF CONNECTICUT Connecticut State Library Office of the Public Administrator 231 Capitol Avenue, Hartford,
Commercial Solutions Opening (CSO) Office of the Secretary of Defense Defense Innovation Unit (Experimental)
SECTION 1 - INTRODUCTION 1.1 Background and Authority Commercial Solutions Opening (CSO) Office of the Secretary of Defense Defense Innovation Unit (Experimental) The 2014 Quadrennial Defense Review (QDR)
KAREN E. RUSHING. Audit of Purchasing Card Program
KAREN E. RUSHING Clerk of the Circuit Court and County Comptroller Audit of Purchasing Card Program Audit Services Jeanette L. Phillips, CPA, CGFO, CIG Director of Internal Audit and Inspector General
CONTROL PROCEDURES FOR UNCLASSIFIED TECHNICAL DATA DISCLOSING MILITARILY CRITICAL TECHNOLOGY
(Example) CONTROL PROCEDURES FOR UNCLASSIFIED TECHNICAL DATA DISCLOSING MILITARILY CRITICAL TECHNOLOGY TITLE: Unclassified Technical Data Control Procedures PROC. NUMBER: ISSUE NUMBER: ISSUE DATE: PURPOSE
UNITED STATES MARINE CORPS INFORMATION AND PERSONNEL SECURITY PROGRAM MANUAL (SHORT TITLE: MARINE CORPS IPSP)
Headquarters, U.S. Marine Corps MCO P5510.18A PCN 10208490600 UNITED STATES MARINE CORPS INFORMATION AND PERSONNEL SECURITY PROGRAM MANUAL (SHORT TITLE: MARINE CORPS IPSP) DISTRIBUTION STATEMENT A: Approved
EnCase Implementation Statement of Work
EnCase Implementation Statement of Work This Statement of Work ( SOW ) is an agreement by and between Guidance Software, Inc., a Delaware corporation ( GSI ) and ( Customer ), and each party
United States Visitor and Immigrant Status Indicator Technology Program (US-VISIT)
for the Conversion to 10-Fingerprint Collection for the United States Visitor and Immigrant Status Indicator Technology Program (US-VISIT) November 15, 2007 Contact Point Barbara M. Harrison, Acting Privacy
Hiring Information Tracking System (HITS)
for the Hiring Information Tracking System (HITS) May 13, 2010 Contact Point Robert Parsons Director, Office of Human Capital U.S. Immigration and Customs Enforcement (202) 732-7770 Reviewing Official
Information Security Policy
Essay 7 Information Security Policy Ingrid M. Olson and Marshall D. Abrams This essay discusses information security policy, focusing on information control and dissemination, for automated information
DSS Secret Internet Protocol Router Network (SIPRnet) Processing Procedures
DSS Secret Internet Protocol Router Network (SIPRnet) Processing Procedures Introduction DSS is the Cognizant Security Authority (CSA) for contractors participating in the National Industrial Security
United States Department of State Privacy Impact Assessment Risk Analysis and Management
United States Department of State Privacy Impact Assessment Risk Analysis and Management Bureau of Administration 1. Contact Information Risk Analysis and Management (RAM) PIA Department of State Privacy
Department of Defense MANUAL
Department of Defense MANUAL NUMBER 5205.07, Volume 1 June 18, 2015 USD(I) SUBJECT: DoD Special Access Program (SAP) Security Manual: General Procedures References: See Enclosure 1 1. PURPOSE. a. Manual.
Security and Emergency Services Community of Interest 0080-Information/Personnel Security Administration Career Road Map
Security and Emergency Services Community of Interest 0080-Information/Personnel Security Administration Career Road Map Prepared by: Booz Allen Hamilton Career progression within the 0080-Information/Personnel
39C-1 Records Management Program 39C-3
39C-1 Records Management Program 39C-3 Sec. 39C-1. Sec. 39C-2. Sec. 39C-3. Sec. 39C-4. Sec. 39C-5. Sec. 39C-6. Sec. 39C-7. Sec. 39C-8. Sec. 39C-9. Sec. 39C-10. Sec. 39C-11. Sec. 39C-12. Sec. 39C-13. Sec.
28042 Federal Register / Vol. 75, No. 96 / Wednesday, May 19, 2010 / Notices
28042 Federal Register / Vol. 75, No. 96 / Wednesday, May 19, 2010 / Notices the records are part of an on-going investigation in which case they may be retained until completion of the investigation.
