Reader Ad Slot
Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
Contract for Assistance Regarding Syed Farooks Iphone — Part 1
Page 71
71 / 111
_SESRET_
military employee serving overseas. The requirement may be waived for short term contractor
personnel (performing duties for a cumulative total of 14 days or less) if there is a critical need
for their specialized and unique skills. These individuals must, however, be United States
citizens or Permanent Resident Aliens.
H.37 Contractor Suitability - Contract Security Requirements from Acquisition Security
Unit (ASU), Procurement Section Directive (PSD): 09-15,204-2(h)
Access to FBI facilities and information ts subject to specific security and suitability
requirements. The FBI reserves the right and prerogative to deny and/or restrict facility and
information access of any contractor employee determined by the FBI, at any time during
performance, to be unsuitable for access and/or present a risk of compromising sensitive
government information to which he or she would have access to under this contract.
Contractors will be allotted a reasonable amount of time, determined by the government, to
replace the employee found not suitable for continued contract performance. Failure to replace
the employee may result in a no cost termination for cause by the government.
H.38 DOJ Security of Systems and PII - Contract Security Requirements from Acquisition
Security Unit (ASU), Procurement Section Directive (PSD): 11-24.101
On 3/20/2008, the Senior Procurement Executive, DOJ, notified the FBI of requirements for
addressing Department systems and data, including provisions governing the use of laptops by
contractors which are to be included in all current and future contracts where a contractor
handles data that originated within the Department, data that the contractor manages or acquires
for the Department, and/or data that is acquired in order to perform on the contract and concerns
Department programs or personnel. Effective immediately if a procurement is expected to result
in the acquisition of services where the contractor handles data that originated within the
Department, data that the contractor manages or acquires for the Department, and/or data that is
acquired in order to perform the contract and concerns Department programs or personnel
procurement officials are required to incorporate the appropriate special security requirements.
It should be noted that within Section A, paragraphs a, b, and d apply to all data, even data that
may not be personally identifiable information (PII). Section B sets forth special security
requirements that must be used in contracts involving PII obtained by the Department from a
contractor, such as an information seller or data broker. A request for a waiver from the
requirement to include these special security requirements, or deviations from the language
(except those that are more stringent}, must be made in writing to the Senior Procurement
Executive. Permission for a deviation or waiver will only be granted in unusual circumstances.
H.39 Personnel Security - Contract Security Requirements from Acquisition Security Unit
(ASU)
H.39.1 Personnel Security Requirements:
The administrative control and maintenance of accurate records of contractors has been
identified by both the Intelligence Community and FBI Executive Management as a matter of
concern. With the continuous dependency on contractors to support the FBI, to include access to
FBI facilities and information, if a procurement is expected to result in the acquisition of services
involving the assignment of contractor personnel to FBI locations the Program Management
Officer/Contracting Officer's Technical Representative (COTR), in coordination with the
assigned Chief Security Officer, are required to identify during procurement planning stages,
AP-59
ser Page 33 of 54
Reveal the original PDF page, then click a word to highlight the OCR text.
Community corrections
No user corrections yet.
Comments
No comments on this document yet.
Bottom Reader Ad Slot
Bottom Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
Continue Exploring
Agency Collection
Explore This Archive Cluster
Broad Topic Hub
letter
bureau
Related subtopics
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic