The document provides a security refresher training for cleared GW MFA employees. It covers key topics such as facility security clearance procedures, operations security, information security, counterintelligence threats and awareness, and reporting requirements. The training is intended to review basic security practices and responsibilities for cleared personnel working with classified information.
2. CLEARED
REFRESHER
SECURITY
TRAINING
Briefing Contents
Updated: June 2016
The Innovative Practice Section in the Department of Emergency Medicine works as a sub-contractor with the
Department of Defense (DoD) to provide medical staffing support services on government contracts where
security clearances may be required.
The objective of this refresher training is to provide all cleared personnel with a review of the basic knowledge of
The George Washington University Medical Faculty Associates’ security practices and procedures as a secured
facility and to identify their security responsibilities and obligations as employees.
> Overview
> Introduction
> Cleared Facility PointsOf Contact (POCs)
> OPSEC
> Information Security
> Counterintelligence Threats and Awareness
> Cleared Employee Reporting Requirements
> Acknowledgement
3. CLEARED
REFRESHER
SECURITY
TRAINING
Overview
The George Washington University
Medical Faculty Associates (GW MFA) is a
non-possessing cleared facility (referred
to as Facility Security Clearance, or FCL)
with a secret-level clearance.
GW MFA has entered into a security agreement with the
Department of Defense in order to have access to
information that has been classified because of its
importance to the national defense. This agreement details
the security responsibilities of both the cleared organization
and the United States Government. The GW MFA and many
of its ac tivities and programs are vital parts of the defense
and sec urity systemsof the United Statesof Americ a.
The National Industrial Security Program Operating Manual
(NISPOM) prescribes the requirements, restric tions, and other
safeguards to prevent unauthorized disclosure of classified
information. A copy of the NISPOM is available to all GW
MFA employees by contac ting the Facility Security Officer
(FSO).
Per the requirements outlined in the NISPOM, all c leared
employees must received refresher training at least annually
to review the information provided in the Initial Security
Briefing for Cleared GW MFA Employees and notify
personnel of c hangesin sec urity regulations.
KEY TERMS
Classified National Security Information (“Classified
Information”): offic ial information or material that
requires protec tion in the interests of National
Security and that is classified for suc h purpose by
appropriate c lassifying authority in acc ordanc e with
the provisionsof Exec utive Order 13526
Facility Security Clearance (FCL): an administrative
determination that, from a security viewpoint, a
c ompany is eligible for ac cess to c lassified
information of a c ertain c ategory (and all lower
c ategories)
Non-possessing facility: facility with no approved
storage for c lassified material
Facility Security Officer (FSO): a U.S. c itizen
c ontrac tor employee, who is c leared as part of the
fac ility clearance, responsible for supervising and
direc ting security measures necessary for
implementing applicable NISPOM and related
Federal requirements for the protec tion of classified
information
SECRET Classification Level: as applied to
information, the unauthorized disc losure of which
reasonably c ould be expected to cause serious
damage to the national security that the original
c lassification authority is able to identify or desc ribe
Updated: June 2016
4. CLEARED
REFRESHER
SECURITY
TRAINING
Introduction
In order to have a successful security program, we need active participation not
only from the FSO and management, but also YOU asa cleared employee.
By being a cleared c ontrac tor/sub-contractor to the U.S. Government, we all have an
obligation to the sec urity and reputa tion of our organization and country. The most important
thing we can do each day is to be AWARE.
Each one of us can make a difference by familiarizing ourselves with GW MFA’s facility security
clearance polic ies and procedures, being c ognizant of our reporting requirements, and
understanding the threat and dangers of intelligence collec tion and the steps we can take to
countermeasure the risks.
Updated: June 2016
5. CLEARED
REFRESHER
SECURITY
TRAINING
Kyle Majchrzak
Operations Manager/ Facility Security Officer (FSO)
International Spec ial Projec ts& Medic al Educ ation Training Programs
Department of Emergency Medic ine
2120 L Street, NW
Suite 530, Offic e 5-119
Washington, DC 20037
Telephone: (202) 741-2944
Email: kmajc hrzak@mfa.gwu.edu
Jason McKay
Training Center Manager/ Assistant Facility Security
Officer (FSO)
International Spec ial Projec ts& Medical Educ ation Training Programs
Department of Emergenc y Medic ine
2120 L Street, NW
Suite 530, Offic e 5-107
Washington, DC 20037
Telephone: (202) 741-3421
Email: jmc kay@mfa.gwu.edu
Updated: June 2016
Cleared Facility Points of Contact (POCs)
You must report any known or suspected
security violation, suspicious contacts, or
vulnerability of which you become
aware to the FSO, independent of who
isresponsible or at fault for the situation,
so sec urity issuesc an be addressed
immediately.
