SlideShare a Scribd company logo
1 of 4
Download to read offline
Security Clearance
A security clearance is a determination by the United States Government that a person or
company is eligible for access to classified information; A security clearance is a status granted to
individuals allowing them access to classified information (state or organizational secrets) or to
restricted areas, after completion of a thorough background check. The term "Security Clearance" is also
sometimes used in private organizations that have a formal process to vet employees for access to
sensitive information. A clearance by itself is normally not sufficient to gain access; the organization
must also determine that the cleared individual needs to know specific information. No one is supposed
to be granted automatic access to classified information solely because of rank, position, or a security
clearance.
Types of Security Clearances
 Positions in the federal government are classified in three ways:
 Non-sensitive positions
 Public trust positions
 National security positions
 Each of these positions requires some form of background investigation, which may vary depending
on the necessary level of clearance for a position. For lower levels of security clearances,
background investigations typically rely entirely on automated checks of an applicant’s history. For a
secret clearance in a national security position, the investigation requires agents to interview people
who have lived or worked with the applicant at some point in the last seven years (or more)
Security Levels
Security clearances can be issued by many United States of America government agencies, including the
Department of Defense (DoD), the Department of State (DOS), the Department of Homeland Security
(DHS), the Department of Energy (DoE), the Department of Justice (DoJ), the National Security Agency
(NSA), and the Central Intelligence Agency (CIA). DoD issues more than 80% of all clearances.
There are three levels of DoD security clearances:
TOP SECRET – Will be applied to information in which the unauthorized disclosure could reasonably be
expected to cause exceptionally grave damage to the national security.
SECRET – Will be applied to information in which the unauthorized disclosure could reasonably be
expected to cause serious damage to the national security.
CONFIDENTIAL – Will be applied to information in which the unauthorized disclosure could reasonably
be expected to cause damage to the national security.
TYPES OF SECURITY CLEARANCES:
The scope of investigative work needed to grant a security clearance depends on the level of clearance
being requested. There are three basic levels of security classification:
CONFIDENTIAL: This refers to material, which, if improperly disclosed, could be reasonably expected to
cause some measurable damage to the national security. The vast majority of military personnel are
given this very basic level of clearance. This level needs to be reinvestigated every fifteen years.
SECRET: The unauthorized disclosure of secret information could be expected to cause serious damage
to the national security. This level is reinvestigated every ten years.
TOP SECRET: Individuals with this clearance have access to information or material that could be
expected to cause exceptionally grave damage to the national security if it was released without
authorization. This level needs to be reinvestigated every five years.
Top Secret
Sensitive Compartmentalized Information (SCI)
Single Scope Background Investigation (SSBI)
Despite the common misconception, a public trust position is not a security clearance, and is not the
same as the confidential designation. Certain positions which require access to sensitive information,
but not information which is classified, must obtain this designation through a background check. Public
Trust Positions can either be moderate-risk or high-risk. Information "above Top Secret" is either
Sensitive Compartmented Information (SCI) orspecial access program (SAP) which are phrases used by
media. It is not truly "above" Top Secret, since there is no clearance higher than Top Secret. SCI
information may be either Secret or Top Secret, but in either case it has additional controls on
dissemination beyond those associated with the classification level alone. In order to gain SCI Access,
one would need to have a Single Scope Background Investigation (SSBI). Compartments of information
are identified by code words. This is one means by which the "need to know" principle is formally and
automatically enforced. In order to have access to material in a particular SCI "compartment", the
person must first have the clearance level for the material. The SCI designation is an add-on, not a
special clearance level. Someone cleared at the SECRET level for some compartment X cannot see
material in compartment X that is classified TOP SECRET. But the reverse is not true: a person cleared for
TOP SECRET with access to X material can also access SECRET material in compartment X. The codeword
flags for SECRET and TOP SECRET material in every compartment are different, and each codeword is
classified at the level it protects (the SECRET codeword for a compartment is itself classified SECRET,
etc.)
 As long as the holder of a clearance is sponsored, the clearance remains active. If the holder loses
sponsorship, the holder is eligible for re-employment with the same clearance for up to 24 months
without reinvestigation, after which an update investigation is required.
 A Periodic Reinvestigation is typically required every five years for Top Secret and ten years for
Secret/Confidential, depending upon the agency. Access to a compartment of information lasts only
as long as the person's need to have access to a given category of information.
 Unclassified (U) is a valid security description, especially when indicating unclassified information
within a document classified at a higher level. For example, the title of a Secret report is often
unclassified, and must be marked as such. Material that is classified as Unclassified // For Official
Use Only (U//FOUO) is considered between Unclassified and Confidential and may deal with
employee data.
 For access to information at a given classification level, individuals must have been granted access
by the sponsoring government organization at that or a higher classification level, and have a need
to know the information. The government also supports access to SCI and SAPs in which access is
determined by need-to-know. These accesses require increased investigative requirements before
access is granted.
Additionally, the United States Department of Energy issues two levels of security clearances:
Q Clearance – Allows access to Classified information up to and including TOP SECRET data with the
special designation: Restricted Data (TS//RD) and special Q-Cleared "security" areas.
L Clearance – Allows access to Classified information up to and including SECRET data with the special
designation: Formerly Restricted Data (S//FRD) and special L-Cleared "limited" areas.
WHO CAN GET A SECURITY CLEARANCE?
Any person who is employed by an organization that is sending, receiving, or developing information
that the government has deemed as important to National security will need to obtain a security
clearance.
Currently, there are more than 500,000 background investigations pending for security clearance
approval. When an individual is going through the process for clearance, it may take up to a year before
a determination is made. This makes a military candidate who already has clearance even more
appealing to a hiring company. If the company hires a person who will need to gain a clearance, they
may wait over a year before the person is eligible to work on the project for which they were hired. This
is a lot of lost time and money to a company. If they can identify a person who has the necessary
clearances, such as a candidate with a military background, that person immediately becomes more
valuable.
HOW DO YOU GET A SECURITY CLEARANCE?
There are three main phases to receiving a security clearance:
 The first phase is the application process. This involves verification of U.S. citizenship, fingerprinting
and completion of the Personnel Security Questionnaire (SF-86).
 The second phase involves the actual investigation of your background. Most of the background
check is conducted by the Defense Security Service (DSS).
 The final phase is the adjudication phase. The results from the investigative phase are reviewed. The
information that has been gathered is evaluated based on thirteen factors determined by the
Department of Defense (DoD). Some examples of areas they consider are; allegiance to the United
States, criminal and personal conduct, and substance abuse or mental disorders. Clearance is
granted or denied following this evaluation process.
BY
Kartheek.G
Sr.Talent Acquisition Specialist

