Adjudicating Contractors in a Position of Trust that do not require a Security Clearance The suggested procedures contained in this document were developed by Kenneth Sudol & Associates, Inc. as a service to the Personnel Security and Human Resource community and are intended to be used as a tool to assist adjudicators, investigators, security managers and human resource personnel in implementing their programs for adjudicating “contractor personnel” who are or will be in a Position of Trust that does not require a security clearance eligibility. These suggested procedures may also prove useful to appeals panels and attorneys dealing with position of trust decisions. These are suggested procedures only and do not reflect government policy and in no way implies a regulatory mandate. The suggested procedures contained herein may be used in any way that an agency or activity deems appropriate in formulating their policy for adjudicating contractors who will be occupying a position of trust that does not require a security clearance. These suggested procedures can be changed or modified as necessary to meet your agencies or activities processing or adjudicative requirements. 1 SUGGESTED PROCEDURES FOR ADJUDICATING CONTRACTOR PERSONNEL IN POSITIONS OF TRUST THAT DO NOT REQUIRE ACCESS TO CLASSIFIED INFORMATION Part A Sec. 1 Purpose. (a) The purpose of this part is to establish suggested criteria and procedures for making determinations of suitability for employment in Positions of Trust for government contractor personnel. As a condition of employment consideration of ``age, health, character, knowledge, and ability for the employment sought must be considered. This section concerns only determinations of contractor ``suitability'' based on an individual's character or conduct that may have an impact on the integrity or efficiency of the federal contract service. Determinations made under this part are distinct from determinations of eligibility for assignment to, or retention in, sensitive national security positions made under Executive Order 10450 (3 CFR, 1949-1953 Comp., p. 936), Executive Order 12968, or similar authorities. Sec. 2 Implementation. (a) An investigation conducted for the purpose of determining suitability for a Position of Trust for a contractor under this section may not be used for any other purpose except as provided in a Privacy Act system of records notice published by the agency conducting the investigation. (b) Under OMB Circular No. A-130 Revised, issued February 8, 1996, the Director of OPM is to establish policies for Federal personnel associated with the design, operation, or use of Federal automated information systems. Agencies are to implement and maintain a program to ensure that adequate protection is provided for all automated information systems. Agency programs should be consistent with government-wide policies and procedures issued by OPM. The Computer Security Act of 1987 (Public Law 100-235) provides additional requirements for Federal automated information systems. (c) Before making any Position of Trust determination for a contractor, the agency should first ensure the individual is eligible for the position and among the best qualified,. Because Position of Trust issues may not be disclosed until late in the approval process, only the best qualified contractor should require a Position of Trust determination, with appropriate procedures followed and appeal rights, if any, provided, if Position of Trust issues would form the only basis for elimination of the contractor from further consideration. (e) When an agency, exercising authority under this section, makes an adjudicative decision under this section, or changes a tentative favorable decision to an unfavorable decision, based on an OPM or other report of investigation or upon a prior investigation the agency should: 2 (1) Ensure that the records used in making the decision are accurate, relevant, timely, and complete to the extent reasonably necessary to ensure fairness to the individual in any determination; (2) Ensure that all applicable administrative procedural requirements provided by law, have been observed; (3) Consider all available information in reaching its final decision, except information furnished by a non-corroborated confidential source. Information furnished by a non-corroborated confidential source should only be used for limited purposes, such as lead information or in interrogatories to a subject if the identity of the source is not compromised in any way; and (4) Keep any record of the agency action as required by OPM. Sec. 3 Designation of Position of Trust and investigative requirements. (a) Risk designation. Agency heads may designate every public trust position within the agency at a high, moderate, or low risk level as determined by the position's potential for adverse impact to the efficiency and integrity of the service. (See Appendix A) (b) Positions of Trust. Positions at the high or moderate risk levels would normally be designated as “Public Trust” positions. Such positions may involve policy making, major program responsibility, public safety and health, law enforcement duties, fiduciary responsibilities, or other duties demanding a significant degree of public trust; and positions involving access to or operation or control of financial records, with a significant risk for causing damage or realizing personal gain. (c) Investigative requirements. Contractors receiving an appointment to a Position of Trust must undergo a background investigation. Minimum investigative requirements correlating to risk levels should be established. Investigations should be initiated before appointment to a Position of Trust or, at most, within 14 calendar days of placement in the position. (d) Position of Trust reinvestigations. Agencies relying on authorities such as the Computer Security Act of 1987 and OMB Circular No. A-130 Revised (issued February 8, 1996), may require incumbents of certain public trust positions to undergo periodic reinvestigations. The appropriate level of any reinvestigation will be determined by the agency. (e) Risk level changes. If an individual experiences a change in position risk level (moves to a higher risk level position, or the risk level of the position itself is changed) the individual may encumber or remain in the position. Any upgrade investigation required for the new risk level should be initiated within 14 calendar days after the move or the new designation is final. (f) Any Position of Trust investigation completed by an agency under provisions of paragraphs (d) or (e) of this section must be adjudicated by the employing agency. The subject's employment status will determine the applicable agency authority and procedures to be followed in any action taken. 3 (g) Position Designation for Non-Classified Contracts. The Contracting Officer’s Technical Representative (COTR), in conjunction with operating unit management, servicing security officer, and security contact, will review the work to be performed under contract and assign the highest risk designation to the entire contract in accordance with the criteria stated below. Accordingly, each contract employee will undergo investigative processing based on the contract's risk level designation. 1. High Risk. A contract will be designated High Risk if it meets the following criteria: a. Work requiring continuous foreign travel of 90 days or more at any time during the performance of the contract under the auspices of the agency; b. Work involving functions or operations of the agency that are critical to the accomplishment of the mission of the agency; c. Work involving investigative, compliance, or senior-level auditing duties; d. Work involving fiduciary, public contact, or other duties involving the highest degree of public trust; e. Work involving Automatic Data Processing functions such as: (1) Planning, directing, and implementing a computer security program; (2) Planning, designing, directing, and operating a computer system that includes ADP hardware, software, and/or data communications, regardless of the sensitivity or classification of the information stored on the system; or (3) Access to a computer system, during the operation or maintenance process that could result in grave damage or in personal gain; or e. Any other work designated High Risk by the contracting officer or by the head of the operating unit or agency office. 2. Moderate Risk. A contract will be designated Moderate Risk if it meets the following criteria: a. Work involving free access and movement during normal work hours within an agency which houses classified information or equipment with little or no supervision by an appropriately cleared Federal Government employee. b. Work occurring during restricted hours within an agency facility which houses classified or sensitive information or equipment even though supervised by a Federal Government employee; c. Work in which a contractor is responsible for the direction, planning, design, operation, or maintenance of a computer system, and whose work is technically reviewed by Federal Government personnel whose position sensitivity is Critical-Sensitive or above to ensure the integrity of the system; 4 d. Work requiring access to sensitive information (information protected under the Privacy Act or Title 13 of the U.S. Code); or e. Work involving foreign travel less than 90 days duration. 3. Low Risk. Work that does not fall into any of the categories noted above will be given a Low Risk designation. 4. Variance in Contract Responsibilities. In instances where there is a wide variance in the risk level of the work to be performed under one contract, individual contract employees may be processed at a lower risk designation based on their duties when approved by the servicing security officer. However, the contract document must specifically apply controls to ensure that the work of persons in the lower risk positions will not overlap with that for the higher risk positions. The contract will identify the number of employees to be processed at the lower risk designation and will specify the duties of the positions. An example of such a case is custodial work where some contract employees perform work that is not supervised during security hours in a building which houses classified information, while others may work under close government supervision during normal work hours. The entire contract might be designated High or Moderate Risk due to the former case, but those contract employees whose work would be Low Risk would be processed with the appropriate background investigation. The contract must meet control obligations to ensure that there is no overlap of work duties between the two groups. 5. Position Designations for Other Non-employee Positions. a. Experts and consultants are subject to the same security requirements as regular employees of the agency. Since experts and consultants may be paid at a level equivalent to a GS-13 or above, such positions should be evaluated based on Public Trust criteria. If a position is not sensitive, experts and consultants should be evaluated as an employee would be for a High or Moderate Risk position. b. Guest workers, research associates, trainees, long-term visitors, and other similar types of nonemployees associated with the agency usually serve in a Low Risk capacity. There are no specific criteria for evaluating their involvement under risk designation criteria; however, the determination should take into account the potential impact or damage that the non-employee's interaction could cause. If the involvement of these non-employees falls within the generic description of a sensitive position, the manager of the operating unit involved must advise the Office of Security. 5 Part B - Suitability Determinations Sec. 1 Standard. (a.) Subject to Subpart B of this part, an individual in a Position of Trust may be denied Federal employment or removed from a position only when the action will protect the integrity or promote the efficiency of the service. Sec. 2 Criteria. (a) General. In determining whether its action will protect the integrity or promote the efficiency of the service, an agency may make its Position of Trust determination on the basis of the specific factors in paragraph (b) of this section, with appropriate consideration given to the additional considerations outlined in paragraph (c) of this section, or by utilizing the Suggested Adjudication Guidelines for Determining Position of Trust Eligibility for Contractors shown in Appendix B, as well as agency policy requirements. Also use the Issue Characterization Chart in Appendix A to determine the ranking of the issue. (Minor, Moderate, Substantial or Major) (b) Suggested potential adjudication factors. When making a Position of Trust determination under paragraph (a) of this section, the following may be considered a basis for finding an individual unsuitable: (Also refer to Appendix B for additional guidance) (1) Misconduct or negligence in employment; (2) Criminal or dishonest conduct; (3) Material, intentional false statement, deception or fraud; (4) Refusal to furnish testimony or corporate in official investigation (5) Alcohol abuse of a nature and duration which suggests that the individual would be prevented from performing the duties of the position in question, or would constitute a direct threat to the property or safety of others; (6) Illegal use of narcotics, drugs, or other controlled substances, without evidence of substantial rehabilitation; (7) Knowing and willful engagement in acts or activities designed to overthrow the U.S. Government by force; (8) Any statutory or regulatory bar which prevents the lawful employment of the person involved in the position in question. (c) Additional considerations. In making a determination under paragraphs (a) and (b) of this section, agencies shall consider the following additional considerations to the extent they deem them pertinent to the individual case: (1) The nature of the position for which the person is applying or in which the person is employed; (2) The nature and seriousness of the conduct; (3) The circumstances surrounding the conduct; (4) The recency of the conduct; (5) The age of the person involved at the time of the conduct; (6) Contributing societal conditions; and (7) The absence or presence of rehabilitation or efforts toward rehabilitation. 6 (d) Additional Suggested Adjudication Guidelines for Determining Position of Trust Eligibility for Contractors (No Classified Access). See Appendix B for additions guidance. A. Allegiance to the United States B. Foreign Influence C. Foreign Preference D. Sexual Behavior E. Personal Conduct F. Financial Considerations G. Alcohol Consumption H. Drug Involvement I. Psychological Conditions J. Criminal Conduct K. Handling Protected Information L. Outside Activities M. Use of Information Technology Systems Sec. 3 Actions by agencies. (a) List of actions. For purposes of this part, an action is one or more of the following: (1) Cancellation of eligibility for a Position of Trust; (2) Denial of appointment in a Position of Trust (3) Removal from a Position of Trust (b) An individual’s eligibility for a Position of Trust may be cancelled, or may be denied employment, or may be removed when an agency finds that the individual is unsuitable for the reasons cited in Sec. 2. (c) An individual may be removed from a Position of Trust on the basis of a material, intentional false statement, or deception or fraud; or refusal to furnish testimony. (e) Agencies are required to report to OPM all unfavorable adjudicative actions taken under this part, and all actions based on an OPM investigation. Part C – Position of Trust Suitability Action Procedures Sec. 4 Scope. (a) Coverage. This subpart sets forth the procedures that may be followed when an agency proposes to take a final suitability action against an individual in a Position of Trust. (b) Definition. In this subpart, days mean calendar days. 7 Sec. 5 Notice of proposed action. (a) An agency shall notify the contractor in writing of the proposed action and of the charges against them (including the availability for review, upon request, of the materials relied upon). The notice shall state the specific reasons for the proposed action and that the contractor has the right to answer the notice in writing. The notice shall further inform the contractor of the time limits for response as well as the address to which such response should be made. (b) The notice of proposed action shall be served upon the contractor by being mailed or hand delivered to the contractor's last known residence, and/or duty station, no less than 30 days prior to the effective date of the proposed action. If the contractor is employed in a Position of Trust on the date the notice is served, the contractor may be entitled to be retained in a pay status during the notice period. Sec. 6 Answer. (a) Contractor's answer. A contractor may answer the charges in writing and furnish documentation and/or affidavits in support of the response. The contractor may be represented by a representative of the contractor's choice, and such representative shall be designated in writing. To be timely, a written answer shall be made no more than 30 days after the date of the notice of proposed action. (b) Agency's answer. The agency shall consider any answer the in reaching a final decision. Sec. 7 Decision. (a) The decision shall be in writing, dated, and inform the contractor of the reasons for the decision. If the decision is unfavorable the employing agency shall remove the contractor from the rolls within 5 work days of receipt of their final decision. Part D - Investigative Requirements for Non-Employees The following information describes the requirements for investigative processing for nonemployees. Appendix C, Processing Personnel Security and Suitability Investigations, provides the minimum requirements for investigative processing of non-employees for risk positions and for positions requiring access to classified information. A. Contractors. Investigative processing for contract personnel is divided into two major categories: unclassified contracts and classified contracts. Unclassified contracts involve no access to classified information. Classified contracts involve access to classified information and are referred as Classified or Sensitive contracts. 