AUTOMATED RESOURCE MANAGEMENT SYSTEM (ARMS)
|
|
- Ashley Oliver
- 6 years ago
- Views:
Transcription
1 AUTOMATED RESOURCE MANAGEMENT SYSTEM (ARMS) SYSTEM REQUIREMENTS DOCUMENT (SRD) December 19, 2003 Version 1.2 Delivered On: December 19, 2003 Delivered To: Federal Emergency Management Agency Contact No.: GS-35F-0306J, FEMA BPA # EMV-2001-BP-0147, Task Order 11 Prepared by: Booz Allen Hamilton
2 TABLE OF CONTENTS 1 INTRODUCTION Background Purpose Document Overview SYSTEM OVERVIEW System Concept High-Level Requirements DETAILED REQUIREMENTS Functional Requirements Resource Inventory Repository Search Resource Requesting Resource Ordering Resource Tracking Reporting Billing Support Mapping Technical Requirements Operational User Roles and Groups Data Interface Hardware Software Booz Allen Hamilton i
3 LIST OF TABLES Table Resource Inventory Repository Requirements Table Search Requirements Table Resource Requesting Requirements Table Resource Ordering Requirements Table Resource Tracking Requirements Table Reporting Requirements Table Billing Support Requirements Table Map Requirements Table Operational Requirements Table User Roles and Group Requirements Table Data Interface Requirements Table Hardware Requirements Table Software Requirements Booz Allen Hamilton ii
4 1 Introduction 1.1 Background Booz Allen Hamilton has been tasked to support the Federal Emergency Management Agency (FEMA)- Preparedness Division, in the development a requirements document for the Automated Resource Management System (ARMS). This document will provide a high-level specification of ARMS system requirements by identifying and defining the corresponding data, functional, business rule, operational and technical requirements for a web site needed to help state and local governments improve their capability to carry out mutual aid during emergency situations. The ARMS is defined as An automated system that assists emergency managers in locating resources to enhance their response to emergencies. ARMS will be used to enhance current EMAC and mutual aid processes. The general functions the software include its use as: A Resource Inventory Repository) A Resource specifies the protocol and provisions forrequesting tool A Resource Ordering tool A Resource Tracking tool, and for assistance provided; and Additionally, ARMS will have a report generating capability and be able to provide supporting documentation for billing purposes. The current Booz Allen task is to perform a detailed analysis of the work and products from Subtask 2.1(Review Working Group Results), Subtask 2.2 (COTS and Government Software Assessment) and 2.4 (Identify Hardware and Software Technical Requirements) and develop an overall ARMS System Requirements Document (Subtask 2.5). 1.2 Purpose The ARMS Systems Requirements Document (SRD) provides a high-level specification of ARMS system requirements. It identifies and defines the corresponding data, functional, business rule, operational, and technical requirements needed to meet the needs of ARMS users. This initial SRD is a baseline for ARMS requirements. The document will be submitted for ARMS COTR review and requirement prioritization. The SRD is a living document and may be updated as approved by FEMA/DHS. Please note that ARMS will be implemented using an existing software system or package system therefore the requirements identified in this document are at a much higher level than if ARMS were to be built from scratch. Booz Allen Hamilton 1-1
5 1.3 Document Overview This document is organized into three major sections. Section 1 (Introduction) defines the background of the ARMS and the purpose of this document. Section 2 (System Overview) provides a high-level overview of the ARMS and its functions. Section 3 (Detailed Requirements) lists the functional and operational requirements the ARMS must satisfy. Please note that ARMS will be implemented using an existing software system or package system therefore the requirements identified in this document are at a much higher level than if ARMS were to be built from scratch. Booz Allen Hamilton 1-2
6 2 System Overview 2.1 System Concept ARMS is defined as An automated system that assists emergency managers in locating resources to enhance their response to emergencies. Resources include personnel, equipment, and supplies. ARMS is the computerized portion of the National Mutual Aid and Resource Management Initiative that will enhance the mutual aid process. ARMS will be used to enhance current EMAC and mutual aid processes and has four main purposes. They include its use as a: Resource inventory repository. ARMS will maintain a resource inventory of selected Federal, State, and local assets. These assets represent a compilation of the resources that have been typed (have minimum standards which identify common measurable criteria for performance, capability, qualification, or other requirement) by the Department of Homeland Security, FEMA and the National Resource Management Working Group. Users will be able to view, search, and update (as appropriate) the inventory. The repository will contain necessary information about each resource. Users will be able to search the inventory database by attributes such as resource name. The inventory for each resource will include information on how to order the resource. Resource requesting tool. ARMS will enable users to request resources, get approvals, and identify and meet conditions that must be met before an asset can be ordered. Resource ordering tool. ARMS will facilitate the process of resource ordering. A resource can be ordered after it has been identified, it is known to be available, and all approvals and conditions have been granted and met. Resource tracking tool. ARMS will provide asset visibility and accountability information on each resource selected for deployment. This will include where the resource is located, the date/time it was dispatched, its estimated arrival