More Related Content

What's hot

05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - NotesKranthi
 
CISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security ConceptsCISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security ConceptsKarthikeyan Dhayalan
 
Cyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital DomainCyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital Domainppd1961
 
20160517 eduroam for institution owned devices
20160517 eduroam for institution owned devices20160517 eduroam for institution owned devices
20160517 eduroam for institution owned devicesJon Agland
 
Mobile and SIM Forensics
Mobile and SIM ForensicsMobile and SIM Forensics
Mobile and SIM ForensicsYugal Pathak
 
Bank Fraud & Data Forensics
Bank Fraud & Data ForensicsBank Fraud & Data Forensics
Bank Fraud & Data Forensicswhbrown5
 
Control and Audit Information System
Control and Audit Information SystemControl and Audit Information System
Control and Audit Information Systemarif prasetyo
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - NotesKranthi
 
Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfEthical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfShivamSharma909
 
Understanding the new modus operandi of cybercriminals
Understanding the new modus operandi of cybercriminalsUnderstanding the new modus operandi of cybercriminals
Understanding the new modus operandi of cybercriminalsSARON MESSEMBE OBIA
 
Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its toolsKathirvel Ayyaswamy
 
Guideline for Call Data Record Analysis by Raghu Khimani
Guideline for Call Data Record Analysis by Raghu KhimaniGuideline for Call Data Record Analysis by Raghu Khimani
Guideline for Call Data Record Analysis by Raghu KhimaniDr Raghu Khimani
 
Target Breach Analysis
Target Breach AnalysisTarget Breach Analysis
Target Breach AnalysisTal Be'ery
 

What's hot (20)

05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes
 
CISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security ConceptsCISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security Concepts
 
Cyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital DomainCyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital Domain
 