1. Non-Classified Contracts. a. Every contract employee who performs work designated as Low Risk within an agency facility for longer than 180 days must undergo investigative processing. All other contract personnel must undergo investigative processing according to the risk level of the contract. The contracting officer's technical representative (COTR), in conjunction with operating unit management and security contact, is responsible for assigning a risk designation to each contract where work will be performed in the agency. Within each contract, the contracting officer must include information that defines the investigative 8 processing requirements associated with the contract's risk level. Sample language is included in Appendix D, Contract Language for High and Moderate Risk Contracts and Appendix E, Contract Language for Low Risk Contacts. b. The COTR is responsible for initiating the investigation request package for a contract employee. The request package is submitted to the Office of Security through the security contact or servicing security officer. The following procedures describe the investigative requirement for contract personnel by risk level. (1) A contract at the High Risk level requires a pre-employment check prior to “entrance-on duty” with a BI initiated no later than three days after the start of the person's performance on the contract. (2) A contract at the Moderate Risk level requires the initiation of an MBI no later than three days after the start of the person's performance on the contract. (3) At the Low Risk level, requirements are based on the elected duration of the contract. If the contract exceeds one year, a NACI must be initiated no later than three days after the start of the subject's performance on the contract. If the contract will last over 180 days but less than one year, a SAC must be initiated no later than three days after the beginning of the subject's performance on the contract. Low Risk contracts with duration of less than 180 days do not ordinarily require processing. At the discretion of the security contact, a SAC may be requested for Low Risk contracts of short duration where unusual circumstances exist and warrant the processing for the contractors involved. 2. Classified Contracts. Individual facility security clearances are required for all contract work involving access to classified information. On a case-by-case basis, individual contract personnel security clearances may be granted by the Director for Security for short-term classified work. B. Guest Workers, Research Associates, Experts, Consultants, Long-Term Visitors, and Trainees. 1. This paragraph prescribes the security requirements, known as "Security Assurance," for guest workers, research associates, experts, consultants, long term visitors, trainees, and other individuals who have similar associations with the agency. Check agency policy for information on Voluntary and Uncompensated Services individuals and Employment of Individual Experts and Consultants. 2. Functions performed by these non employees are assigned risk designations. U. S. citizens serving in positions designated Low Risk who expects to remain with the agency for more than 180 days shall be subject to investigative processing. Non citizens serving in positions designated Low Risk who expect to remain with the agency for more than ten working days within 12 consecutive months shall be subject to investigative processing. Positions designated at the Moderate or High Risk level must undergo additional investigative processing. The agency will accept active security assurance reviews conducted by other Federal agencies if verifiable by a servicing security officer. 9 3. Completion of the security assurance processing requirements set forth in this chapter does not automatically permit visitors or other categories of non-employees associated with the agency to have access to classified information or to restricted areas. Security clearances for such purposes, as distinguished from security assurances, must be obtained in accordance with applicable security regulations. 4. While the agency allows guest workers, research associates, experts and consultants, and trainees access to its facilities, the final authority for determining the acceptability of such individuals belongs to the agency. The operating unit head shall make certain that the provisions of the agency Security Manual are met before assigning or agreeing to assign an individual to an agency facility within his or her unit, and may prescribe additional control measures as necessary. 5. If the duties of a guest worker, research associate, or trainee appear to fall within the generic description of a National Security position, the head of an operating unit must provide a written statement to that effect to the Office of Security through their servicing security officer. The statement should include information describing the particular type of involvement that appears to create a similar situation to that for a sensitive position. C. Short-term visitors are defined as non-Federal employees on official business to agency facilities, making visits which do not extend beyond 30 working days for citizens or ten working days for non-citizens within a consecutive 12-month period, and which do not involve access to classified information or to restricted areas. No security assurance processing is required for short-term visitors, but managers of operating units to be visited shall make definitive arrangements, such as escorts, to prevent accidental access to restricted areas or to classified information during these visits. In general, however, assignments or visits of foreign nationals that entail potential access to restricted areas or to classified information should be discouraged. D. Projects Sponsored by Other Federal Agencies. When a project being conducted in an agency facility is being carried out by another Federal agency, the investigative processing requirements of the sponsoring agency shall apply unless other arrangements are made. E. Processing Membership for Departmental Advisory Committees. Security and suitability processing is required for all nominees for membership on agency advisory committees who require access to classified information. Committee Liaison Officers for each operating unit coordinate the process of obtaining access to classified information. The procedures are set forth in Appendix D, Processing Security and Suitability Investigations. F. Security Clearance Requirements Applicable to Non-Employees. All non-employees who require a security clearance to meet contract or other obligations with the agency will be investigated and granted a security clearance in accordance with the provisions of the National Industrial Security Program Operating Manual (NISPOM) and the agency Security Manual. 10 G. Child Care Workers Employed at Agency Facilities. 1. In compliance with 42 U.S.C. § 13Ø1, child care centers located in Agency facilities must have background checks conducted on their employees. GSA conducts such checks on child care providers when the child care center is located in a GSA controlled facility. Determine if there are agency facilities using GSA approved contractors as well as contractors not processed by GSA. The security contact or servicing security officer must verify that appropriate background checks were conducted on each employee of the contract provider. When a GSA approved contractor is not used, the security contact or servicing security officer is responsible to ensure that appropriate checks have been conducted as outlined in 42 U. S.C. § 13Ø1, the minimum criminal history checks for applicants will be a fingerprint check of the records in the Identification Division of the FBI and a check of the state criminal history repositories of all addresses listed on the application for employment as either current or former residences. Additionally, the application for employment will contain a question asking whether the individual has ever been arrested for or charged with a crime involving a child, and, if so, the manager will require a description of the disposition of the arrest or charge. The application shall state that it is being signed under penalty of perjury. Where this language is not included on the application for employment, a separate sheet with this information should be attached. 2. The servicing security officer will work with the COTR and ensure that the appropriate investigation is initiated for persons being hired with child care responsibilities at agency facilities. An operating unit may hire a staff person provisionally prior to the completion of a background check if, at all times prior to receipt of the background check during which children are in the care of the person, the child care provider must be within sight and under the supervision of a staff person whose background check has been successfully completed OPM currently offers the CNACI investigation for child care workers to meet the requirements of the Public Law. This investigation must be used to comply with the Public Law. An operating unit may hire a staff person provisionally prior to the completion of the required background check provided that, when caring for children, the uncleared individual must at all times be within the sight and under the supervision of a staff person whose background check has been successfully completed. 11 Appendix A Position Designation A.1 POSITION DESIGNATION REQUIREMENTS Proper position risk and sensitivity designations are the foundation of effective and consistent suitability and security programs. Position designations determine the type and level of investigation required for proper screening of an individual for each Agency position. Additionally, as the level of authority and responsibility of a position becomes greater, character and conduct become more significant in deciding whether employment or continued employment would protect the integrity and promote the efficiency of the Federal service. All positions in the Agency must have a risk designation based on the duties and responsibilities and in accordance with the specific criteria outlined in agency Standard Operating Procedures (SOP). In addition, positions with national security duties and responsibilities must have a sensitivity level designation. Proper risk and sensitivity position designations ensure that investigative screening of employees is performed in compliance with 5 CFR 731, 732, 736, Executive Order 10450, and Executive Order 12968. Investigations for positions without national security access are conducted to promote the efficiency and integrity of the Federal service. Investigations for national security access positions are conducted to protect the national security. The Agency must maintain a Position Designation Record for each and every position in the agency. These records are maintained by the servicing human resources management offices. Servicing security offices also should maintain records of positions designated for national security access in the operating units or offices they support. The following chart provides the position designation codes for risk and sensitivity along with the impact on the integrity of the Federal service and the national security. Although a risk assessment must be prepared for all positions, regardless of sensitivity, the position is coded in accordance with its highest designation. For national security positions, the code will reflect the sensitivity designation. If the national security designation is rescinded, the position reverts to the risk designation coding. 12 SUGGESTED POSITION DESIGNATION CODES POSITION DESIGNATION 4 - Special-Sensitive (SS) or 4C - Special-Sensitive (IT) 3 - Critical-Sensitive (CS) or 3C - Critical-Sensitive (IT) 2 - Noncritical-Sensitive (NCS) or 2C - Noncritical-Sensitive (IT) 6 - High Risk (HR) or 6C - High Risk (IT) 5 - Moderate Risk (MR) or 5C - Moderate Risk (IT) 1 - Low Risk (LR) or 1C - Low Risk (IT) IMPACT ON FEDERAL SERVICE OR NATIONAL SECURITY Potential for inestimable damage to the national security. Used for positions that the head of an operating unit designates at a level higher than Critical-Sensitive due to special requirements for access to Sensitive Compartmented Information (SCI) or other intelligence-related Special Sensitive information. Potential for exceptionally grave damage to the national security. These positions may include access up to, and including, Top Secret defense information; development or approval of war plans, plans or particulars of future or major or special operations of war, or critical and extremely important items of war; investigative duties, the issuance of personnel security clearances, or duty on personnel security boards; or other positions related to national security, regardless of duties, that require the same degree of trust. Potential for serious damage to the national security. These positions involve either access to Secret or Confidential national security information or materials or to duties that may adversely affect, directly or indirectly, the national security operations of the Agency. Potential for exceptionally serious impact involving duties especially critical to the Agency or a program mission with broad scope of policy or program authority. Potential for moderate to serious impact involving duties of considerable importance to the Agency or program mission with significant program responsibilities and delivery of customer services to the public. Positions involve duties that have a low or limited impact on the Agency’s mission or on the efficiency of the service. 13 Appendix B Criteria for Adjudicating Contractor Personnel in a Position of Trust Suggested Suitability Factors for Contractors in a Position of Trust Suitability is defined as identifiable character traits and conduct sufficient to determine whether an individual is likely or not likely to be able to carry out the duties of a Federal contractor with appropriate integrity, efficiency, and effectiveness. The following factors may be considered as a basis for finding an individual unsuitable, and the Adjudicator must state the factors (charges) forming the basis of the decision in the charging document. SUITABILITY FACTORS (1) MISCONDUCT OR NEGLIGENCE IN EMPLOYMENT, (2) CRIMINAL or DISHONEST CONDUCT GENERAL APPLICATIONS/DISCUSSION The appointment of an individual to a covered position when his or her employment record shows he or she has engaged in misconduct or negligence may not promote the efficiency or protect the integrity of the service. * Misconduct involves intentionally doing something wrong in the employer’s estimation, while negligence is an act or omission that a person in the employee’s circumstances should know is contrary to the employer’s expectations. * May or may not have resulted in a disciplinary action, including dismissal. If dismissed, primary emphasis should be on the act or conduct which prompted the dismissal. For military misconduct, the nature of the misconduct is the governing factor, rather than the type of discharge. * A favorable litigation decision, including receiving unemployment benefits, would not necessarily nullity the conduct. * Includes: poor attendance without cause, insubordination, or other suitability issues occurring in employment (such as theft, etc). * Does not include performance (an inability to perform), failure to complete training, or other qualification issues. * Misconduct or negligence in current Federal employment is not generally included unless it is part of a pattern of conduct. Criminal Conduct: Criminal activity creates doubt about a person’s judgment, reliability, and trustworthiness. By its very nature, it calls into question a person’s ability or willingness to comply with laws, rule or regulations. * Primary emphasis is on the nature of the criminal conduct, which may or may not have resulted in arrests, charges, or conviction. * Details/reasons for dismissal of a charge must be considered; expungement of records and pardons for an offense would not nullify the conduct, unless granted on the basis of the person's innocence. * Pending charges of a nature that are potentially disqualifying cannot be adjudicated until case is disposed. Dishonest Conduct: Dishonest conduct must be intentional, and includes deliberate lies, fraud, or deceit other than in connection with examination or appointment. Includes: * Illegal activities resulting from dishonest acts (such as theft, acceptance of a bribe, falsification of claims and business records, perjury, forgery, etc). * Intentional falsification of non-federal documents. * Deliberate financial irresponsibility with continuing, valid debts of a significant nature (such as unwillingness to satisfy debts, indebtedness 14 caused by frivolous and irresponsible spending and the absence of any evidence of willingness or intent to pay the debt or establish a realistic plan to pay the debt, history of not meeting financial obligations, etc) SUITABILITY FACTORS for Contractors in a Position of Trust SUITABILITY FACTORS GENERAL APPLICATIONS/DISCUSSION (3) MATERIAL INTENTIONAL FALSE STATEMENT, OR DECEPTION OR FRAUD IN EXAMINATION OR APPOINTMENT. OPM retains jurisdiction in all covered position cases involving evidence of material, intentional false statement, or deception or fraud in examination or appointment. Agencies must refer these cases to OPM for adjudication, or provide required notification to OPM, if the agency wants to take or has taken action under its own OWNGRADE (CONVERSION) OF ISSUES authority (5 CFR part 315, 5 CFR part 359, or 5 CFR part 752) A charge under this factor may relate to a person’s assistance of or Note: Any issues over 108 months are collusion considered with one to be or more non-issues. accomplices. What must be established is the person’s wrongful intent, not the accomplices’ wrongful intent. Providing intentional false statements or engaging in deception or fraud in the competitive hiring process circumvents the Federal hiring procedures created to ensure fair and open competition. * A “Material” statement (as used in the phrase “material, intentional false statement”) is one that is capable of influencing, affects, or has a natural tendency to affect an official decision. The test of materiality does not rest on whether the agency actually relied on the statement. * An intentional attempt to withhold information, or furnish false information, that is capable of influencing decisions about the individual’s suitability, qualifications, or other matters related to the appointment process. * Material, intentional false answers to questions on application or appointment documents or material, intentional failure to admit a series of minor issues which demonstrate a pattern of misconduct, or material, intentional omission of information clearly related to the position sought (such as a performance discharge from the same type of job or a conviction for drug use when applying for a job in the medical field). * Materially, intentionally falsifying experience, education, etc. that could influence an official decision (the experience or education does not have to be required for the position; it only needs to have a natural tendency to influence the decision). * The impediment or interference with fair and open competition in the competitive examining process or with conditions or qualifications for appointment or restrictions on appointment in covered positions. * Impersonation or collusion in examination (such as altering scores) etc. * Deception and/or fraud in examination – where a person knew or should have known his or her conduct had a tendency to impede or interfere with fair and open competition in a competitive examination, or to otherwise compromise the integrity of the competitive examining system. * Deception and/or fraud in appointment – where a person knew or should have known his or her conduct had a tendency to impede or interfere with conditions or qualifications for appointment or restrictions on appointment in the competitive service or in a competitive service position. 15 SUITABILITY FACTORS for Contractors in a Position of Trust SUITABILITY FACTORS (4) REFUSAL TO FURNISH TESTIMONY as required by 5 CFR Part 5, section 5.4. GENERAL APPLICATIONS/DISCUSSION Competitive service applicants and employees are required to give OPM, MSPB, or Special Counsel all information, testimony, documents, and materials requested in matters inquired of under the civil service laws, rules, and regulations, the disclosure of which is not otherwise prohibited by law. Therefore, failure to provide testimony when requested may be disqualifying. (Although section 5.4 lists other requirements, the suitability factor is limited to the requirement to provide testimony when required by OPM). Authority to invoke this rule is reserved to OPM, MSPB, or the Special Counsel; therefore, agencies must not cite this disqualify factor as a basis for a suitability action. Notification to OPM is required if the agency wants to take or has taken action under its own authority (5 CFR part 315, 5 CFR part 359, or 5 CFR part 752). (5) ALCOHOL ABUSE, without evidence of substantial rehabilitation, of a nature and duration suggests that the applicant or appointee would be prevented from performing the duties of the position in question, or would constitute a direct threat to the property or safety of the applicant or appointee or others. An individual’s use of alcohol may impact on his or her ability to complete the duties of the job and/or raise questions about his or her reliability or trustworthiness, thus indicating his or her employment would not promote the efficiency or protect the integrity of the service. Includes: * Current continuing abuse of alcohol. * A pattern of alcohol-related arrest and/or problems in employment. * Rehabilitation, if present, must be carefully considered (clear, lengthy break in pattern of abuse; strong evidence the abuse will not occur again). (6) ILLEGAL USE OF NARCOTICS, DRUGS, OR OTHER CONTROLLED SUBSTANCES, without evidence of substantial rehabilitation. Drug involvement can raise questions about an individual’s reliability and trustworthiness or ability or willingness to comply with laws, rules, and regulations, thus indicating his or her employment would not promote the efficiency or protect the integrity of the service. Includes: * Current or recent use of a serious nature. * A pattern of drug-related arrests and/or problems in employment. * Substantial rehabilitation cannot be established if the conduct is ongoing or recent. However, if the use is not recent, rehabilitation claims must be carefully considered (clear, lengthy break since last use; strong evidence the use will not occur again). The distinction between this factor and the alcohol abuse factor is the use of narcotics, drugs, or other controlled substances is generally illegal; therefore, the conduct need not amount to abuse or addiction to be disqualifying. The conduct must still be sufficiently serious to cause a general concern. In cases that do not involve a criminal conviction, it is important to have clear evidence the use is illegal. Criminal conduct is an applicable factor to consider for use of drugs and would apply in instances of possession charges where personal use has not been established and the drug factor does not apply. 16 SUITABILITY FACTORS for Contractors in a Position of Trust SUITABILITY FACTORS (7) KNOWING AND WILFUL ENGAGEMENT IN ACTS OR ACTIVITIES DESIGNED TO OVERTHROW THE U.S. GOVERNMENT BY FORCE. GENERAL APPLICATIONS/DISCUSSION All Federal employees must be loyal to the United States. * Disqualifying acts must be overt, defined as illegal acts. * Disqualifying advocacy must be the incitement or Indoctrination to commit defined illegal acts. * Disqualifying associations require the individual to know of the organization’s unlawful goals, and for the individual to be an active member of the organization or to have the specific intent to further its unlawful goals. * Membership in organization, alone, is not disqualifying. (8) Any STATUTORY or REGULATORY BAR which prevents the lawful employment of the person involved in the position in question. Federal statutes and/or regulations may prevent lawful employment. Includes: * Participation in a strike against the government *Conviction of misdemeanor crime (under Federal or State law) of domestic violence (use or attempted use of physical force, or the threatened use of a deadly weapon, committed by current or former spouse, parent, or guardian of the victim, by a person with whom the victim shares a child in common, by a person who is cohabiting or who has cohabited with the victim as a spouse, parent, or guardian, or by a person similarly situated to a spouse, parent, or guardian of the victim). * Employment is determined to be in violation of the antinepotism statute. Normally, agencies identify and act on these. (See the Issue Characterization Chart for additional examples). Additional Considerations: As outlined in 5 CFR 731.202(c), when making a determination the adjudicator must consider any of the following additional considerations but only to the extent he or she deems any of them pertinent to the individual case, and must explain his or her consideration of applicable factors in the charging document and the final suitability action letter. Additional considerations not deemed pertinent by agencies or OPM in individual cases cannot be considered by the Merit Systems Protection Board as aggravating or mitigating factors during the appeal process. These Considerations do not apply in statutory or regulatory bars to employment. 17 ADDITIONAL CONSIDERATIONS ADDITIONAL CONSIDERATIONS (1) (1) The Nature of the POSITION for which the person is applying or in which the person is employed. (2) The NATURE AND SERIOUSNESS of the conduct. DISCUSSION The more authority, responsibility, sensitivity and public trust associated with the position, the higher the risks involved and the more potential adverse impact there is to the efficiency and integrity of the service; thus the misconduct becomes more serious as a potentially disqualifying issue. However, certain kinds of conduct may result in disqualification regardless of the position. The more serious the conduct, the greater the potential for disqualification. (3) The CIRCUMSTANCES surrounding the conduct Full facts and circumstances are essential to insure justice to the person and to protect the interests of the Government. (4) The RECENCY of the conduct. The more recent the conduct is, the greater the potential for disqualification. (5) The AGE of the person at the time of the conduct. Offenses committed as a minor are treated as less serious than those committed as an adult, unless the offense is very recent, part of a pattern, or particularly heinous. (6) Contributing SOCIETAL CONDITIONS. Economic and cultural conditions might be a mitigating factor if the conditions are now removed. Generally considered in cases with relatively minor issues. (7) The absence or presence of REHABILITATION or efforts toward rehabilitation. Clear, affirmative evidence of rehabilitation is required for a favorable adjudication. Rehabilitation is a consideration in all cases, not just those involving alcohol and drug abuse. While formal counseling or treatment may be a consideration, other factors such as the individual’s employment record, etc. May also be indications of rehabilitation. 18 Suggestions For Adjudicating Contractor Personnel in Positions of Trust Issue Characterization Chart 1 – INTOXICANTS A – MINOR Drunk Drunk and disorderly Liquor law violation (use or possession by minor) B – MODERATE Drinking and driving Driving under influence Driving while intoxicated C – SUBSTANTIAL Illegal manufacturing Illegal sale D – MAJOR Pattern of excessive use as reflected in: ï‚· Convictions ï‚· Job performance ï‚· Employment gaps ï‚· Inability to function responsibly ï‚· Medical treatment or poor health 2 – DRUG USE A – MINOR Infrequent use or possession of marijuana B – MODERATE Regular use or possession of marijuana Possession of marijuana paraphernalia Infrequent use or possession of other Arrested or charged with possession of controlled substances marijuana Possession of drug paraphernalia Cultivating marijuana for personal use C – SUBSTANTIAL Transfer of controlled substance Possession for sale or resale Prescription fraud or forgery Sale of controlled substance Unlawful dispensing of prescription drugs Smuggling contraband drug into prison Regular use of controlled substances other than marijuana D – MAJOR Pattern of use or excessive use as reflected in 1D above. ï‚· Manufacturing ï‚· Addiction ï‚· Exporting ï‚· Trafficking ï‚· Cultivating for sale 3 – FINANCIAL RESPONSIBILITY A – MINOR Bad check Infrequent, irregular, but deliberate delinquency in meeting financial obligations B – MODERATE Non-support Judgment, tax lien or other default with no attempt at restitution Illegal gambling Eviction C – SUBSTANTIAL D – MAJOR Pattern of Pattern of irresponsibility irresponsibility as as reflected in 3C plus reflected in: continuing, major, valid liabilities ï‚· Credit history ï‚· Disregard for debts ï‚· Abuse of fiduciary trust 4 – SEXUAL MISCONDUCT A – MINOR B – MODERATE Indecent exposure Solicitation Voyeurism, peeping C – SUBSTANTIAL Prostitution Bigamy or polygamy Pimping or pandering Keeping house of ill repute Contributing to tom Mailing, selling, or displaying obscene 19 D – MAJOR Pattern of misconduct as reflected in conviction records Child molestation Sexual assault Statutory rape material Obscene phone call Indecent proposal delinquency of or corrupting the morals of a minor Sexual harassment Other sexual misconduct with impact on job Incest Bestiality C – SUBSTANTIAL Bribery Embezzlement Grand larceny Grand theft Mail theft Burglary Robbery (unarmed) Perjury False impersonation (such as impersonating a law enforcement officer) Interstate transportation of stolen goods Black market activities with intent to profit Income tax evasion Receiving stolen property D – MAJOR Pattern of dishonesty as reflected in: ï‚· Disregard for truth ï‚· Conviction records ï‚· Abuse of trust, or ï‚· Employment records Blackmail Counterfeiting Extortion Armed robbery Material, intentional false statement or deception or fraud in examination or appointment Deliberate misrepresentation, falsification, or omission of material fact 5 – HONESTY A – MINOR Non-material, intentional false statement or deception or fraud in examination or appointment Deliberate misrepresentation, falsification, or omission of a nonmaterial fact B – MODERATE Altering Breaking & entering Forgery Fraud Possession of stolen property Black market activities (non-profit) Petty larceny Minor stealing or petty theft Shoplifting Abuse of property Criminal false statement Filing false instrument Failure to file income tax return 6 – DISRUPTIVE OR VIOLENT BEHAVIOR A – MINOR Disorderly conduct Disturbing the peace Making a threat Resisting arrest Abusive language Unlawful assembly B – MODERATE Assault Damaging property Destroying property Hit & run Vandalism Criminal or malicious mischief Harassment Cruelty to animals Hindering prosecution Eluding police C – SUBSTANTIAL Assault & battery Battery Manslaughter (involuntary) D – MAJOR Pattern of violence as reflected in: ï‚· Conviction records ï‚· Disregard for life or property ï‚· Civil actions ï‚· Employment records ï‚· Medical records Aggravated assault Assault with deadly weapon Assault with intent to commit rape, kidnapping or abduction Murder Rape Arson Threat or assault upon a public official Manslaughter (voluntary) Child abuse 7 – EMPLOYMENT MISCONDUCT OR NEGLIGENCE A – MINOR Negative Attitude Personality Conflict B – MODERATE Insubordination Absenteeism or attendance problems Rules or regulation violations C – SUBSTANTIAL * 20 D – MAJOR Pattern of unemployability based on misconduct or negligence as reflected in employment history *Other issues (use or possession of intoxicants, controlled substances and marijuana, financial responsibility, criminal immoral conduct, honesty, disruptive or violent behavior, etc.) which also lead to termination or forced resignation are raised one level for adjudication purposes. For example, petty theft, a B issue by itself, becomes a C issue if it is the reason for termination or forced resignation from employment. 8 – FIREARMS & WEAPONS A – MINOR Possession of an unregistered firearm B – MODERATE Possession of a prohibited weapon Possession of illegal ammunition Carrying deadly weapon Unlawful discharge of firearms C – SUBSTANTIAL Carrying concealed weapon or firearm Brandishing firearm Possession of firearm by a felon Possession of a loaded firearm Possession of explosives D – MAJOR Improper or illegal sale or transportation of firearms or explosives Illegal manufacture of firearms or explosives B – MODERATE Traffic violations greater than A but less than C Contempt of court Driving motor vehicle without owner's consent Possession of instrument of crime C – SUBSTANTIAL Vehicular homicide Refusal to furnish testimony as required by 5 CFR 5.4 Tampering with a witness Harboring a fugitive D – MAJOR Hatch Act violation Mutilation or destruction of public records Engaging in riots or civil disorders Striking against the Government Desertion (military) 9 – MISCELLANEOUS A – MINOR Vagrancy Loitering Trespassing Minor traffic violation (Traffic violations not required to be admitted on application material or questionnaires must not be considered issues) 21 10 – STATUTORY OR REGULATORY DEBARMENT The following issues require debarment from Federal employment for the period specified. CONDUCT DEBARMENT PERIOD Habitual use of intoxicating beverages to excess Evidence of disloyalty; advocates or is a knowing member of an organization that advocates, the overthrow of our Constitutional form of government Participation in a strike against the government Indefinite1 (from positions in the competitive service only) Indefinite 5 U.S.C. 7352 Indefinite Willful and unlawful concealment, removal, mutilation or destruction (including attempts) of public records and materials Inciting, organizing, promoting, encouraging, participating, or aiding others to engage in riots or civil disorders or any offense committed in furtherance of, or while participating in a riot or civil disorder Interference with elections by an officer or member of the armed forces Unlawful approval of bond or sureties by a postmaster Theft or unlawful concealment of money, or other property of value, from a bank or safe in, or adjacent to, a bank which is a Federal Reserve member or is insured by the Federal Deposit Insurance Corporation Unlawful trading in public property by collection or disbursing officer Unauthorized disclosure of information by a Farm Credit Examiner Committing treason against the United States Inciting, assisting, or participating in any rebellion or insurrection against the United States Knowingly and willfully advocating, abetting, advising, or teaching the overthrow of the United States Government or any political subdivision of the United States Activities intended to impair or influence the loyalty, morale, or discipline of the United States Armed Forces Indefinite 5 U.S.C. 7311; 18 U.S.C. 1918 18 U.S.C. 2071 (b) LEGAL AUTHORITY 5 U.S.C. 7311; 18 U.S.C. 1918 5 years from the date the Felony conviction becomes final 5 U.S.C. 7313 Indefinite 18 U.S.C. 593 Indefinite (from employment as Postmaster only) Indefinite (from positions of National Bank Examiner and Federal Deposit Insurance Corporation Examiners only) 18 U.S.C. 1732 Indefinite 18 U.S.C. 1901 Indefinite (from employment as Farm Credit Examiner only) Indefinite Indefinite 18 U.S.C. 1907 5 years from the date of the conviction 18 U.S.C. 2385 5 years from the date of the conviction 18 U.S.C. 2387 1 18 U.S.C. 655 18 U.S.C. 2381 18 U.S.C. 2383 The length of debarment imposed based on 5 CFR 731.202(b)(5) Alcohol abuse, without evidence of substantial rehabilitation, of a nature and duration that suggests that the applicant or appointee would be prevented from performing the duties of the position in question or would constitute a direct threat to the property or safety of the applicant or appointee or others, would be in accordance with the procedures under 5 CFR part 731. 22 10 – STATUTORY OR REGULATORY DEBARMENT, Continued DEBARMENT PERIOD LEGAL AUTHORITY Indefinite from any position requiring the individual to ship, transport, possess, or receive firearms or ammunition 18 U.S.C. 922 Omnibus Consolidated Appropriations Act of 1997 (amended the Gun Control Act of 1968) Indefinite from any position involving regular contact with, or control over, Indian children 25 U.S.C. 3207 Indian Child Protection and Family Violence Act, dated November 28, 1990, contains minimum standards. Refer also to Dept. of Interior or Health and Human Services agency regulations 5 U.S.C. 3328 CONDUCT Conviction of misdemeanor crime (under Federal or State law) of domestic violence (use or attempted use of physical force, or the threatened use of a deadly weapon, committed by current or former spouse, parent, or guardian of the victim, by a person with whom the victim shares a child in common, by a person who is cohabiting or who has cohabited with the victim as a spouse, parent, or guardian, or by a person similarly situated to a spouse, parent, or guardian of the victim). Any individual who has been found guilty of, or has entered a plea of nolo contendere or guilty to any offense under Federal, State, or tribal law involving crimes of violence, sexual assault, molestation, exploitation, contact or prostitution; or crimes against persons or offenses committed against children. Knowing and willful failure to register under Section 3 of the Military Selective Service Act [50 U.S.C. App. 453]. (Applies to men born after December 31, 1959, who are or were required to register and who are not registered, or did not register before the requirement terminated or became inapplicable to the individual. Processing guidance can be found at 5 CFR 300.) Indefinite (from positions in executive agencies only) 11 – LOYALTY & SECURITY y suit Suitability issues indicating evidence of disloyalty or terrorism that does NOT require statutory debarment will be adjudicated at level D Adultery is rarely a suitability issue but, in certain circumstances, may be a security issue and should be reported when indications of susceptibility to coercion or blackmail are present. Previous instances of security violations, clearance denials or revocations are included. Any other issue not listed elsewhere may be a suitability issue considered in security adjudication (e.g., judgment, reliability, and dependability issues). Unadmitted/unlisted foreign travel that was required to be reported. Listed foreign travel when foreign connections or foreign activities are reported, or when problems occurred while traveling outside the United States. 12 – QUALIFICATIONS (INCLUDING HEALTH) (The seriousness of physical and mental health issues under this Code must be assessed in light of the Rehabilitation Act of 1973, amended, and 5 CFR Part 339) Lack of required competencies or knowledge, skills, and abilities Inability to perform or poor performance which is not due to negligence or misconduct Physical health issues All forms of counseling and therapy Mental, emotional, psychological, or psychiatric issues which do not include other issues listed in this appendix 13 – ASSOCIATES* Issues listed in this appendix that relate to the conduct of an associate of the person under investigation 14 – RELATIVES* Issues listed in this appendix that relate to the conduct of a relative of the person under investigation *Use issue codes 13 and 14 only when the issue has a bearing on the suitability or security determination of the person under investigation. 