5 FAM 440 ELECTRONIC RECORDS, FACSIMILE RECORDS, AND ELECTRONIC MAIL RECORDS
5 FAM 440 ELECTRONIC RECORDS, FACSIMILE RECORDS, AND ELECTRONIC MAIL RECORDS (CT:IM-158; 12-29-2014) (Office of Origin: A/GIS/IPS) NOTE: In October, 2014, the Department issued an interim directive superseding
Integrated Security Management System (ISMS)
for the (ISMS) September 16, 2014 Contact Point David Colangelo Security Systems Division, Office of the Chief Security Officer Management Directorate (202) 447-5320 Reviewing Official Karen L. Neuman
NWX-DTSW-DEFENSE SECURITY SERV. Moderator: Nancy McKeown March 12, 2015 10:30 am CT
Page 1 NWX-DTSW-DEFENSE SECURITY SERV March 12, 2015 10:30 am CT Our security vulnerabilities and DSS assessment webinar. So without further ado it's my pleasure to introduce two of the greatest presenters
SECURITY STANDARD OPERATING PROCEDURES
TABLE OF CO TE TS Page Introduction 3 CHAPTER 1. GE ERAL PROVISIO S A D REQUIREME TS Section 1. Purpose and Scope 5 Section 2. General Requirements 6 Section 3. Reporting Requirements 10 CHAPTER 2. SECURITY
Audit of Tax Data Security. Final Report Approved by Internal Audit Committee on June 29, 2005
Final Report Approved by Internal Audit Committee on June 29, 2005 Audit and Evaluation Division March 2005 Table of Contents Auditor s Statement... 1 I. Introduction... 2 II. Findings and Recommendations...
Background Check Service
for the Background Check Service Contact Point Elizabeth Gaffin USCIS Privacy Officer United States Citizenship and Immigration Services 202-272-1400 Reviewing Official Hugo Teufel III Chief Privacy Officer
Basic Records Management Practices for Saskatchewan Government*
Provincial Saskatchewan Archives R of Saskatchewan Basic Records Management Practices for Saskatchewan Government* Provincial Archives of Saskatchewan (306) 787-0734 [email protected] www.saskarchives.com
Flexible Circuits Inc. Purchase Order Standard Terms and Conditions
Flexible Circuits Inc. Purchase Order Standard Terms and Conditions 1. Acceptance- This writing, together with any attachments incorporated herein, constitutes the final, complete, and exclusive contract
Privacy Impact Assessment Of the. Office of Inspector General Information Technology Infrastructure Systems
Privacy Impact Assessment Of the Office of Inspector General Information Technology Infrastructure Systems Program or application name: Office of Inspector General Information Technology Infrastructure
Supplier Awareness. Export Control/ ITAR
Export Control & ITAR Supplier Awareness Export Control/ ITAR THIS INFORMATION IS PROVIDED BY PAR SYSTEMS, INC. ("PAR"). PAR IS NOT A LAW FIRM, AND THE INFORMATION CONTAINED HEREIN IS NOT INTENDED TO BE
ATTACHMENT A SUPPLIER CERTIFICATIONS PACKAGE
Page 1of 12 SUPPLIER RFQ# P/N# ATTACHMENT A SUPPLIER CERTIFICATIONS PACKAGE FORM $25,000 $100,000 $650,000 1. Cost Accounting Standards and Notices X 2. Certification Regarding Responsibility Matters X
Protected Critical Infrastructure Information Program Procedures Manual
Protected Critical Infrastructure Information Program Procedures Manual April 2009 PCII PROGRAM PROCEDURES AND GUIDANCE MANUAL As you read this Manual and participate in the PCII Program, you may have
UNIT 34: COST ACCOUNTING STANDARDS
UNIT CERTIFICATION Statement of Completion has satisfactorily completed training in the duty of this Unit under the conditions described below and in accordance with the overall standard(s) for this Unit.