Data recovery
Data recoveryData recovery
Data recovery
 
20160517 eduroam for institution owned devices
20160517 eduroam for institution owned devices20160517 eduroam for institution owned devices
20160517 eduroam for institution owned devices
 
Mobile and SIM Forensics
Mobile and SIM ForensicsMobile and SIM Forensics
Mobile and SIM Forensics
 
Bank Fraud & Data Forensics
Bank Fraud & Data ForensicsBank Fraud & Data Forensics
Bank Fraud & Data Forensics
 
Control and Audit Information System
Control and Audit Information SystemControl and Audit Information System
Control and Audit Information System
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Digital forensic tools
Digital forensic toolsDigital forensic tools
Digital forensic tools
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
 
Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfEthical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdf
 
Understanding the new modus operandi of cybercriminals
Understanding the new modus operandi of cybercriminalsUnderstanding the new modus operandi of cybercriminals
Understanding the new modus operandi of cybercriminals
 
Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its tools
 
It act ppt ( 1111)
It act ppt ( 1111)It act ppt ( 1111)
It act ppt ( 1111)
 
6 Physical Security
6 Physical Security6 Physical Security
6 Physical Security
 
Caa ts
Caa tsCaa ts
Caa ts
 
Guideline for Call Data Record Analysis by Raghu Khimani
Guideline for Call Data Record Analysis by Raghu KhimaniGuideline for Call Data Record Analysis by Raghu Khimani
Guideline for Call Data Record Analysis by Raghu Khimani
 
Target Breach Analysis
Target Breach AnalysisTarget Breach Analysis
Target Breach Analysis
 

Similar to Security clearance

security_clearance_faq
security_clearance_faqsecurity_clearance_faq
security_clearance_faqwebuploader
 
WOC 2016: Want a Security Clearance? This is what you need to know
WOC 2016: Want a Security Clearance? This is what you need to knowWOC 2016: Want a Security Clearance? This is what you need to know
WOC 2016: Want a Security Clearance? This is what you need to knowCareer Communications Group
 
Want a Security Clearance? This is what you need to know
Want a Security Clearance? This is what you need to knowWant a Security Clearance? This is what you need to know
Want a Security Clearance? This is what you need to knowCareer Communications Group
 
Want a Security Clearance? This is what you need to know
Want a Security Clearance? This is what you need to knowWant a Security Clearance? This is what you need to know
Want a Security Clearance? This is what you need to knowCareer Communications Group
 
U.S. Department of State; Non Disclosure Agreement
U.S. Department of State; Non Disclosure AgreementU.S. Department of State; Non Disclosure Agreement
U.S. Department of State; Non Disclosure AgreementRafaelleMD
 
2010 Security Clearance Talent Assessment
2010 Security Clearance Talent Assessment2010 Security Clearance Talent Assessment
2010 Security Clearance Talent AssessmentMonster
 
BEYA2021 The Top Secret: Applying for and Leveraging a Security Clearance
BEYA2021 The Top Secret: Applying for and Leveraging a Security Clearance BEYA2021 The Top Secret: Applying for and Leveraging a Security Clearance
BEYA2021 The Top Secret: Applying for and Leveraging a Security Clearance Career Communications Group
 
Want a Security clearance? This is what you need to know
Want a Security clearance? This is what you need to know Want a Security clearance? This is what you need to know
Want a Security clearance? This is what you need to know Career Communications Group
 
Facility security clearance refresher training.
Facility security clearance refresher training.Facility security clearance refresher training.
Facility security clearance refresher training.Philip Barquer
 
Facility security clearance refresher training
Facility security clearance refresher trainingFacility security clearance refresher training
Facility security clearance refresher trainingPhilip Barquer
 
Want a Security Clearance? This Is What You Need to Know
Want a Security Clearance? This Is What You Need to KnowWant a Security Clearance? This Is What You Need to Know
Want a Security Clearance? This Is What You Need to KnowCareer Communications Group
 
Increase Value, Increase Success: Tools, Certifications, and Strategies to be...
Increase Value, Increase Success: Tools, Certifications, and Strategies to be...Increase Value, Increase Success: Tools, Certifications, and Strategies to be...
Increase Value, Increase Success: Tools, Certifications, and Strategies to be...Career Communications Group
 
