the personnel security program establishes for personnel security determinations
(e) Verbiage was added that prohibits the use of DoD adjudication systems of record for use as a pre-hiring tool. This document has been published in the Federal Register. First, the domain of the user needs to match the domain name of the company that the user claims to be employed by. Let us review them both in detail to better understand how they will help protect the smart grid. This requirement specifies that entities must implement controls to manage access to physical security perimeters on a 24/7 basis. 10450, as amended; E.O. For readers unfamiliar with PERSEREC, it is a relatively small, nondescript arm of the U.S. Department of Defense (DoD) headquartered in Monterrey, CA, that houses an extraordinary group of highly focused researchers committed to conducting a broad range of collaborative research on matters specifically related to personnel security. Additionally, physical access must be revoked within 24 hours for terminated personnel and within seven calendar days for personnel who no longer need physical access. 278g-3; 40 U.S.C. (7) Enforce the requirement that DoD personnel security adjudication system(s) of records, within their respective Components, shall only be used as a personnel security system of records and shall not be used as a pre-hiring screening tool. (ii) The individual has undergone the required NACI or other equivalent suitability, public trust, or national security investigation and received favorable adjudication from the former agency. These terms and their definitions are for the purposes of this part: Continuous evaluation. documents in the last year, 16 (4) Decisions following appeal are final. (1) DoD reciprocally accepts existing national security eligibility determinations or clearances from other government agencies in accordance with E.O. (1) Any position in a department or agency, the occupant of which could bring about, by virtue of the nature of the position, a material adverse effect on the national security. The organization, upon termination of individual employment: The organization reviews logical and physical access authorizations to information systems/facilities when personnel are reassigned or transferred to other positions within the organization and initiates. Awareness program exists, but is not conducted within the minimum required period of quarterly reinforcement; or. This site displays a prototype of a “Web 2.0” version of the daily Individuals entrusted with access to Federal property, information systems, and any other information bearing on national security must not put the Government at risk or provide an avenue for terrorism. Personnel security processing and maintaining individuals requiring Department of Defense (DOD) clearances Work in all disciplines of personnel security and will be a part of the team to implement personnel security processes and tools for centrally managing the company’s DoD personnel security program (2) Develop and publish revisions to 32 CFR Part 154. Retrieves all security-related organizational information system-related property; and. Controlling access to classified information by implementing a Personnel Security Program (PSP) at cleared facilities is essential to protecting our national security. https://quizlet.com/516015609/security-awareness-flash-cards Nikolai Mansourov, Djenana Campara, in System Assurance, 2011. When the investigation is delayed, the Component may, in lieu of a CAC, issue an alternative facility access credential at the discretion of the relevant Component official based on a risk determination. b. DoD Component implementation of the electronic financial disclosure requirement, consistent with E.O. on (4) Enforce requirements for prompt reporting of significant derogatory information, unfavorable administrative actions, and adverse actions to the appropriate personnel security, human resources, and counterintelligence official(s), as appropriate, within their respective Component. Use the PDF linked in the document sidebar for the official electronic format. However, any such requirement such as the suggested collection of DNA from clearance applicants would be covered in a separate rulemaking. The personnel security component is often overlooked and not reviewed in detail by assessors. One personnel risk assessment is not updated at least every 7 years, or for cause; or. establishes policy for the conduct of polygraph examinations supporting personnel security vetting within the IC and implements Security Executive Agent Directive 2, Use of Polygraph in Support of Personnel Security Determinations for Initial or Continued Eligibility for Access to Classified Information or Eligibility to Hold a Sensitive Position. If the DoD Component does not have funds available, the Military Service in which the uniform service personnel served may choose to fund the investigation. (3) Approve, coordinate, and oversee all DoD personnel security research initiatives and activities to improve the efficiency, effectiveness, and fairness of the DoD PSP. 12333, as amended; 5 U.S.C. partnership with USD(I&S) and other agency heads with established personnel security polygraph programs, or their designees. These levels and their criteria are listed in Table 6.7.11, Table 6.7. documents in the last year, 7 10865, as amended; E.O. Some of the documents and regulations which cover this area include the following: 5 CFR 731.106 Designation of public trust positions and investigative requirements, ICD 704 Personnel Security Standards (SCI). (3) Contractor employees who have had their CAC revoked, and for whom an appeal is allowed under this paragraph, may appeal to DOHA under the established administrative process set out in 32 CFR Part 155. 