Windows is either a registered trademark or a trademark of Microsoft Corporation in the United States and/or other countries. Mac is a trademark of Apple Inc. Fill Dd Fillable, download blank or editable online. Sign, fax and printable from PC, iPad, tablet or mobile with PDFfiller ✓ Instantly ✓ No software. Try Now!. The purpose of this document is to levy uniform requirements for ap,n of the DD Form , “Contract Security. Classification Specification,” for contracts.
|Published (Last):||2 December 2011|
|PDF File Size:||16.48 Mb|
|ePub File Size:||8.72 Mb|
|Price:||Free* [*Free Regsitration Required]|
Sometimes, the government will collaborate with the potential contractor to develop this document. Operations Division, Fort George G. It was developed as a contractual document to capture in one place all of the security requirements for a classified contract.
The back section of the bpank provides additional information related to the requirements for classified contracts, access considerations and terms and definitions.
Determine Eligibility Objectives Search for Customer on database Enter application signed date and eligibility determination. Distribute copies of the DDas appropriate, and indicate the distribution in the respective blocks. A few notes about these sections before we go over them.
Item 13 should be appropriately annotated to provide clarifying information when this item is used. Draw Requests amount must agree with. You should enter a statement in Item 13 that explains the services and that provides appropriate security guidance.
Contract Security Classification Specification – ppt video online download
RD is information related to atomic weapons and is classified by the Department of Energy. Normally they are unclassified. Other Specify Use this item to add any additional performance requirements not covered above. The contractor is responsible for obtaining the approval of the contracting activity prior to release of any information received bpank generated under the contract, except for certain glank of information authorized by the NISPOM.
The action could be research, development, production, study, services, etc.
Remember to include costing for required security training and education for your personnel when developing costing for contracts associated with classified information. Mark “YES” if the contractor is expected to generate or utilize hardware containing classified.
Only certain classified information qualified for shipment by DCS. Your careful planning will establish your government contract as an example of NMSU’s commitment to supporting sensitive, controlled, or classified government research. Are there design features which require protection?
Insert an “X” into the appropriate box. Examples blwnk DDs 9.
However, the following module will facilitate a linear approach to learning. Exit a Customer Chapter 8. This item authorizes the contractor o r subcontractor to transfer material received or generated under the preceding contract to the new contract. An explanation of each item follows.
Consider the following minimum requirements: It is the vehicle that provides the contractor with the security classification guidance necessary for the classified information to be received and generated under the contract. When this condition exists, mark “Yes” and enter the preceding contract number in the space provided.
If intelligence information must be accessed, the GCA is responsible for ensuring that the additional security requirements outlined in various DCI Directives are incorporated in the guidance provided to the contractor. Some example are provided below: This includes contractor address changes if they are performing classified work at their facility. If the volume or configuration of the documents is such that specialized storage requirements are necessary, contact the CSO to verify storage capacity at the contracting facility.
Understanding the DD
Auth with social network: Have access to U. Complete Item 5 as appropriate. The document provides the basis for a contractor to have a facility clearance FCL and have access to classified information.
If access is not required during the solicitation process: It may require checking 10k as well. This item may be applicable on some classified contracts. Also list the city and country. Put yourself in their place, do you understand the guidance? Certification and Signature Enter the name, title, telephone number, address and signature of a designated official certifying that the security requirements are complete and adequate for performance of the classified contract.