23 GENERAL GUIDANCE Difficult to Characterize Issues. For Suitability-related conduct not listed in this Appendix, attempt to find a similar or related issue, and use the characterization of the listed issue. If unlisted conduct does not associate well with a listed issue, but seems to relate more appropriately to a level where no issues are identified (such as level A for Issue 4), identify the issue at that level. Resolve any uncertainty about an issue with an experienced Adjudicator. Graft and Corruption. Bribery of public officials and witnesses and graft in connection with public service matters may serve as a basis for debarment. Some misconduct requires automatic removal from Federal employment, but no automatic debarment. Criminal Activity Not Covered. Use issue code 9 for any criminal activity that does not properly fall in any other issue code. Probation and Parole Violations. The ranking of a probation or parole violation is determined by the nature of the issue leading to the violation. For example, a probation or parole violation for Driving While Intoxicated is adjudicated at level B while a violation for Assault With a Deadly Weapon is adjudicated at level D. Probation and parole violations that cannot be related to conduct in this Appendix (such as failure to report to probation or parole officer) are adjudicated at level B. DETERMINING THE RECENCY AND CONTROL DATE – The recency of an issue is the period of time elapsed between the date the conduct occurred and the control date. The control date is used to determine the recency of issues for issue upgrade or downgrade (conversion). Use the control date appropriate for the case type, as shown in this chart: TYPE OF CASE CONTROL DATE Uninvestigated Applicants (Those who have not yet undergone the required level of OPM investigation) Investigated Applicant (Those who have undergone the required level of OPM investigation) Date the suitability issue information was first considered by the Human Resources Office (normally the date of the OF 306, if the issue information was admitted). (If referred to OPM-FISD- Suitability Adjudications Branch; the date of referral is used. Date the subject signed investigative data form. Date the Subject signed the investigative data form. Appointee or Employee OPM may impose the maximum debarment in directed removal actions that are based, in whole or in part, on falsification or fraud. ï‚· When new actionable issues arise after the original control date, the control date becomes the date of occurrence of the most recent actionable conduct. ï‚· The control date for cases involving an applicant whose previous application was canceled because of pending charges is the date of referral of the current or most recent application. ï‚· If two or more applications for the same person are received for suitability determination, the control date is the earliest referral date. 24 SUITABILITY UPGRADE. Because the basic suitability evaluation is used to identify the most serious conduct and recency has a significant affect on this assessment, suitability upgrades only apply to issues occurring within 0 to 36 months from the control date. Suitability upgrade is based on the premise multiple issues in the same case raise a more serious question of suitability than would a single issue. Thus, the upgrade action is applied when there is more than one recent suitability issue in a given case. When an upgrade occurs due to multiple issues, issues characterized at the lower end of the ranking scale may be elevated to a higher level if they are repeated issues or occur in conjunction with another issue, as shown in the following chart: SUITABILITY UPGRADE NUMBER OF ISSUES & RECENCY (FREQUENCY) UPGRADE ACTION 2 ISSUES IN 0-36 MONTHS RAISE BOTH ISSUES ONCE (e.g., “A” to “B”) RAISE THOSE ISSUES TWICE (e.g., “A” to “C”) 3 OR MORE ISSUES IN 0-36 MONTHS Note: When an individual is charged with multiple crimes based on the same incident, there is no upgrade. Rather, characterize the issue according to the most serious conduct. Suitability Downgrade (Issue Conversion). Suitability downgrades only apply to issues occurring more than 36 months from the control date. Suitability downgrade is based on the premise the less recent the issue, the less serious the question of suitability. Downgrading, hence, reduces the potential for a negative suitability determination because of presumed rehabilitation over time. Once an issue has been characterized and its recency established, it then may be downgraded to take into account its age. Use the following chart: SUITABILITY DOWNGRADE (CONVERSION) RECENCY (PERIOD IN WHICH ISSUE OCCURRED) ISSUE B C D CONVERTS TO 0-36 Months 37-72 Months 73-108 Months B, no conversion Downgrades to A Downgrades to NON-ISSUE C, no conversion Downgrades to B Downgrades to A D, no conversion Downgrades to C Downgrades to B Note: Any issues over 108 months become a NON-ISSUE for purposes of the basic suitability evaluation. 25 DEBARMENT ACTION: ï‚· Only OPM has authority to impose a Government-wide period of debarment of up to three years from all covered positions in the Federal service. ï‚· Agencies have the authority to impose up to a three-year period of debarment from either all or specific covered positions within their own agency when the issues are not recent or serious enough to warrant referral to OPM to consider imposing a Government-wide debarment from all Federal covered positions. ï‚· Agencies do not have the authority to bar from all covered positions Government-wide. OPM and agencies have sole discretion to determine the length of debarment to impose. ï‚· These guidelines are intended to promote consistency in adjudicative decisions about the length of debarment to impose. (Refer to OPM Suitability Processing Handbook for complete Debarment procedures) 26 (Attached Separately) A djudication Guidelines Suggested Adjudication Guidelines for Determining Eligibility for Contractors in a Position of Trust (No Classified Access) Prepared by: Kenneth Sudol & Associates, Inc. February 2008 27 Appendix C Suggested Procedures for Processing Personnel Security Investigations for Contractors C.1 INTRODUCTION C.2 RECORDS AND REPORTING C.3 PROCESSING INVESTIGATIONS A. Personnel Security and Suitability Investigations. 1. Pre-Appointment Checks for Sensitive and High Risk Positions. 2. Waiver Request Memorandum for Critical-Sensitive Positions. 3. Special Agreement Checks (SAC). 4. National Agency Checks and Inquiries (NACI). 5. Access National Agency Checks and Inquiries (ANACI). 6. National Agency Checks with Law and Credit (NACLC). 7. Childcare National Agency Checks with written Inquiries (CNACI). 8. Minimum Background Investigation (MBI). 9. Background Investigation (BI). 10. Single Scope Background Investigation (SSBI). 11. Upgrade Investigation (UGI). 12. Update Investigation (UDI). B. Re-Investigations. 1. Noncritical-Sensitive Re-Investigations. 2. Periodic Re-Investigations (PRI). 3. Single Scope Background Investigation - Periodic Re-Investigations (SSBI-PR). B.1. INVESTIGATIVE REQUIREMENTS A. Personnel Security Investigations (PSI) are conducted to develop information on the background of employees, appointees, applicants, and non employees (contractors) associated with the Agency. Suitability investigations provide an assessment of an individual's potential to promote the efficiency and integrity of the Agency's operations when filling a particular position. Security investigations are conducted to determine if an individual's employment or retention in employment is consistent with the national security. The findings obtained through security investigations are used to determine eligibility far access to national security information or to special access programs. Investigations on non employees are used to determine the potential impact or risk the non employee's association would have with the Agency. General guidance on the minimum type of investigation for each sensitivity or risk level is indicated in the table on page B.4. 28 B. Non-employees working under non IT contracts that do not require access to classified information are generally considered Low Risk; however, due to the impact on Agency programs, contracts deemed to be of a higher risk require more extensive investigations of individuals performing under that contract. At a minimum, a Minimum Background Investigations (MBI) will be required for persons performing work under a contract designated Moderate Risk and a Background Investigation (BI) will be required for persons performing work under a contract designated High Risk. When required, the Background Investigation must be completed prior to performance on the contract. The National Agency Check and Inquiries will be conducted after an individual begins work under the contract. Investigations must be initiated no later than three days after the start of the subject's performance under the contact at the facility. C. Background checks are required for non employees such as guest workers, research associates, and trainees who will be associated with the Agency for a limited amount of time. For U. S. citizens a Special Agreement Check (SAC) is required if they are associated with the Agency more than 30 days during a oneyear period A National Agency Check and Inquiries (NACI) investigation will be required if they will be associated with the Agency for more than one year. For non U. S. citizens, a SAC is required if they are associated with the Agency more than 10 days during a one-year period. A NACI will be required if the duration of the association is more than one year. For non employees, the SAC and the NACI must be initiated no later than three days after starting work at the facility or association on a specific project. B.2 EMPLOYEES (Including Experts and Consultants) A. Sensitive Positions. For general guidance, see the table on page B.5., Minimum Requirements for Personnel Investigations. 1. Special-Sensitive. The Single Scope Background Investigation (SSBI) must be completed prior to appointment. 2. Critical-Sensitive. The SSBI must be completed prior to appointment; however, a waiver of this requirement may be requested in an emergency situation. 3. Noncritical-Sensitive. The Access National Agency Check and Inquiries (ANACI) must be initiated no later than 14 days after the subject’s entrance-on-duty. B. Non-Sensitive Positions. For general guidance, see the table on page B.5., Minimum Requirements for Personnel Investigations. 1. High Risk. The Background Investigation (BI) must be initiated upon receipt of a favorable preappointment check. Subjects can enter on duty after pre-appointment checks are favorably completed. 2. Moderate Risk. The Moderate Background Investigation (MBI) must be initiated no later than 14 days after the subject's entrance-on-duty date. 3. Low Risk. The NACI must be initiated no later than 14 days after the subject's entrance-on duty date. 29 B.3 NON-EMPLOYEES A. Contractors 1. Classified Contracts. a. Critical-Sensitive. The BI must be completed prior to performance on the contract. b. Noncritical-Sensitive. The National Agency Check with Law and Credits (NACLC) must be completed prior to performance on the contract. 2. Unclassified Contracts. a. High Risk contract. A BI is required for individuals performing work under a High Risk contract of any duration. The BI must be initiated upon receipt of a favorable pre-appointment check. Subjects can enter on duty (EOD) after pre-appointment checks are favorably completed. b. Moderate Risk contracts. A MBI is required for individuals performing work under a Moderate Risk contract of any duration. The MBI must be initiated no later than three days after the subject's beginning association. c. Low Risk contracts that exceeds one year. A NACI is required for individuals performing work under a non-IT, Low Risk contract for more than 365 days. The NACI must be initiated no later than three days after the subject's beginning association. d. Low Risk contract less than one year. A SAC is required for individuals performing work under a Low Risk contract over 180 days but less than 365 days. The SAC must be initiated no later than three days after the subject's beginning association. B. Guest Workers, Research Associates, Trainees, and Long-term Visitors 1. Guest workers, research associates, trainees, long-term visitors, and other non-employees associated with the Agency shall obtain a Security Assurance. For general guidance, see the table below, “Minimum Requirements for Personnel Investigations.” 2. U.S. Citizen. a. More than One Year. A NACI is required for U.S. citizens associated with the Agency for more than one-year. The NACI must be initiated within three days of the individual’s beginning association with the Agency. b. 180 to 365 Days. A SAC is required for U.S. citizens associated with the Agency for more than 180 days but less than 365 days. The SAC must be requested prior to the 180th day of the individual’s association with the Agency. c. 30 to 180 Days. A SAC may be requested for U.S. citizens associated with the Agency from 30 to 180 days when there is a potential for increased risk. 30 3. Non-U.S. Citizen. a. More than One Year. A NACI is required for non-U.S. citizens associated with the Agency for more than one-year. The NACI must be initiated within three days of the individual’s beginning association with the Agency. B.4 PROCESSING INVESTIGATIONS Guidance for both human resources managers and security contacts to initiate requests for investigations for national security positions are found in this Appendix. NOTE: Also check the requirements of HSPD-12 for all contractor personnel who will require access to your facilities. 31 MINIMUM REQUIREMENTS FOR PERSONNEL SECURITY INVESTIGATIONS SAC Special-Sensitive Critical-Sensitive, Top Secret Critical-Sensitive, Secret Noncritical-Sensitive High Risk Moderate Risk Low Risk Child Care Provider Contract: Critical-Sensitive/ High Risk Contract: Noncritical-Sensitive Contract: Moderate Risk Contract: Nonsensitive More than 180 days Contract: Nonsensitive Less than 180 Days Non-Employee: U.S. Citizen More than One Year Non-Employee: U.S. Citizen 180-365 Days Non-Employee: U.S. Citizen 30-180 Days Non-U.S. Citizen: More than One Year Non-U.S. Citizen: 10-365 Days Non-U.S. Citizen: Less than 10 Days NACI ANACI NACLC CNACI MBI BI SSBI M M M M RI Appendix C * * * * M * M M M * M M M M M C.3 A.1 & 10 C .C.3 A.1 & 9 3 C.3 A.1 & 5 C.3 A.1 & 9 A C.3 A.8 . C.3 A.4 1 C.3 A.7 C.3 & A.9 C.3 A.5 C.3 1 A.8 0 A.4 C.3 C.3 A.3 M C.3 A.4 M C.3 A.3 O C.3 A.3 M C.3 A.4 C.3 A.3 C.3 A.3 M O M = Mandatory O = Optional * RI = Reinvestigation of subject required at 5 or 10 year interval depending on level of security clearance. C.1 INTRODUCTION Agency security officers represent the Office of Security when providing support services to operating units. To fulfill this responsibility, each servicing security officer has the authority to ensure the requests for personnel security investigations are appropriately processed based upon position sensitivity. In connection with these responsibilities, the following guidelines and procedures are provided to ensure a uniform personnel security investigative program among the operating units and the Agency. For ease of reference, the guidelines have been separated into two basic categories: Records and Reporting and Processing Investigations. 32 C.2 RECORDS AND REPORTING A. Records. The Office of Security maintains an electronic database for each employee, contractor, guest worker, research associate, or other individual associated with the Agency who is granted access to national security information. The Office of Security will maintain security record information on a cleared individual for as long as that individual is actively employed or associated with the Agency. Results of completed suitability determinations are filed in each employee’s Official Personnel Folder (OPF). The servicing human resources office will provide copies of the OF-79A to the Office of Security indicating the final suitability adjudication for national security positions only. The Personnel Security database will only contain the results of determinations for national security positions and will include the following information: 1. Name; 2. Bureau; 3. Position title (or other designation for non-employee); 4. Date and place of birth; 5. Social Security Number; 6. Position sensitivity/risk designation (Special Sensitive, Critical-Sensitive, Noncritical-Sensitive, High Risk, Moderate Risk, or Low Risk); 7. Date of security briefings/debriefings; 8. Access level (Top Secret, Secret), Special Access (DOE, NATO, SCI, etc.); 9. Security processing action; a. Date initiated (sent to Office of Security or to OPM) b. Type of processing or security action (Pre-Appointment Checks, Personnel Investigation, Security Assurance, Security Access, etc.) to include Agency system of records. c. Date of completion and results for positions requiring a security determination. 10. Entrance-on-duty date and separation date. 33 B. Personnel Security and Investigative Files. 1. The Office of Security is the only repository for personnel security information in the Agency. Accordingly, Privacy Act and Freedom of Information Act requests for personnel security information will be referred to the Office of Security for direct response to the requestor. However, reports of investigations conducted by the Office of Personnel Management (OPM) or other investigative agencies remain under the control of that agency; therefore, an individual will be required to submit their Privacy Act request to OPM or the appropriate agency to obtain a copy of the investigative file. 2. Success of the Agency's Personnel Security Program depends upon well-defined and open channels of communication for timely and efficient flow of information. The key link in this communication chain is the servicing security officer. The servicing security officer is charged with ensuring that effective channels of communication are developed and maintained within his/her jurisdiction. Each servicing security officer shall establish communications with a point of contact for each operating unit within his/her jurisdiction. The operating unit point-of-contact is appointed by the senior official of that site or program as the security contact. The security contact is responsible for immediately reporting of all security incidences to the servicing security officer. The servicing security officer is responsible for keeping the Office of Security headquarters informed of incidents or situations which may affect the Personnel, Physical or Information Security programs in general, or the safety and security of the Agency's personnel, property, or programs. The servicing security officer also is responsible for keeping the appropriate operating unit or site official informed of all appropriate reports and correspondence. C. Reports. It is not practical to list all conceivable reporting situations; however, the following items are necessary to ensure that personnel security records are current and properly maintained. 