13488; E.O. Alternate OSD Federal Register Liaison Officer, Department of Defense. documents in the last year, 40 Matthew Metheny, in Federal Cloud Computing, 2013, A formal, documented personnel security policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and. This repetition of headings to form internal navigation links Within this requirement are specifics for Card Keys, Special Locks, Security Personnel, and Other Authentication Devices. There are 3 major federal personnel security programs and each has its own terminology. Any doubt shall be resolved in favor of national security. 13526; E.O. One instance of personnel (employee, contractor, or service provider) change other than for cause in which access to critical cyber assets was no longer needed was not revoked within seven calendar days. The Department is reissuing the DoD Directive as a DoD Instruction to update existing policy regarding operation of the DoD Personnel Security Program and to establish new policy implementing HSPD-12. Personnel screenings must be incorporated into standard personnel policies. The OFR/GPO partnership is committed to presenting accurate and reliable The investigative process applies to members of the Armed Forces, DoD civilian employees, DoD contractors, and other affiliated people who require access to classified information … This rule establishes PSP policy related to the operation of the DoD PSP, including investigative and adjudicative policy for determining eligibility to hold national security positions. The Intelligence Reform and Terrorism Prevention Act of 2004, E.O. Please note, you will not receive a certificate of completion for watching a short. Information about this document as published in the Federal Register. (i) Eligibility for national security positions shall be granted only to persons who are U.S. citizens for whom the investigative and adjudicative process has been favorably completed. 3- PIV Client Application Programming Interface; Pt. Threat to the life, safety, or health of employees, contractors, vendors, or visitors; to the Government's physical assets or information systems; to personal property; to records, privileged, proprietary, financial, or medical records; or to the privacy of data subjects, which will not be tolerated by the Government. Suitability determinations are made according to the 5 CFR 731 Code of Federal Regulations of Suitability for All Covered Positions. This rule also establishes investigative and adjudicative policy for the Department's personal identity verification (PIV) credential. on DoD Response: The Federal Government is looking into the feasibility of using biometric identifiers other than fingerprints in the security clearance process. Assigns a risk designation to all positions; Establishes screening criteria for individuals filling those positions; and. It is very possible that your agency has a security screening branch that carries out all background investigations. A process for ensuring access authorization requests and revocations are reviewed, A procedure for escorting unauthorized personnel within the physical security perimeter. documents in the last year, by the U.S. Customs and Border Protection While every effort has been made to ensure that (2) Reciprocity for SCI eligibility shall be executed in accordance with ICD 704 and associated Director of National Intelligence guidance. 13467; E.O. c. All IC security elements shall accept in-scope personnel security investigations and access eligibility determinations that are void of conditions, deviations, or waivers. This program must be in accordance with federal, state, provincial, and local laws, as well as collective bargaining unit agreements. (1) No separate administrative appeal process is allowed when an individual has been denied a CAC as a result of a negative suitability determination under 5 CFR Part 731, an applicable decision to deny or revoke a security clearance, or based on the results of a determination to disqualify the person from an appointment in an excepted service position or from working on a contract for reasons other than eligibility for a Federal Credential as described in OPM Memorandum, “Final Credentialing Standards for Issuing Personal Identity Verification Cards under HSPD-12.” If a later denial or revocation of a CAC results from an applicable denial or revocation of a security clearance, suitability decision, or other action for which administrative process was already provided on grounds that support denial or revocation of a CAC, no separate appeal for CAC denial or revocation is allowed. The only current requirements for reinvestigations of personnel occupying Public Trust positions are those established by individual agencies pursuant to the Federal Information Security Management Act of 2002 (Title III of E-Government Act) and Office of Management and Budget (OMB) Circular No. Access to between 26% and 50% of a responsible entity's total number of physical security perimeters is not controlled, monitored, and logged; or. (3) There is no requirement to reinvestigate CAC holders unless they are subject to reinvestigation for national security or suitability reasons as specified in applicable DoD issuances. It has been certified that 32 CFR Part 156 does not have federalism implications, as set forth in E.O. establishing the XML-based Federal Register as an ACFR-sanctioned Entities are required to develop, maintain, and document a cyber security training program for personnel with access to cyber critical assets. 