SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
ClearanceJobs Security and Suitability
Clearance Golossary
                  —A—                         Classified Information — The three levels     CRYPTO — Cryptographic. A category of
                                              of classified national security information   classified information at the Secret and
Active Clearance — Security clearance
                                              are: Confidential, Secret and Top Secret.     Top Secret levels related to cryptographic
status where the individual granted a
                                              There are categories of classified            logic, keys and authenticators that require
clearance currently occupies a position for
                                              information, such as SCI, SAP and COMSEC,
                                                                           ,                special access controls and briefings.
which the clearance is required.
                                              within these three levels requiring
                                                                                            Current Clearance — Commonly used term
Adjudicative Guidelines — Document            special safeguarding and access controls
                                                                                            to describe the status of an individual’s
containing the 13 criteria used by            that exceed those normally required for
                                                                                            security clearance where the clearance
federal security clearance adjudicators       information at the same classification
                                                                                            has terminated but is eligible for
to determine an applicant’s eligibility       level.
                                                                                            reinstatement.
for access to classified national security
                                              CNWDI — Critical Nuclear Weapons Design
information.                                                                                CUI — Controlled Unclassified Information.
                                              Information. A category of Department
                                                                                            Unclassified information pertinent to the
ANACI — Access National Agency Check          of Defense (DoD) Secret and Top Secret
                                                                                            national interest of the United States
with Inquiries. Type of personnel security    Restricted Data that reveals the theory
                                                                                            or to the important interests of entities
investigation required for initial-hire       of operation or design of the components
                                                                                            outside the Federal Government. Other
federal employees who need a Confidential     of a thermonuclear or fission weapon or
                                                                                            unclassified information protected by
or Secret clearance or a DoE “L” Access       test device. Special access controls and
                                                                                            law from unauthorized disclosure is also
Authorization.                                briefings are required for CNWDI.
                                                                                            designated CUI. (See also FOUO and SBU.)
                  —B—                         COMSEC — Communications Security.
                                                                                            CVS — Clearance Verification System.
                                              Protective measures taken to deny
BI — Background Investigation. Type of                                                      Investigation and clearance database
                                              unauthorized persons information
personnel security investigation conducted                                                  system operated by OPM and accessible
                                              derived from telecommunications of the
for High-Risk Public Trust Positions. BI                                                    to federal security personnel. CVS
                                              U.S. Government relating to national
is also used as a generic term for any                                                      will eventually replace OPM’s older SII
                                              security and to ensure the authenticity
personnel security investigation.                                                           database. CVS has linkage to DoD’s JPAS
                                              of such communications. COMSEC is also
                                                                                            database.
                  —C—                         a category of classified information that
                                              requires special safeguarding, access
CAF — Central Adjudication Facility. The                                                                     —D—
                                              restrictions and briefings.
office of a federal agency that adjudicates                                                 DCII — Defense Central Index of
all security clearance for that agency.       COSMIC Top Secret — Control Of Secret         Investigations. Computer database
Within the Department of Defense there        Material in an International Command. The     that contains listings of criminal and
are 10 CAFs (Army, Navy, Air Force, DISCO,    term used for NATO Top Secret information     security investigations conducted by DoD
JCS, WHS, DIA, NSA, NGA and NRO).             and clearances.                               investigative agencies. The DCII is no
                                                                                            longer being updated with new clearance


                                                                                                                      CONTINUED>>



                  Build your own personal network of cleared candidates on The Cleared Network – only on ClearanceJobs.com.

                 1.877.386.3323 • www.clearancejobs.com                            SECURITY CLEARANCE JOBS FOR U.S. CITIZENS
data. Since July 2005, new clearance data     security clearance where the clearance                             —J—
are being entered into the Joint Personnel    has terminated and is no longer eligible
                                                                                            JPAS — Joint Personnel Adjudication
Adjudication System (JPAS).                   for reinstatement because time limits for
                                                                                            System. Web-based system that connects
                                              reinstatement have been exceeded.
DISCO — Defense Industrial Security                                                         security personnel with a database used
Clearance Office. Component of DSS that                         —F—                         to initiate and manage DoD personnel
processes, adjudicates and grants security                                                  security investigations and clearances. It
                                              FOUO — For Official Use Only. Protective
clearances for industrial (contractor)                                                      is managed by DoD Central Adjudication
                                              marking used to identify unclassified
personnel under the National Industrial                                                     Facilities (CAFs) and is composed of
                                              sensitive government information requiring
Security Program (NISP).                                                                    two subsystems: Joint Adjudication
                                              special handling and access controls.
                                                                                            Management System (JAMS) and Joint
DOHA — Defense Office of Hearings and                                                       Clearance Access Verification System
                                              FRD — Formerly Restricted Data. Classified
Appeals. Component of the Defense Legal                                                     (JCAVS).
                                              information which has been removed
Services Agency that issues decisions in
                                              from the Restricted Data category after
security clearance cases for contractor                                                                        —L—
                                              Department of Energy (DoE) and DoD
personnel doing work for DoD components                                                     LAA — Limited Access Authorization.
                                              have jointly determined that it relates
and 20 other Federal Agencies and                                                           Permission granted by the Federal
                                              primarily to the military utilization of
Departments. It also conducts personal                                                      Government to non-U.S. citizens for access
                                              atomic weapons and can be adequately
appearances for DoD civilian employee                                                       to classified national security information
                                              safeguarded as national security
and military personnel security clearance                                                   where the non-U.S. citizen possesses
                                              information.
appeals.                                                                                    unique or unusual skill or expertise that
                                                               —H—                          is urgently needed to support a specific
DSS — Defense Security Service. Formerly
                                              HSPD-12 — Homeland Security Presidential      government project involving access to
known as the Defense Investigative Service
                                              Directive Number 12. Mandates a               specified classified information and a
(DIS). DSS is responsible for administering
                                              standard for secure and reliable forms        cleared or clearable U.S. citizen is not
the National Industrial Security Program
                                              of identification for personnel requiring     readily available.
(NISP) and providing security education
and training to DoD and other federal         physical or logical access to federal
                                                                                            “L” Access Authorization — DoE clearance
personnel and contractors.                    facilities or computer systems. Sponsorship
                                                                                            that authorizes access up to Secret
                                              plus a favorably adjudicated NACI are
                                                                                            Formerly Restricted Data and Secret
                 —E—                          needed to obtain a Personal Identity
                                                                                            National Security Information.
eQIP — Electronic Questionnaires for          Verification (PIV) card required by this
Investigations Processing. Web-based          directive.                                    LBI — Limited Background Investigation.
versions of OPM Standard Forms 85,                                                          Type of personnel security investigation
                                                                —I—                         used for Moderate-Risk or High-Risk Public
85P 85PS and 86 used for initiating
   ,
federal personnel security investigations.    Interim Security Clearance — Temporary        Trust positions.
The eQIP version of the SF86 replaced         security clearance based on the favorable
                                              completion of minimum investigative           LOD — Letter of Denial. Letter issued by
DoD’s Electronic Personnel Security
                                              requirements, pending the completion of       a security clearance adjudication facility
Questionnaire (EPSQ).
                                              the full investigative requirements for the   informing an applicant of a final decision
Expired Clearance — Commonly used term        final clearance determination.                to deny the applicant a security clearance
to describe the status of an individual’s                                                   and of the applicant’s right to appeal the




