Preview

Navy Command's Security Administration Case Study

Satisfactory Essays
Open Document
Open Document
432 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Navy Command's Security Administration Case Study
Security Approval Process
The Contractor's Security Representative shall ensure that each individual employee pending assignment shall accurately complete the required forms for submission to the Navy Command's Security Manager. The Contractor's Security Representative shall screen the investigative questionnaires for completeness and accuracy and for potential suitability/security issues prior to submitting the request to the Navy Command's Security Manager. Forms and fingerprint cards may be obtained from the Navy Command's Security Manager. These required items, shall be forwarded to the Navy Command's Security Manager for processing at least 30 days prior to the individual employee's anticipated date for reporting for duty. The Navy Command's Security Manager will review the submitted documentation for completeness prior to submitting it to the Office of Personnel Management (OPM). Suitability/security issues identified by the Navy Command's Security Manager may render the contract employee ineligible for the assignment. A favorable review of the questionnaire and advance fingerprint results are required as an interim measure prior to the contract employee start date. An unfavorable determination made by the Navy Command's Security Manager is final and such a determination does not relieve the Contractor from meeting any contractual obligation under the contract.
…show more content…
The Contractor shall include the IT Position Category per SECNAV M-551 0.30 for each employee designated on a VAR. The VAR requires annual renewal for the duration of the employee's performance under the

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Argyle Security Inc. is a detention and commercial security provider based out of San Antonio, TX. Established in 2005 originally as Argyle Security Acquisition Corporation, Argyle Security Inc. operates through five different business units ISI, MCS, PDI, Com-Tec, and MCS Fire & Security business units. In April 2008, the private equity firm MML Capital made a $15 million investment into Argyle Security. The company has since successfully positioned itself to take advantage of increasing domestic incarceration rates and the need to house and secure an ever growing number of inmates.…

    • 756 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Army Fleet Support (AFS) has written Non-Destructive Inspection (NDI) Certification Procedures AFS-M-0119; and IAW Quality Procedures AFS-M-0100, para. 8.2.4.2; and C.12.4.9) and AFS-M-0117 (Training) for performance of Non-Destructive Testing.…

    • 104 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    The order also states clearly the definition of Liberty and when it is to be allowed. The following is an excerpt from the order which defines Liberty.…

    • 846 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    It’s my pleasure to provide this recommendation for SSG Soto, Christiana as he pursues a security clearance in order to growth and server The United States Army Honorably. As his supervisor on the Cadet Leader Development (CLD) Program for internationals and nationals Cadets for the past two years; I’ve worked closely with SSG Soto on a day-to-day basis. I'm confident that SSG Soto will sustain the standard, policies and laws that are subject required to embrace a security clearance. Please allow me to give three examples of SSG Soto qualifications for his clearance.…

    • 305 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    If we go back in history the ADA was called Coast Artillery Corp (CAC) right after World War I. After the fatalities of World War I that left more than one million casualties and almost the same amount of wounded Soldiers and civilians, the Army had the needs to organize a Unit with the mission of protect the man-power and skies in friendly territory.…

    • 64 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    This SOP is meant to ensure that all workers assigned utilize the same procedures and policies. Any deviation from these policies could negatively affect the overall operation of the Disbursing Operations. Failure to comply with the procedures detailed in this SOP may result in disciplinary action. Report violations immediately to the Deputy Disbursing Officer (DDO). This SOP will be updated annually and must be signed and dated by the Defense Military Pay Office (DMPO) Director or Deputy Director within 12 months of NAFCD’s scheduled…

    • 85 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Math Book NCTB

    • 1131 Words
    • 5 Pages

    A department provides the background check information release and fingerprinting authorization form to the final candidate for a critical position. The candidate fills out the first page and returns it to the department. The department fills out the second page, then schedules an appointment with the Police Department to begin the background check process.…

    • 1131 Words
    • 5 Pages
    Good Essays
  • Good Essays

    In this week's writing assignment, I choose to use NCIS (Naval Criminal Investigative Services) Season 13 Episode 9. This episode is about one of the agents, finding out her spouse is having an affair. Her husband uses his past experience of being in Dubai for the reason he was unfaithful. Elle Bishop, played by Emily Wickersham is on her way to surprise her husband, Jake Malloy, played by Jamie Barber for lunch at a small cafe; she sees him having about to have lunch with another woman. Bishop was hurt, she then left her husband in Washington D.C and went to visit her family in Oklahoma.…

    • 740 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Who are the Navy? the Navy is a nation’s armed services that mainly conducts military operations from the see by using vessels, drones and weapon system to protect and fight against other countries who are a threat to the United States of America.The Navy was founded on October 13, 1775 and on March 27, 1794 the first six Navy ships were created, the USS Constitution, the USS Chesapeake, the USS Constellation , the USS President, the USS United States, and the USS Congress. Navy ships range in size from coastal patrol ships to massive aircraft carriers they all have different purposes and armed ships even have enough firepower to obliterate small islands. There are many careers in the Navy to choose from such as being an electrician, firefighter,…

    • 598 Words
    • 3 Pages
    Good Essays
  • Good Essays

    For squadron revitalization efforts to be both successful and enduring, commanders must be given authority that is commensurate with the responsibility for an entire unit. For far too long, commanders responsible for the management of their manpower resources have been denied the authority to make meaningful changes to their Unit Manpower Documents (UMD). To make even minute changes to positions on their UMD, commanders must endure a laborious staffing process which ultimately “asks” Major Commands (MAJCOM) for approval. Empowering squadron commanders to manage their manpower resources can be accomplished by providing squadron commander’s support Staffs (CSS) with access to the Manpower Programming and Execution System (MPES) and the rights to build and publish projects.…

    • 480 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Shameka Johnson SE5780 Practices for Administration of Physical & Operations Security Technical Controls Paper Administrative, Technical and Physical Controls (false sense of security) Administrative controls influence the choice of technical controls by giving guidelines and policies on hardware and software installation; such as, having a policy that states that all laptops must have a company standard encryption that the technical support staff supports. Another example, all employees must have the company standard antivirus software on their computers. Administrative controls are concerned largely with the security policies and standards that need to be adhered to throughout the organization.…

    • 871 Words
    • 4 Pages
    Good Essays
  • Good Essays

    A large-scale incident that seriously impacts any part of our infrastructure is a frightening one, but considering our heavy reliance on an electrical system that utilizes antiquated and/or obsolete technology, restoring electrical service after massive disruptions (by natural or man-made causes) requires special consideration.…

    • 653 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    There are four different levels of security service typologies. Level IV is the highest level and an example would be the Secret Service or a sheriff’s department. Level III has full governmental powers but does not have the experience that Level IV has. Level II has limited governmental powers but a lot of resources. An example of Level II would be casino security and community police. Level I is the lowest level and has no powers or resources. An example of a Level I would be Menards security or hospital security.…

    • 484 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Law Enforcement Hiring

    • 544 Words
    • 3 Pages

    Law enforcement personnel once hired. Will go thru these methods the time of hire, and must…

    • 544 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Security Clearance Info

    • 8089 Words
    • 33 Pages

    (PCL) and Facility Clearances (FCL) for defense contractor personnel and defense contractor facilities. It is…

    • 8089 Words
    • 33 Pages
    Powerful Essays