12333, as amended; 5 U.S.C 301 and 7532; section 1072 of Pub. Proper information security practices should be in place to ensure that employees, contractors, and third-party users understand their responsibilities, and are suitable for the roles they are considered for, and to reduce the risk of theft, fraud or misuse of facilities, specifically: Security responsibilities should be addressed prior to employment in adequate job descriptions and in terms and conditions of employment. Standard CIP-004 requires this training to occur at least annually and those granted physical access to cyber critical assets must be trained within 90 calendar days of being granted said access. Relevant information about this document from Regulations.gov provides additional context. Once an applicant has been identified for employment, he is placed on an access control roster. The second requirement in standard CIP-006 covers physical access controls. corresponding official PDF file on govinfo.gov. o Incorporates the provisions to provide procedural benefits to afford (d) The Under Secretary of Defense for Policy (USD(P)) is the approval authority for requests for exceptions to the DoD PSP involving access to NATO classified information. (6) Federal Government credentialing standards do not prohibit employment of convicted felons who have been released from correctional institutions, absent other issues, if they have demonstrated clear evidence of rehabilitation. Information Technology security—The following highlights individual security features of the implemented Clicks2Bricks system's ITSEC facets. (1) The sponsoring activity shall not re-adjudicate CAC determinations for individuals transferring from another Federal department or agency, provided: (i) Possession of a valid personal identity verification (PIV) card or CAC can be verified by the individual's former department or agency. Functional Area Sponsor: PS, PP&O. A favorably adjudicated National Agency Check with Inquiries (NACI) is the minimum investigation required for a final credentialing determination for CAC.Start Printed Page 18166. chapter 23. on For moderate risk law enforcement and high impact public trust level, a reinvestigation is required during the 5th year. The ultimate determination whether to authorize CAC issuance or revoke the CAC must be an overall common-sense judgment after careful consideration of the basic and, if applicable, supplemental credentialing standards in OPM Memorandum, “Final Credentialing Standards for Issuing Personal Identity Verification Cards under HSPD-12,” each of which is to be evaluated in the context of the whole person. (ii) An individual currently occupying a national security position will be immediately removed from the national security position and placed, in accordance with agency policy, in an existing non-sensitive position if available. Registration for the Clicks2Bricks system. 13467, E.O. (g) No person shall be deemed to be eligible for a national security position merely by reason of Federal service or contracting, licensee, certificate holder, or grantee status, or as a matter of right or privilege, or as a result of any particular title, rank, position, or affiliation. (1) An interim credentialing determination can be made based on the results of a completed National Agency Check or an Federal Bureau of Investigation National Criminal History Check (fingerprint check), and submission of a request for investigation (NACI or greater). The first requirement of standard CIP-006 covers physical security plans. These tools are designed to help you understand the official document The study identified the following challenges related to mitigating insider risks and threats: The Internet creates a large and efficient global marketplace for bringing sellers, seekers, brokers, and buyers of information assets together in relative anonymity. 278g-3; 40 U.S.C. provide legal notice to the public or judicial notice to the courts. The basic staffing process is shown below, and the assessor should ensure the processes, procedures, and organizational policies provide the necessary guidance to the HR staff to accomplish these steps in a professional and secure manner throughout the recruitment, hiring, and employee life cycle for each and every employee and contractor involved in the governmental support efforts for their agency. Most U.S. federal agencies require background investigations. The risk executive (function) must look at risk from the organizational perspective across a number of unique domains, including information security, personnel security, physical security, and budget. This course will review the regulatory basis for the PSP. In this way, the risk executive (function) serves as the central point for information about the organization’s risk management process and its current risk profile. This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes … 12968, as amended. documents in the last year, 355 Reviews and revises position risk designations at least every three years. Executive Order 10450 ... August 2, 1995 Establishes a uniform Federal personnel security program for employees who will be considered for initial or continued access to classified. Common access card (CAC) investigation and adjudication. NIST SP 800-35, Guide to Information Technology Security Services. Defined in 32 CFR Part 154. The latter dealing with HSPD-12 is an unfunded mandate. The documents posted on this site are XML renditions of published Federal Requests for exceptions involving access to NATO classified information shall be sent to the Office of the Under Secretary