6. CLEARED
REFRESHER
SECURITY
TRAINING
OperationsSecurity (OPSEC)
Violators of OPSEC:
#1 US Military
#2 U.S. CONTRACTORS!!!
…Don’t be a statistic
OPSEC:
> Isa proc essthat identifiesc ritic al information and protec tsit from our adversaries
> Isan important part of every organization and we all have the responsibility to manage critical information
> Helpsto c ontrol information that could be used against us(the organization). Increased safety and sec urity in
any setting and for any purpose isthe benefit
Updated: June 2016
The most important security tool in operations security is YOU!
7. CLEARED
REFRESHER
SECURITY
TRAINING
OPSEC & the 5-Step Cycle
OPSEC 5-Step Cycle
1. Identify Critical Information – What needsto be protec ted and how do we protec t it?
2. Analyze the Threat – Who isa potential adversary? (i.e. c riminals, hac kers, c ompetitors,
foreign intelligenc e servic es, insider threats)
3. Analyze Vulnerabilities– (i.e. public c onversations, poor doc ument c ontrol, with whic h
information isnot handled, stored or destroyed properly)
4. AssessRisk – What c ould happen? RISK = THREATx VULNERABILITY x IMPACT
5. Apply Countermeasures
Identify Critical
Information
Analyze the Threat
Analyze
Vulnerabilities
Assess Risk
Apply
Countermeasures
Updated: June 2016
8. CLEARED
REFRESHER
SECURITY
TRAINING
Information Security
Classified information (official information or material that requires protection in the interests
of National Security and that is classified for such purpose by appropriate classifying
authority) can be in the form of:
Updated: June 2016
The three levels applied to classified information are:
X TOP SECRET – the unauthorized disc losure of Top Secret information reasonably could be expected to cause
exc eptionally grave damage to the national security that the original classification authority is able to identify or
desc ribe
SECRET – the unauthorized disc losure of Secret information reasonably c ould be expec ted to c ause serious
damage to the national sec urity that the original c lassific ation authority is able to identify or desc ribe
CONFIDENTIAL – the unauthorized disclosure of Confidential information reasonably c ould be expec ted to c ause
damage to the national sec urity that the original c lassific ation authority is able to identify or desc ribe
A c leared c ontrac tor with a “ need-to-know” (determination made by an authorized holder of c lassified information
that a prospec tive recipient has a requirement for access to, knowledge, or possession of the c lassified information to
perform tasks or servic es essential to the fulfillment of a c lassified c ontrac t or program), possessing the necessary
c learance level, and having been briefed ac cordingly may view c lassified material at or below their c learanc e level
Remember, GW MFA is cleared to the levelsof Secret and Confidential
> Documents > Faxes > Personnel files > Equipment and mac hinery
> Working papers > Photographs > Maps& sketches > Meeting notes
> Emails > Medical rec ords > Storage media > Employee travel plans/ records
9. CLEARED
REFRESHER
SECURITY
TRAINING
Information Security
Need-to-Know
Thingsto remember about Need-to-Know:
> No one is entitled to c lassified information solely by virtue of offic e, position, rank or c learanc e
> You, asan authorized holder of c lassified information, have three c hoicesin dec iding whether or not to share
c lassified material entrusted to you:
i. Allow accesswhen all items in the above formula are present
ii. Deny accesswhen any item in the above formula is missing
iii. Delay accesswhen any of the itemsin the above formula are unknown
Questionsabout Need-to-Know? Contact the Facility Security Officer
CLEARANCE
SF 312
(ClassifiedInformation
Non-DisclosureAgreement)
NEED-TO-KNOW+ + =
Updated: June 2016
ACCESS
10. CLEARED
REFRESHER
SECURITY
TRAINING
The mission of counterintelligence (CI) as defined by DSS is to “identify unlawful
penetrators of cleared U.S. defense industry and articulate the threat for industry and
U.S. government leaders.”
Timely and ac curate reporting from c leared industry is the primary tool to identify and mitigate c ollec tion efforts
targeting tec hnologiesand information resident in c leared industry.
On the following slides we will review:
> Overview of Counterintelligenc e Threats
> InsiderThreats
> Reporting the Threat
> Cyber Sec urity
> Elic itation: Can You Rec ognize It?
