Search results
Results from the WOW.Com Content Network
A Secret clearance requires a NACLC, and a Credit investigation; it must also be re-investigated every 10 years. [24] Investigative requirements for DoD clearances, which apply to most civilian contractor situations, are contained in the Personnel Security Program issuance known as DoD Regulation 5200.2-R, at part C3.4.2.
If the holder loses sponsorship, the holder is eligible for re-employment with the same clearance for up to 24 months without reinvestigation, after which an update investigation is required. A Periodic Reinvestigation is typically required every five years for Top Secret and ten years for Secret/Confidential, depending upon the agency.
A clearance by itself is normally not sufficient to gain access; the organization must also determine that the cleared individual needs to know specific information. No individual is supposed to be granted automatic access to classified information solely because of rank, position, or a security clearance.
The Tier 5 investigation is required in order to receive a Top Secret or Q clearance. [3] It is required for positions designated as High Risk. [1] Standard elements include background checks of employment, education, organization affiliations and any local agency where the subject has lived, worked, traveled or attended school.
Get AOL Mail for FREE! Manage your email like never before with travel, photo & document views. Personalize your inbox with themes & tabs. You've Got Mail!
The form is required to be completed by military personnel, government contractors, and government employees in order to receive a requisite security clearance. Information demanded in the form include any colleges or universities attended over the past three years, an account of the last ten years of the individual's employment, ties to ...
AOL Mail welcomes Verizon customers to our safe and delightful email experience!
The security policy must be explicit, well-defined, and enforced by the computer system. Three basic security policies are specified: [6] Mandatory Security Policy – Enforces access control rules based directly on an individual's clearance, authorization for the information and the confidentiality level of the information being sought.