MaHIMA_Winter_Meeting___Compliance_Beyond_HIPAA_1_2016
MaHIMA_Winter_Meeting___Compliance_Beyond_HIPAA_1_2016MaHIMA_Winter_Meeting___Compliance_Beyond_HIPAA_1_2016
MaHIMA_Winter_Meeting___Compliance_Beyond_HIPAA_1_2016Colin Zick
 
Facility security clearance refresher training video.
Facility security clearance refresher training video.Facility security clearance refresher training video.
Facility security clearance refresher training video.Philip Barquer
 
Want a Security Clearance? This is what you need to know
Want a Security Clearance? This is what you need to knowWant a Security Clearance? This is what you need to know
Want a Security Clearance? This is what you need to knowCareer Communications Group
 
Information Asset Classification .pptx
Information Asset Classification .pptxInformation Asset Classification .pptx
Information Asset Classification .pptxDrRajapraveen
 
Cybersecurity Salary in Washington, D.C.
Cybersecurity Salary in Washington, D.C.Cybersecurity Salary in Washington, D.C.
Cybersecurity Salary in Washington, D.C.ClearanceJobs
 
SECURITY BREACH NOTIFICATION CHART 2013
SECURITY BREACH NOTIFICATION CHART 2013SECURITY BREACH NOTIFICATION CHART 2013
SECURITY BREACH NOTIFICATION CHART 2013- Mark - Fullbright
 
What is demanded from a Special Agent?
What is demanded from a Special Agent?What is demanded from a Special Agent?
What is demanded from a Special Agent?Frank Rauber
 
Getting “Cleared” for Launch GovCon Webinar Kathleen Smith
Getting “Cleared” for Launch GovCon Webinar Kathleen SmithGetting “Cleared” for Launch GovCon Webinar Kathleen Smith
Getting “Cleared” for Launch GovCon Webinar Kathleen Smithdonnae2763
 

Similar to Security clearance (20)

security_clearance_faq
security_clearance_faqsecurity_clearance_faq
security_clearance_faq
 
WOC 2016: Want a Security Clearance? This is what you need to know
WOC 2016: Want a Security Clearance? This is what you need to knowWOC 2016: Want a Security Clearance? This is what you need to know
WOC 2016: Want a Security Clearance? This is what you need to know
 
Want a Security Clearance? This is what you need to know
Want a Security Clearance? This is what you need to knowWant a Security Clearance? This is what you need to know
Want a Security Clearance? This is what you need to know
 
Want a Security Clearance? This is what you need to know
Want a Security Clearance? This is what you need to knowWant a Security Clearance? This is what you need to know
Want a Security Clearance? This is what you need to know
 
U.S. Department of State; Non Disclosure Agreement
U.S. Department of State; Non Disclosure AgreementU.S. Department of State; Non Disclosure Agreement
U.S. Department of State; Non Disclosure Agreement
 
2010 Security Clearance Talent Assessment
2010 Security Clearance Talent Assessment2010 Security Clearance Talent Assessment
2010 Security Clearance Talent Assessment
 
BEYA2021 The Top Secret: Applying for and Leveraging a Security Clearance
BEYA2021 The Top Secret: Applying for and Leveraging a Security Clearance BEYA2021 The Top Secret: Applying for and Leveraging a Security Clearance
BEYA2021 The Top Secret: Applying for and Leveraging a Security Clearance
 
Want a Security clearance? This is what you need to know
Want a Security clearance? This is what you need to know Want a Security clearance? This is what you need to know
Want a Security clearance? This is what you need to know
 
Facility security clearance refresher training.
Facility security clearance refresher training.Facility security clearance refresher training.
Facility security clearance refresher training.
 
Facility security clearance refresher training
Facility security clearance refresher trainingFacility security clearance refresher training
Facility security clearance refresher training
 
Want a Security Clearance? This Is What You Need to Know
Want a Security Clearance? This Is What You Need to KnowWant a Security Clearance? This Is What You Need to Know
Want a Security Clearance? This Is What You Need to Know
 
Increase Value, Increase Success: Tools, Certifications, and Strategies to be...
Increase Value, Increase Success: Tools, Certifications, and Strategies to be...Increase Value, Increase Success: Tools, Certifications, and Strategies to be...
Increase Value, Increase Success: Tools, Certifications, and Strategies to be...
 