of Defense for Policy. (1) Provide advice and guidance as to the legal sufficiency of procedures and standards involved in implementing the DoD PSP and exercise oversight of the established administrative due process procedures of the DoD PSP. What is the standard form of identification for DoD employees? FIPS Publication 199, Standards for Security Categorization of Federal Information and Information Systems. However, this rule does not increase costs; rather it implements the requirements of HSPD-12 in the most efficient and effective manner possible by ensuring uniform implementation. (ii) Other such positions include, but are not limited to, those whose duties include: (A) Protecting the nation, its citizens and residents from acts of terrorism, espionage, or foreign aggression, including those positions where the occupant's duties involve protecting the nation's borders, ports, critical infrastructure or key resources, and where the occupant's neglect, action, or inaction could bring about a material adverse effect on the national security; (B) Developing defense plans or policies; (C) Planning or conducting intelligence or counterintelligence activities, counterterrorism activities and related activities concerned with the preservation of the military strength of the United States; (D) Protecting or controlling access to facilities or information systems where the occupant's neglect, action, or inaction could bring about a material adverse effect on the national security; (E) Controlling, maintaining custody, safeguarding, or disposing of hazardous materials, arms, ammunition or explosives, where the occupant's neglect, action, or inaction could bring about a material adverse effect on the national security; (F) Exercising investigative or adjudicative duties related to national security, suitability, fitness or identity credentialing, where the occupant's neglect, action, or inaction could bring about a material adverse effect on the national security; (G) Exercising duties related to criminal justice, public safety or law enforcement, where the occupant's neglect, action, or inaction could bring about a material adverse effect on the national security; or. (3) All interim and final adjudicative determinations shall be made by cleared and trained Federal Government personnel. If an entity is found to be out of compliance, it is classified into one of four levels for noncompliance. (c) Changes were made in the “Responsibilities” section to update the new title name for the Deputy Under Secretary of Defense for Intelligence and Security (previously known as the Deputy Under Secretary of Defense for HUMINT, Counterintelligence, and Security). (j) Wounded Warrior Security and Intelligence Internship Program. (b) The Deputy Under Secretary of Defense for Intelligence & Security (DUSD(I&S)), under the authority, direction, and control of the USD(I) shall: (1) Ensure that the PSP is consistent, cost-effective, efficient, and balances the rights of individuals with the interests of national security. Documents personnel security requirements; and. on Executive Order (EO) 12968, as amended, … (2) The requirements of this part apply to positions in the competitive service, positions in the excepted service where the incumbent can be noncompetitively converted to the competitive service, and career appointments in the Senior Executive Service within the executive branch. Immediately following final adjudication, the sponsoring activity shall record the final eligibility determination (active, revoked, denied, etc.) This is an update to an existing rule regarding personnel security investigative and adjudicative policy and implements new department policy related to HSPD-12. Register (ACFR) issues a regulation granting it official legal status. (c) Adjudication. Under certain conditions, DoD Components are authorized to use polygraph examinations to resolve credible derogatory information developed in connection with a personnel security investigation; to aid in the related adjudication; or to facilitate classified access decisions. (f) The Heads of the DoD Components shall: (1) Designate a senior agency official, consistent with the provisions of E.O. of the issuing agency. 3343; 5 CFR parts 731, 731.101, 732 and 736; and HSPD-12. These programs will provide practical guidance on indicators that may signal matters of security concern. Since this rule was last published, additional executive orders have been issued directing alignment of security, suitability and reciprocal acceptance of prior investigations and determinations. (3) The distribution of power and responsibilities among the various levels of Government. Specifically, entities are required to keep physical access logs for at least 90 calendar days. Register documents. 13526; E.O. and services, go to This section is a summary from a study conducted by PERSEREC (Kramer et al., 2005, 2007). (8) Adjudication and Eligibility Determinations (9) Unfavorable Eligibility Determinations and . Also, describe how the background investigation department can be contacted and where they are located. (7) Develop guidance, interpretation, and clarification regarding the DoD PSP as needed. a. Access to less than 15% of a responsible entity's total number of physical security perimeters is not controlled, monitored, and logged; or. These are known as throw-offs, and they are obtained during interviews of references furnished by applicants.). Entities are required to develop and maintain a physical security plan that addresses the following: A process and documentation of all cyber assets within the Electronic Cyber Perimeter are housed within a physical security perimeter. 