DoD R, “Department o£ Defense Personnel Security Program,” December , is hereby canceled as of December 31, DoD M – National Industrial Security Program Operating Manual. ( NISPOM) DoD R – Personnel Security Program. DOD R: DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM.
|Published (Last):||5 April 2011|
|PDF File Size:||7.71 Mb|
|ePub File Size:||5.49 Mb|
|Price:||Free* [*Free Regsitration Required]|
Sexual Behavior Sexual behavior that involves a criminal offense; indicates a personality or emotional disorder; reflects a lack of judgment or discretion; or may subject an applicant to undue influence or coercion, exploitation or duress can raise questions about the applicant’s reliability, trustworthiness and ability to protect classified national security information CNSI.
All information, both favorable and unfavorable, is weighed. Government departments and agencies may also choose to apply these guidelines to analogous situations regarding persons being considered for access to other types of protected information.
Affluence that cannot be explained by known sources of income is also a security concern. In evaluating the relevance of an individual’s conduct, the adjudicator will consider the 13 Adjudicative Guidelines and cross reference them with the following below-listed 9 Adjudicative Factors:. Allegiance is the loyalty that a citizen owes to his or her country.
Use of Information Technology IT Systems Noncompliance with rules, procedures, guidelines or regulations pertaining to information technology systems may raise security concerns about an individual’s reliability and trustworthiness, calling into question the willingness or ability to properly protect sensitive systems, networks and information. Information Technology IT Systems include all related computer hardware, software, firmware and data used for the communication, transmission, processing, manipulation, storage or protection of information.
Sources and Information A source’s impressions, opinions or interpretations are useful to investigators as clues to things that require further investigation, but they are generally not used as a basis for adjudicative action unless they are substantiated by examples of specific behaviors. Willingness and ability to comply with rules and regulations is, therefore, an important qualification for access to classified information.
One knowledgeable source who reports credible adverse information may outweigh many acquaintances who claim never to have seen evidence of such behavior.
Foreign contacts and interests become a security concern if an applicant has divided loyalties or if foreign financial interests can be manipulated or induced to help a foreign person, group, organization or government in a way that is not in the interests of the United States.
Sexual behavior that involves a criminal offense; indicates a personality or emotional disorder; reflects a lack of judgment or discretion; or may subject an applicant to undue influence or coercion, exploitation or duress can raise questions about the applicant’s reliability, trustworthiness and ability to protect classified odd security information CNSI.
It may indicate proceeds from financially profitable criminal acts.
DOD 5200.2-R PDF
Such behavior is sometimes part of a more general pattern of inability or unwillingness to follow rules that should also be evaluated under the Personal Conduct Guideline. This increases the risk of unauthorized disclosure of classified information due to impulsive or careless behavior.
It is principally a Foreign Influence or Foreign Preference issue when an individual shows a preference for a foreign country, serves a foreign interest or is vulnerable to foreign influence that puts protected information at risk.
They may harm the organization by actions that run the gamut from absenteeism to self-serving decisions, theft, fraud, sabotage or espionage. Government should be consulted when evaluating potentially disqualifying and mitigating information. Screening out applicants with a significant criminal history protects the organization against more than just espionage. Respectfully, Bill Meili Dallas Office: If your security clearance is jeopardized in any way, your career is at risk.
DOD Adjudicative Elements – Security Clearance
National security organizations have a vested interest in maintaining high standards. Name, Social Security Number SSNEmployee Identification Number EINand network user identification; service request records relating to password issuance, type of security clearance, and name of system to which access has been granted. Many employees become disloyal after gaining a security clearance.
An industrial security clearance case involves the adjudication of the security eligibility of officers and employees of defense contractors under Executive Order and DoD Directive Records are electronically deleted from the database. Government, prevent others from exercising their constitutional rights or to harm deliberately the United States.
They have the self-discipline generally required for success in an academic or career environment.
It impairs judgment, reduces inhibitions, and increases any tendency toward aggression. Any failure to do truthful and candid answers during the security clearance process is of particular interest. The 520.2-r information technology systems as used here includes all computer hardware, software, firmware, networks and data used for the communication, transmission, processing, manipulation, storage or protection of information.
Decisions regarding eligibility for access to classified information take into account factors that could cause a conflict of interest and place a person in the position of having to choose between his or her commitments to the United States, including the commitment to protect classified information, and any other compelling loyalty.
A person’s strengths are evaluated to assess whether the strengths outweigh the weaknesses.