                                                                                                                      CONTINUED>>


                 Build your own personal network of cleared candidates on The Cleared Network – only on ClearanceJobs.com.

               1.877.386.3323 • www.clearancejobs.com                            SECURITY CLEARANCE JOBS FOR U.S. CITIZENS
decision to the agency’s Personnel Security   NACLC — National Agency Check with Local      Counterintelligence-Scope or Full-
Appeals Board.                                Agency Checks and Credit Check. Type          Scope (lifestyle and counterintelligence
                                              of personnel security investigation used      questions).
LOI — Letter of Intent. Letter that
                                              for Confidential and Secret clearances
accompanies a “Statement of Reasons”                                                        PPR — Phased Periodic Reinvestigation.
                                              or for DoE “L” access authorizations.
explaining why a tentative decision to                                                      Abbreviated form of the Single Scope
                                              This investigation is not authorized for
deny a security clearance was made and                                                      Background Investigation – Periodic
                                              initial-hire federal employees requiring
offering the applicant an opportunity to                                                    Reinvestigation (SSBI-PR). The PPR is an
                                              a security clearance or a DoE “L” Access
rebut or mitigate the reasons.                                                              optional form of the SSBI-PR reserved for
                                              Authorization.
                                                                                            personnel with no unfavorable information
Loss of Jurisdiction — Status of an
                                                                 —O—                        listed in their clearance application.
individual’s security clearance when
employment for the required clearance         OHA — Office of Hearings and Appeals.         PR — Periodic Reinvestigation.
terminates after a clearance action is        Component of the Department of Energy         Reinvestigations required at specific
initiated but before a final determination    (DoE) responsible for conducting hearings     intervals to maintain a security clearance
is made to grant, continue, deny or revoke    and issuing decisions involving personnel     or a designated public trust position.
the clearance.                                security clearance cases of DoE employees
                                              and contractors.                              PRSI — Personal Subject Interview. In
                  —M—                                                                       depth interview of the subject of a
                                              OPM/FISD — Office of Personnel                personnel security investigation by a
MBI — Minimum Background Investigation.
                                              Management/Federal Investigative Services     security investigator. The PRSI is a standard
Type of personnel security investigation
                                              Division. Principal supplier of personnel     component of the SSBI, SSBI-PR, PPR, BI,
used for Moderate-Risk Public Trust
                                              security investigations to the Federal        MBI, LBI, and PT-SBI.
positions.
                                              Government.
                                                                                            PSI — Personal Security Investigation. Term
                  —N—                                            —P—                        that encompasses all types of background
NAC — National Agency Check. Basic                                                          investigations used to determine
                                              Period of Coverage — Also known as the
component of all federal personnel                                                          employment suitability and security
                                              Period of Investigation. Standard period
security investigations. As a minimum all                                                   clearance eligibility.
                                              of time covered by a Personnel Security
NACs include a check of FBI Headquarters
                                              Investigation (PSI). Each type of PSI
records, an FBI technical fingerprint
                                              has an overall period of coverage and
search, and a check of OPM and DoD
                                              specific periods of coverage for individual   Public Trust Position — Designated
investigative databases.
                                              components (i.e. employment, police           federal employee and contractor positions
NACI — National Agency Check with             records, and education) of a PSI.             that, due to the sensitive unclassified
Inquiries. Type of personnel security                                                       responsibilities of the positions, require
                                              Polygraph — Device that measures and
investigation used for determining federal                                                  suitability determinations based on
                                              records physiological responses while a
employment suitability or for the issuance                                                  personnel security investigations. Public
                                              subject answers a series of questions. It
of a Personal Identity Verification (PIV)                                                   Trust positions are designated as either
                                              relies on the belief that false answers
card required by HSPD-12. An NACI plus                                                      Moderate-Risk or High-Risk. Public Trust
                                              will produce distinctive measurements.
credit check can be used as the basis for                                                   position include positions designated ADP-I,
                                              Polygraph examinations are used as
contractor Moderate-Risk Public Trust                                                       ADP-II, ADP-III, IT-1, IT-2, IT-3, IT-5, IT-6,
                                              an adjunct to an SSBI for some Special
positions.                                                                                  5C and 6C.
                                              Access Programs and can be either




                  Build your own personal network of cleared candidates on The Cleared Network – only on ClearanceJobs.com.

