The IT Law Wiki
Explore
Main Page
All Pages
Community
Interactive Maps
Random page
TopContent
Most Visited Pages
Information environment
Cloud computing
RFID tag
Radio frequency spectrum
Spectrum allocation
Department of Defense
Guidelines on the Protection of Privacy and Transborder Flows of Personal Data
Newly Changed Pages
Black hat SEO
Revenge porn
Pornography
Generative AI pornography
Deep fake
Domain Name and Addressing System
Laws Relating to Filtering, Blocking and Usage Policies in Schools and Libraries
Most Popular Pages
community
Community portal
forum
FANDOM
Fan Central
BETA
Games
Anime
Movies
TV
Video
Wikis
Explore Wikis
Community Central
Start a Wiki
Don't have an account?
Register
Sign In
Start a Wiki
Sign In
Don't have an account?
Register
Sign In
The IT Law Wiki
Explore
Main Page
All Pages
Community
Interactive Maps
Random page
TopContent
Most Visited Pages
Information environment
Cloud computing
RFID tag
Radio frequency spectrum
Spectrum allocation
Department of Defense
Guidelines on the Protection of Privacy and Transborder Flows of Personal Data
Newly Changed Pages
Black hat SEO
Revenge porn
Pornography
Generative AI pornography
Deep fake
Domain Name and Addressing System
Laws Relating to Filtering, Blocking and Usage Policies in Schools and Libraries
Most Popular Pages
community
Community portal
forum
Sign In
Don't have an account?
Register
Sign In
Explore
Fan Central
Current
Sign In
Register
The IT Law Wiki
34,539
pages
Explore
Main Page
All Pages
Community
Interactive Maps
Random page
TopContent
Most Visited Pages
Information environment
Cloud computing
RFID tag
Radio frequency spectrum
Spectrum allocation
Department of Defense
Guidelines on the Protection of Privacy and Transborder Flows of Personal Data
Newly Changed Pages
Black hat SEO
Revenge porn
Pornography
Generative AI pornography
Deep fake
Domain Name and Addressing System
Laws Relating to Filtering, Blocking and Usage Policies in Schools and Libraries
Most Popular Pages
community
Community portal
forum
in:
Definition
,
Security
,
Employment
Unfavorable personnel security determination
Sign in to edit
History
Talk (0)
Definition
[
]
An
unfavorable personnel security determination
is
“
[a]ny one or a combination of the following scenarios:
Denial
/
revocation
of
clearance
for
access
to
classified information
Denial
/
revocation
of
access
to
classified information
Denial
/
revocation
of a
Special Access Authorization
(AA), including
access
to
Sensitive Compartmented Information
(
SCI
)
Non-appointment/non-selection for appointment to a
sensitive
position
Non-appointment/non-selection for any other position requiring
trustworthiness
Reassignment to a position of lesser
sensitivity
or to a non-sensitive position
Non-acceptance for or discharge for the Armed Forces when any of the foregoing actions are based on
derogatory information
of
personnel security
significance.
[1]
”
References
[
]
↑
Glossary of Security Terms, Definitions, and Acronyms
, at 255.
Follow on IG
TikTok
Join Fan Lab