> Foreign Travel Vulnerability
Updated: June 2016
Counterintelligence Threatsand Awareness
11. CLEARED
REFRESHER
SECURITY
TRAINING
The technology base of the U.S. isunder constant attack. DSShasidentified foreign entities(most
aggressively East Asia and the Pac ific , aswell asAfric a) seeking intelligenc e value in our:
> Information systemstec hnology
> Aeronautic s
> Lasers, optic sand sensor technology
> In the c ommerc ial spac e, government-tendered requirementsaswell asinformation to c ompete against
c ompetitors
Foreign Entitiesseek classified information for many reasons. Below are some examples:
> To obtain an advantage against regional adversaries
> Replic ate U.S. capabilities
> Develop c ountermeasuresto U.S. systems
> Profit c ommerc ially
Ascollection methodsevolve, DSShasrecognized the following trends:
> Collec torsview request for information (RFI) (i.e. seemingly innoc ent requestsmade by c ollec torsregarding
shipping logistic sand export regulations)
> Cyber c ollec tion (i.e. foreign entitiesgaining ac c essto unc lassified c leared c ontrac tor networks, potentially
c ompromising sensitive, but unc lassified, information present on those networks)
> Ac ademic solic itation (foreign entitiesuse students, professors, sc ientistsand researchersascollec tors; i.e.
foreign studentsapplying to c leared c ontrac torsassoc iated with U.S. universities)
Updated: June 2016
Counterintelligence Threatsand Awareness
Overview of Threats
12. CLEARED
REFRESHER
SECURITY
TRAINING
The number one threat to national security comesfrom the “Insider Threat”. An insider
can have a negative impact on national security and industry security in:
> Lossor c ompromise of c lassified, export-c ontrolled, or proprietary information
> Lossof tec hnologic al superiority
> Ec onomic loss and/ or lossof life
Updated: June 2016
Some indicators of an insider threat are:
> Engaging in c lassified c onversationswithout a need-to-know
> Working hoursinc onsistent with job assignment or insistenc e on working in private
> Repeated sec urity violations
If noticed, it is best to report these examples of suspicious activity to your FSO.
Again, be aware of your surroundings and those around you.
Counterintelligence Threatsand Awareness
Insider Threats
13. CLEARED
REFRESHER
SECURITY
TRAINING
It is your OBLIGATION TO REPORTactual, probable or possible espionage, sabotage,
terrorism or subversion promptly to the FSO.
DSShas warned that the majority of suspic iousc ontactsoriginate from
c ommerc ial entities. Examplesinc lude:
> Feb 2012: Pangang Group (steel manufac turer in Sic huan provinc e of
China) indicted in Northern California for c onspirac y to c ommit ec onomic
espionage inc luding c onspirac y to steal valuable trade sec retsfrom
DuPont.
> Feb 2012: Hanjuan Jin wasfound guilty in Illinoisfor theft of trade sec rets;
she illegally possessed thousandsof Motorola trade sec retson her
c omputer and in other forms of digital storage; her intent wasto passthe
information to the Chinese military.
Hanjuan Jin- November 7, 2011 (AP)
Attempted intrusionsare the most common suspiciousactivity in:
> Soc ially engineered emailswith malic iousattac hmentsto exploit c ommerc ial software
> Spoofing emailsthat imitate valid domains
> Attempted intrusion from removable media
Counterintelligence Threatsand Awareness
Reporting the Threat
Updated: June 2016
14. CLEARED
REFRESHER
SECURITY
TRAINING
Cyber criminals, hackers, insider threats, terrorists and foreign intelligence entities are
targeting our technology by using the following methods:
> Phishing emailswith malic iouslinksor attac hments
> Unpatched or outdated sec urity software
> Removable media
> Weak or default passwords
> Website vulnerabilities
> Seeking information on soc ial networks
Stepsthat can be taken to mitigate the risk include:
> Changing your passwordsregularly
> Using c omplex alphanumeric passwordswith c ombinations of numbers, symbols, letters, and multiple
c harac ters
> Do not open emails/ attac hmentsfrom unfamiliar sourc es
> Do not install or c onnec t personal software or hardware to your organization’snetwork without permission
from the ITdepartment
> Do not share work information on soc ial networks
Updated: June 2016
Counterintelligence Threatsand Awareness
Cyber Security
15. CLEARED
REFRESHER
SECURITY
TRAINING
Elicitation isused by intelligence officersin order to subtly extract information about
you, your work and/ or your colleagues. Most often, illegal or unauthorized accessto
classified or sensitive information is sought.
