Search results
Results from the WOW.Com Content Network
Within the U.S. government, security clearance levels serve as a mechanism to ascertain which individuals are authorized to access sensitive or classified information. These levels often appear in employment postings for Defense related jobs and other jobs involving substantial amounts of responsibility, such as air traffic control or nuclear ...
When security concerns arise for an individual, which could bar them from holding a security clearance, adjudicators may also look at the Whole-Person Concept as a source of potential mitigation so that the person may still be granted a security clearance. [41] The high-level clearance process can be lengthy, sometimes taking a year or more.
A United States security clearance is an official determination that an individual may access information classified by the United States Government. Security clearances are hierarchical; each level grants the holder access to information in that level and the levels below it.
According to the Department of Defense, Public Trust is a type of position, not clearance level, though General Services Administration refers to it as clearance level. [18] Certain positions which require access to sensitive information, but not information which is classified, must obtain this designation through a background check.
Access is restricted by law or regulation to particular groups of people with the necessary security clearance with a need to know. Mishandling of the material can incur criminal penalties. A formal security clearance is required to view or handle classified material. The clearance process requires a satisfactory background investigation.
For premium support please call: 800-290-4726 more ways to reach us
A Q Clearance is equivalent to a U.S. Department of Defense Top Secret clearance. [2] According to the Department of Energy, "Q access authorization corresponds to the background investigation and administrative determination similar to what is completed by other agencies for a Top Secret National Security Information access clearance." [2]
The security policy must be explicit, well-defined, and enforced by the computer system. Three basic security policies are specified: [6] Mandatory Security Policy – Enforces access control rules based directly on an individual's clearance, authorization for the information and the confidentiality level of the information being sought.