The continuous security evaluation process | AskTOP.net - Leader Development for Army Professionals

The continuous security evaluation process

Many soldiers have security clearances based on MOS or job performance requirements. The security clearance is granted only after a lengthy background investigation is performed by qualified persons. Your security clearance investigation may have been initiated before you even entered active duty.

the continuous security evaluation process

Maintaining a security clearance takes a combination of factors into account, but a violation of  just one can jeopardize your clearance.

Depending on the duration of the investigation, it may have even been resolved while you were in the delayed entry program. You might be thinking you dodged a bullet after having your clearance granted. You may have had several issues in your past that had to be addressed prior to the clearance granted.

Investigators report the results of their investigations and the government determines suitability. The results of the investigation are used to determine whether or not the subject is stable, trustworthy, reliable, of excellent character, judgment, and discretion; and of unquestioned loyalty to the United States. The determination is based on 13 investigation criteria:

  • Use of information technology systems
  • Outside activities
  • Handling protected information
  • Criminal conduct
  • Psychological conditions
  • Drug involvement
  • Alcohol consumption
  • Financial considerations
  • Personal conduct
  • Sexual behavior
  • Foreign preference
  • Foreign influence
  • Allegiance to the United States
security clearance adverse information

You must report adverse information anytime you or another person violates the criteria listed above.

Show Full Article
posted on 02/03/2011 under Articles
avatar
Jeffrey W. Bennett, ISP has served 22 years in Army Intelligence and Transportation and now advises on national security. A teacher at heart, he is board certified to protect classified information and has a master’s in business administration. He speaks, writes and provides products to help professionals better protect sensitive and classified information. His books include, “ISP Certification-The Industrial Security Professional Exam Manual”, “Managing the Security of Classified Information and Contracts” and “Get Riche in a Niche; Writing, Self-Publishing and Marketing in a Specialized Market”. Red Bike Publishing

Disclaimer: Though all content posted on AskTOP.net is reviewed by our qualified subject matter experts, you should not make decisions based solely on the information contained in this post. Use information from multiple sources when making important professional decisions. This is not an official government website.

You might be interested in…

Leave a Comment

We will never publish or sell your email address, nor will we ever send you information you have not requested.