Updated: June 2016
What are some recruitment toolsthat intelligence officersuse to lure a target that you should be aware of?
> Money is offered by an intelligenc e officer (IO) to a target in exc hange for information
> Appealing to ideology (IO expressessame worldview or political leaningswith a target in order to gain trust)
> Ego (target bec omesthe subjec t of immense flattery and praise)
> Revenge (IO learnstarget isdisgruntled and enc ouragesretribution by passing on c lassified information)
> Blac kmail (IO learnsof damaging information and forc estarget to c ooperate by threatening to expose
personal sec rets)
> Industrial spiesattend trade showsand c onferenc es, whic h allowsthem to ask questionsthat might
otherwise seem suspic iousin a different environment
Counterintelligence Threatsand Awareness
Elicitation: Can You Recognize It?
16. CLEARED
REFRESHER
SECURITY
TRAINING
What can be done to counter recruitment attempts?
> Safeguard your wordsand ac tionsto avoid bec oming an easy target.
> Examine your own vulnerabilitiesand adjust your lifestyle to c lose gapsthat hostile entitiescould exploit.
Updated: June 2016
Report any suspiciousconversations to your FSO.
Thisinformation will be passed on to DSS, who will then review and determine if a
potential counterintelligence threat concern exists.
Counterintelligence Threatsand Awareness
Elicitation and Recruitment
17. CLEARED
REFRESHER
SECURITY
TRAINING
As cleared contractors travel for business and/ or personal use, the knowledge they
have issought-after by foreign entities.
Collection techniques include the following:
> Bugged hotel rooms or airline c abinsfor audio and/ or visual surveillance
> Intercepting faxesor email transmissions
> Rec ording of telephone c alls/ conversations
> Theft of elec tronic devic es
> Unauthorized ac cessto elec tronic devices
> Installation of malic ioussoftware
> Unnec essary and often unknown search of briefc ases/ luggage
Updated: June 2016
Counterintelligence Threatsand Awareness
Foreign Travel Vulnerability: Collection Techniques
18. CLEARED
REFRESHER
SECURITY
TRAINING
To combat potential vulnerabilities, please apply the following countermeasures when
traveling abroad:
> Do not public ize travel plansand limit sharing of thisinformation to people who need to know
> Inform the FSO prior to departure and rec eive an offic ial foreign travel briefing
> Maintain c ontrol of media and equipment; do not leave them unattended in hotel rooms
> Keep hotel room doorslocked and make a mental note of how the room looks when you leave/ return
> Do not use c omputer or fax equipment at foreign hotels or businessc entersfor sensitive matters
> Ignore or deflec t intrusive or suspect inquiriesor c onversationsabout professional or personal matters
> Refrain from bringing portable elec tronic devic es, espec ially if c ompany-issued
> If using portable elec tronic devic es, set passwordsto restric t ac c essand c lear the devic e in the event of
theft
> Enc rypt data, hard drivesand storage devic eswhenever possible
> Use c omplex passwords
> Please refer to the State Department website for travel warningsprior to departure
Updated: June 2016
Counterintelligence Threatsand Awareness
Foreign Travel Vulnerability: Countermeasures
19. CLEARED
REFRESHER
SECURITY
TRAINING
Cleared Employee Reporting Requirements
Updated: June 2016
In accordance with requirements outlined in the NISPOM, all cleared employees are required to report
the following issues to the FSO for investigation, resolution and reporting to the appropriate
government agency :
> Adverse Information
> Change in Personal Status
> Sec urity Violations/ Vulnerabilities
> Espionage, Sabotage, Subversive Activities
> Suspic iousContac ts
20. CLEARED
REFRESHER
SECURITY
TRAINING
Cleared Employee Reporting Requirements
Updated: June 2016
Adverse Information
Adverse information is any information that unfavorably reflec ts on the integrity or character of a cleared
employee, that suggests his or her ability to safeguard c lassified information may be impaired, or that his or her
ac c essto c lassified information c learly may not be in the best interest of national sec urity.
