Continuous Evaluation Top 15 Frequently Asked Questions
Frequently Asked Questions (FAQ) Show The Personnel Security Program ensures that individuals who are being considered for access to classified information or special nuclear material (SNM) meet national standards of honesty, reliability, and trustworthiness. Because each Federal agency's program is similar, most questions come from personnel who have never had a security clearance (DOE calls it an access authorization) or who are confused because they had clearances at agencies that had requirements that differ slightly from DOE's. Additional information for applicants can be found at "Overview of Access Authorization Process for Applicants” Q: What is Trusted
Workforce? Q:
What is Rap Back? Q: Is Rap Back part of
Continuous Evaluation? Q: What do FBI Rap Back
checks look for? Q: How far back does an FBI Rap Back check go? Q: What happens if something comes up on my Rap Back? Q: How will I know if I need to be refingerprinted? Q: What happens if I refuse to get refingerprinted? Q: Where do I go to be refingerprinted? Q: When will I be enrolled in Rap Back? Q: How does drug use impact my ability to get an access authorization? Q: I've just been told that I need a background investigation in
order to get a security clearance for a job I'm applying for. Is there somewhere I can get some information on that process? Q: I saw an ad for a job with DOE. It said that I would need a DOE access authorization. What is that, exactly? Is it the same thing as a security clearance? Q: I saw an advertisement for a job with a company that has a contract to
perform work for DOE. The job sounds perfect for me, but the ad said that applicants must have a DOE access authorization. I don't have one. Can I still apply for this job? Q: I currently work for a company where I am required to have a Top-Secret security clearance. If
I apply for a job that requires a DOE access authorization, and I'm selected, will I have to have a new background investigation? I just had one two years ago. Q: What if my last investigation was completed 5 years ago? Q: Back up a minute! You just mentioned a "Q" access authorization. What is that and how does it relate to
the Top Secret, Secret, and Confidential clearance terminology I'm familiar with? Q: I'm employed by a DOE contractor, and I currently have a Q access authorization. I saw a job advertised in the paper that required a Top-Secret clearance. Based on what you just said, would the agency that advertised that job accept my Q? Q: What do you mean by "special requirements?"
Q: How do you determine if an individual can be granted an access authorization? Q: What if DOE decides that I am not qualified for an access authorization? Do I have any right to appeal the decision? Q: How can I get a copy of the information in my personnel security file? For the Defense Counterintelligence Security Agency, which conducts the majority of DOE's investigations, the request should be sent to: CONTACT: ADDITIONAL LINKS:
What information does continuous evaluation query?What information does CE query? CE uses automated records checks of commercial databases, US Government databases and other information lawfully available to security officials - information that is already reviewed during background or periodic investigations.
What is the purpose for continuous evaluation?Continuous Evaluation (CE) is an ongoing screening process to review the background of an individual who is assigned to a sensitive position or has access to classified information or material. It exists to ensure that the individual should continue to retain a security clearance or the assignment to sensitive duties.
Who is responsible for continuous evaluation?The Director of National Intelligence (DNI) serves as the Security Executive Agent (SecEA) for the Federal Government. In the DNI's responsibilities, the Continuous Evaluation (CE) Program is established within the National Counterintelligence and Security Center (NCSC).
What databases does continuous evaluation check?The Continuous Evaluation program will use commercial databases, federal government databases, or other platforms of information that are legally available to security officials.
|