MaHIMA_Winter_Meeting___Compliance_Beyond_HIPAA_1_2016
MaHIMA_Winter_Meeting___Compliance_Beyond_HIPAA_1_2016MaHIMA_Winter_Meeting___Compliance_Beyond_HIPAA_1_2016
MaHIMA_Winter_Meeting___Compliance_Beyond_HIPAA_1_2016
 
Facility security clearance refresher training video.
Facility security clearance refresher training video.Facility security clearance refresher training video.
Facility security clearance refresher training video.
 
Want a Security Clearance? This is what you need to know
Want a Security Clearance? This is what you need to knowWant a Security Clearance? This is what you need to know
Want a Security Clearance? This is what you need to know
 
Information Asset Classification .pptx
Information Asset Classification .pptxInformation Asset Classification .pptx
Information Asset Classification .pptx
 
Cybersecurity Salary in Washington, D.C.
Cybersecurity Salary in Washington, D.C.Cybersecurity Salary in Washington, D.C.
Cybersecurity Salary in Washington, D.C.
 
SECURITY BREACH NOTIFICATION CHART 2013
SECURITY BREACH NOTIFICATION CHART 2013SECURITY BREACH NOTIFICATION CHART 2013
SECURITY BREACH NOTIFICATION CHART 2013
 
What is demanded from a Special Agent?
What is demanded from a Special Agent?What is demanded from a Special Agent?
What is demanded from a Special Agent?
 
Getting “Cleared” for Launch GovCon Webinar Kathleen Smith
Getting “Cleared” for Launch GovCon Webinar Kathleen SmithGetting “Cleared” for Launch GovCon Webinar Kathleen Smith
Getting “Cleared” for Launch GovCon Webinar Kathleen Smith
 

Recently uploaded

VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...Suhani Kapoor
 
Vip Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...
Vip  Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...Vip  Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...
Vip Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...shivangimorya083
 
Dark Dubai Call Girls O525547819 Skin Call Girls Dubai
Dark Dubai Call Girls O525547819 Skin Call Girls DubaiDark Dubai Call Girls O525547819 Skin Call Girls Dubai
Dark Dubai Call Girls O525547819 Skin Call Girls Dubaikojalkojal131
 
Employee of the Month - Samsung Semiconductor India Research
Employee of the Month - Samsung Semiconductor India ResearchEmployee of the Month - Samsung Semiconductor India Research
Employee of the Month - Samsung Semiconductor India ResearchSoham Mondal
 
Zeeman Effect normal and Anomalous zeeman effect
Zeeman Effect normal and Anomalous zeeman effectZeeman Effect normal and Anomalous zeeman effect
Zeeman Effect normal and Anomalous zeeman effectPriyanshuRawat56
 
Booking open Available Pune Call Girls Ambegaon Khurd 6297143586 Call Hot In...
Booking open Available Pune Call Girls Ambegaon Khurd  6297143586 Call Hot In...Booking open Available Pune Call Girls Ambegaon Khurd  6297143586 Call Hot In...
Booking open Available Pune Call Girls Ambegaon Khurd 6297143586 Call Hot In...Call Girls in Nagpur High Profile
 
The Impact of Socioeconomic Status on Education.pdf
The Impact of Socioeconomic Status on Education.pdfThe Impact of Socioeconomic Status on Education.pdf
The Impact of Socioeconomic Status on Education.pdftheknowledgereview1
 
Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...
Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...
Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...shivangimorya083
 
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...Suhani Kapoor
 
Dubai Call Girls Demons O525547819 Call Girls IN DUbai Natural Big Boody
Dubai Call Girls Demons O525547819 Call Girls IN DUbai Natural Big BoodyDubai Call Girls Demons O525547819 Call Girls IN DUbai Natural Big Boody
Dubai Call Girls Demons O525547819 Call Girls IN DUbai Natural Big Boodykojalkojal131
 
Internshala Student Partner 6.0 Jadavpur University Certificate
Internshala Student Partner 6.0 Jadavpur University CertificateInternshala Student Partner 6.0 Jadavpur University Certificate
Internshala Student Partner 6.0 Jadavpur University CertificateSoham Mondal
 
VIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service Cuttack
VIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service CuttackVIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service Cuttack
VIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service CuttackSuhani Kapoor
 
Experience Certificate - Marketing Analyst-Soham Mondal.pdf
Experience Certificate - Marketing Analyst-Soham Mondal.pdfExperience Certificate - Marketing Analyst-Soham Mondal.pdf
Experience Certificate - Marketing Analyst-Soham Mondal.pdfSoham Mondal
 
Low Rate Call Girls Cuttack Anika 8250192130 Independent Escort Service Cuttack
Low Rate Call Girls Cuttack Anika 8250192130 Independent Escort Service CuttackLow Rate Call Girls Cuttack Anika 8250192130 Independent Escort Service Cuttack
Low Rate Call Girls Cuttack Anika 8250192130 Independent Escort Service CuttackSuhani Kapoor
 
OSU毕业证留学文凭,制做办理
OSU毕业证留学文凭,制做办理OSU毕业证留学文凭,制做办理
OSU毕业证留学文凭,制做办理cowagem
 
CFO_SB_Career History_Multi Sector Experience
CFO_SB_Career History_Multi Sector ExperienceCFO_SB_Career History_Multi Sector Experience
CFO_SB_Career History_Multi Sector ExperienceSanjay Bokadia
 
Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call Girls
Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call GirlsSonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call Girls
Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call GirlsNiya Khan
 
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service Cuttack
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service CuttackVIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service Cuttack
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service CuttackSuhani Kapoor
 
Résumé (2 pager - 12 ft standard syntax)
Résumé (2 pager -  12 ft standard syntax)Résumé (2 pager -  12 ft standard syntax)
Résumé (2 pager - 12 ft standard syntax)Soham Mondal
 
VIP Kolkata Call Girl Lake Gardens 👉 8250192130 Available With Room
VIP Kolkata Call Girl Lake Gardens 👉 8250192130  Available With RoomVIP Kolkata Call Girl Lake Gardens 👉 8250192130  Available With Room
VIP Kolkata Call Girl Lake Gardens 👉 8250192130 Available With Roomdivyansh0kumar0
 

Recently uploaded (20)

VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
 
Vip Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...
Vip  Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...Vip  Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...
Vip Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...
 
Dark Dubai Call Girls O525547819 Skin Call Girls Dubai
Dark Dubai Call Girls O525547819 Skin Call Girls DubaiDark Dubai Call Girls O525547819 Skin Call Girls Dubai
Dark Dubai Call Girls O525547819 Skin Call Girls Dubai
 
Employee of the Month - Samsung Semiconductor India Research
Employee of the Month - Samsung Semiconductor India ResearchEmployee of the Month - Samsung Semiconductor India Research
Employee of the Month - Samsung Semiconductor India Research
 
Zeeman Effect normal and Anomalous zeeman effect
Zeeman Effect normal and Anomalous zeeman effectZeeman Effect normal and Anomalous zeeman effect
Zeeman Effect normal and Anomalous zeeman effect
 
Booking open Available Pune Call Girls Ambegaon Khurd 6297143586 Call Hot In...
Booking open Available Pune Call Girls Ambegaon Khurd  6297143586 Call Hot In...Booking open Available Pune Call Girls Ambegaon Khurd  6297143586 Call Hot In...
Booking open Available Pune Call Girls Ambegaon Khurd 6297143586 Call Hot In...
 
The Impact of Socioeconomic Status on Education.pdf
The Impact of Socioeconomic Status on Education.pdfThe Impact of Socioeconomic Status on Education.pdf
The Impact of Socioeconomic Status on Education.pdf
 
Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...
Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...
Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...
 
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...
 