All c leared employeesare required to notify the FSO if any of the following exist:
> Seriousfinanc ial diffic ulties(exc essive indebtedness, bankruptc y or wage garnishments)
> Excessive use of intoxic ants(alc ohol, prescription medications)
> Use of illegal drugs
> Required c ounseling for emotional or psyc hologic al problems
> Arrestsor c onvic tionsfor c riminal offensesinc luding drunk driving
> Tic kets(over $300)
> Excessive/ unexplained wealth
> Unusual/ bizarre behavior
21. CLEARED
REFRESHER
SECURITY
TRAINING
Cleared Employee Reporting Requirements
Updated: June 2016
Change in Personal Status
The following should be reported to the FSO for proper doc umentation:
> A c hange in name
> A rec ent c hange in marital statusor a spouse-like relationship
> A c hange in c itizenship
> When ac c essto c lassified information is no longer required due to a c hange in job assignments
You must report if you begin to ac t asa representative of or c onsultant to any foreign entity. Thisinc ludesa
foreign government (or government agenc y), c ommerc ial businessor an individual.
Example: Obtaining a foreign passport or entering into a business/partnership with a foreign national.
22. CLEARED
REFRESHER
SECURITY
TRAINING
Cleared Employee Reporting Requirements
Updated: June 2016
Security Violations/ Vulnerabilities
In addition to personnel sec urity reporting requirements, you must report any known or suspected security violation or
vulnerability of which you become aware, independent of who is responsible or at fault for the situation. Sec urity
violations/ vulnerabilitiesinc lude:
> The c areless, intentional, or unintentional failure to c omply with or disregard of fac ility sec urity c learanc e polic ies
and procedures, regardlessof intent, that hasresulted in the loss, c ompromise or suspected c ompromise of
c lassified information
> The unauthorized rec eipt of c lassified material
> Report suspic iousc ontac ts, whic h are effortsby any individual, regardlessof nationality, i) to obtain illegal or
unauthorized ac c essto c lassified information, ii) to c ompromise a c leared employee, iii) all c ontactsby employees
with known or suspected intelligenc e offic ersfrom any c ountry, or iv) any c ontact whic h suggeststhe employee
c onc erned may be the target of an attempted exploitation by the intelligence servicesof another c ountry
> You must immediately report any situation related to ac tual, probable, or possible espionage, sabotage or
subversive ac tivitiesdirec ted at the United States
23. INITIAL
SECURITY
BRIEFING
Per the NISPOM, Sec tion 1-304 a gra duated sc a le of disc ipline has been put into pla c e in the event of a n
emp loyee tha t viola tes or is negligent of his/ her sec urity requirements. The a c tion must b e rep orted d irec tly to
the FSO and will b e reviewed for a sec urity violation if one or more of the following fac tors are present :
a. The violation involved a deliberate disregard of sec urity requirements.
b. The violation involved grossnegligence in the handling of classified materials.
c. The violation involved wasnot deliberate in nature but involved a pattern of negligence or carelessness.
You must immediately report any situation related to ac tual, probable, or possible violation direc tly to the FSO. The
FSO, if nec essary will meet with the Complianc e Officer and/ or General Counsel to disc ussthe known or suspected
violation. It will be determined at that time is ac tion c onsistsof remedial or c orrec tive measuresand/ or if
appropriate, disc iplinary ac tion, up to and inc luding suspension or termination of employment pursuant to the
MFA’s disc iplinary polic iesand procedures.
The FSO will maintain a rec ord of all disc iplinary and c orrective ac tions. All disc iplinary ac tions should be fairly and
firmly enforc ed.
If, after review with the Complianc e Offic er and General Counsel it is determined that an allegation does not warrant
an investigation, a report will be provided based on the initial review of the allegation and why the investigation is
not warranted.
Updated: June 2016
Cleared Employee Reporting Requirements
Security Violations/ Vulnerabilities
24. CLEARED
REFRESHER
SECURITY
TRAINING
Cleared Employee Reporting Requirements
Espionage, Sabotage, Subversive Activities
Espionage isthe act or practice of spying or of using spies to obtain
secret intelligence.
You must report potential espionage indicators exhibited by others:
> Unexplained affluenc e of wealth
> Keeping unusual work hours
> Divided loyalty or allegianc e to the U.S.
> Disregarding sec urity proc edures
> Unauthorized removal of c lassified information
> Unreported foreign c ontac t and travel (appliesto c leared employees)
> Pattern of lying
> Attempts to enlist othersin illegal or questionable ac tivity
> Verbal or physic al threats
> Inquiry about operations/ projec tswhere no legitimate need-to-know exists
Statute of limitationsdoes NOTapply to Espionage
Updated: June 2016
25. CLEARED
REFRESHER
SECURITY
TRAINING
Suspiciouscontacts are:
> Any efforts by any individual, regardless or nationality, to obtain illegal
or unauthorized access to c lassified information or to c ompromise any
c leared employee.