                 1.877.386.3323 • www.clearancejobs.com                           SECURITY CLEARANCE JOBS FOR U.S. CITIZENS
PT-SBI — Public Trust-Special Background     level (does not include COMSEC, CRYPTO,         Security Clearance — Determination
Investigation. Type of personnel security    or CNWDI). SAPs are categorized as              made by a government personnel security
investigation conducted for selected High-   intelligence, acquisition and operations/       adjudicator that an individual’s access to
Risk Public Trust positions.                 support. They are also categorized as           classified information is clearly consistent
                                             acknowledged, unacknowledged and                with the interests of national security.
                  —Q—                        waived.                                         Among adjudicators the term “Security
“Q” Access Authorization — DoE                                                               Clearance” is being replaced by the term
                                             SBU — Sensitive But Unclassified. Term
clearance that authorizes access up to                                                       “Eligibility for Access.”
                                             that is being replaced by “Controlled
Top Secret Restricted Data and Top Secret
                                             Unclassified Information.” (See also CUI        SF85 — Standard Form 85. Questionnaire
National Security Information.
                                             and FOUO).                                      for Non-Sensitive Positions. Form used
                  —R—                                                                        as the basis for a NACI to determine
                                             Scattered Castles — Consolidated
                                                                                             an individual’s suitability for federal
RD — Restricted Data. Classified             personnel security investigation and
                                                                                             employment in non-sensitive positions
information defined by the Atomic Energy     clearance database of U.S. Intelligence
                                                                                             or to hold certain non-sensitive federal
Act as concerning: 1) design, manufacture,   Community personnel. The database is
                                                                                             contractor positions.
or utilization of atomic weapons; 2)         operated and maintained by the Director
production of special nuclear material; or   of National Intelligence.                       SF85P — Standard Form 85P Questionnaire
                                                                                                                      .
3) use of special nuclear material in the                                                    for Public Trust Positions. Form used as
production of energy. RD is considered a     SCI — Sensitive Compartmented
                                                                                             the basis for an investigation to determine
special access program.                      Information. Category of classified
                                                                                             an individual’s suitability to hold a Public
                                             information with many separate
                                                                                             Trust position.
RRU — Request for Research/Recertify/        subcategories or compartments that
Upgrade Eligibility. Direct notification     imposes safeguarding and access                 SF85P-S — Standard Form 85P-S.
to the appropriate CAF through JPAS of       restrictions that exceed those normally         Supplemental Questionnaire for Selected
any personnel security clearance status      required for information at the same            Positions. Form used in addition to the
changes a JPAS user cannot make within       classification level. SCI is a Special Access   SF85P as the basis for an investigation
the system.                                  Program (SAP) involving intelligence            to determine an individual’s suitability
                                             sources, methods or analytical processes.       to hold selected High-Risk Public Trust
RSI — Reimbursable Suitability/Security
                                             SCI has three sensitivity levels — SSBI         positions.
Investigations. Specific investigative
                                             without polygraph, SSBI with CI-Scope
actions to gather information to resolve                                                     SF86 — Standard Form 86. Questionnaire
                                             polygraph and SSBI with Full-Scope
issues that surfaced during a standard OPM                                                   for National Security Positions. Form
                                             polygraph.
personnel security investigation.                                                            used as the basis for an investigation to
                                             Scope of Investigation — Standard               determine an individual’s eligibility for a
                  —S—
                                             components of an investigation, such            security clearance or for continuation of
SAP — Special Access Program. Program        as character references, employment             an existing security clearance.
established for a specific category of       records, credit report, police records
classified information that imposes                                                          SII — Security/Suitability Investigations
                                             checks, national agency checks and
safeguarding and access requirements                                                         Index. OPM’s computer database of
                                             educational records. The term “scope”
that exceed those normally required for                                                      investigations accessible to federal
                                             is often misused to describe an
information at the same classification                                                       security personnel.
                                             investigation’s “Period of Coverage.”




                  Build your own personal network of cleared candidates on The Cleared Network – only on ClearanceJobs.com.

                1.877.386.3323 • www.clearancejobs.com                           SECURITY CLEARANCE JOBS FOR U.S. CITIZENS
SOR — Statement of Reason. Document
from a security clearance adjudication
facility advising an applicant of the
specific reason(s) why the adjudication
facility intends to deny or revoke a
security clearance. The SOR also advises
the applicant of his/her right to submit
a written rebuttal and/or mitigating
information regarding the allegations and
in the case of contractors, the additional
right to a hearing before an administrative
judge.

SPIN — Special Interview. Subject
interview to address specific unresolved
issues developed during a standard OPM
personnel security investigation.

SSBI — Single Scope Background
Investigation. Type of personnel security
investigation used for Top Secret
clearances, DoE “Q” access authorizations,
Sensitive Compartmented Information
(SCI) and other designated Special Access
Programs (SAP).
Compiled by William H. Henderson, author of Security
Clearance Manual




                        Build your own personal network of cleared candidates on The Cleared Network – only on ClearanceJobs.com.

                     1.877.386.3323 • www.clearancejobs.com                     SECURITY CLEARANCE JOBS FOR U.S. CITIZENS

Weitere ähnliche Inhalte

Was ist angesagt?

