DoD R, “Department o£ Defense Personnel Security Program,” December , is hereby canceled as of December 31, DoD M – National Industrial Security Program Operating Manual. ( NISPOM) DoD R – Personnel Security Program. DOD R: DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM.

Author: Mar Mashura
Country: Bangladesh
Language: English (Spanish)
Genre: Love
Published (Last): 9 January 2013
Pages: 219
PDF File Size: 19.54 Mb
ePub File Size: 6.64 Mb
ISBN: 701-6-88944-419-1
Downloads: 88377
Price: Free* [*Free Regsitration Required]
Uploader: Moogutilar

Some alcohol use is normal, but excessive use can be a serious security concern. The ability to develop specific thresholds for action under these guidelines is limited by the nature and complexity of human behavior. It may indicate proceeds from financially profitable criminal acts.

Owing to the magnitude of problems that can be caused by misuse of computer systems, all agencies have a vested interest in maintaining a work environment that fosters high standards of computer security.

Evidence from past espionage cases indicates that alcohol problems are more prevalent among convicted spies than in the population as a whole.

DOD Adjudicative Elements – Security Clearance

Sexual odd or preference may not 52200.2-r used as a basis for disqualification in adjudicating eligibility for security clearance. The ability to weather these situations without engaging in improper or illegal activity depends, in large part, upon a person’s basic character and integrity.

Capacity for Making Commitment Obligations that accompany a security clearance involve a lifetime commitment to maintain secrecy. Access decisions also take into account a person’s reliability, trustworthiness and ability to protect classified information.

Passwords and User IDs are used to control access to the system data, and procedures are in place to deter and detect browsing and unauthorized access. A source’s impressions, opinions or interpretations are useful to investigators as clues to things that require further investigation, but they are generally not used as a basis for adjudicative action unless they are substantiated by examples of specific behaviors.

While not always illegal, misuse of information technology systems is often unethical and usually reflects poor judgment or lack of care in following security rules and regulations. Foreign Preference is an issue whenever a person acts in a way that indicates a possible preference for a foreign country over the United States. The process involves the adjudication of the security eligibility of military personnel and civilian employees of the Department of Defense under Executive Order and DoD Regulation Excessive use affects perception, thinking and coordination.


The adjudicator is an analyst who forms his or her conclusions and recommendations based on a review of all available information.

Notwithstanding the whole-person concept, pursuit of further investigation may be terminated by an appropriate adjudicative agency in the face of reliable, significant, disqualifying, adverse information. Know where you stand. Self-Control Security requires the exercise of sound judgment in protecting classified information. Cleared employees must respect regulations whether they agree with them or not.

They have the self-discipline generally required for success in an academic or career environment. Any reason to suspect otherwise creates doubt about the applicant’s willingness to safeguard classified national security information CNSI.

Alcohol Consumption Some alcohol use is normal, but excessive use can be a serious security concern. It is not prohibited for a U. These positive qualities may outweigh some unfavorable information. Financial Considerations Failure or inability to live within one’s means, satisfy debts or meet financial obligations may indicate poor self-control, lack of judgment or unwillingness to abide by rules and regulations, all of which can raise questions about an applicant’s reliability, trustworthiness and ability to protect classified national security information CNSI.

Available, reliable information about the person, past and present, favorable and unfavorable, should be considered in reaching a determination. If an applicant’s behavior indicates a preference for a foreign country over the United States, then the applicant may be prone to providing information or making decisions that are harmful to U.

Many people, perhaps most people, experience some form of stress that threatens their self-image at some time in their lives: Of particular concern are three types of role conflict: The adjudicative guideline specifies that foreign contacts and interests may be a security concern under the following circumstances: The information collected must be sufficient to allow an affirmative or negative determination of a person’s eligibility for access to classified information.


The adjudicator is not just a reviewer and reporter of information. Government as a drug-free workplace. The work environment that tacitly ignores or tolerates petty violations is also the climate where serious violations are most likely to occur.

Foreign Preference If an applicant’s behavior indicates a preference for a foreign country over the United States, then the applicant may be prone to providing information or making decisions that are harmful to U. A qualified mental health professional e. Information is used to meet regulatory requirements when granting access to information systems and to maintain a repository of personnel who have been granted access.

It is principally a Foreign Influence or Foreign Preference issue when an individual shows a preference for a foreign country, serves a foreign interest or is vulnerable to foreign influence that puts protected information at risk.

DOD 5200.2-R PDF

Access to classified information is a privilege, not a right. Mental health is a security concern because it influences how a person perceives the world, makes decisions and manages stress.

Unfavorable information is more useful 52002-r time and frequency are expressed in specific rather than general terms: Such behavior is sometimes part of a more general pattern of inability or unwillingness to follow rules that should also be evaluated under the Personal Conduct Guideline.

Social Responsibility Maintaining security requires following the rules for protection of doc information.