Tag: Behavior

  • Guideline L: Outside Activities

    Involvement in certain types of outside employment or activities is of security concern if it poses a conflict of interest with an individual’s security responsibilities and could create an increased risk of unauthorized disclosure of classified information. It is when an individual’s activities present a potential conflict with their role as a clearance holder that…

  • Guideline J: Criminal Conduct

    Criminal activity creates doubt about a person’s judgment, reliability and trustworthiness. By its very nature, past or current criminal activity calls into question a person’s ability or willingness to comply with laws, rules and regulations. Adjudication standards that disqualify individuals with a significant criminal history are supported by evidence that past adult criminal behavior predicts…

  • Guideline M: Use of Information Technology (IT) Systems

    Noncompliance with rules, procedures, guidelines or regulations pertaining to information technology systems may raise security concerns about an individual’s reliability and trustworthiness, calling into question the willingness or ability to properly protect sensitive systems, networks and information. Information Technology (IT) Systems include all related computer hardware, software, firmware and data used for the communication, transmission,…

  • Guideline K: Handling Protected Information

    Deliberate or negligent failure to comply with rules and regulations for protecting classified or other sensitive information raises doubt about an individual’s trustworthiness, judgment, reliability or willingness and ability to safeguard such information and is a serious security concern. This includes protecting controlled but unclassified information such as For Official Use Only (FOUO), proprietary, export-controlled…