DoD R, “Department o£ Defense Personnel Security Program,” December , is hereby canceled as of December 31, DoD M – National Industrial Security Program Operating Manual. ( NISPOM) DoD R – Personnel Security Program. DOD R: DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM.
|Published (Last):||25 May 2012|
|PDF File Size:||8.93 Mb|
|ePub File Size:||6.70 Mb|
|Price:||Free* [*Free Regsitration Required]|
The use of illegal drugs or the misuse of prescription drugs can raise questions about an applicant’s reliability and trustworthiness since these actions impair judgment and suggest an inability or unwillingness to comply with laws, rules and regulations. It follows that such information will be known to few people, and that these are likely to be close associates such as family members, lovers, best friends, teammates or close work colleagues.
DOD 5200.2-R PDF
This is the opposite of the antisocial person who resists rules and regulations, finds it difficult to conform to society’s expectations, and exploits and manipulates other persons. This magnifies the amount of damage that can be caused by a single cleared insider working for the other side. Executive Orderdated September 15,establishes the U. Sexual Behavior Sexual behavior that involves a criminal offense; indicates a personality or emotional disorder; reflects a lack of judgment or discretion; or may subject an applicant to undue influence or coercion, exploitation or duress can raise questions about the applicant’s reliability, trustworthiness and ability to protect classified national security information CNSI.
The adjudicator is not just a reviewer and reporter of information.
The adjudication process seeks reasonable assurance that persons granted access to classified information are persons: The adjudication process seeks reasonable assurance that persons granted access to classified information are 5200.2. Government employee or member of the military is a violation of this presidential order.
All information, both favorable and unfavorable, is weighed.
Know where you stand. Most people try to conceal their involvement in illegal, immoral or otherwise embarrassing activities.
DOD Adjudicative Elements – Security Clearance
Trained adjudicators apply regulations, executive orders and government directives in order to determine the loyalty, trustworthiness and reliability of security clearance applicants.
Social Responsibility Maintaining security requires following the rules for protection of classified information. Personnel with technical skills and administrative access to a network are also capable of damaging or impairing the operability of critical information systems.
One of the keys is found in the appropriate regulations which underpin all security clearance work, and specifically in those sections dealing with extenuation and mitigation.
A personnel security clearance is an administrative determination by a certified adjudicator that an individual is eligible under national security standards for access to classified information. No adverse inference concerning the standards in this guideline may be made solely on the basis of the sexual orientation of the individual.
Certain emotional, mental and personality conditions can impair judgment, reliability or trustworthiness.
Owing to the magnitude of problems that can be caused by misuse of computer systems, all agencies have a vested interest in maintaining a work environment that fosters high standards of computer security.
We do everything necessary to establish that the client is, in fact, trustworthy, reliable and sufficiently possessed of sound and dox judgment. A formal diagnosis of a disorder is not required for there to be a concern under this guideline. Physical and electronic access are limited to persons responsible for servicing and authorized to use the system. Access decisions also take into account a person’s reliability, trustworthiness and ability to protect classified information. Sources dpd Information A source’s impressions, opinions or interpretations are useful to investigators as clues to things that require further investigation, but they are generally not used as a basis for adjudicative action unless they are substantiated by examples of specific behaviors.
Using the computer, individual employees can quickly and quietly commit serious crimes that are very difficult to detect. What most people do not know is that within each topic or issue, there are between 6 and 10 sub-topics or issues.
The potential for pressure, coercion, exploitation, or duress. Financial Considerations Failure or inability to live within one’s means, satisfy debts or meet financial obligations may indicate poor self-control, lack of judgment or unwillingness to abide by rules and regulations, all of which can raise questions about an applicant’s reliability, trustworthiness and ability to protect classified national security information CNSI.
When that happens, the agency will usually issue the individual a letter identifying the potential disqualifier. Emotionally stable and well-adjusted individuals generally respond to these experiences in positive ways; by learning from them, adjusting their expectations, working harder or sticking with their core values.
The ability to develop specific thresholds for action under these guidelines is limited by the nature and complexity of human behavior. They have the self-discipline generally required for success in an academic or career environment. Those who abuse alcohol are more likely than others to engage in high-risk, thoughtless or violent behaviors.
Most, if not all, of these topics or issues can be mitigated and be made to appear less severe.