date/time at its destination, and date/time when it is released and returned to the provider. Further, ARMS will identify resources in the inventory that have been ordered/deployed and those deployed and now unavailable for deployment. The resource tracking function will expand to include GPS/GIS and mapping capabilities in the future. The primary system requirement for ARMS is for it to be able to store, search, locate, and display selected resource information for those resource items that have been defined and typed and approved by the DHS/FEMA and the National Resource Management Working Group. Federal, State, and local resources are targeted for inclusion in ARMS. ARMS will be extremely useful to Federal, State, and local users during emergency situations. It will provide direct support to enhance the response and recovery capabilities of the National Incident Management System (NIMS) by providing Booz Allen Hamilton 2-1
7 governments directly impacted by an emergency the opportunity to request and obtain the critical resource they need in a timely manner ARMS will have a report generating capability (candidate reporting capabilities include status, tracking, costing/reimbursement, history, etc). The owner of the resource is responsible for maintaining ARMS information. ARMS will be used to provide supporting documentation/data on resource transactions. This documentation/data will serve as the basis for reimbursement. The actual billing will be accomplished separately, through applicable Federal, State, and local accounting systems. ARMS will have an open architecture and meet the requirements to exist within the DHS/FEMA IT infrastructure. 2.2 High-Level Requirements The ARMS high-level requirements presented here are derived from comments from individuals who participated in National Mutual Aid Working Groups in 2003, Mutual Aid Working Group presentations, and the Resource Typing Effort Pilot State briefings and work sessions. The following is a high-level summary of the ARMS functional requirements: 1. The ARMS will be a secure web-based system. 2. The ARMS system will provide information via the Internet to authorized users. 3. The ARMS system will contain an inventory of resources that have been defined and typed using FEMA/DHS approved definitions. 4. The ARMS system will provide the capability to perform searches on resources in the resource inventory repository. 5. The ARMS system will enable users to request resources via the Internet. 6. The ARMS system will enable users to order resources once they have gone through all the necessary approvals associated with requesting the resource. 7. The ARMS system will enable users to track resources once they have been deployed to an incident. 8. The ARMS system will provide users with a reporting capability. 9. The ARMS system will provide supporting documentation/data on resource transactions that will serve as the basis for reimbursement. 10. The ARMS system will interface with pre-existing systems to keep the resource inventory updated. Booz Allen Hamilton 2-2
8 3 Detailed Requirements 3.1 Functional Requirements The Functional Requirements section contains requirements that are allocated to each ARMS core module. Each requirement is assigned a corresponding identifier as a means to facilitate discussion, tracking, and eventual testing of compliance within the final system implementation Resource Inventory Repository ARMS shall have a resource inventory repository. The following table lists the requirements for the resource inventory. Table Resource Inventory Repository Requirements IR = Inventory Repository IR-0001 IR-0002 IR-0003 IR-0004 IR-0005 IR-0006 IR-0007 IR-0008 IR-0009 IR-0010 IR-0011 IR-0012 IR-0013 IR-0014 IR-0015 IR-0016 The system shall maintain an inventory of resources. The system shall maintain resource items that have been defined and typed as approved by the DHS/FEMA and the National Resource Management Working Group. The system shall display and store standardized resource definitions for personnel requirements such as number and skills sets. The system shall display and store a resource s weight. The system shall display and store standardized resource s dimension. The system shall display and store digital photos of resources. The system shall display and store standardized resource functions. The system shall display and store resource capabilities. The system shall display and store resource certifications. The system shall display and store resource credentials. The system shall display and store a mnemonic code for a resource. The system shall display and store the resource brand. The system shall display and store the resource name. The system shall display and store resource sustainability requirements for each resource such as operational hours, logistical support, and replacement crews, if applicable. The system shall display and store resource restrictions such as intrastate use, interstate use, radius of availability, requirements to have access (ex. Federal disaster declaration) etc. The system shall display and store resource staging area requirements. Booz Allen Hamilton 3-1
9 IR = Inventory Repository IR-0017 IR-0018 IR-0019 IR-0020 IR-0021 IR-0022 IR-0023 IR-0024 IR-0025 IR-0026 IR-0027 IR-0028 IR-0029 IR-0030 IR-0031 IR-0032 IR-0033 IR-0034 IR-0035 IR-0036 IR-0037 IR-0038 IR-0039 IR-0040 IR-0041 IR-0042 IR-0043 The system shall display and store resource status (available, unavailable, committed). The system shall display and store resource location. The system shall display the distance to the incident site (road mileage from ZIP code). The system shall display and store the time required to prepare/position resource for deployment. The system shall display and store resource deployment options (road, rail, air, barge). The system shall display and store resource Point of Contact information. The system shall display and store resource Agency ownership information. The system shall display and store links between dependant resources The system shall display instructions on how to obtain a resource. The system shall display instructions for release and return of a resource. The system shall display resource reimbursement costs. The system shall display the resource reimbursement process. The system shall only display resources from participating entities. The system shall allow users to designate resource delivery method. The system shall enable users to enter resource data. The system shall display resource suggestions. Deleted The system shall allow for the updating of resource records. The system shall track resource depreciation. The system shall enable the user to view resources from approved private contractors. The system shall display private contractor POC information. The system shall display private contractor capabilities. The system shall display private contractor geographical areas. The system shall display point of contact information for team leaders. The system shall display point of contact information for team members. The system shall grant the states the responsibility for validating input from local jurisdictions. The system shall contain up to date copies of mutual aid agreements and compacts. The system shall maintain resource items that have not been defined and typed as approved by the DHS/FEMA and the National Resource Management Working Group. Booz Allen Hamilton 3-2
10 Search ARMS will provide users the ability to search the resource inventory. The following table identifies the search requirements Формат: Список Table Search Requirements SR = Search SR-0001 SR-0002 SR-0003 SR-0004 SR-0005 SR-0006 SR-0007 SR-0008 SR-0009 SR-0010 SR-0011 SR-0012 SR-0013 SR-0014 SR-0015 SR-0016 SR-0017 SR-0018 SR-0019 SR-0020 SR-0021 SR-0022 The system shall enable users to search the resource inventory. The system shall enable users to search by resource name. The system shall enable users to search for resources by brand. The system shall enable users to search by resource location. The system shall enable users to search for resources by deployed location. The system shall enable users to search resources by owner. The system shall enable users to search by type of incident (example: hurricane, flood, fire, etc.). The system shall allow users to look beyond their geographic area for resources. The system shall enable users to search for resources by emergency function. The system shall enable users to search for resources by resource kind. The system shall enable users to search for resources by resource type. The system shall enable users to search for resources by free text. The system shall enable users to search for resources by zip code. The system shall enable users to search for resources by distance from incident site. The system shall enable users to search for resources by jurisdiction. The system shall enable users to search for resources by capability. The system shall enable users to search by GIS capability. Deleted. Moved to Mapping The system shall enable users to search by mnemonic code. The system shall allow users to search by all fields on the inventory data form. The system shall allow users to sort results by distance from incident site. The system shall enable users to search for resources by associated aliases. The system shall enable users to search by previous incidents. Booz Allen Hamilton 3-3
11 Resource Requesting ARMS should allow users to request resources. The following table identifies the resource requesting requirements. Формат: Список Table Resource Requesting Requirements RQ = Resource Requesting RQ-0001 RQ-0002 RQ-0003 RQ-0004 RQ-0005 RQ-0006 RQ-0007 RQ-0008 RQ-0009 RQ-0010 RQ-0011 RQ-0012 The system shall allow a user to request resources. The system shall allow for the requesting of parts of teams. The system shall allow for the approval of mixed teams from different readiness levels. Deleted The system shall display approved requests on resources. The system shall display denied requests on resources. The system shall allow for the acceptance of requests. The system shall allow for the rejection of requests. The system shall generate confirmations of a resource request approval. The system shall generate confirmations of a resource request denial. The system shall allow for multiple requests on un-deployed resources. The system shall display a user s requested resources. The system shall allow the resource owner to refuse a resource request Resource Ordering Once all the approvals have been made, ARMS should enable a user to order resources. The resource ordering requirements are identified in the following table. Формат: Список Table Resource Ordering Requirements RO = Resource Ordering RO-0001 RO-0002 RO-0003 RO-0004 RO-0005 RO-0006 The system shall allow a resource owner to deny a resource order. The system shall notify users of acceptance or denial of resource requests. The system shall allow for the acceptance of resources by the requestor. The system shall allow for the rejection of resources by the requestor. The system shall provide remote access. The system shall be password protected. Booz Allen Hamilton 3-4