1. Pending Security Processing. The servicing security officer or security contact will respond to requests for information concerning cases as requested by the Office of Security headquarters. 2. Personnel Actions. The security contact shall report all appropriate personnel actions to the servicing security officer for inclusion in the Personnel Security database. The servicing security officer is responsible for obtaining pertinent SF-50B (Notification of Personnel Action) issued within his/her jurisdiction, and for forwarding to the Office of Security those forms which indicate actions affecting, or possibly affecting, an individual's eligibility for security access. The following are examples of the types of personnel actions, which may have a bearing on the Personnel Security Program. The list is not all inclusive. a. Terminations for cause; b. Name changes; c. Changes in position sensitivity; d. Separations/transfers, outside of the Agency; e. Personnel transfers and reassignments; f. Suspensions and other disciplinary actions; 34 g. Appointments; h. Details; and i. Leave without pay in excess of 30 days. C.3 PROCESSING INVESTIGTIONS A. Personnel Security and Suitability Investigations. Each servicing security officer has the responsibility to confirm that all security processing requirements within his/her jurisdiction are met. The initial responsibility for preparing security and suitability request packages for employees or applicants is usually that of the servicing human resources officer. The servicing security officer shall provide assistance to the servicing human resources officer with regard to the processing of paperwork for security and suitability positions. The Contracting Officer or Contracting Officer’s Technical Representative (COTR) has the initial responsibility for contract workers and their request packages. Managers or other officials who represent the Agency in interactions with non-employees have the initial responsibility for preparing their request packages. The servicing security officer is responsible for tracking all investigations for national security information positions within their respective jurisdictions. Some security and suitability request packages may require more than one completed original form or copies of a completed original form. An “original” is a completed form that bears the subject’s original signature. 1. Pre-Appointment Check (Sensitive, High Risk, and Certain IT-related Moderate Risk Positions). a. Requirement. A pre-appointment check is optional for Low Risk positions and most Moderate Risk positions; however it is required for Moderate Risk positions in the Information Technology occupations, positions that afford “global access” to information systems, and all Sensitive and High Risk positions. These checks will include favorable National Criminal Information Center (NCIC) checks for criminal history. b. Procedure. The servicing human resources office provides the investigative forms to the applicant in advance of the entrance-on-duty date. The employee completes all forms, obtains a completed fingerprint card and fingerprints from the servicing security office (or local police station), and returns the completed forms and fingerprint card to the servicing human resources office. The servicing human resources office sends the completed package to the servicing security office for processing. c. Request Package. The pre-appointment request must include the following: (1) Pre-Appointment Check Request Memorandum; (2) Completed questionnaire: (a) For sensitive positions: Form SF-86, Questionnaire for National Security Positions, or 35 (b) For High Risk positions: Form SF-85P, Questionnaire for Public Trust Positions; (c) For Moderate Risk positions: Form SF-85, Questionnaire for Non-Sensitive Positions; (3) Form SF-87, Fingerprint chart, with OPM’s designation in the ORI Block; (4) Request for Security Clearance (Agency form), with sufficient justification for access to the security level requested (for Sensitive positions only); (5) Form OF-612, Optional Application for Federal Employment, or resume/equivalent; (6) Form OF-306, Declaration for Federal Employment; and (7) Credit Release Authorization. (8) Waiver Request Memorandum. (see paragraph 2 below). d. Security Office Action. The servicing security officer shall review the pre-appointment check request package for completeness and forward a copy of the request package to Office of Security headquarters for action. The Office of Security headquarters will perform the preappointment checks and notify the servicing human resources office of the results. The servicing human resources office will then notify the Office of Security once the appointment date has been established. 2. Waiver Request Memorandum (Critical-Sensitive Positions Only). When a Critical-Sensitive position appointment must be filled prior to the completion of an investigation due to an emergency situation, the individual’s immediate supervisor must submit a waiver request memorandum with the request for a pre-appointment check. The waiver request memorandum shall be addressed to the Director for Security requesting a waiver of the requirement for completion of a Single Scope Background Investigation (SSBI) or Background Investigation (BI) before appointment. The waiver request must contain sufficient justification concerning the nature of emergency and the benefit to the national interest. Waiver requests will not be granted to Special-Sensitive position appointments under any circumstance. a. Requirement. The Director for Security or his/her designee may grant a waiver of the requirement for prior completion of a BI or SSBI for appointment to a Critical-Sensitive position. The appointment must be justified as an emergency and in the national interest. b. Procedure. The individual’s supervisor or unit manager will be responsible for initiating the request for a waiver and sending it to the servicing security officer. c. Request Package. (1) The SSBI or BI investigative request package coded for 35-day service request; (2) Waiver request memorandum to the Office of Security from the individual’s supervisor or office manager, identifying the subject, the subject's proposed position sensitivity level, and 36 the nature of the emergency and the national interest; (3) Form SF-87, Fingerprint Chart, with OPM's designation in the ORI Block; and (4) Credit Release Authorization. d. Servicing Security Officer Action. 1. Confirm that the waiver request memorandum clearly identifies the emergency need and the national interest; and 2. Forward the waiver request package to the Office of Security headquarters for processing. 3. Special Agreement Check (SAC) (Low Risk Contracts and non-employees). a. Requirement. Special Agreement Check (SAC) is the minimum investigative requirement for contract personnel and non-employees performing Low Risk functions. (1) All U.S. citizens with access to Agency facilities for more than 180 calendar days but less than 365 calendar days are subject to a SAC or higher investigation, if required. (2) All non-U.S. citizens with access to Agency facilities for more than 10 working days up to 365 days are subject to a SAC or higher investigation, if required. b. Procedures. The responsible security contact or Contracting Officer Technical Representative (COTR) initiates the SAC investigation request package. The security contact or the COTR, not the subject, completes form OFI-86C, Items 1 through 12 and 14. The COTR ensures that confirm code “R” is clearly written in Block 7 and that the subject has signed and dated Block 13, Authorization For Release of Information. The completed SAC request package is then sent to the servicing security officer for processing no later than three working days after the subject’s start of work. c. Request Package. (1) Form OFI-86C, Special Agreement Checks; (2) FD-258, Fingerprint Chart with OPM's designation in the ORI Block. d. Servicing Security Officer Action. (1) Review investigative request package for completeness; (2) Ensure that the subject of each package is identified as contract personnel, the name of the contracting company or organization of origin is clearly indicated, and that each package is clearly marked to indicate the contract sensitivity designation; and (3) Forward completed package to OPM. 37 4. National Agency Checks and Inquiries (NACI) (Low Risk Positions). a. Requirement. The National Agency Checks and Inquiries (NACI) is the minimum investigation requirement for appointment to a Low Risk position. b. Procedure. The servicing human resources office provides the NACI investigative package to the employee in advance of or on the entrance-on-duty date. The employee completes all forms, obtains a completed fingerprint card from the servicing security office, and returns the completed investigative package and fingerprint card to the servicing human resources office within three working days after the effective date of the appointment. The servicing human resources office sends the completed package to OPM within 14 calendar days of the appointment effective date. c. Request Package. (1) Form SF-85, Questionnaire for Non-Sensitive Positions; (2) Form OF-612, Optional Application for Federal Employment or resume/equivalent; (3) Form OF-306, Declaration for Federal Employment; (4) Form SF-87 Fingerprint Chart, with OPM’s designation in the ORI Block; and (5) Credit Release Authorization. d. Servicing Security Office Action. None. The NACI investigative request package will be reviewed by the servicing human resources offices or designated office for completeness and forwarded to the Office of Personnel Management for processing. 5. Access National Agency Checks and Inquiries (ANACI) (Noncritical-Sensitive Positions). a. Requirement. Access National Agency Checks and Inquiries (ANACI) is the minimum investigative requirement for Noncritical-Sensitive positions requiring access to classified information up to the Secret level under E.O. 12968. b. Procedure. The servicing human resources office provides the ANACI investigative forms to the employee in advance of the entrance-on-duty date. The applicant or employee completes all forms, obtains a completed fingerprint card and set of fingerprints from the servicing security office (or local police office), and returns the completed investigative request package to the servicing security officer for processing. c. Request Package. (1) Pre-Appointment Check Request Memorandum; (2) Form SF-86, Questionnaire for National Security Positions; 38 (3) Form OF-612, Optional Application for Federal Employment, or resume/equivalent; (4) Form OF-306, Declaration for Federal Employment; (5) Form SF-87, Fingerprint Chart, with OPM’s designation in the ORI Block; (6) Form CD-79, Request for Security Clearance, with sufficient justification for access to the security level requested; and (7) Credit Release Authorization. d. Servicing Security Officer Action. Review the ANACI investigative request package for completeness and enter relevant data into Office of Security’s electronic database. Forwards a copy of request package to Office of Security headquarters for information. Upon favorably completed pre-appointment checks and subject’s EOD date, send the ANACI request package to the Office of Personnel Management (OPM) for processing. 6. National Agency Checks with Law and Credit (NACLC) (Noncritical-Sensitive contracts and non-employees). a. Requirement. National Agency Checks with Law and Credit (NACLC) is the minimum investigation requirement for contractor personnel, consultants, experts, associates, or committee members whose work requires access to classified information up to the Secret level. b. Procedure. The responsible security contact, COTR (Contracting Officer Technical Representative, or Agency committee liaison provides the NACLC investigative forms to the individual prior to the start date or required date of association. The individual completes all forms, obtains a completed fingerprint card and set of fingerprints from the servicing security office (or local police office), and returns the completed investigative package to the security contact, COTR, or Agency committee liaison, who forwards the request package to the servicing security office for processing. c. Request Package. (1) Form SF-86, Questionnaire for National Security Positions; (2) Form FD-258, Fingerprint Chart, with OPM’s designation in the ORI Block; (3) Form CD-79, Request for Security Clearance, with sufficient justification for access to classified information up to the Secret level; and (4) Credit Release Authorization. d. Servicing Security Office Action. Review the NACLC investigative request package for completeness and enter relevant data into Office of Security’s electronic database. Forward the request package to the Office of Personnel Management (OPM) for processing and send a copy to Office of Security headquarters for information. 39 7. Childcare National Agency Checks with Written Inquiries (CNACI) (Child Care Worker) a. Requirement. Childcare National Agency Checks with written Inquiries (CNACI) meets the investigative requirements set forth by Public Law 101-647 and 42 USC § 13041, for individuals holding positions within childcare facilities. Employees of childcare facilities sponsored by the Agency are subject to a CNACI investigation conducted by OPM and will be reinvestigated every five years. b. Procedure. (1) The security contact or the COTR of the childcare contractor provides the CNACI investigative forms to the individual in advance of or on the entrance-on-duty date. The individual completes all forms, obtains a completed fingerprint card and set of fingerprints from the servicing security office (or local police office), and returns the completed investigative package to the security contact or COTR, who forwards the request package to the servicing security office for processing. (2) The servicing security officer reviews and submits the completed request package to OPM within three days of the individual’s start of work. c. Request Package. (1) Form SF-85, Questionnaire for Non-Sensitive Positions; (2) Resume of professional qualifications, and employment history; (3) Form FD-258, Fingerprint Chart, with OPM’s designation in the ORI Block; and (4) Credit Release Authorization. d. Servicing Security Officer Action. Review the CNACI investigative request package for completeness and submit it to the Office of Personnel Management for processing. 8. Minimum Background Investigation (MBI) (Moderate Risk Positions). a. Requirement. The Minimum Background Investigation (MBI) is the minimum investigation requirement for appointment of employees to a Moderate Risk position. b. Procedure. The servicing human resources office provides the MBI investigative package to individuals being appointed to Moderate Risk positions. The employee completes all forms, obtains a completed fingerprint card from the servicing security office, and returns the completed investigative request package to the servicing human resources office at the appropriate time for processing. Individuals being appointed to non-IT related occupations can receive the investigative forms either in advance of or on the entrance-onduty date. Individuals in IT-related positions must receive the investigative forms prior to the entrance-onduty date and be subject to a favorable pre-appointment check prior to appointment. 40 c. Request Package. (1) Form SF-85, Questionnaire for Non-Sensitive Positions; (2) Form OF-612, Optional Application for Federal Employment or resume/equivalent; (3) Form OF-306, Declaration for Federal Employment; (4) Form SF-87 Fingerprint Chart, with OPM’s designation in the ORI Block; and (5) Credit Release Authorization. d. Servicing Security Office Action. None. (Unless accomplished by the Security Office). The MBI investigative request package will normally be reviewed by the servicing human resource office (HRO) for completeness and forwarded to the Office of Personnel Management for processing. 9. Background Investigation (BI) (Critical-Sensitive and High Risk Positions). a. Requirement. (1) All employees and non-employees appointed to Critical-Sensitive positions that require access to information up to the Secret level are subject to the completion of a BI prior to appointment. (2) All appointments to High Risk positions are subject to the prior completion of a BI; however, subjects can enter-on-duty (EOD) after a pre-appointment check has been favorably completed. b. Procedure. The servicing human resources office provides the BI investigative forms to the employee in advance of the entrance-on-duty date. The employee completes all forms, obtains a completed fingerprint card and set of fingerprints from the servicing security office (or local police office), and returns the completed investigative package to the servicing security officer for processing. c. Request Package. (1) Pre-Appointment Check Request Memorandum; (2) Waiver Request Memorandum, if required; (3) Questionnaire: (a) For Critical-Sensitive Positions: Form SF-86, Questionnaire for National Security Positions; or (b) For High Risk Positions: Form SF-85P, Questionnaire for Public Trust Positions; 41 (4) Form OF-612, Optional Application for Federal Employment, Resume/Equivalent; (5) Form OF-306, Declaration for Federal Employment; (6) Fingerprint card: (a) Form SF-87, Fingerprint Chart, with OPM's designation in the ORI Block; or (b) Form FD-258, Fingerprint Chart, with OPM’s designation in the ORI Block; (7) Request for Security Clearance (agency form) with sufficient justification for access to the security level requested; and (8) Credit Release Authorization. d. Servicing Security Office Action. (1) Critical Sensitive. Review the BI investigative request packages for completeness and enter relevant data into Office of Security’s electronic database. Forward the Waiver Request Memorandum (if required) and Form SF-86 to the Office of Security headquarters for processing. After favorably completing the pre-appointment check and determining the subject’s EOD date, submit the BI request package to the Office of Personnel Management (OPM) for processing. (2) High Risk. Review the BI investigative request packages for completeness and upon favorably completed pre-appointment checks and subject’s EOD date; submit the BI request package to the Office of Personnel Management (OPM) for processing. 