Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Public Trust Clearance
I need a Public Trust Clearance document for a government contractor role, requiring a 5-year background check, including financial history and foreign contacts, with a 3-month processing timeline.
What is a Public Trust Clearance?
A Public Trust Clearance is a background check and vetting process for federal employees and contractors who handle sensitive but unclassified government information. While it's not as rigorous as a security clearance, it helps ensure people in positions of public trust won't misuse their access to government systems, facilities, or data.
Federal agencies use Public Trust screenings for roles like IT administrators, financial managers, and healthcare workers who need access to sensitive records but don't deal with classified material. The process typically involves reviewing criminal history, employment records, education verification, and financial background to assess someone's reliability and trustworthiness.
When should you use a Public Trust Clearance?
Federal agencies need Public Trust Clearances when hiring for positions that handle sensitive but unclassified information. This includes roles managing financial systems, maintaining federal databases, or accessing personal records of citizens. For example, a government HR specialist accessing personnel files or an IT administrator managing agency networks would require this level of screening.
Private contractors working with federal agencies also need Public Trust Clearances when their work involves accessing government facilities, information systems, or sensitive data. The clearance process helps protect government resources while giving qualified professionals the access they need to perform essential functions for federal programs.
What are the different types of Public Trust Clearance?
- High Risk (Level 6): Required for positions with significant influence over policy or programs, including senior financial roles and system administrators with extensive data access
- Moderate Risk (Level 5): Used for positions involving public safety, health records, or moderate financial responsibility
- Low Risk (Level 1): Applies to positions with limited access to sensitive information but still requiring basic trust screening
- ADP (Automated Data Processing): Specific to IT positions handling sensitive computer systems and data
- Non-Sensitive (Level 0): Basic screening for positions with minimal access to sensitive information or systems
Who should typically use a Public Trust Clearance?
- Federal Agencies: Determine which positions require Public Trust Clearances and initiate background investigations for employees and contractors
- Office of Personnel Management (OPM): Conducts and oversees the background investigations for Public Trust positions
- Federal Employees: Submit to background checks and maintain eligibility standards while occupying positions of public trust
- Government Contractors: Must obtain clearances when their work involves access to sensitive government information or systems
- Security Officers: Manage clearance processes within their agencies and ensure compliance with federal security requirements
How do you write a Public Trust Clearance?
- Position Details: Document the role's responsibilities, access levels, and sensitivity of information handled
- Personal Information: Gather applicant's full name, SSN, birth date, citizenship status, and residence history for past 7 years
- Employment History: Collect detailed work experience, including supervisors' contact information for the past 5-7 years
- Education Records: Compile academic credentials, degrees earned, and institutions attended with dates
- References: List professional and personal references who can verify character and reliability
- Financial Data: Document credit history, bankruptcies, and financial obligations that might affect trustworthiness
What should be included in a Public Trust Clearance?
- Position Sensitivity: Clear description of risk level designation and justification for public trust status
- Access Scope: Detailed outline of systems, facilities, or information the position can access
- Background Requirements: Specific checks required, including criminal, financial, and employment investigations
- Certification Statement: Applicant's acknowledgment of truthfulness and consent for investigation
- Continuous Evaluation: Terms for ongoing monitoring and reporting requirements
- Security Protocols: Specific handling procedures for sensitive information and systems
- Disqualifying Factors: Clear listing of conditions that could result in clearance denial
What's the difference between a Public Trust Clearance and an Access Control Policy?
A Public Trust Clearance differs significantly from an Access Control Policy in both scope and purpose. While both deal with managing access to sensitive information, they serve distinct functions in organizational security.
- Authorization Level: Public Trust Clearances are government-specific background investigations for federal positions, while Access Control Policies are organizational documents that can be used in any sector
- Legal Framework: Public Trust Clearances operate under federal security regulations and OPM guidelines, whereas Access Control Policies follow internal corporate governance and industry standards
- Duration and Review: Public Trust Clearances require periodic reinvestigation and continuous monitoring, while Access Control Policies typically undergo regular policy reviews and updates
- Scope of Coverage: Public Trust focuses on individual trustworthiness and character, while Access Control Policies define system-wide rules and procedures for information access
Download our whitepaper on the future of AI in Legal
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.