Want a Security Clearance: This is what you need to know
Want a Security Clearance: This is what you need to knowWant a Security Clearance: This is what you need to know
Want a Security Clearance: This is what you need to knowCareer Communications Group
 
Want a Security Clearance? This is what you need to know
Want a Security Clearance? This is what you need to knowWant a Security Clearance? This is what you need to know
Want a Security Clearance? This is what you need to knowCareer Communications Group
 
Facility security clearance refresher training
Facility security clearance refresher trainingFacility security clearance refresher training
Facility security clearance refresher trainingPhilip Barquer
 
Healthcare forum yelorda megan himss presentation
Healthcare forum yelorda megan himss presentation Healthcare forum yelorda megan himss presentation
Healthcare forum yelorda megan himss presentation ISSA LA
 
Facility security clearance refresher training.
Facility security clearance refresher training.Facility security clearance refresher training.
Facility security clearance refresher training.Philip Barquer
 
The Flip Side of Interrogation
The Flip Side of InterrogationThe Flip Side of Interrogation
The Flip Side of InterrogationKevin S. Gould
 
Facility security clearance refresher training video.
Facility security clearance refresher training video.Facility security clearance refresher training video.
Facility security clearance refresher training video.Philip Barquer
 
BEYA2021 The Top Secret: Applying for and Leveraging a Security Clearance
BEYA2021 The Top Secret: Applying for and Leveraging a Security Clearance BEYA2021 The Top Secret: Applying for and Leveraging a Security Clearance
BEYA2021 The Top Secret: Applying for and Leveraging a Security Clearance Career Communications Group
 

Was ist angesagt? (8)

Want a Security Clearance: This is what you need to know
Want a Security Clearance: This is what you need to knowWant a Security Clearance: This is what you need to know
Want a Security Clearance: This is what you need to know
 
Want a Security Clearance? This is what you need to know
Want a Security Clearance? This is what you need to knowWant a Security Clearance? This is what you need to know
Want a Security Clearance? This is what you need to know
 
Facility security clearance refresher training
Facility security clearance refresher trainingFacility security clearance refresher training
Facility security clearance refresher training
 
Healthcare forum yelorda megan himss presentation
Healthcare forum yelorda megan himss presentation Healthcare forum yelorda megan himss presentation
Healthcare forum yelorda megan himss presentation
 
Facility security clearance refresher training.
Facility security clearance refresher training.Facility security clearance refresher training.
Facility security clearance refresher training.
 
The Flip Side of Interrogation
The Flip Side of InterrogationThe Flip Side of Interrogation
The Flip Side of Interrogation
 
Facility security clearance refresher training video.
Facility security clearance refresher training video.Facility security clearance refresher training video.
Facility security clearance refresher training video.
 
BEYA2021 The Top Secret: Applying for and Leveraging a Security Clearance
BEYA2021 The Top Secret: Applying for and Leveraging a Security Clearance BEYA2021 The Top Secret: Applying for and Leveraging a Security Clearance
BEYA2021 The Top Secret: Applying for and Leveraging a Security Clearance
 

Ähnlich wie Security Clearance Information

Paper on Identification and Operational Risk-Boyd-16 Nov 2015
Paper on Identification and Operational Risk-Boyd-16 Nov 2015Paper on Identification and Operational Risk-Boyd-16 Nov 2015
Paper on Identification and Operational Risk-Boyd-16 Nov 2015John Boyd
 
Dynamic access control sbc12 - thuan nguyen
Dynamic access control sbc12 - thuan nguyenDynamic access control sbc12 - thuan nguyen
Dynamic access control sbc12 - thuan nguyenThuan Ng
 
Self-Protecting Information for De-Perimiterised Electronic Relationships
Self-Protecting Information for De-Perimiterised Electronic RelationshipsSelf-Protecting Information for De-Perimiterised Electronic Relationships
Self-Protecting Information for De-Perimiterised Electronic RelationshipsJeremy Hilton
 
The Federal Information Security Management Act
The Federal Information Security Management ActThe Federal Information Security Management Act
The Federal Information Security Management ActMichelle Singh
 
WP82 Physical Security in Mission Critical Facilities
WP82   Physical Security in Mission Critical FacilitiesWP82   Physical Security in Mission Critical Facilities
WP82 Physical Security in Mission Critical FacilitiesSE_NAM_Training
 
RAINBOW BOOK - Orange book
RAINBOW BOOK - Orange bookRAINBOW BOOK - Orange book
RAINBOW BOOK - Orange bookFelipe Prado
 
Attributable Networks - Guardtime Whitepaper
Attributable Networks - Guardtime WhitepaperAttributable Networks - Guardtime Whitepaper
Attributable Networks - Guardtime WhitepaperMartin Ruubel
 
Insider threat-what-us-do d-want
Insider threat-what-us-do d-wantInsider threat-what-us-do d-want
Insider threat-what-us-do d-wantSecurity Bootcamp
 
Himmatullah Ferozee Assingnment.pptx
Himmatullah Ferozee Assingnment.pptxHimmatullah Ferozee Assingnment.pptx
Himmatullah Ferozee Assingnment.pptxMobeenMasoudi
 
CMMC rollout: How CMMC will impact your organization
CMMC rollout: How CMMC will impact your organizationCMMC rollout: How CMMC will impact your organization
CMMC rollout: How CMMC will impact your organizationInfosec
 
Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...
Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...
Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...Source Conference
 
Data Breach Brochure
Data Breach BrochureData Breach Brochure
Data Breach Brochuretonycord01
 
Data Breach Brochure
Data Breach BrochureData Breach Brochure
Data Breach Brochuretonycord01
 
Comprehensive Analysis of Contemporary Information Security Challenges
Comprehensive Analysis of Contemporary Information Security ChallengesComprehensive Analysis of Contemporary Information Security Challenges
Comprehensive Analysis of Contemporary Information Security Challengessidraasif9090
 
Presented at the University of Louisville Cyber Securitys Day,.docx
Presented at the University of Louisville Cyber Securitys Day,.docxPresented at the University of Louisville Cyber Securitys Day,.docx
Presented at the University of Louisville Cyber Securitys Day,.docxChantellPantoja184
 
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor AuthenticationAddressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor AuthenticationPeter Choi
 
1 Info Sec+Risk Mgmt
1 Info Sec+Risk Mgmt1 Info Sec+Risk Mgmt
1 Info Sec+Risk MgmtAlfred Ouyang
 
63 Requirements for CASB
63 Requirements for CASB63 Requirements for CASB
63 Requirements for CASBKyle Watson
 
Eidws 107 information assurance
Eidws 107 information assuranceEidws 107 information assurance
Eidws 107 information assuranceIT2Alcorn
 