10. Single Scope Background Investigation (SSBI) (Special-Sensitive and Critical-Sensitive Positions). a. Requirement. (1) All appointments to Special-Sensitive positions for employees and contract personnel that require access to classified information at the Top Secret and Sensitive Compartmented Information (SCI) levels are subject to completion of an SSBI prior to appointment. (2) All appointments to Critical-Sensitive positions for employees and contract personnel that require access to classified information at the Top Secret level are subject to the prior completion of an SSBI. (3) A pre-appointment check request memorandum is required for both Special-Sensitive and Critical-Sensitive positions. b. Procedure. The servicing human resources office provides the SSBI investigative forms to the employee in advance of the entrance-on-duty date. The employee completes all forms, obtains a completed fingerprint card and set of fingerprints from the servicing security office (or local police office), and returns the completed investigative package to the servicing security officer for processing. When a favorable pre-appointment check has been completed, the servicing security officer 42 submits the investigative package to OPM. c. Request Package. (1) Pre-Appointment Checks Request Memorandum; (2) Waiver Request Memorandum, (Critical-Sensitive Only) if required; (3) Form SF-86, Questionnaire for National Security Positions; (4) Form OF-612, Optional Application for Federal Employment, Resume/Equivalent, or Personal qualifications statement; (5) Form OF-306, Declaration for Federal Employment; (6) Form SF-87, Fingerprint Chart, with OPM's designation in the ORI Block; and (7) OPM Form 1476, Activity outside of the United States (This form is required only if the subject has had either extensive employment in foreign countries in the most recent five-year period, or has had extensive residence in foreign countries during the most recent three-year period); (8) Request for Security Clearance (agency form), with sufficient justification for access to the security level requested; and (9) Credit Release Authorization. d. Servicing Security Office Action. Review the SSBI investigative request packages for completeness and enter relevant data into Office of Security’s electronic database. Forward the Waiver Request Memorandum (if required) and copies of Form SF-86 to Office of Security headquarters for processing. After favorably completing the pre-appointment check and determining the subject’s EOD date, send the SSBI request package to the Office of Personnel Management (OPM) for processing. 11. Upgrade Investigation (UGI).The UGI consists of a National Agency Check (NAC), subject interview, record searches, credit check, and personal interview with selected sources covering specific areas of the subject’s background since the last investigation. The investigation is used to upgrade a previous investigation (SSBI, BI, or ANACI) to provide adequate investigative basis for an employee’s movement to the higher sensitivity level. 12. Update Investigation (UDI) (Positions/Contracts).The UDI consists of the same coverage as a prior investigation (SSBI, BI, or ANACI) during the 13 to 60 months since the previous investigation. This investigation is required when there has been a break in service of more than 365 calendar days since the previous investigation. B. Re-Investigations. 1. Noncritical-Sensitive Re-Investigations (Positions/Contracts). a. Requirement. All individuals occupying positions designated Noncritical-Sensitive are subject to a re-investigation at least once every ten years. The National Agency Checks with Law 43 and Credit (NACLC) investigation is used for Noncritical-Sensitive position re-investigations, expiring LBI, MBI, and NACLC investigations. b. Procedure. The security contact or COTR provides the RI investigative forms to the individual. The individual completes all forms, obtains a completed fingerprint card and set of fingerprints from the servicing security office (or local police office), and returns the completed investigative package to the servicing security officer for processing. When completed, the servicing security officer submits the RI investigative package to OPM for investigation with a copy provided to the Office of Security headquarters. c. Request Package. (1) Form SF-86, Questionnaire for National Security Positions; (2) Fingerprint card: (a) Form SF-87, Fingerprint Chart, with OPM’s designation in the ORI Block (employee), or (b) Form FD-258, Fingerprint Chart, with OPM’s designation in the ORI Block (contractor); and (3) Credit Release Authorization. d. Servicing Security Office Action. Review the re-investigative request package for completeness and forward it to the Office of Personnel Management. 2. Periodic Re-Investigations (PRI) (Critical-Sensitive with Secret Access and High Risk Positions). a. Requirement. All individuals occupying positions designated Critical-Sensitive with access to Secret information or High Risk is subject to periodic re-investigation at least once every five years. b. Procedure. The security contact provides the PRI investigative forms to the individual. The individual completes all forms, obtains a completed fingerprint card and set of fingerprints from the servicing security office (or local police office), and returns the completed investigative package to the servicing security officer for processing. When completed, the servicing security officer submits the PRI investigative package to OPM for investigation with a copy provided to the Office of Security headquarters. c. Request Package. (1) Form SF-86, Questionnaire for National Security Positions, updated by the subject with the top portion of the form completed by the security contact; (2) Fingerprint card: (a) Form SF-87, Fingerprint Chart, with OPM’s designation in the ORI Block (employee), or (b) Form FD-258, Fingerprint Chart, with OPM’s designation in the ORI Block (contractor); and 44 (3) Credit Release Authorization. d. Servicing Security Office Action. Review the re-investigation request package for completeness and submit it to the Office of Personnel Management for processing. 3. Single Scope Background Investigation - Periodic Re-Investigations (SSBI-PR) (Special and Critical-Sensitive Positions with Top Secret Access). a. Requirement. All individuals occupying positions designated Special-Sensitive or Critical Sensitive are subject to a reinvestigation at least once every five years. b. Procedure. The security contact provides the SSBI-PRI forms to the individual. The individual completes all forms, obtains a completed fingerprint card and set of fingerprints from the servicing security office (or local police office), and returns the completed investigative request package to the servicing security officer for processing. When completed, the servicing security officer submits the SSBI-PR investigative package to OPM for investigation with a copy provided to the Office of Security headquarters. c. Request Package. (1) Form SF-86, Questionnaire for National Security Positions, (Part I must be fully completed); (2) Form SF-87, Fingerprint Chart, with OPM's designation in the ORI Block; and (3) Credit release authorization. d. Servicing Security Office Action. (1) Special-Sensitive Positions: Review the SSBI-PR request package for completeness and submit it to the Office of Personnel Management for processing. (2) Critical-Sensitive Positions: Review the SSBI-PR request package for completeness and submit it to the Office of Personnel Management for processing. 45 Appendix D Suggested Contract Language for High and Moderate Risk Contracts This appendix establishes the security processing requirements for High and Moderate Risk contracts. SECURITY PROCESSING FOR HIGH AND MODERATE RISK CONTRACTS Each person employed under a High or Moderate Risk contract shall undergo security processing by the Agency's Office of Security before being eligible to work on the premises of any Agency owned, leased, or controlled facility in the United States or overseas. All Agency security processing pertinent to this contract will be conducted at no cost to the contractor. A. Non-U.S. citizens to be employed under this contract within the United States must have: ï‚· ï‚· ï‚· Official legal status in the United States Continuously resided in the United States for the last two years; and Advance approval from the security contact and servicing security officer of the contracting operating unit, and in consultation with the Office of Security (OSY). (OSY routinely consults with appropriate agencies regarding the use of non-U.S. citizens on contracts and can provide up-to-date information concerning this matter.) B. Processing requirements for High and Moderate Risk Contracts are as follows: 1. A proposed contract employee will submit the SF-85P, Questionnaire for Public Trust Positions, FD258, Fingerprint Chart with OPM's designation in the ORI Block, and any requested releases to the servicing security officer. 2. Upon completion of the security processing, the Office of Security, through the servicing security officer and the Contracting Officer’s Technical Representative (COTR), will notify the contractor in writing of the individual's eligibility to be given access to the HCHB or other Agency buildings and facilities. C. Security processing shall consist of limited personal background inquiries pertaining to verification of name, physical description, marital status, present and former residences, education, employment history, criminal record, personal references, medical fitness, fingerprint classification, and other pertinent information. It is the option of the Office of Security to repeat the security processing on any contract employee at its discretion. 46 D. If the Office of Security receives disqualifying information on a contract employee, the COTR will be notified. The COTR, in coordination with the contracting officer, will immediately remove the contract employee from duty requiring access to Agency facilities. Contract employees may be barred from working on the premises of a facility for any of the following: ï‚· ï‚· ï‚· ï‚· Conviction of a felony of a crime of violence or of a misdemeanor involving moral turpitude. Falsification of information entered on security screening forms or of other documents submitted to the Agency. Improper conduct once performing on the contract, including criminal, infamous, dishonest, immoral, or notoriously disgraceful conduct or other conduct prejudicial to the Government regardless of whether the conduct directly related to the contract. Any behavior judged to pose a potential threat to Agency information systems, personnel, property, or other assets. NOTE: Failure to comply with the requirements may result in termination of the contract or removal of some contract employees from Agency facilities. E. Compliance with these requirements shall not be construed as providing a contract employee clearance to have access to classified information. 47 Appendix E Suggested Contract Language for Low Risk Contracts This appendix establishes the security processing requirements for Low Risk contracts. SECURITY PROCESSING FOR LOW RISK CONTRACTS Each person employed under this Low Risk contract for over 180 days shall undergo security processing by the Agency’s Office of Security before being eligible to work on the premises of any Agency owned, leased, or controlled facility in the United States or overseas. All Agency security processing pertinent to this contract will be conducted at no cost to the contractor. A. Non-U.S. citizens to be employed under this contract within the United States must have: ï‚· ï‚· ï‚· Official legal status in the United States; Continuously resided in the United States for the last two years; and Advance approval from the servicing security officer in consultation with the Office of Security. B. Processing requirements for Low Risk Contracts are as follows. 1. Contract employees employed from 180 to 365 days require a Special Agreement Check (SAC), Form OFI-86C, to be processed. The COTR will forward a completed Form OFI-86C along with the FD-258, Fingerprint Chart, to the servicing security officer, who will send the investigative packet to the Office of Personnel Management for processing. 2. Contract employees employed for more than 365 days will require a National Agency Check and Inquiries (NACI) to be processed. The COTR will forward a completed Form SF-85 and Form FD-258, Fingerprint Chart, to the servicing security officer within three working days from start of work, who will send the investigative packet to the Office of Personnel Management. 3. Any contract employee with a favorable Special Agreement Check who remains on the contract over 364 days will be required to have a NACI conducted to continue working on the job site. C. The scope of the SAC will include checks of the Security/Suitability Investigations Index (SII), other agency files (INVA), Defense Clearance Investigations Index (DCII), FBI Fingerprint (FBIF), and the FBI Information Management Division (FBIN). For those individuals who are not U.S. citizens (immigrants), the COTR will request an INS (Immigration and Naturalization Service) check on the SAC, Form OF-86C, by checking Block #7, Item I. In Block 13, the COTR should enter the employee’s Alien Registration Receipt Card number to aid in verification. 48 D. If the Office of Security receives disqualifying information on a contract employee, the COTR will be notified. The COTR, in coordination with the Contracting Officer, will immediately remove the employee from duty requiring access to Agency facilities. Contract employees may be barred from working on the premises of a facility for any of the following reasons: ï‚· ï‚· ï‚· ï‚· Conviction of a felony of a crime of violence or of a misdemeanor involving moral turpitude. Falsification of information entered on security screening forms or of other documents submitted to the Agency. Improper conduct once performing on the contract, including criminal, infamous, dishonest, immoral, or notoriously disgraceful conduct or other conduct prejudicial to the Government regardless of whether the conduct directly related to the contract. Any behavior judged to pose a potential threat to Agency information systems, personnel, property, or other assets. NOTE: Failure to comply with the requirements may result in termination of the contract or removal of some contract employees from Agency facilities. E. Compliance with these requirements shall not be construed as providing a contract employee clearance to have access to classified information. 49 Appendix F Child Care Provider Processing General Guidance for Investigations F.1 REQUIREMENT All child care providers working in owned, leased, or sponsored Agency child care facilities will be processed for background checks utilizing the Child Care National Agency Check with Inquiries (CNACI). The scope of the CNACI includes the National Agency Check with Inquiries and state criminal history check for all states of residence. The CNACI meets the intent of the Crime Act of 1990, as amended, as well as the minimum suitability investigation directed for Federal employment under Executive Order 10450. An operating unit may hire a staff person provisionally prior to the completion of the required background check provided that, when caring for children, the uncleared individual must at all times be within the sight and under the supervision of a staff person whose background check has been successfully completed. F.2 BACKGROUND INVESTIGATION A. Procedures. Prior to the employment of a child care provider in any Agency sponsored child care facility, the facility director/manager shall be responsible to ensure that the applicant has submitted to the servicing security officer the required documentation resulting in a “completed” CNACI by the Office of Personnel Management (OPM) and favorably adjudicated by the Office of Security. Facility managers should work in concert with their servicing security officer for the submission of the investigation packet to OPM. Upon the completion of the adjudication by the Office of Security, the facility manager will receive, through the servicing security officer, a letter of favorable adjudication authorizing the applicant to work in the facility. B. Request Package. The Child Care National Agency Check with Inquiries (CNACI) Package will include the following documents. 1. Original SF-85, Questionnaire for Non-Sensitive Positions, with “CCP” marked in Block 1 (Position Title) to distinguish it as a Child Care Provider case. 2. Type of Investigation will be annotated as “02” and Extra Coverage Block will be code “8.” 3. Form FD-258, Fingerprint Chart, with OPM's designation in the ORI Block. 50 C. Processing. 1. The packet will be submitted to the servicing security officer who will forward the investigative packet to OPM. 2. Upon completion of the CNACI, OPM will forward the packet to the Office of Security for adjudication. 3. Upon favorable determination by the Office of Security, a certificate of favorable background investigation will be sent to the facility manager through the servicing security officer. 4. CNACI investigations shall be updated every five years. 5. As required by 42 U.S.C. § 13041, the Office of Security will maintain a database to reflect the current background investigation status of child care providers and to determine when they need an updated background investigation. NOTE: Failure to comply with these requirements will result in the applicant being determined ineligible to work in an Agency owned, leased, or sponsored child care facility. 51 A djudication Guidelines Suggested Adjudication Guidelines for Determining Eligibility for Contractors in a Position of Trust (No Classified Access) Prepared by: Kenneth Sudol & Associates, Inc. February 2008 52 ADJUDICATIVE GUIDELINES A. Allegiance to the United States p. 6/7 B. Foreign Influence p. 8/9 C. Foreign Preference p. 10/11 D. Sexual Behavior p. 12 E. Personal Conduct p. 13/14/15 F. Financial Considerations p. 16/17 G. Alcohol Consumption p. 18/19 H. Drug Involvement p. 20/21 I. Psychological Conditions p. 22/23 J. Criminal Conduct p. 24/25 K. Handling Protected Information p. 26/27 L. Outside Activities p. 28 M. Use of Information Technology Systems p. 29/30 53 Suggested Adjudicative Guidelines for Determining Eligibility for Contractors In a Position of Trust 1. INTRODUCTION The following suggested adjudicative guidelines are established for U. S. Government contractors within the (insert your agency) for a Position of Trust position. They apply to persons being considered for initial or continued eligibility for a position of trust, to include sensitive positions that do not require access to classified information but may have a need for access to other types of protected information. Decisions regarding eligibility for a position of trust with the Federal government takes into account factors that could cause a conflict of interest and place a person in the position of having to choose between his or her commitments to the United States, including the commitment to protect government facilities and/or sensitive information, and any other compelling loyalty. Position of trust decisions also take into account a person’s reliability, trustworthiness and ability to protect all agency proprietary and/or sensitive information. No coercive policing could replace the self-discipline and integrity of the person entrusted with the nation’s sensitive information as the most effective means of protecting them. When a person’s life history shows evidence of unreliability or untrustworthiness, questions arise whether the person can be relied on and trusted to exercise the responsibility necessary for working in an environment where protecting government facilities and/or sensitive or agency proprietary information is paramount. 2. THE ADJUDICATIVE PROCESS (a) The adjudicative process is an examination of a sufficient period of a person's life to make an affirmative determination that the person is an acceptable security risk. Eligibility for access to government facilities or to government sensitive or agency proprietary information is predicated upon the individual meeting these guidelines. The adjudication process is the careful weighing of a number of variables known as the wholeperson concept. Available, reliable information about the person, past and present, favorable and unfavorable, should be considered in reaching a determination. In evaluating the relevance of an individual's conduct, the adjudicator should consider the following factors: 54 (1) The nature, extent, and seriousness of the conduct; (2) The circumstances surrounding the conduct, to include knowledgeable participation; (3) The frequency and recency of the conduct; (4) The individual’s age and maturity at the time of the conduct; (5) The extent to which participation is voluntary; (6) The presence or absence of rehabilitation and other permanent behavioral changes; (7) The motivation for the conduct; (8) The potential for pressure, coercion, exploitation, or duress; and (9) The likelihood of continuation or recurrence. (b) Each case must be judged on its own merits, and final determination remains the responsibility of the specific department or agency. Any doubt concerning personnel being considered for a position of trust will be resolved in favor of this agency and the Federal Government. (c) The ability to develop specific thresholds for action under these guidelines is limited by the nature and complexity of human behavior. The ultimate determination of whether the granting or continuing of eligibility for a position of trust is clearly consistent with the interests of this agency or the Federal Government must be an overall common sense judgment based upon careful consideration of this agencies written policies and the following guidelines, each of which is to be evaluated in the context of the whole person. (1) GUIDELINE A: Allegiance to the United States; (2) GUIDELINE B: Foreign Influence; (3) GUIDELINE C: Foreign Preference; (4) GUIDELINE D: Sexual Behavior; (5) GUIDELINE E: Personal Conduct; (6) GUIDELINE F: Financial Considerations; 55 (7) GUIDELINE G: Alcohol Consumption; (8) GUIDELINE H: Drug Involvement; (9) GUIDELINE I: Psychological Conditions; (10) GUIDELINE J: Criminal Conduct; (11) GUIDELINE K: Handling Protected Information; (12) GUIDELINE L: Outside Activities; (13) GUIDELINE M: Use of Information Technology Systems; (d) Although adverse information concerning a single criterion or policy may not be sufficient for an unfavorable determination, the individual may be disqualified if available information reflects a recent or recurring pattern of questionable judgment, irresponsibility, or emotionally unstable behavior. Notwithstanding, the whole person concept, pursuit of further investigation may be terminated by this agency in the face of reliable, significant, disqualifying, adverse information. (e) When potentially unfavorable information becomes known about an individual who is currently eligible for a position of trust, the adjudicator should consider whether the person: (1) Voluntarily reported the information; (2) Was truthful and complete in responding to questions; (3) Sought assistance and followed professional guidance, where appropriate; (4) Resolved or appears likely to favorably resolve the security concern; (5) Has demonstrated positive changes in behavior and employment; (6) Should have his or her access to a position of trust temporarily suspended pending final adjudication of the information. 56 (f) If after evaluating potentially unfavorable information of concern, the adjudicator decides that the information is not serious enough to warrant a recommendation of disapproval or removal from a position of trust, it may be appropriate to recommend approval with a warning that future incidents of a similar nature may result in removal from a position of trust. 57 Suggested Adjudicative Guidelines for Contractors in a Position of Trust GUIDELINE A ALLEGIANCE TO THE UNITED STATES 3. The Concern. An individual must be of unquestioned allegiance to the United States. The willingness to safeguard agency proprietary or other sensitive information is in doubt if there is any reason to suspect an individual's allegiance to the United States. 4. Conditions that could raise a trustworthiness concern and may potentially be disqualifying include: (a) Involvement in, support of, training to commit, or advocacy of any act of sabotage, espionage, treason, terrorism, or sedition against the United States of America; (b) Association or sympathy with persons who are attempting to commit, or who are committing, any of the above acts; (c) Association or sympathy with persons or organizations that advocate, threaten, or use force or violence, or use any other illegal or unconstitutional means, in an effort to: (1) overthrow or influence the government of the United States or any state or local government; (2) prevent Federal, state, or local government personnel from performing their official duties; (3) gain retribution for perceived wrongs caused by the Federal, state, or local government; (4) prevent others from exercising their rights under the Constitution or laws of the United States or of any state. 58 5. Conditions that could potentially mitigate the trustworthiness concerns include: (a) The individual was unaware of the unlawful aims of the individual or organization and severed ties upon learning of these; (b) The individual's involvement was only with the lawful or humanitarian aspects of such an organization; (c) Involvement in the above activities occurred for only a short period of time and was attributable to curiosity or academic interest; (d) The involvement or association with such activities occurred under such unusual circumstances, or so much time has elapsed, that it is unlikely to recur and does not cast doubt on the individual’s current reliability, trustworthiness, or loyalty. 59 GUIDELINE B FOREIGN INFLUENCE 6. The Concern. Foreign contacts and interests may be a concern if the individual has divided loyalties or foreign financial interests, may be manipulated or induced to help a foreign person, group, organization, or government in a way that is not in U.S. interests, or is vulnerable to pressure or coercion by any foreign interest. Adjudication under this Guideline can and should consider the identity of the foreign country in which the foreign contact or financial interest is located, including, but not limited to, such considerations as whether the foreign country is known to target United States citizens to obtain protected information and/or is associated with a risk of terrorism. 7. Conditions that could raise a trustworthiness concern and may potentially be disqualifying include: (a) Contact with a foreign family member, business or professional associate, friend, or other person who is a citizen of or resident in a foreign country if that contact creates a heightened risk of foreign exploitation, inducement, manipulation, pressure, or coercion; (b) Connections to a foreign person, group, government, or country that create a potential conflict of interest between the individual’s obligation to protect sensitive information or technology and the individual’s desire to help a foreign person, group, or country by providing that information; (c) Counterintelligence information, that may be classified, indicates that the individual’s access to protected information may involve an unacceptable risk to national security; (d) Sharing living quarters with a person or persons, regardless of citizenship status, if that relationship creates a heightened risk of foreign inducement, manipulation, pressure, or coercion; (e) A substantial business, financial, or property interest in a foreign country, or in any foreign-owned or foreign-operated business, which could subject the individual to heightened risk of foreign influence or exploitation; (f) Failure to report, where required, association with a foreign national; 60 (g) Unauthorized association with a suspected or known agent, associate, or employee of a foreign intelligence service; (h) Indications that representatives or nationals from a foreign country are acting to increase the vulnerability of the individual to possible future exploitation, inducement, manipulation, pressure or coercion; (i) Conduct especially while traveling outside the U.S., which may make the individual vulnerable to exploitation, pressure, or coercion by a foreign person, group, government, or country. 8. Conditions that could potentially mitigate the trustworthiness concerns include: (a) The nature of the relationships with foreign persons, the country in which these persons are located, or the positions or activities of those persons in that country are such that it is unlikely the individual will be placed in a position of having to choose between the interests of a foreign individual, group, organization, or government and the interests of the U.S. (b) There is no conflict of interest, either because the individual’s sense of loyalty or obligation to the foreign person, group, government, or country is so minimal, or the individual has such deep and longstanding relationships and loyalties in the U.S., that the individual can be expected to resolve any conflict of interest in favor of the U.S. interest; (c) Contact or communication with foreign citizens is so casual and infrequent that there is little likelihood that it could create a risk for foreign influence or exploitation; (d) The foreign contacts and activities are on U.S. Government business or are approved by the cognizant security authority; (e) The individual has promptly complied with existing agency requirements regarding the reporting of contacts, requests, or threats from persons, groups, or organizations from a foreign country; (f) The value or routine nature of the foreign business, financial, or property interests is such that they are unlikely to result in a conflict and could not be used effectively to influence, manipulate, or pressure the individual. 61 GUIDELINE C FOREIGN PREFERENCE 9. The Concern. When an individual acts in such a way as to indicate a preference for a foreign country over the United States, then he or she may be prone to provide information or make decisions that are harmful to the interests of this agency or to the United States. 10. Conditions that could raise a trustworthiness concern and may potentially be disqualifying include: (a) Exercise of any right, privilege or obligation of foreign citizenship after becoming a U.S. citizen or through the foreign citizenship of a family member. This includes but is not limited to: (1) Possession of a current foreign passport; (2) Military service or a willingness to bear arms for a foreign country; (3) Accepting educational, medical, retirement, social welfare, or other such benefits from a foreign country; (4) Residence in a foreign country to meet citizenship requirements; (5) Using foreign citizenship to protect financial or business interests in another country; (6) Seeking or holding political office in a foreign country; (7) Voting in foreign elections; (b) Action to acquire or obtain recognition of a foreign citizenship by an American citizen; (c) Performing or attempting to perform duties, or otherwise acting, so as to serve the interests of a foreign person, group, organization or government in conflict with the national security interest; (d) Any statement or action that shows allegiance to a country other than the United States: for example, declaration of intent to renounce United States citizenship; renunciation of United States citizenship. 62 11. Conditions that could potentially mitigate the trustworthiness concerns include: (a) Dual citizenship is based solely on parents' citizenship or birth in a foreign country; (b) Individual has expressed a willingness to renounce dual citizenship (c) Exercise of the rights, privileges, or obligations of foreign citizenship occurred before the individual became a U.S. citizen or when the individual was a minor; (d) Use of a foreign passport is approved by the cognizant security authority; (e) The passport has been destroyed, surrendered to the cognizant security authority, or otherwise invalidated; (f) The vote in a foreign election was encouraged by the United States Government 63 GUIDELINE D SEXUAL BEHAVIOR 12. The Concern. Sexual behavior that involves a criminal offense, indicates a personality or emotional disorder, reflects lack of judgment or discretion, or which may subject the individual to undue influence or coercion, exploitation, or duress can raise questions about an individual’s reliability, trustworthiness and ability to protect sensitive information. No adverse inference concerning the standards in this Guideline may be raised solely on the basis of the sexual orientation of the individual. 13. Conditions that could raise a trustworthiness concern and may potentially be disqualifying include: (a) Sexual behavior of a criminal nature, whether or not the individual has been prosecuted; (b) A pattern of compulsive, self-destructive or high-risk sexual behavior that the person is unable to stop or that may be symptomatic of a personality disorder; (c) Sexual behavior that causes an individual to be vulnerable to coercion, exploitation, or duress; (d) Sexual behavior of a public nature and/or that which reflects lack of discretion or judgment. 14. Conditions that could potentially mitigate the trustworthiness concerns include: (a) The behavior occurred prior to or during adolescence and there is no evidence of subsequent conduct of a similar nature; (b) The sexual behavior happened so long ago, so infrequently, or under such unusual circumstances, that it is unlikely to recur and does not cast doubt on the individual’s current reliability, trustworthiness, or good judgment (c) The behavior no longer serves as a basis for coercion, exploitation, or duress; (d) The sexual behavior is strictly private, consensual, and discreet. 64 GUIDELINE E PERSONAL CONDUCT 15. The concern. Conduct involving questionable judgment, lack of candor, dishonesty or unwillingness to comply with rules and regulations can raise questions about an individual’s reliability, trustworthiness and ability to protect sensitive information. Of special interest is any failure to provide truthful and candid answers during the personnel security investigation process or any other failure to cooperate with the personnel security investigation process. The following will normally result in an unfavorable action or administrative termination of further processing for a position of trust eligibility: (a) Refusal, or failure without reasonable cause, to undergo or cooperate with security processing, including but not limited to meeting with a security investigator for subject interview, completing security forms or releases, and cooperation with medical or psychological evaluation; (b) Refusal to provide full, frank and truthful answers to lawful questions of investigators, security officials or other official representatives in connection with a trustworthiness determination. 16. Conditions that could raise a trustworthiness concern and may potentially be disqualifying also include: (a) The deliberate omission, concealment, or falsification of relevant facts from any personnel security questionnaire, personal history statement, or similar form used to conduct investigations, determine employment qualifications, award benefits or status, determine eligibility for a position of trust, or award fiduciary responsibilities; (b) Deliberately providing false or misleading information concerning relevant facts to an employer investigator, security official, competent medical authority, or other official government representative; 65 (c) (d) Credible adverse information in several adjudicative issue areas that is not sufficient for an adverse determination under any other single guideline, but which, when considered as a whole, supports a whole-person assessment of questionable judgment, untrustworthiness, unreliability, lack of candor, unwillingness to comply with rules and regulations, or other characteristics indicating that the person may not properly safeguard protected information; Credible adverse information that is not explicitly covered under any other guideline and may not be sufficient by itself for an adverse determination, but which, when combined with all available information supports a whole-person assessment of questionable judgment, untrustworthiness, unreliability, lack of candor, unwillingness to comply with rules and regulations, or other characteristics indicating that the person may not properly safeguard protected information. This includes but is not limited to consideration of: (1) untrustworthy or unreliable behavior to include breach of client confidentiality, release of proprietary information, unauthorized release of sensitive corporate or other government protected information; (2) disruptive, violent, or other inappropriate behavior in the workplace; (3) a pattern of dishonesty or rule violations; (4) evidence of significant misuse of Government or other employer’s time or resources; (e) Personal conduct, or concealment of information about one’s conduct, that creates a vulnerability to exploitation, manipulation, or duress, such as: (1) engaging in activities which, if known, may affect the person’s personal, professional, or community standing, or (2) while in another country, engaging in any activity that is illegal in that country or that is legal in that country but illegal in the United States and may serve as a basis for exploitation or pressure by the foreign security or intelligence service or other group; 66 (f) Violation of a written or recorded commitment made by the individual to the employer as a condition of employment; (g) Association with persons involved in criminal activity. 17. Conditions that could potentially mitigate trustworthiness concerns include: (a) The individual made prompt, good-faith efforts to correct the omission, concealment, or falsification before being confronted with the facts; (b) The refusal or failure to cooperate, omissions, or concealment was caused or significantly contributed to by improper or inadequate advice of authorized personnel or legal counsel advising or instructing the individual specifically concerning the security clearance process. Upon being made aware of the requirement to cooperate or provide the information, the individual cooperated fully and truthfully; (c) The offense is so minor, or so much time has passed, or the behavior is so infrequent, or it happened under such unique circumstances that it is unlikely to recur and does not cast doubt on the individual’s reliability, trustworthiness, or good judgment; (d) The individual has acknowledged the behavior and obtained counseling to change the behavior or taken other positive steps to alleviate the stressors, circumstances, or factors that caused untrustworthy, unreliable, or other inappropriate behavior, and such behavior is unlikely to recur; (e) The individual has taken positive steps to reduce or eliminate vulnerability to exploitation, manipulation, or duress (f) The information was unsubstantiated or from a source of questionable reliability; (g) Association with persons involved in criminal activity has ceased or occurs under circumstances that do not cast doubt upon the individual’s reliability, trustworthiness, judgment, or willingness to comply with rules and regulations. 