Dubai Call Girls Demons O525547819 Call Girls IN DUbai Natural Big Boody
Dubai Call Girls Demons O525547819 Call Girls IN DUbai Natural Big BoodyDubai Call Girls Demons O525547819 Call Girls IN DUbai Natural Big Boody
Dubai Call Girls Demons O525547819 Call Girls IN DUbai Natural Big Boody
 
Internshala Student Partner 6.0 Jadavpur University Certificate
Internshala Student Partner 6.0 Jadavpur University CertificateInternshala Student Partner 6.0 Jadavpur University Certificate
Internshala Student Partner 6.0 Jadavpur University Certificate
 
VIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service Cuttack
VIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service CuttackVIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service Cuttack
VIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service Cuttack
 
Experience Certificate - Marketing Analyst-Soham Mondal.pdf
Experience Certificate - Marketing Analyst-Soham Mondal.pdfExperience Certificate - Marketing Analyst-Soham Mondal.pdf
Experience Certificate - Marketing Analyst-Soham Mondal.pdf
 
Low Rate Call Girls Cuttack Anika 8250192130 Independent Escort Service Cuttack
Low Rate Call Girls Cuttack Anika 8250192130 Independent Escort Service CuttackLow Rate Call Girls Cuttack Anika 8250192130 Independent Escort Service Cuttack
Low Rate Call Girls Cuttack Anika 8250192130 Independent Escort Service Cuttack
 
OSU毕业证留学文凭,制做办理
OSU毕业证留学文凭,制做办理OSU毕业证留学文凭,制做办理
OSU毕业证留学文凭,制做办理
 
CFO_SB_Career History_Multi Sector Experience
CFO_SB_Career History_Multi Sector ExperienceCFO_SB_Career History_Multi Sector Experience
CFO_SB_Career History_Multi Sector Experience
 
Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call Girls
Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call GirlsSonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call Girls
Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call Girls
 
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service Cuttack
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service CuttackVIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service Cuttack
VIP Call Girl Cuttack Aashi 8250192130 Independent Escort Service Cuttack
 
Résumé (2 pager - 12 ft standard syntax)
Résumé (2 pager -  12 ft standard syntax)Résumé (2 pager -  12 ft standard syntax)
Résumé (2 pager - 12 ft standard syntax)
 
VIP Kolkata Call Girl Lake Gardens 👉 8250192130 Available With Room
VIP Kolkata Call Girl Lake Gardens 👉 8250192130  Available With RoomVIP Kolkata Call Girl Lake Gardens 👉 8250192130  Available With Room
VIP Kolkata Call Girl Lake Gardens 👉 8250192130 Available With Room
 

