Site Overlay

DOD 5200.2-R PDF

DoD R, “Department o£ Defense Personnel Security Program,” December , is hereby canceled as of December 31, DoD M – National Industrial Security Program Operating Manual. ( NISPOM) DoD R – Personnel Security Program. DOD R: DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM.

Author: Akinolrajas Miramar
Country: France
Language: English (Spanish)
Genre: History
Published (Last): 14 June 2008
Pages: 128
PDF File Size: 16.58 Mb
ePub File Size: 3.42 Mb
ISBN: 679-2-47978-665-5
Downloads: 74500
Price: Free* [*Free Regsitration Required]
Uploader: Gubar

Over the past twenty five years, I have represented military service members, government contractors sod dos dpd employees who have had security clearance problems. They experience failure to compete effectively with their peers; perceive injustice at the hands of a supervisor or employing organization; are terminated from a job under circumstances that prompt resentment; feel rejected or betrayed by a spouse; confront serious financial or medical problems; or are tempted by a seemingly easy opportunity for illegal monetary gain.

Information Technology IT Systems include all related computer hardware, software, firmware and data used for the communication, dor, processing, manipulation, storage or protection of 52000.2-r. Conduct involving questionable judgment, lack of candor, dishonesty or unwillingness to comply with regulations can raise questions about an applicant’s reliability, trustworthiness and ability to protect classified national security information CNSI.

Personnel with technical skills and administrative access to a network are also capable of damaging or impairing the operability of critical information systems.

One of the keys is found in the appropriate regulations which underpin all security clearance work, and specifically in those sections dealing with extenuation and mitigation. The Personal Conduct adjudicative guideline covers unreliable or untrustworthy behavior not considered 5200.22-r other guidelines, or which falls below the threshold for action under any other single guideline. It did a means for adjudicators to consider a pattern of unreliable and untrustworthy behavior that may encompass multiple guidelines.

The vast majority of juvenile offenders get into trouble only once or twice and they stop offending as they mature.

The adjudicator is an analyst who forms his or her conclusions and recommendations based on a review of all available information. A source’s impressions, opinions or interpretations are useful to investigators as clues to things that require further investigation, but they are generally not used as a basis for adjudicative action unless they are substantiated by examples of specific behaviors.

If your security clearance is jeopardized in any way, your career is at risk. Any reason to suspect otherwise creates doubt about the applicant’s willingness to safeguard classified national security information CNSI.

This site uses cookies. Unfavorable information is more useful when time and frequency are expressed in specific rather than general terms: Government departments and agencies may also choose to apply these guidelines to analogous situations regarding persons being considered for access to other types of protected information.


For example, a source’s opinion that the subject is irresponsible should be substantiated by description of specific examples of the subject’s irresponsibility, such as moving out of a rental apartment without notice. Foreign Preference If an applicant’s behavior indicates a preference for a foreign country over the United States, then the applicant may be prone to providing information or making decisions that are harmful to U.

If adverse information comes from a single source, it is necessary to evaluate both the credibility of the source’s access to that information and any possible ulterior motives for providing that information. While not always illegal, misuse of information technology systems is often unethical and usually reflects poor judgment or lack of care in following security rules and regulations.

Sources and Information A source’s impressions, opinions or interpretations are useful to investigators as clues to things that require further investigation, but they are generally not used as a basis for adjudicative action unless they are substantiated by examples of specific behaviors.

DOD 5200.2-R PDF

The nature, extent, and seriousness of the conduct. The applicant’s preference for a foreign country must be 5200.22-r by adequate evidence of heightened risks to national security. Self-control, social maturity, strength of character and overall psychological adjustment are more important security indicators than the specific sexual practices in which people engage.

A preference for a foreign entity may cause a person to make decisions that are contrary to the interests of the United States. Self-Control Security requires the exercise of sound judgment in protecting classified information.

An adjudicator must be free of any personal biases, opinions and prejudices when applying the 13 Adjudicative Guidelines. What most people do not know is that within each topic or issue, there are between 6 and 10 sub-topics or issues. Decisions regarding eligibility for access to classified information take into account factors that could cause a conflict of interest and place a person in the position of having to choose between his or her commitments to the United States, including the commitment to protect classified information, and any other compelling loyalty.

Other crimes such as drug dealing, illegal gambling, assault on coworkers, theft from other employees and prostitution also affect the workplace. Although adverse information concerning a single criterion may not be sod for an unfavorable determination, the individual may be disqualified if available information reflects a recent or recurring pattern of questionable judgment, irresponsibility or emotionally unstable behavior.


The information 5200.2r must be sufficient to allow an affirmative or negative determination of a person’s eligibility for access to classified information. Each case must be judged on its own merits and final determination remains the responsibility of the specific department or agency. If allegiance to the United States is in doubt, an individual’s willingness to safeguard classified information is also in doubt.

DOD Adjudicative Elements – Security Clearance

Organizations are vulnerable to a wide variety 5200.2–r crimes including embezzlement, procurement fraud, sabotage of computer systems and theft of government property. It is principally a Foreign Influence or Foreign Preference issue when an individual shows a preference for a foreign country, serves a foreign interest or is vulnerable to foreign influence that puts protected information at risk.

April 13,77 FR When information of security concern becomes known about an individual who is currently eligible for access to classified information, the adjudicator should consider whether the person:.

Excessive alcohol consumption often leads to questionable judgment or the failure to control impulses and can raise questions about an applicant’s reliability and trustworthiness. Civilian, military and contract employees who request access to information under the security cognizance of DoDIIS. The socially responsible person has appropriate respect for authority, comfortably accepts ordinary rules and regulations, and deals fairly with others. The following actions may result in unfavorable clearance action or administrative termination of further processing: Adjudications Certain positions within DoD entail duties of such a sensitive nature, including access to classified information, that the misconduct, malfeasance or nonfeasance of an incumbent in any such position could result in an unacceptably adverse impact upon the national security of the United States.

It is not prohibited for a 5200.2-f.

These 5200.2-t qualities may outweigh some unfavorable information. The adjudicative guideline specifies that foreign contacts and interests may be a security concern under the following circumstances: Employees whose behavior is under conscious control think before acting, take their duties seriously, and are able to delay immediate gratification of their desires in order to achieve some longer-term goal. An equally fundamental legal principle is that access to classified information is a privilege, not a right.

It may indicate proceeds from financially profitable criminal acts.