When.com Web Search

  1. Ad

    related to: post office security clearance requirements

Search results

    105.11-1.46 (-1.37%)

    at Mon, Jun 3, 2024, 4:00PM EDT - U.S. markets closed

    Delayed Quote

    • Open 105.92
    • High 106.38
    • Low 104.86
    • Prev. Close 106.57
    • 52 Wk. High 108.17
    • 52 Wk. Low 78.85
    • P/E 20.17
    • Mkt. Cap 6.37B
  1. Results From The WOW.Com Content Network
  2. Security clearance - Wikipedia

    en.wikipedia.org/wiki/Security_clearance

    Individuals who require access to more sensitive information (or access to sensitive federal government sites and/or assets) because of their job will be required to sign the Security Clearance Form (TBS/SCT 330-60e). There are two levels of clearance: Secret

  3. Classified information in the United States - Wikipedia

    en.wikipedia.org/wiki/Classified_information_in...

    Standard Form 312 (SF 312) is a non-disclosure agreement required under Executive Order 13292 to be signed by employees of the U.S. Federal Government or one of its contractors when they are granted a security clearance for access to classified information.

  4. National Agency Check with Local Agency Check and Credit ...

    en.wikipedia.org/wiki/National_Agency_Check_with...

    National Agency Check with Local Agency and Credit Checks (NACLC) is a type of background check required in the United States for granting of security clearances.

  5. Single Scope Background Investigation - Wikipedia

    en.wikipedia.org/wiki/Single_Scope_Background...

    A Single Scope Background Investigation (SSBI), now called a Tier 5 (T5) investigation, is a type of United States security clearance investigation. It involves investigators or agents interviewing past employers, coworkers and other individuals associated with the subject of the SSBI.

  6. List of U.S. security clearance terms - Wikipedia

    en.wikipedia.org/wiki/List_of_U.S._security...

    This list covers security clearance terms used in the United States of America. Within the U.S. government, security clearance levels serve as a mechanism to ascertain which individuals are authorized to access sensitive or classified information.

  7. Office of Personnel Management data breach - Wikipedia

    en.wikipedia.org/wiki/Office_of_Personnel...

    Office of Personnel Management data breach. The Office of Personnel Management data breach was a 2015 data breach targeting Standard Form 86 (SF-86) U.S. government security clearance records retained by the United States Office of Personnel Management (OPM).

  8. Sensitive compartmented information - Wikipedia

    en.wikipedia.org/wiki/Sensitive_compartmented...

    Sensitive compartmented information. Sensitive compartmented information ( SCI) is a type of United States classified information concerning or derived from sensitive intelligence sources, methods, or analytical processes. All SCI must be handled within formal access control systems established by the Director of National Intelligence.

  9. Security Advisory Opinion - Wikipedia

    en.wikipedia.org/wiki/Security_Advisory_Opinion

    Security Advisory Opinion (SAO) or Washington Special Clearance, commonly called security clearance, administrative clearance, or administrative processing, is a process the United States Department of State and the diplomatic missions of the United States use in deciding to grant or deny a United States visa to certain visa applicants.

  10. Standard Form 86 - Wikipedia

    en.wikipedia.org/wiki/Standard_Form_86

    SF 86 is distinguished from SF 85, which is used for public trust or lower-risk positions. [2] The form is required to be completed by military personnel, government contractors, and government employees in order to receive a requisite security clearance.

  11. Classified information - Wikipedia

    en.wikipedia.org/wiki/Classified_information

    Clearance. Clearance is a general classification, that comprises a variety of rules controlling the level of permission required to view some classified information, and how it must be stored, transmitted, and destroyed. Additionally, access is restricted on a "need to know" basis.