Security clearance

  • 1. Security Clearance A security clearance is a determination by the United States Government that a person or company is eligible for access to classified information; A security clearance is a status granted to individuals allowing them access to classified information (state or organizational secrets) or to restricted areas, after completion of a thorough background check. The term "Security Clearance" is also sometimes used in private organizations that have a formal process to vet employees for access to sensitive information. A clearance by itself is normally not sufficient to gain access; the organization must also determine that the cleared individual needs to know specific information. No one is supposed to be granted automatic access to classified information solely because of rank, position, or a security clearance. Types of Security Clearances  Positions in the federal government are classified in three ways:  Non-sensitive positions  Public trust positions  National security positions  Each of these positions requires some form of background investigation, which may vary depending on the necessary level of clearance for a position. For lower levels of security clearances, background investigations typically rely entirely on automated checks of an applicant’s history. For a secret clearance in a national security position, the investigation requires agents to interview people who have lived or worked with the applicant at some point in the last seven years (or more) Security Levels Security clearances can be issued by many United States of America government agencies, including the Department of Defense (DoD), the Department of State (DOS), the Department of Homeland Security (DHS), the Department of Energy (DoE), the Department of Justice (DoJ), the National Security Agency (NSA), and the Central Intelligence Agency (CIA). DoD issues more than 80% of all clearances. There are three levels of DoD security clearances: TOP SECRET – Will be applied to information in which the unauthorized disclosure could reasonably be expected to cause exceptionally grave damage to the national security. SECRET – Will be applied to information in which the unauthorized disclosure could reasonably be expected to cause serious damage to the national security. CONFIDENTIAL – Will be applied to information in which the unauthorized disclosure could reasonably be expected to cause damage to the national security.
  • 2. TYPES OF SECURITY CLEARANCES: The scope of investigative work needed to grant a security clearance depends on the level of clearance being requested. There are three basic levels of security classification: CONFIDENTIAL: This refers to material, which, if improperly disclosed, could be reasonably expected to cause some measurable damage to the national security. The vast majority of military personnel are given this very basic level of clearance. This level needs to be reinvestigated every fifteen years. SECRET: The unauthorized disclosure of secret information could be expected to cause serious damage to the national security. This level is reinvestigated every ten years. TOP SECRET: Individuals with this clearance have access to information or material that could be expected to cause exceptionally grave damage to the national security if it was released without authorization. This level needs to be reinvestigated every five years. Top Secret Sensitive Compartmentalized Information (SCI) Single Scope Background Investigation (SSBI) Despite the common misconception, a public trust position is not a security clearance, and is not the same as the confidential designation. Certain positions which require access to sensitive information, but not information which is classified, must obtain this designation through a background check. Public Trust Positions can either be moderate-risk or high-risk. Information "above Top Secret" is either Sensitive Compartmented Information (SCI) orspecial access program (SAP) which are phrases used by media. It is not truly "above" Top Secret, since there is no clearance higher than Top Secret. SCI information may be either Secret or Top Secret, but in either case it has additional controls on dissemination beyond those associated with the classification level alone. In order to gain SCI Access, one would need to have a Single Scope Background Investigation (SSBI). Compartments of information are identified by code words. This is one means by which the "need to know" principle is formally and automatically enforced. In order to have access to material in a particular SCI "compartment", the person must first have the clearance level for the material. The SCI designation is an add-on, not a special clearance level. Someone cleared at the SECRET level for some compartment X cannot see material in compartment X that is classified TOP SECRET. But the reverse is not true: a person cleared for TOP SECRET with access to X material can also access SECRET material in compartment X. The codeword flags for SECRET and TOP SECRET material in every compartment are different, and each codeword is classified at the level it protects (the SECRET codeword for a compartment is itself classified SECRET, etc.)  As long as the holder of a clearance is sponsored, the clearance remains active. If the holder loses sponsorship, the holder is eligible for re-employment with the same clearance for up to 24 months without reinvestigation, after which an update investigation is required.
  • 3.  A Periodic Reinvestigation is typically required every five years for Top Secret and ten years for Secret/Confidential, depending upon the agency. Access to a compartment of information lasts only as long as the person's need to have access to a given category of information.  Unclassified (U) is a valid security description, especially when indicating unclassified information within a document classified at a higher level. For example, the title of a Secret report is often unclassified, and must be marked as such. Material that is classified as Unclassified // For Official Use Only (U//FOUO) is considered between Unclassified and Confidential and may deal with employee data.  For access to information at a given classification level, individuals must have been granted access by the sponsoring government organization at that or a higher classification level, and have a need to know the information. The government also supports access to SCI and SAPs in which access is determined by need-to-know. These accesses require increased investigative requirements before access is granted. Additionally, the United States Department of Energy issues two levels of security clearances: Q Clearance – Allows access to Classified information up to and including TOP SECRET data with the special designation: Restricted Data (TS//RD) and special Q-Cleared "security" areas. L Clearance – Allows access to Classified information up to and including SECRET data with the special designation: Formerly Restricted Data (S//FRD) and special L-Cleared "limited" areas. WHO CAN GET A SECURITY CLEARANCE? Any person who is employed by an organization that is sending, receiving, or developing information that the government has deemed as important to National security will need to obtain a security clearance. Currently, there are more than 500,000 background investigations pending for security clearance approval. When an individual is going through the process for clearance, it may take up to a year before a determination is made. This makes a military candidate who already has clearance even more appealing to a hiring company. If the company hires a person who will need to gain a clearance, they may wait over a year before the person is eligible to work on the project for which they were hired. This is a lot of lost time and money to a company. If they can identify a person who has the necessary clearances, such as a candidate with a military background, that person immediately becomes more valuable. HOW DO YOU GET A SECURITY CLEARANCE? There are three main phases to receiving a security clearance:  The first phase is the application process. This involves verification of U.S. citizenship, fingerprinting and completion of the Personnel Security Questionnaire (SF-86).  The second phase involves the actual investigation of your background. Most of the background check is conducted by the Defense Security Service (DSS).
  • 4.  The final phase is the adjudication phase. The results from the investigative phase are reviewed. The information that has been gathered is evaluated based on thirteen factors determined by the Department of Defense (DoD). Some examples of areas they consider are; allegiance to the United States, criminal and personal conduct, and substance abuse or mental disorders. Clearance is granted or denied following this evaluation process. BY Kartheek.G Sr.Talent Acquisition Specialist