- Industrial Security
- Field Operations
- Industrial Security Integration & Application (IP)
- NISP Agencies
- NISP Library
Investigations for Other than Access to Classified Information.
The processing of investigations for purposes other than access to classified information related to a classified contract is the responsibility of the government contracting activity (GCA). Click here for more details.
Directive-type Memorandum (DTM) 15-002, "Policy Guidance for the Processing of National Interest Determinations (NIDs) in Connection with Foreign Ownership, Control, or Influence (FOCI)" was promulgated and effective on February 11, 2015.
The link to the DTM can be accessed directly
DSS Releases ISL 2015-01 to Add Millennium Challenge Corporation (MCC) to NISPOM Paragraph 1-103b, Agency Agreements
DSS releases ISL 2015-01, updating the list of Federal agencies that have entered into an agreement with DoD for Industrial Security services. Click here to view ISL.
Use of Legacy Operating Systems
Defense Security Service to Deploy the Annual National Industrial Security Program Cost Collection Survey Jan. 19, 2015 - Feb. 6, 2015:
As the Executive Agency for the National Industrial Security Program (NISP) under Executive Order 12829, the Department of Defense is required to provide the Information Security Oversight Office (ISOO) with an estimated annual cost to Industry of complying with NISP security requirements. We determine the costs by surveying contractors who possess classified information at their cleared facility. Results are forwarded to ISOO and incorporated in an annual report to the President.
To meet this requirement, DSS conducts a stratified random sample survey of contractor facilities using a web-based survey and Office of Management and Budget (OMB)-approved survey methodology. Since the sample of cleared facility participants is randomly selected, not all facilities will receive the survey. The survey will be fielded on Jan. 19, 2015, and remain open through COB Feb. 6, 2015. Participation is anonymous. As in years past, the survey invitation will contain a securitysurveys.net survey link. Verification of the legitimacy of the Survey URL can be obtained through your Cognizant Security Office. If you have any questions, please direct them to our mailbox: AandE@dss.mil.
We appreciate your cooperation and submission of the cost information by Feb. 6, 2015.
DSS provides an update on the National Industrial Security Program (NISP) Contract Classification System (NCCS)
The National Industrial Security Program (NISP) Contracts Classification System (NCCS) in being developed as an Enterprise Federal information system application that supports DoD and other Federal Agencies in the NISP by facilitating the processing and distribution of contract security classification specifications for contracts requiring access to classified information. In addition, NCCS will provide a centralized repository for the collection of classified contract security requirements and supporting data while automating the DD Form 254 (DoD Contract Security Classification Specification) processes and workflows. DSS has partnered with the Office of Defense Procurement and Acquisition Policy within the Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics, to expedite the deployment of NCCS within the existing Wide Area Workflow platform. WAWF is a secure web-based system for electronic invoicing, receipt, and acceptance. Development started in June 2014 with the initial operating capability for the core system scheduled for June 2015. DSS will be setting up a governance board to address future releases. DSS developed the application's business functionality requirements based on input from DoD, other Federal agencies, and industry.
DSS provides information on pending insider-threat program requirements for industry
DSS Updates April 10, 2014 Posting on: Guidance on Managing Personnel Security Clearance Records in the Joint Personnel Adjudication System (JPAS)
Eligibility, Break in Access and Break in Employment. Click here.
DSS provides an answer to a frequently asked question on reporting conduct involving marijuana.
Q: Are contractors in states that have enacted laws authorizing the medical use of marijuana, or in states that have enacted laws authorizing the use, possession, production, processing and distribution of marijuana, required to report use, possession, production, processing, or distribution of marijuana by cleared contractor personnel?
A:YES, any of these activities must be reported as adverse information in accordance with NISPOM paragraph 1-302.a.
DSS posts information on use of JPAS
Industrial Security Letter (ISL) 2006-01, article #3, advised contractors
that the Department of Defense designated the Joint Personnel Adjudication
System (JPAS) as its system of record for contractor eligibility and access
to classified information. In accordance with NISPOM paragraph 2-200b,
contractors are responsible for annotating and maintaining the accuracy of
their employees' access records in JPAS.