Ähnlich wie Security Clearance Information (20)

Paper on Identification and Operational Risk-Boyd-16 Nov 2015
Paper on Identification and Operational Risk-Boyd-16 Nov 2015Paper on Identification and Operational Risk-Boyd-16 Nov 2015
Paper on Identification and Operational Risk-Boyd-16 Nov 2015
 
Dynamic access control sbc12 - thuan nguyen
Dynamic access control sbc12 - thuan nguyenDynamic access control sbc12 - thuan nguyen
Dynamic access control sbc12 - thuan nguyen
 
Self-Protecting Information for De-Perimiterised Electronic Relationships
Self-Protecting Information for De-Perimiterised Electronic RelationshipsSelf-Protecting Information for De-Perimiterised Electronic Relationships
Self-Protecting Information for De-Perimiterised Electronic Relationships
 
Federated and Secure Identity Management in Operation
Federated and Secure Identity Management in OperationFederated and Secure Identity Management in Operation
Federated and Secure Identity Management in Operation
 
The Federal Information Security Management Act
The Federal Information Security Management ActThe Federal Information Security Management Act
The Federal Information Security Management Act
 
WP82 Physical Security in Mission Critical Facilities
WP82   Physical Security in Mission Critical FacilitiesWP82   Physical Security in Mission Critical Facilities
WP82 Physical Security in Mission Critical Facilities
 
RAINBOW BOOK - Orange book
RAINBOW BOOK - Orange bookRAINBOW BOOK - Orange book
RAINBOW BOOK - Orange book
 
Attributable Networks - Guardtime Whitepaper
Attributable Networks - Guardtime WhitepaperAttributable Networks - Guardtime Whitepaper
Attributable Networks - Guardtime Whitepaper
 
Insider threat-what-us-do d-want
Insider threat-what-us-do d-wantInsider threat-what-us-do d-want
Insider threat-what-us-do d-want
 
Himmatullah Ferozee Assingnment.pptx
Himmatullah Ferozee Assingnment.pptxHimmatullah Ferozee Assingnment.pptx
Himmatullah Ferozee Assingnment.pptx
 
CMMC rollout: How CMMC will impact your organization
CMMC rollout: How CMMC will impact your organizationCMMC rollout: How CMMC will impact your organization
CMMC rollout: How CMMC will impact your organization
 
Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...
Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...
Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...
 
Data Breach Brochure
Data Breach BrochureData Breach Brochure
Data Breach Brochure
 
Data Breach Brochure
Data Breach BrochureData Breach Brochure
Data Breach Brochure
 
Comprehensive Analysis of Contemporary Information Security Challenges
Comprehensive Analysis of Contemporary Information Security ChallengesComprehensive Analysis of Contemporary Information Security Challenges
Comprehensive Analysis of Contemporary Information Security Challenges
 
Presented at the University of Louisville Cyber Securitys Day,.docx
Presented at the University of Louisville Cyber Securitys Day,.docxPresented at the University of Louisville Cyber Securitys Day,.docx
Presented at the University of Louisville Cyber Securitys Day,.docx
 
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor AuthenticationAddressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
 
1 Info Sec+Risk Mgmt
1 Info Sec+Risk Mgmt1 Info Sec+Risk Mgmt
1 Info Sec+Risk Mgmt
 
63 Requirements for CASB
63 Requirements for CASB63 Requirements for CASB
63 Requirements for CASB
 
Eidws 107 information assurance
Eidws 107 information assuranceEidws 107 information assurance
Eidws 107 information assurance
 

Mehr von ClearanceJobs

Top Secret Tech Jobs - ClearanceJobs
Top Secret Tech Jobs - ClearanceJobsTop Secret Tech Jobs - ClearanceJobs
Top Secret Tech Jobs - ClearanceJobsClearanceJobs
 
Cybersecurity Salary in Washington, D.C.
Cybersecurity Salary in Washington, D.C.Cybersecurity Salary in Washington, D.C.
Cybersecurity Salary in Washington, D.C.ClearanceJobs
 
Job Search Guide: Veterans Edition
Job Search Guide: Veterans EditionJob Search Guide: Veterans Edition
Job Search Guide: Veterans EditionClearanceJobs
 
Military Transition Job Search Guide
Military Transition Job Search GuideMilitary Transition Job Search Guide
Military Transition Job Search GuideClearanceJobs
 
ClearanceJobs: Reaching Veterans, Wounded Warriors and Targeted Disabilities
ClearanceJobs: Reaching Veterans, Wounded Warriors and Targeted DisabilitiesClearanceJobs: Reaching Veterans, Wounded Warriors and Targeted Disabilities
ClearanceJobs: Reaching Veterans, Wounded Warriors and Targeted DisabilitiesClearanceJobs
 
The Cleared Network: Recruiting and Networking with Cleared Professionals
The Cleared Network: Recruiting and Networking with Cleared ProfessionalsThe Cleared Network: Recruiting and Networking with Cleared Professionals
The Cleared Network: Recruiting and Networking with Cleared ProfessionalsClearanceJobs
 
Government Contractor vs Government Employment
Government Contractor vs Government EmploymentGovernment Contractor vs Government Employment
Government Contractor vs Government EmploymentClearanceJobs
 
BRAC 2005 - 2011 (Base Realignment and Closure)
BRAC 2005 - 2011 (Base Realignment and Closure)BRAC 2005 - 2011 (Base Realignment and Closure)
BRAC 2005 - 2011 (Base Realignment and Closure)ClearanceJobs
 
FSO Training: Preparing for Business Growth
FSO Training: Preparing for Business GrowthFSO Training: Preparing for Business Growth
FSO Training: Preparing for Business GrowthClearanceJobs
 
Security Clearance Jobs in Tampa, St. Petersburg, Orlando, and Huntsville
Security Clearance Jobs in Tampa, St. Petersburg, Orlando, and HuntsvilleSecurity Clearance Jobs in Tampa, St. Petersburg, Orlando, and Huntsville
Security Clearance Jobs in Tampa, St. Petersburg, Orlando, and HuntsvilleClearanceJobs
 
Security Clearance Jobs in Phoenix, Tucson, Colorado Springs, Dallas and Fort...
Security Clearance Jobs in Phoenix, Tucson, Colorado Springs, Dallas and Fort...Security Clearance Jobs in Phoenix, Tucson, Colorado Springs, Dallas and Fort...
Security Clearance Jobs in Phoenix, Tucson, Colorado Springs, Dallas and Fort...ClearanceJobs
 

Mehr von ClearanceJobs (11)

Top Secret Tech Jobs - ClearanceJobs
Top Secret Tech Jobs - ClearanceJobsTop Secret Tech Jobs - ClearanceJobs
Top Secret Tech Jobs - ClearanceJobs
 
Cybersecurity Salary in Washington, D.C.
Cybersecurity Salary in Washington, D.C.Cybersecurity Salary in Washington, D.C.
Cybersecurity Salary in Washington, D.C.
 
Job Search Guide: Veterans Edition
Job Search Guide: Veterans EditionJob Search Guide: Veterans Edition
Job Search Guide: Veterans Edition
 
Military Transition Job Search Guide
Military Transition Job Search GuideMilitary Transition Job Search Guide
Military Transition Job Search Guide
 
ClearanceJobs: Reaching Veterans, Wounded Warriors and Targeted Disabilities
ClearanceJobs: Reaching Veterans, Wounded Warriors and Targeted DisabilitiesClearanceJobs: Reaching Veterans, Wounded Warriors and Targeted Disabilities
ClearanceJobs: Reaching Veterans, Wounded Warriors and Targeted Disabilities
 
The Cleared Network: Recruiting and Networking with Cleared Professionals
The Cleared Network: Recruiting and Networking with Cleared ProfessionalsThe Cleared Network: Recruiting and Networking with Cleared Professionals
The Cleared Network: Recruiting and Networking with Cleared Professionals
 
Government Contractor vs Government Employment
Government Contractor vs Government EmploymentGovernment Contractor vs Government Employment
Government Contractor vs Government Employment
 
BRAC 2005 - 2011 (Base Realignment and Closure)
BRAC 2005 - 2011 (Base Realignment and Closure)BRAC 2005 - 2011 (Base Realignment and Closure)
BRAC 2005 - 2011 (Base Realignment and Closure)
 
FSO Training: Preparing for Business Growth
FSO Training: Preparing for Business GrowthFSO Training: Preparing for Business Growth
FSO Training: Preparing for Business Growth
 
Security Clearance Jobs in Tampa, St. Petersburg, Orlando, and Huntsville
Security Clearance Jobs in Tampa, St. Petersburg, Orlando, and HuntsvilleSecurity Clearance Jobs in Tampa, St. Petersburg, Orlando, and Huntsville
Security Clearance Jobs in Tampa, St. Petersburg, Orlando, and Huntsville
 
Security Clearance Jobs in Phoenix, Tucson, Colorado Springs, Dallas and Fort...
Security Clearance Jobs in Phoenix, Tucson, Colorado Springs, Dallas and Fort...Security Clearance Jobs in Phoenix, Tucson, Colorado Springs, Dallas and Fort...
Security Clearance Jobs in Phoenix, Tucson, Colorado Springs, Dallas and Fort...
 

Kürzlich hochgeladen

4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 

Kürzlich hochgeladen (20)

4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 

Security Clearance Information

  • 1. ClearanceJobs Security and Suitability Clearance Golossary —A— Classified Information — The three levels CRYPTO — Cryptographic. A category of of classified national security information classified information at the Secret and Active Clearance — Security clearance are: Confidential, Secret and Top Secret. Top Secret levels related to cryptographic status where the individual granted a There are categories of classified logic, keys and authenticators that require clearance currently occupies a position for information, such as SCI, SAP and COMSEC, , special access controls and briefings. which the clearance is required. within these three levels requiring Current Clearance — Commonly used term Adjudicative Guidelines — Document special safeguarding and access controls to describe the status of an individual’s containing the 13 criteria used by that exceed those normally required for security clearance where the clearance federal security clearance adjudicators information at the same classification has terminated but is eligible for to determine an applicant’s eligibility level. reinstatement. for access to classified national security CNWDI — Critical Nuclear Weapons Design information. CUI — Controlled Unclassified Information. Information. A category of Department Unclassified information pertinent to the ANACI — Access National Agency Check of Defense (DoD) Secret and Top Secret national interest of the United States with Inquiries. Type of personnel security Restricted Data that reveals the theory or to the important interests of entities investigation required for initial-hire of operation or design of the components outside the Federal Government. Other federal employees who need a Confidential of a thermonuclear or fission weapon or unclassified information protected by or Secret clearance or a DoE “L” Access test device. Special access controls and law from unauthorized disclosure is also Authorization. briefings are required for CNWDI. designated CUI. (See also FOUO and SBU.) —B— COMSEC — Communications Security. CVS — Clearance Verification System. Protective measures taken to deny BI — Background Investigation. Type of Investigation and clearance database unauthorized persons information personnel security investigation conducted system operated by OPM and accessible derived from telecommunications of the for High-Risk Public Trust Positions. BI to federal security personnel. CVS U.S. Government relating to national is also used as a generic term for any will eventually replace OPM’s older SII security and to ensure the authenticity personnel security investigation. database. CVS has linkage to DoD’s JPAS of such communications. COMSEC is also database. —C— a category of classified information that requires special safeguarding, access CAF — Central Adjudication Facility. The —D— restrictions and briefings. office of a federal agency that adjudicates DCII — Defense Central Index of all security clearance for that agency. COSMIC Top Secret — Control Of Secret Investigations. Computer database Within the Department of Defense there Material in an International Command. The that contains listings of criminal and are 10 CAFs (Army, Navy, Air Force, DISCO, term used for NATO Top Secret information security investigations conducted by DoD JCS, WHS, DIA, NSA, NGA and NRO). and clearances. investigative agencies. The DCII is no longer being updated with new clearance CONTINUED>> Build your own personal network of cleared candidates on The Cleared Network – only on ClearanceJobs.com. 1.877.386.3323 • www.clearancejobs.com SECURITY CLEARANCE JOBS FOR U.S. CITIZENS
  • 2. data. Since July 2005, new clearance data security clearance where the clearance —J— are being entered into the Joint Personnel has terminated and is no longer eligible JPAS — Joint Personnel Adjudication Adjudication System (JPAS). for reinstatement because time limits for System. Web-based system that connects reinstatement have been exceeded. DISCO — Defense Industrial Security security personnel with a database used Clearance Office. Component of DSS that —F— to initiate and manage DoD personnel processes, adjudicates and grants security security investigations and clearances. It FOUO — For Official Use Only. Protective clearances for industrial (contractor) is managed by DoD Central Adjudication marking used to identify unclassified personnel under the National Industrial Facilities (CAFs) and is composed of sensitive government information requiring Security Program (NISP). two subsystems: Joint Adjudication special handling and access controls. Management System (JAMS) and Joint DOHA — Defense Office of Hearings and Clearance Access Verification System FRD — Formerly Restricted Data. Classified Appeals. Component of the Defense Legal (JCAVS). information which has been removed Services Agency that issues decisions in from the Restricted Data category after security clearance cases for contractor —L— Department of Energy (DoE) and DoD personnel doing work for DoD components LAA — Limited Access Authorization. have jointly determined that it relates and 20 other Federal Agencies and Permission granted by the Federal primarily to the military utilization of Departments. It also conducts personal Government to non-U.S. citizens for access atomic weapons and can be adequately appearances for DoD civilian employee to classified national security information safeguarded as national security and military personnel security clearance where the non-U.S. citizen possesses information. appeals. unique or unusual skill or expertise that —H— is urgently needed to support a specific DSS — Defense Security Service. Formerly HSPD-12 — Homeland Security Presidential government project involving access to known as the Defense Investigative Service Directive Number 12. Mandates a specified classified information and a (DIS). DSS is responsible for administering standard for secure and reliable forms cleared or clearable U.S. citizen is not the National Industrial Security Program of identification for personnel requiring readily available. (NISP) and providing security education and training to DoD and other federal physical or logical access to federal “L” Access Authorization — DoE clearance personnel and contractors. facilities or computer systems. Sponsorship that authorizes access up to Secret plus a favorably adjudicated NACI are Formerly Restricted Data and Secret —E— needed to obtain a Personal Identity National Security Information. eQIP — Electronic Questionnaires for Verification (PIV) card required by this Investigations Processing. Web-based directive. LBI — Limited Background Investigation. versions of OPM Standard Forms 85, Type of personnel security investigation —I— used for Moderate-Risk or High-Risk Public 85P 85PS and 86 used for initiating , federal personnel security investigations. Interim Security Clearance — Temporary Trust positions. The eQIP version of the SF86 replaced security clearance based on the favorable completion of minimum investigative LOD — Letter of Denial. Letter issued by DoD’s Electronic Personnel Security requirements, pending the completion of a security clearance adjudication facility Questionnaire (EPSQ). the full investigative requirements for the informing an applicant of a final decision Expired Clearance — Commonly used term final clearance determination. to deny the applicant a security clearance to describe the status of an individual’s and of the applicant’s right to appeal the CONTINUED>> Build your own personal network of cleared candidates on The Cleared Network – only on ClearanceJobs.com. 1.877.386.3323 • www.clearancejobs.com SECURITY CLEARANCE JOBS FOR U.S. CITIZENS
