(1) Non-defence authorities that have entered into industrial security agreements with DoD and doD components use the contractual safety specification, Form DD 254. The contract agent or agent of the agents is the official authorized to form DD 254 related to the main mission and ensures that Form DD 254 is properly prepared, distributed and coordinated with security requirements and personnel in accordance with Agency procedures (see 4.402(d)). The following forms, prescribed by the Ministry of Defence, are used by the doD components and defence agencies with which DoD has industrial security service provision agreements for the National Industrial Security Program, where the contractor`s access to classified information is required, as in subsection 4.4 and clause 52.204-2: The final rule applies to small businesses that receive contracts or subcontractors from executive agencies that are covered by the executive agency. National Industrial Security Program that need access that requires access. Classified information. Currently, the Defence Security Service monitors approximately 13,500 authorized contracting equipment for access to classified information. Some 9,000 establishments are considered less complex, including small businesses and minor security operations. Experts estimate that 5,400 (60 percent) of the 9,000 less complex facilities are small businesses. The latter rule is to revise the FAR To update and clarify the requirements for the use of Form DD 254, specification of the contract security classification. The government uses Form DD 254 to provide contractors with security requirements when the performance of the contract requires access to classified information. Major contractors also use Form DD 254 to provide subcontractors with security requirements that require access to classified information to subcontract it.
Subcontractors may also use Form DD 254 when access to classified information is required to provide additional security requirements to subcontractors. Answer: The rule does not diminish the security expert`s ability to verify security and security levels, as ordered by the NISPOM via the National Industrial Security System (NISS).