Department of Defense MANUAL. DoD Information Security Program: Overview, Classification, and Declassification
Department of Defense MANUAL NUMBER 5200.01, Volume 1 February 24, 2012 USD(I) SUBJECT: DoD Information Security Program: Overview, Classification, and Declassification References: See Enclosure 1 1. PURPOSE
GENERAL GOVERNMENT ADMINISTRATION EXECUTIVE RECORDS RETENTION AND DISPOSITION SCHEDULES (ERRDS) ERRDS, DIVISION OF VOCATIONAL REHABILITATION REPEALED
TITLE 1 CHAPTER 18 PART 644 GENERAL GOVERNMENT ADMINISTRATION EXECUTIVE RECORDS RETENTION AND DISPOSITION SCHEDULES (ERRDS) ERRDS, DIVISION OF VOCATIONAL REHABILITATION 1.18.644.1 ISSUING AGENCY: State
Industrial Security Facilities Database (ISFD) Job Aid. December 2014
Industrial Security Facilities Database (ISFD) Job Aid December 2014 Page 2 Table of Contents Introduction Logging into ISFD Navigating ISFD Changing Passwords Update My Info Request for Information Submit
NAVY RECORDS MANAGEMENT PROGRAM COMMAND PROGRAM GUIDE
NAVY RECORDS MANAGEMENT PROGRAM COMMAND PROGRAM GUIDE Ref: (a) SECNAVINST 5210.8D, Department of the Navy Records Management Program, 31 December 2005 (b) SECNAV Manual M-5210.1, Department of the Navy,
Additional Terms And Conditions E-2D Advanced Hawkeye (AHE) Pilot Production (Prime Contract No. N00019-03-C-0057)
Additional Terms And Conditions E-2D Advanced Hawkeye (AHE) Pilot Production (Prime Contract No. N00019-03-C-0057) All of the additional terms and conditions set forth below are incorporated in and made
Blanket Purchase Agreement Attachment C Ordering Guide. DLT Solutions/Autodesk. Blanket Purchase Agreement (BPA): N00104-12-A-ZF30
DLT Solutions/Autodesk Blanket Purchase Agreement (BPA): N00104-12-A-ZF30 1 Version Dated: January 23, 2015 DOD ESI BPA ORDERING GUIDE This Ordering Guide has been developed by the DoD ESI team to assist
Practice Test Security Fundamentals Professional Certification (SFPC) Multiple Choice. Multiple-Choice Sample Question # 1
The following Practice Test presents samples of the type, difficulty, and format of questions found on the SFPC assessment. At the end of the Practice Test, a table is provided outlining the topics and
DHS DIRECTIVES INSTRUCTION HANDBOOK DHS INSTRUCTION HANDBOOK 121-01-007 THE DEPARTMENT OF HOMELAND SECURITY PERSONNEL SUITABILITY AND SECURITY PROGRAM
DHS DIRECTIVES INSTRUCTION HANDBOOK DHS INSTRUCTION HANDBOOK 121-01-007 THE DEPARTMENT OF HOMELAND SECURITY PERSONNEL SUITABILITY AND SECURITY PROGRAM APPROVAL DATE: JUNE 2009 DEPARTMENT OF HOMELAND SECURITY
Hosting Foreign Nationals at DOE Sites
Hosting Foreign Nationals at DOE Sites Office of Security Office of International Safeguards and Security DOE s Unclassified Foreign Visits and Assignments Program The Department of Energy is a leader
1.3 There have been no material or substantive changes to the Code since last year.
1. Please describe the key components of the GPO s written code of business ethics and conduct. (Please provide a copy and describe any changes since the last submission.) Please assure your response includes:
28 CFR Ch. I (7 1 11 Edition)
0.75 the interpretation of Executive Order 10501 of November 5, 1953, as amended, and of regulations issued thereunder in accordance with section 11 of that order; and the interpretation of Executive Order
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5200.39 May 28, 2015 USD(I)/USD(AT&L) SUBJECT: Critical Program Information (CPI) Identification and Protection Within Research, Development, Test, and Evaluation
PRIVACY IMPACT ASSESSMENT (PIA) For the
PRIVACY IMPACT ASSESSMENT (PIA) For the Assistance Reporting Tool (ART) Defense Health Agency (DHA) SECTION 1: IS A PIA REQUIRED? a. Will this Department of Defense (DoD) information system or electronic
Information Security Policy
Information Security Policy Contents Version: 1 Contents... 1 Introduction... 2 Anti-Virus Software... 3 Media Classification... 4 Media Handling... 5 Media Retention... 6 Media Disposal... 7 Service Providers...
https://www.usajobs.gov/getjob/viewdetails/391530800
Page 1 of 6 Home Search Jobs My Account Resource Center SIGN IN OR CREATE AN ACCOUNT Keyword: Keywords, Job Title, Control #, Agency Location: City, State, ZIP Code, or Country Search Advanced Search >