12829, as amended; E.O. Establish the notification and NCCA review process for agencies … (iii) To ensure consistency and quality in determinations of eligibility for national security positions, adjudicators must successfully complete the full program of professional training provided by the DSS Center for Development of Security Excellence (or equivalent training) and be certified through the DoD Professional Certification Program for Adjudicators within 2 years of program implementation or, for new hires, within 2 years of eligibility for certification testing. For maintenance and testing, entities must test and maintain all components of their physical security at least every three years and maintain records of said testing. However, the additional use of DNA would recognize the greater prevalence of DNA evidence in criminal investigations. the material on FederalRegister.gov is accurately displayed, consistent with 301 and 7532; section 1072 of Public Law 110-181, as amended; 15 U.S.C. A Rule by the Defense Department on 04/01/2014. [FR Doc. All 3 programs have provisions for an interim eligibility authorization pending the completion of a background investigation and a final eligibility determination. Defined in E.O. This regulation establishes the Department of the Navy (DON) Personnel Security Program (PSP) under the authority of Executive Order (EO) 12968, Access to Classified Information, reference (a) and EO 10450, Security Requirements for Government Employees, reference (b), and in compliance with Department of Defense (DoD) from 37 agencies. Specifically, standard CIP-006 requires entities to develop and implement a physical security program to protect critical cyber assets. Develops policy, guidance, and oversight for the DoD Personnel Security Program (PSP), in accordance with DoDD 5143.01, in that capacity reviews and approves DoD Components’ policy and procedures governing civilian, military, and contractor personnel PSPs within the This rule updates policies and responsibilities for the Department of Defense (DoD) Personnel Security Program (PSP) in accordance with the provisions of current U.S. Code, Public Laws, and Executive Orders (E.O.). Fewer employees are deterred by a traditional sense of employer loyalty. 1. 12333, as amended; 32 CFR parts 147, 154 through 156; 5 CFR parts 731, 731.101, 732 and 736; 5 U.S.C. The Personnel Security Program establishes the standards, criteria, and guidelines upon which personnel security eligibility determinations are based. New Documents 03/19/2021, 370 This would help insure that no applicant for a clearance is a subject of an active federal, state, or local criminal investigation based on DNA evidence. Individuals with a statutory or regulatory bar are not eligible for reconsideration while under debarment. ; 3343; 5 CFR parts 731, 732 and 736, and Homeland Security Presidential Directive (HSPD)-12. should verify the contents of the documents against a final, official SUMMARY of CHANGE AR 380–67 Personnel Security Program This rapid action revision, dated 24 January 2014--o Revises criteria for application of security standards (para 2-4 q). No required documentation created pursuant to the training or personnel risk assessment programs exists. This rule updates policies, assigns responsibilities, and prescribes procedures for the Department of Defense (DoD) Personnel Security Program (PSP) in accordance with the provisions of current U.S. Code, Public Laws, and Executive Orders (E.O.). Copyright © 2021 Elsevier B.V. or its licensors or contributors. One comment was received and is addressed below: Comment: Given the increasing use of DNA (deoxyribonucleic acid) as an investigatory tool by federal, state, and local law enforcement agencies, the DoD should consider requiring applicants to provide a DNA sample. (1) Category 2 wounded, ill, or injured uniformed service personnel who expect to be separated with a medical disability rating of 30 percent or greater may submit a PSI for Top Secret clearance with SCI eligibility prior to medical separation provided they are serving in or have been nominated for a wounded warrior internship program. History . This part applies to the Office of the Secretary of Defense, the Military Departments, the Office of the Chairman of the Joint Chiefs of Staff and the Joint Staff, the Combatant Commands, the Office of the Inspector General of the DoD, the Defense Agencies, the DoD Field Activities, and all other organizational entities within the DoD (hereinafter referred to collectively as the “DoD Components”). Greater inclination for employees engaged in multinational trade transactions to regard unauthorized transfer of information assets or technology as a business matter rather than an act of betrayal or treason. We use cookies to help provide and enhance our service and tailor content and ads. This secondary issue would have to be examined by DoD and the legal community. In addition to security professionals, many boards include budget, privacy, and document professionals as well as members of the organization’s legal team. 12866, “Regulatory Planning and Review” and, Public Law 96-354, “Regulatory Flexibility Act” (, Public Law 96-511, “Paperwork Reduction Act” (44 U.S.C. The procedural guidance for the DoD PSP is currently being updated and will subsequently be proposed as a rule codified at 32 CFR Part 154. Technological, social, and economic trends that elevate opportunity and motivation for insiders to engage in theft (selling) of classified and proprietary information, and the transfer of materials to foreign rather than domestic recipients.