STUDY SFPC references Exam Prep 2024 with 100%
correct answers
Terms in this set (52)
According to DODI 5200.39, Critical Program Information is capability elements that
What is CPI? contribute to US warfighters technical advantage and that if compromised could
undermine US military preeminence.
Organic CPI and inherited CPI. Organic is unique, original CPI that is owned and
What are the two types of CPI? generated by a Research Development Test & Evaluation program. Inherited is like
organic except it is incorporated into or used by another.
If your program has approved CPI, where is the Program manager will document it in the Program Protection Plan (PPP).
it documented?
First, program managers identify CPI, then select and implement appropriate CPI
CPI Lifecycle
protection measures, document it in their PPP, they monitor the CPI.
Identify CPI: Initiate: early in the acquisition life cycle, when a significant change or
CPI process- part 1
event occurs. Output an approved list of CPI
Select/Implement CPI Protection: Determine and apply appropriate CPI protection
measures. Initiate: After CPI has been identified or a significant change or event
CPI process- part 2
occurs. Output is protection measures that have been determined, applied, and are
actively protecting CPI
Monitor CPI: Determine if/when CPI identification and the selection/implementation
of protection measures need to be reexamined. Initiate: When CPI has been
CPI process- part 3 informally and formally identified and protection measures have been implemented.
Output: A determination that one of more of the CPI Analysis processes require
reexamination
Sometimes different programs have the same or similar CPI technologies. Horizontal
Horizontal Protection ensures these programs apply a similar level of protection to mitigate the loss of
their CPI.
Is required to be issued with every classified contract within the Dept of Defense. Its
DD FORM 254
purpose is to specify the classification requirements for a contract.
Designated Government Representative- responsible to ensure that a contractor
DGR sending classified shipments does so in a secure manner iaw export regulations.
Fulfills an important role in the sending and receiving of classified material
STUDY SFPC references
1/7
, 10/18/24, 9:33 AM
On which document does the DGR review DSP-85 Export License
facility information?
The National Industrial Security Program NISPOM
Operating Manual (NISPOM) provides
specific requirements, restrictions, and
safeguards for industry to prevent
unauthorized disclosure of U.S. classified
and export-controlled information or
technology to foreign interests.
Foreign ownership, control or influence FOCI
(FOCI) is a state that may affect a
company'sability to qualify for or maintain a
Facility Security Clearance (FCL).
The process of determining FOCI begins SF 328
when a company submits Standard Form
(SF) 328, the Certificate Pertaining to
Foreign Interest
A Security Control Agreement (SCA) is SCA
used when a company is not effectively
owned or controlled by a foreign entity but
when the foreign interest is entitled to
representation on the company's
governing board
A Special Security Agreement (SSA), is SSA
used when a cleared company is
effectively owned or controlled by a
foreign entity.
As part of the FOCI mitigation GOVERNMENT SECURITY COMMITTEE (GSC)
requirements, the GSC plays an important
role in the management of the company
under FOCI and in ensuring compliance
with the provisions and security measures
of the FOCI agreements.
The National Industrial Security Program NISPOM document treatment
Operating Manual (NISPOM) defines a
document as "any recorded information,
regardless of the nature of the medium or
the method or circumstances of recording."
The NISPOM requires you to use the same
processes to protect electronic classified
documents that you use to protect paper-
based classified documents.
These processes are proper marking, NISPOM procedures
retrievability, Top Secret accountability,
retention, and destruction
According to the NISPOM (Section 5-200), RETRIEVABILITY (Information Management System)
contractors are required to establish an
information management system (IMS) to
protect and control classified information.
2/7
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Denyss. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $13.99. You're not tied to anything after your purchase.