  • 3. decision to the agency’s Personnel Security NACLC — National Agency Check with Local Counterintelligence-Scope or Full- Appeals Board. Agency Checks and Credit Check. Type Scope (lifestyle and counterintelligence of personnel security investigation used questions). LOI — Letter of Intent. Letter that for Confidential and Secret clearances accompanies a “Statement of Reasons” PPR — Phased Periodic Reinvestigation. or for DoE “L” access authorizations. explaining why a tentative decision to Abbreviated form of the Single Scope This investigation is not authorized for deny a security clearance was made and Background Investigation – Periodic initial-hire federal employees requiring offering the applicant an opportunity to Reinvestigation (SSBI-PR). The PPR is an a security clearance or a DoE “L” Access rebut or mitigate the reasons. optional form of the SSBI-PR reserved for Authorization. personnel with no unfavorable information Loss of Jurisdiction — Status of an —O— listed in their clearance application. individual’s security clearance when employment for the required clearance OHA — Office of Hearings and Appeals. PR — Periodic Reinvestigation. terminates after a clearance action is Component of the Department of Energy Reinvestigations required at specific initiated but before a final determination (DoE) responsible for conducting hearings intervals to maintain a security clearance is made to grant, continue, deny or revoke and issuing decisions involving personnel or a designated public trust position. the clearance. security clearance cases of DoE employees and contractors. PRSI — Personal Subject Interview. In —M— depth interview of the subject of a OPM/FISD — Office of Personnel personnel security investigation by a MBI — Minimum Background Investigation. Management/Federal Investigative Services security investigator. The PRSI is a standard Type of personnel security investigation Division. Principal supplier of personnel component of the SSBI, SSBI-PR, PPR, BI, used for Moderate-Risk Public Trust security investigations to the Federal MBI, LBI, and PT-SBI. positions. Government. PSI — Personal Security Investigation. Term —N— —P— that encompasses all types of background NAC — National Agency Check. Basic investigations used to determine Period of Coverage — Also known as the component of all federal personnel employment suitability and security Period of Investigation. Standard period security investigations. As a minimum all clearance eligibility. of time covered by a Personnel Security NACs include a check of FBI Headquarters Investigation (PSI). Each type of PSI records, an FBI technical fingerprint has an overall period of coverage and search, and a check of OPM and DoD specific periods of coverage for individual Public Trust Position — Designated investigative databases. components (i.e. employment, police federal employee and contractor positions NACI — National Agency Check with records, and education) of a PSI. that, due to the sensitive unclassified Inquiries. Type of personnel security responsibilities of the positions, require Polygraph — Device that measures and investigation used for determining federal suitability determinations based on records physiological responses while a employment suitability or for the issuance personnel security investigations. Public subject answers a series of questions. It of a Personal Identity Verification (PIV) Trust positions are designated as either relies on the belief that false answers card required by HSPD-12. An NACI plus Moderate-Risk or High-Risk. Public Trust will produce distinctive measurements. credit check can be used as the basis for position include positions designated ADP-I, Polygraph examinations are used as contractor Moderate-Risk Public Trust ADP-II, ADP-III, IT-1, IT-2, IT-3, IT-5, IT-6, an adjunct to an SSBI for some Special positions. 5C and 6C. Access Programs and can be either Build your own personal network of cleared candidates on The Cleared Network – only on ClearanceJobs.com. 1.877.386.3323 • www.clearancejobs.com SECURITY CLEARANCE JOBS FOR U.S. CITIZENS
  • 4. PT-SBI — Public Trust-Special Background level (does not include COMSEC, CRYPTO, Security Clearance — Determination Investigation. Type of personnel security or CNWDI). SAPs are categorized as made by a government personnel security investigation conducted for selected High- intelligence, acquisition and operations/ adjudicator that an individual’s access to Risk Public Trust positions. support. They are also categorized as classified information is clearly consistent acknowledged, unacknowledged and with the interests of national security. —Q— waived. Among adjudicators the term “Security “Q” Access Authorization — DoE Clearance” is being replaced by the term SBU — Sensitive But Unclassified. Term clearance that authorizes access up to “Eligibility for Access.” that is being replaced by “Controlled Top Secret Restricted Data and Top Secret Unclassified Information.” (See also CUI SF85 — Standard Form 85. Questionnaire National Security Information. and FOUO). for Non-Sensitive Positions. Form used —R— as the basis for a NACI to determine Scattered Castles — Consolidated an individual’s suitability for federal RD — Restricted Data. Classified personnel security investigation and employment in non-sensitive positions information defined by the Atomic Energy clearance database of U.S. Intelligence or to hold certain non-sensitive federal Act as concerning: 1) design, manufacture, Community personnel. The database is contractor positions. or utilization of atomic weapons; 2) operated and maintained by the Director production of special nuclear material; or of National Intelligence. SF85P — Standard Form 85P Questionnaire . 3) use of special nuclear material in the for Public Trust Positions. Form used as production of energy. RD is considered a SCI — Sensitive Compartmented the basis for an investigation to determine special access program. Information. Category of classified an individual’s suitability to hold a Public information with many separate Trust position. RRU — Request for Research/Recertify/ subcategories or compartments that Upgrade Eligibility. Direct notification imposes safeguarding and access SF85P-S — Standard Form 85P-S. to the appropriate CAF through JPAS of restrictions that exceed those normally Supplemental Questionnaire for Selected any personnel security clearance status required for information at the same Positions. Form used in addition to the changes a JPAS user cannot make within classification level. SCI is a Special Access SF85P as the basis for an investigation the system. Program (SAP) involving intelligence to determine an individual’s suitability sources, methods or analytical processes. to hold selected High-Risk Public Trust RSI — Reimbursable Suitability/Security SCI has three sensitivity levels — SSBI positions. Investigations. Specific investigative without polygraph, SSBI with CI-Scope actions to gather information to resolve SF86 — Standard Form 86. Questionnaire polygraph and SSBI with Full-Scope issues that surfaced during a standard OPM for National Security Positions. Form polygraph. personnel security investigation. used as the basis for an investigation to Scope of Investigation — Standard determine an individual’s eligibility for a —S— components of an investigation, such security clearance or for continuation of SAP — Special Access Program. Program as character references, employment an existing security clearance. established for a specific category of records, credit report, police records classified information that imposes SII — Security/Suitability Investigations checks, national agency checks and safeguarding and access requirements Index. OPM’s computer database of educational records. The term “scope” that exceed those normally required for investigations accessible to federal is often misused to describe an information at the same classification security personnel. investigation’s “Period of Coverage.” Build your own personal network of cleared candidates on The Cleared Network – only on ClearanceJobs.com. 1.877.386.3323 • www.clearancejobs.com SECURITY CLEARANCE JOBS FOR U.S. CITIZENS
  • 5. SOR — Statement of Reason. Document from a security clearance adjudication facility advising an applicant of the specific reason(s) why the adjudication facility intends to deny or revoke a security clearance. The SOR also advises the applicant of his/her right to submit a written rebuttal and/or mitigating information regarding the allegations and in the case of contractors, the additional right to a hearing before an administrative judge. SPIN — Special Interview. Subject interview to address specific unresolved issues developed during a standard OPM personnel security investigation. SSBI — Single Scope Background Investigation. Type of personnel security investigation used for Top Secret clearances, DoE “Q” access authorizations, Sensitive Compartmented Information (SCI) and other designated Special Access Programs (SAP). Compiled by William H. Henderson, author of Security Clearance Manual Build your own personal network of cleared candidates on The Cleared Network – only on ClearanceJobs.com. 1.877.386.3323 • www.clearancejobs.com SECURITY CLEARANCE JOBS FOR U.S. CITIZENS