Home     Sitemap     Magyar

Mission
Sources of intelligence
Structure
Address
Staff
Employment
History

Legislation
Secret intelligence gathering
Data management
Budget

Foreign and security policy
International terrorism, Al-Qaede
Economic security
Organised crime
Non-proliferation
Export control
Foreign secret services
Protective security
Communications security
Vetting


Vetting
  The goal of the vetting procedure is to ascertain whether the persons nominated to or holding important and confidential positions meet the security conditions required for the lawful functioning of state, the national economy and the conditions originating from international commitments (e.g. NATO).

Vetting involves the exploration of risk factors, circumstances, information, through which the activities of persons, holding important and confidential positions, may be influenced or targeted to exploit the position for unlawful purposes, thus creating a situation that violates or threatens national security.
Vetting therefore is an exploration of risk factors not for proving or excluding the possibility that the person undergoing the procedure has been put under illegal leverage and thus he is a jeopardising factor from a national security point of view. It is rather aimed at establishing whether, on the ground of the revealed factors, conditions and information, there is good reason to believe that such a situation might emerge. The national security service, tasked with carrying out the vetting, consults the person concerned. Depending on the scope of the procedure there are three types of security questionnaires: "A", "B", and "C".

The entire staffs of the Information Office is considered to hold important and confidential positions therefore they are to undergo the most complex type of vetting, on the basis of the questionnaire "C".
There is a special unit within the Information Office, which is tasked to carry out the vetting of the staff and candidates. The Office shall carry out vetting of external individuals that might have access to any of the secret documents of the Office (e.g. when co-operating in the development of technical devices).




European Union
National security files