> Any contac t by a c leared employee with known or suspected
intelligence offic ersfrom any c ountry.
> Any contac t whic h suggestsyou or another employee may be the
target of an attempted exploitation by foreign intelligenc e.
If you receive suspicious contacts please report them immediately to the FSO,
asthey will then be reported to DSS
Cleared Employee Reporting Requirements
SuspiciousContacts
Updated: June 2016
26. CLEARED
REFRESHER
SECURITY
TRAINING
DSSCase Study
In Marc h 2009, a presumed South and Central Asian national c ontacted a c leared c ontrac tor in an attempt to
ac quire export-c ontrolled partsused in c ounter-battery radar systems.
In November 2009, a different U.S. c leared c ontrac tor rec eived an unsolic ited email from the same individual
expressing interest in purc hasing the same radar system that wasrequested in the Marc h inc ident.
The suspic iousindividual wasa representative of a trading c ompany from his home c ountry. Multiple sourc es
indic ate that hishome government established the trading c ompany asa front c ompany to proc ure export-
c ontrolled tec hnology and equipment for the national military, and that the trading c ompany had previously
sought produc tson behalf of several military servic esand defense-affiliated entities.
The trading c ompany wasthe subjec t of several other SCRsreporting attemptsto purc hase export-c ontrolled
elec tronic sproduc tsand c ommunic ationsequipment used in military airc raft.
Updated: June 2016
If you receive suspiciouscontacts please report them immediately to the FSO, asthey
will then be reported to DSS
Cleared Employee Reporting Requirements
SuspiciousContacts– DSSCase Study
27. CLEARED
REFRESHER
SECURITY
TRAINING
Cleared Employee Reporting Requirements
Reporting Hotlines& Contact Information
•In addition to the FSO within our organization, Federal agenciesmaintain hotlines to allow an unconstrained
avenue for government and contractor personnel to report, without fear of reprisal, any known or
suspec ted instances of sec urity irregularities or infractions conc erning defense-affiliated c ontracts,
programs, or projects.
•You are also required to report any fraud, waste or abuse regarding work while working on a
government contract.
•WARNING: Do NOT disclose classified information when reporting via one of the DoD Hotline methods,
as these channelsare not secure!
DEPARTMENTOFDEFENSE(DoD) HOTLINE
The Pentagon
Washington, D.C. 20301-1900
(800) 424-9098
hotline.dodig.jil
http:/ / www.dodig.mil/ hotline
Updated: June 2016
NRC HOTLINE
U.S. Nuclear Regulatory Commission
Office of the Inspector General
Mail Stop O5-E13
11555 Roc kville Pike
Roc kville, MD 20852
(800) 233-3497
CIA HOTLINE
Office of the Inspector General
Central Intelligence Agenc y
Washington, D.C. 20505
(703) 874-2600
DOEHOTLINE
Department of Energy
Office of the Inspector General (IG)
ATTN: IG Hotline
1000 Independence Avenue, S.W.
Mail Stop 5D-031
Washington, D.C. 20585
(202) 586-4073
(800) 541-1625
DEFENSESECURITY SERVICE(DSS)
DSSIG Hotline: (571) 305-6660
Michael Irvine, Industrial Security Specialist
michael.irvine@dss.mil
(703) 617-2300
HectorRodriguez, Field CI Specialist
hec tor.Rodriguez@dss.mil
(571) 289-0657
28. CLEARED
REFRESHER
SECURITY
TRAINING
Cleared Employee Reporting Requirements
Global Compliance (Non Security-Related Reporting)
If you suspect, or are asked
to cover up, any of the
following, report it to your
supervisor, to the MFA’s
Compliance Office or Legal
Department, or contact
Global Compliance:
> Fraud/ False Claims/ Upc oding
> Kic kbac ksfor referrals
> Conflic tsof interest
> Theft
> Harassment or disc rimination
> Criminal ac tivity
> Violations of lawsor regulations
> Health, safety, environmental
issues
> Violations of c ompany polic y or
procedure
Updated: June 2016
29. CLEARED
REFRESHER
SECURITY
TRAINING
Acknowledgement
I hereby certify by my signature below that I have reviewed the information
contained herein and understand it is my responsibility to comply with all
necessary security measures outlined in the June 2016 Facility Security
Clearance Refresher Training for Cleared GW MFA Employees.
Name
Signature Date
Position and Department
Please return thispage to the Facility Security Officer once it has been signed
via email to kmajchrzak@mfa.gwu.edu or facsimile at 202-741-2214
Updated: June 2016