Accountability of TS Documents on Information Systems and Electronic Information
A: The NISPOM defines a document as "Any recorded information, regardless of the nature of the medium or the method or circumstances of recording." When documents are in electronic form and stored on another medium (e.g. hard drive or optical disc) each TS document on the medium must be accounted for individually.
Q:If multiple documents are stored on the electronic media, are NISP contractors required to maintain accountability of each TS digital document stored on a system's hard drive or account for the TS hard drive only?
A: When documents are in electronic form and stored on another medium (e.g. hard drive or optical disc) each TS document on the medium must be accounted for individually, in addition to the medium itself (if removable).
A: Any such report of loss must identify each individual document and item when a loss occurs. When multiple items are placed on the same medium, each having their own control number, they must be accounted for separately.
|5/27/2014||Clarification Regarding JCAVS Person Summary Screen PRINTOUTS:
In addition to the guidance provided by
Contractor security functions can be accomplished without printing from JPAS.
As a reminder, all JCAVS printouts must be protected from unauthorized disclosure and in accordancewith the requirements for privacy/sensitive information and For Official Use Only (FOUO), Privacy Act of 1974. Privacy Act requests must be made according to the JPAS SoRN Record Access procedures.
|5/16/2014||DSS Rescinds ISL 2007-01
The guidance found in the articles in ISL 2007-01 has been incorporated into the latest version of the ODAA Process Manual v3.2, dated Nov. 15, 2013. Therefore, ISL 2007-01 is rescinded. Click here to view the ODAA Process Manual. "Click here"
|5/07/2014||Notice for Contractors with GSA-approved Class 5 security containers manufactured by FEDSAFE.
Contractors who have GSA-approved Class 5 security containers manufactured by FEDSAFES should contact the Department of Defense Lock Program. These containers may have a condition that requires correction. The DoD Lock Program is gathering data and can provide additional information.
When contacting the DoD Lock Program please provide the following information about your FEDSAFE container:
In addition, be prepared to provide the name, phone number and email address of a point of contact for the container at your facility.
You can contact the DoD Lock Program by phone 1-800-290-7607 or email W_NAVFAC_DOD_Lock_Program_Support@navy.mil
|4/25/2014||DSS releases ISL 2014-03 "GSA Containers and Verifying Recertification
ISL 2014-03 provides clarification on the procurement of GSA containers and verifying GSA recertification labels, use of DoD approved alarms systems when the contractor is located on a military installation, and clarifies UL-2050 monitoring stations. Click HERE to view ISL.
|4/24/2014||DSS releases ISL 2014-02, "U.S. Department of Housing and Urban Development (HUD)" |
DSS releases ISL 2014-02, updating the list of Federal agencies that have entered into an agreement with DoD for Industrial Security services. Click HERE to view ISL.
|4/23/2014||DoDM 5220.22, Volume 3, “National Industrial Security Program: Procedures for Government Activities Relating to Foreign Ownership, Control or Influence (FOCI)” is released |
DoDM 5220.22, Volume 3, “National Industrial Security Program: Procedures for Government Activities Relating to Foreign Ownership, Control or Influence (FOCI)” was promulgated on April 17, 2014, and replaces Directive-Type Manual (DTM) 09-019. The link to the Manual can be accessed directly at http://www.dtic.mil/whs/directives/corres/pdf/522022_vol3_2014.pdf.
This DoD policy provides guidance to Government Activities (DoD (including Defense Security Service)) and the non-DoD agencies who have entered into agreements with DoD for industrial security services) about the industrial security procedures and practices related to foreign ownership, control or influence that those Government agencies should follow when evaluating FOCI at a company in process for a facility security clearance or a contractor that already has a facility security clearance. The NISPOM (DoD 5220.22-M) continues to provide guidance to NISP contractors about actions and issues related to FOCI.
|4/17/2014||DSS releases ISL 2014-01
DSS releases ISL 2014-01, "GSA Carriers for Overnight Delivery of SECRET and CONFIDENTIAL Classified Materials"; rescinding ISL 2006-02, Article 18. The ISL prohibits the use of drop boxes and provides additional guidance on documenting processes and approvals for using commercial overnight express carriers for the shipment of SECRET and CONFIDENTIAL classified information. View ISL 2014-01.
DSS provides "Validation of Personnel with Eligibility for Access to Classified Information" notice to industry. Click here to view notice.
View policy archives...