67 GUIDELINE F FINANCIAL CONSIDERATIONS 18. The Concern. Failure or inability to live within one’s means, satisfy debts, and meet financial obligations may indicate poor self-control, lack of judgment, or unwillingness to abide by rules and regulations, all of which can raise questions about an individual’s reliability, trustworthiness and ability to protect sensitive or agency proprietary information. An individual who is financially overextended is at risk of having to engage in illegal acts to generate funds. Compulsive gambling is a concern as it may lead to financial crimes including espionage. Affluence that cannot be explained by known sources of income is also a concern. It may indicate proceeds from financially profitable criminal acts. 19. Conditions that could raise a trustworthiness concern and may potentially be disqualifying include: (a) Inability or unwillingness to satisfy debts; (b) Indebtedness caused by frivolous or irresponsible spending and the absence of any evidence of willingness or intent to pay the debt or establish a realistic plan to pay the debt; (c) A history of not meeting financial obligations; (d) Deceptive or illegal financial practices such as embezzlement, employee theft, check fraud, income tax evasion, expense account fraud, filing deceptive loan statements, and other intentional financial breaches of trust; (e) Consistent spending beyond one’s means, which may be indicated by excessive indebtedness, significant negative cash flow, high debt-to-income ratio, and/or other financial analysis; (f) Financial problems that are linked to drug abuse, alcoholism, gambling problems, or other issues of security concern. (g) Failure to file annual Federal, state, or local income tax returns as required or the fraudulent filing of the same; 68 (h) Unexplained affluence, as shown by a lifestyle or standard of living, increase in net worth, or money transfers that cannot be explained by subject’s known legal sources of income; (i) Compulsive or addictive gambling as indicated by an unsuccessful attempt to stop gambling, “chasing losses” (i.e. increasing the bets or returning another day in an effort to get even), concealment of gambling losses, borrowing money to fund gambling or pay gambling debts, family conflict or other problems caused by gambling. 20. Conditions that could potentially mitigate trustworthiness concern include: (a) The behavior happened so long ago, was so infrequent, or occurred under such circumstances that it is unlikely to recur and does not cast doubt on the individual’s current reliability, trustworthiness, or good judgment; (b) The conditions that resulted in the financial problem were largely beyond the person's control (e.g., loss of employment, a business downturn, unexpected medical emergency, or a death, divorce or separation), and the individual acted responsibly under the circumstances; (c) The person has received or is receiving counseling for the problem and/or there are clear indications that the problem is being resolved or is under control; (d) The individual initiated a good-faith effort to repay overdue creditors or otherwise resolve debts. (e) The individual has a reasonable basis to dispute the legitimacy of the past-due debt which is the cause of the problem and provides documented proof to substantiate the basis of the dispute or provides evidence of actions to resolve the issue; (f) The affluence resulted from a legal source of income. 69 GUIDELINE G ALCOHOL CONSUMPTION 21. The Concern. Excessive alcohol consumption often leads to the exercise of questionable judgment or the failure to control impulses, and can raise questions about an individual’s reliability and trustworthiness. 22. Conditions that could raise a trustworthiness concern and may potentially be disqualifying include: (a) Alcohol-related incidents away from work, such as driving while under the influence, fighting, child or spouse abuse, disturbing the peace, or other incidents of concern, regardless of whether the individual is diagnosed as an alcohol abuser or alcohol dependent; (b) Alcohol-related incidents at work, such as reporting for work or duty in an intoxicated or impaired condition, or drinking on the job, regardless of whether the individual is diagnosed as an alcohol abuser or alcohol dependent; (c) Habitual or binge consumption of alcohol to the point of impaired judgment, regardless of whether the individual is diagnosed as an alcohol abuser or alcohol dependent; (d) Diagnosis by a duly qualified medical professional (e.g. physician, clinical psychologist or psychiatrist) of alcohol abuse or alcohol dependence; (e) Evaluation of alcohol abuse or alcohol dependence by a licensed clinical social worker who is a staff member of a recognized alcohol treatment program; (f) Relapse after diagnosis of alcohol abuse or dependence and completion of an alcohol rehabilitation program; (g) Failure to follow any court order regarding alcohol education, evaluation, treatment, or abstinence. 70 23. Conditions that could potentially mitigate trustworthiness concerns include: (a) So much time has passed, or the behavior was so infrequent, or it happened under such unusual circumstances that it is unlikely to recur or does not cast doubt on the individual’s current reliability, trustworthiness, or good judgment; (b) The individual acknowledges his or her alcoholism or issues of alcohol abuse, provides evidence of actions taken to overcome this problem, and has established a pattern of abstinence (if alcohol dependent) or responsible use (if an alcohol abuser); (c) The individual is a current employee who is participating in a counseling or treatment program, has no history of previous treatment and relapse, and is making satisfactory progress; (d) The individual has successfully completed inpatient or outpatient counseling or rehabilitation along with any required aftercare, has demonstrated a clear and established pattern of modified consumption or abstinence in accordance with treatment recommendations, such as participates in meetings of Alcoholics Anonymous or a similar organization, and received a favorable prognosis by a duly qualified medical professional, or a licensed clinical social worker who is a staff member of a recognized alcohol treatment program. 71 GUIDELINE H DRUG INVOLVEMENT 24. The Concern. Use of an illegal drug or misuse of a prescription drug can raise questions about an individual's reliability and trustworthiness, both because it may impair judgment and because it raises questions about a persons ability or willingness to comply with laws, rules, and regulations. (a) Drugs are defined as mood and behavior altering substances, and include: (1) Drugs, materials, and other chemical compounds identified and listed in the Controlled Substances Act of 1970, as amended (e.g., marijuana or cannabis, depressants, narcotics, stimulants, and hallucinogens) and (2) Inhalants and other similar substances. (b) Drug abuse is the illegal use of a drug or use of a legal drug in a manner that deviates from approved medical direction. 25. Conditions that could raise a trustworthiness concern and may potentially be disqualifying include: (a) Any drug abuse (see above definition); (b) Testing positive for illegal drug use; (c) Illegal drug possession, including cultivation, processing, manufacture, purchase, sale, or distribution; or possession of drug paraphernalia; (d) Diagnosis by a duly qualified medical professional (e.g. physician, clinical psychologist, or psychiatrist) of drug abuse or drug dependence: 72 (e) Evaluation of drug abuse or drug dependence by a licensed clinical social worker who is a staff member of a recognized drug treatment program; (f) Failure to successfully complete a drug treatment program prescribed by a duly qualified medical professional; (g) Any illegal drug use after being granted a security clearance; (h) Expressed intent to continue illegal drug use, or failure to clearly and convincingly commit to discontinue drug use. 26. Conditions that could potentially mitigate trustworthiness concerns include: (a) The behavior happened so long ago, was so infrequent, or happened under such circumstances that it is unlikely to recur or does not cast doubt on the individual’s current reliability, trustworthiness, or good judgment; (b) A demonstrated intent not to abuse any drugs in the future, such as: (1) disassociation from drug-using associates and contacts; (2) changing or avoiding the environment where drugs were used; (3) an appropriate period of abstinence; (4) a signed statement of intent with automatic revocation of clearance for any violation; (c) Abuse of prescription drugs was after a severe or prolonged illness during which these drugs were prescribed, and abuse has since ended; (d) Satisfactory completion of a prescribed drug treatment program, including but not limited to rehabilitation and aftercare requirements, without recurrence of abuse, and a favorable prognosis by a duly qualified medical professional. 73 GUIDELINE I PSYCHOLOGICAL CONDITIONS 27. The Concern. Certain emotional, mental, and personality conditions can impair judgment, reliability, or trustworthiness. A formal diagnosis of a disorder is not required for there to be a concern under this guideline. A duly qualified mental health professional, (e.g. clinical psychologist or psychiatrist), employed by, or acceptable to and approved by the U.S. Government, should be consulted when evaluating potentially disqualifying and mitigating information under this guideline. No negative inference concerning the standards in this Guideline may be raised solely on the basis of seeking mental health counseling. 28. Conditions that could raise a trustworthiness concern and may potentially be disqualifying include: (a) Behavior that cast doubt on an individual’s judgment, reliability, or trustworthiness that is not covered under any other guideline, including but not limited to emotionally unstable, irresponsible, dysfunctional, violent, paranoid, or bizarre behavior; (b) An opinion by a duly qualified mental health professional that the individual has a condition not covered under any other guideline that may impair judgment, reliability, or trustworthiness1; (c) The individual has failed to follow treatment advice related to a diagnosed emotional, mental, or personality condition, e.g., failure to take prescribed medication. 74 29. Conditions that could potentially mitigate trustworthiness concerns include: (a) The identified condition is readily controllable with treatment, and the individual has demonstrated ongoing and consistent compliance with the treatment plan; (b) The individual has voluntarily entered a counseling or treatment program for a condition that is amenable to treatment, and the individual is currently receiving counseling or treatment with a favorable prognosis by a duly qualified mental health professional; (c) Recent opinion by a duly qualified mental health professional employed by, or acceptable to and approved by the U.S. Government that an individual's previous condition is under control or in remission, and has a low probability of recurrence or exacerbation; (d) The past emotional instability was a temporary condition (e.g., one caused by death, illness, or marital breakup), the situation has been resolved, and the individual no longer show indications of emotional instability; (e) There is no indication of a current problem. 75 GUIDELINE J CRIMINAL CONDUCT 30. The Concern. Criminal activity creates doubt about a person's judgment, reliability and trustworthiness. By its very nature, it calls into question a person’s ability or willingness to comply with laws, rules and regulations. 31. Conditions that could raise a trustworthiness concern and may potentially be disqualifying include: (a) A single serious crime or multiple lesser offenses; (b) Discharge or dismissal from the Armed Forces under dishonorable conditions; (c) Allegations or admissions of criminal conduct, regardless of whether the person was formally charged, formally prosecuted or convicted; (d) Individual is currently on parole or probation; (e) Violation of parole or probation, or failure to complete a courtmandated rehabilitation program; 76 32. Conditions that could potentially mitigate trustworthiness concerns include: (a) So much time has elapsed since the criminal behavior happened, or it happened under such unusual circumstances that it is unlikely to recur and does not cast doubt on the individual’s reliability, trustworthiness, or good judgment; (b) The person was pressured or coerced into committing the act and those pressures are no longer present in the person’s life; (c) Evidence that the person did not commit the offense; (d) There is evidence of successful rehabilitation; including but not limited to the passage of time without recurrence of criminal activity, remorse or restitution, job training or higher education, good employment record, or constructive community involvement.; 77 GUIDELINE K HANDLING PROTECTED INFORMATION 33. The Concern. Deliberate or negligent failure to comply with rules and regulations for protecting sensitive or other protected information raises doubt about an individual's trustworthiness, judgment, reliability, or willingness and ability to safeguard such information, and is a serious security concern. 34. Conditions that could raise a trustworthiness concern and may potentially be disqualifying include: (a) Deliberate or negligent disclosure of sensitive or other protected information to unauthorized persons, including but not limited to personal or business contacts, to the media, or to persons present at seminars, meetings, or conferences; (b) Collecting or storing sensitive or other protected information in any unauthorized location. (c) Loading, drafting, editing, modifying, storing, transmitting, or otherwise handling sensitive reports, data, or other information on any unapproved equipment including but not limited to any typewriter, word processor, or computer hardware, software, drive, system, gameboard, handheld, “palm” or pocket device or other adjunct equipment; (d) Inappropriate efforts to obtain or view sensitive or other protected information outside one’s need-to-know; (e) Copying sensitive or other protected information in a manner designed to conceal or remove sensitive or other document control markings; (f) Viewing or downloading information from a secure system when the information is beyond the individual’s need-to-know; 78 (g) Any failure to comply with rules for the protection of sensitive information; (h) Negligence or lax security habits that persist despite counseling by management; (i) Failure to comply with rules or regulations that results in damage to the National Security, regardless of whether it was deliberate or negligent. 35. Conditions that could potentially mitigate trustworthiness concerns include: (a) So much time has elapsed since the behavior, or it has happened so infrequently or under such unusual circumstances, that it is unlikely to recur and does not cast doubt on the individual’s current reliability, trustworthiness, or good judgment; (b) The individual responded favorably to counseling or remedial security training and now demonstrates a positive attitude toward the discharge of responsibilities; (c) The violations were due to improper or inadequate training. 79 GUIDELINE L OUTSIDE ACTIVITIES 36. The Concern. Involvement in certain types of outside employment or activities is of concern if it poses a conflict of interest with an individual's responsibilities and could create an increased risk of unauthorized disclosure of sensitive or other protected information. 37. Conditions that could raise a trustworthiness concern and may potentially be disqualifying include: (a) Any employment or service, whether compensated or volunteer, with: (1) The government of a foreign country; (2) Any foreign national, organization, or other entity; (3) A representative of any foreign interest; (4) Any foreign, domestic, or international organization or person engaged in analysis, discussion, or publication of material on intelligence, defense, foreign affairs, or protected technology; (b) Failure to report or fully disclose an outside activity when this is required. 38. Conditions that could potentially mitigate trustworthiness concerns include: (a) Evaluation of the outside employment or activity by the appropriate security or counterintelligence office indicates that it does not pose a conflict with an individual's responsibilities or with the national security interests of the United States; (b) The individual terminated the employment or discontinued the activity upon being notified that it was in conflict with his or her responsibilities. 80 GUIDELINE M USE OF INFORMATION TECHNOLOGY SYSTEMS 39. The Concern. Noncompliance with rules, procedures, guidelines or regulations pertaining to information technology systems may raise concerns about an individual’s reliability and trustworthiness, calling into question the willingness or ability to properly protect sensitive systems, networks, and information. Information Technology Systems include all related computer hardware, software, firmware, and data used for the communication, transmission, processing, manipulation, and storage, or protection of information. 40. Conditions that could raise a trustworthiness concern and may potentially be disqualifying include: (a) Illegal or unauthorized entry into any information technology system or component thereof; (b) Illegal or unauthorized modification, destruction, manipulation or denial of access to information, software, firmware, or hardware in an information technology system; (c) Use of any information technology system to gain unauthorized access to another system or to a compartmented area within the same system; (d) Downloading, storing, or transmitting sensitive information on or to any unauthorized software, hardware, or information technology system; (e) Unauthorized use of a government or other information technology system; (f) Introduction, removal, or duplication of hardware, firmware, software, or media to or from any information technology system without authorization, when prohibited by rules, procedures, guidelines or regulations; (g) Negligence or lax security habits in handling information technology that persist despite counseling by management; (h) Any misuse of information technology, whether deliberate or negligent, that results in damage to the national security. 81 41. Conditions that could potentially mitigate trustworthiness concerns include: (a) So much time has elapsed since the behavior happened, or it happened under such unusual circumstances, that it is unlikely to recur and does not cast doubt on the individual’s reliability, trustworthiness, or good judgment; (b) The misuse was minor and done only in the interest of organizational efficiency and effectiveness, such as letting another person use one’s password or computer when no other timely alternative was readily available; (c) The conduct was unintentional or inadvertent and was followed by a prompt, good-faith effort to correct the situation and by notification of supervisor. 82