12 Resource Tracking ARMS shall track resources once they have been deployed. The following table identifies the resource tracking requirements. Формат: Список Table Resource Tracking Requirements RT = Resource Tracking RT-0001 RT-0002 RT-0003 RT-0004 RT-0005 The system shall track resource movements. The system shall display deployed team locations. The system shall display deployed team mission. The system shall allow for the tracking of resources by GPS location. The system shall change the status of resources from available to unavailable for resources that have been deployed Reporting ARMS will need to have a reporting capability. The reporting requirements can be found in the table below. Формат: Список Table Reporting Requirements RP = Reporting RP-0001 RP-0002 RP-0003 RP-0004 RP-0005 RP-0006 RP-0007 RP-0008 RP-0009 RP-0010 RP-0011 RP-0012 RP-0013 The system shall generate reports of resource request status. The system shall generate reports of resource availability. The system shall generate reports of resource tracking. The system shall generate reports of resources committed. The system shall generate reports of resources billed. The system shall generate reports of resources remaining. The system shall generate reports on who s providing resources by local government. The system shall generate reports on who s providing resources by State government. The system shall generate historical reports of resource use by time of year. The system shall generate historical reports of resource use by emergency function. The system shall generate post remediation resource use reports. The system shall provide reports by incident. The system shall provide reports by requestor. Booz Allen Hamilton 3-5
13 RP = Reporting RP-0014 RP-0015 RP-0016 RP-0017 RP-0018 The system shall provide reports by provider. The system shall generate reports on who s providing resources by Federal government. The system shall generate reports on who s requesting resources by local government. The system shall generate reports on who s requesting resources by State government. The system shall generate reports on who s requesting resources by Federal government Billing Support ARMS will need to support billing functions for reimbursements. The billing support requirements are listed in the table below. Формат: Список Table Billing Support Requirements BS = Billing Support BS-0001 BS-0002 The system shall provide users with supporting reimbursement documentation on resource transactions. The system shall generate resource reimbursement reminders Mapping ARMS will need to a mapping capability. The mapping requirements are listed in the table below. Формат: Список Table Map Requirements MP = Map MP-0001 MP-0002 The system shall enable users to display resources on a map using GIS capability. The system shall incorporate GPS technology to track resources on a map. Формат: Список Booz Allen Hamilton 3-6
14 Technical Requirements This section contains the ARMS technical requirements. Each requirement is assigned a corresponding identifier as a means to facilitate discussion, tracking, and eventual testing of compliance within the final system implementation Operational In addition to the requirements defined for individual features, there are requirements that apply to the overall system. This section describes the functionality relating to system performance, security, and administration. Table Operational Requirements OP = Operational OP-0001 OP-0002 OP-0003 OP-0004 OP-0005 OP-0006 OP-0007 OP-0008 OP-0009 OP-0010 OP-0011 OP-0012 OP-0013 OP-0014 OP-0015 The system shall be web-based. The system shall be accessible from inside and outside of FEMA s LAN/WAN. The system shall provide the capability for users to use their Internet browsers to view, add, and update resource information from the database. The system shall provide a privacy statement. The system shall provide a secure logon to access the web site. The system shall provide different levels of access based upon the user login. The system shall require an alphanumeric password compliant with FEMA requirements. The system shall require users to change their password every 90 days. The system shall lock a user account if the password is incorrectly entered three times consecutively. The system shall encrypt information in compliance with FEMA requirements, i.e. 128-bit SSL encryption. The system shall only contain unclassified data. The system shall provide a user-friendly interface. The system shall be fully backed up daily. The system shall have an open architecture. The system shall meet all the requirements to exist within the DHS/FEMA IT infrastructure. Booz Allen Hamilton 3-7
15 OP = Operational OP-0016 OP-0017 OP-0018 OP-0019 OP-0020 OP-0021 OP-0022 OP-0023 OP-0024 OP-0025 OP-0026 OP-0027 OP-0028 OP-0029 OP-0030 OP-0031 OP-0032 OP-0033 OP-0034 OP-0035 OP-0036 OP-0037 OP-0038 OP-0039 OP-0040 The system shall update to a redundant mirror site on a nightly basis. The system shall be available to users without an Internet connection. The system shall maintain high availability. The system shall accommodate updates via hard media. The system database shall be populated with inventory data from individual states. The system shall incorporate a special training module. The system shall be updated via automated nightly process. The system shall store information in a database. The system shall accommodate the varying approval processes used by states. The system shall display data in real time. The system shall check for data updates when accessed. The system shall display the most recent data available. The system shall accommodate data uploads. The system shall accept updates via . The system shall accept content updates via ed excel spreadsheets. The system shall track users based on personal profile. The system shall require users to enter their first and last name. The system shall require users to enter their location. The system shall track users based on their geographic location. Deleted. The system shall allow users to change their location in their personal profile. The system shall recognize a user s location based on their profile information. The system shall be Section 508 compliant. The system shall comply with all security requirements outlined by DHS Capital Planning and Investment Control. The system shall comply with all privacy requirements outlined by DHS Capital Planning and Investment Control. The system shall meet all requirements for FEMA IT accreditation User Roles and Groups The following table contains the ARMS requirements pertaining to user roles and groups. Формат: Список Table User Roles and Group Requirements Booz Allen Hamilton 3-8
16 UR = User Roles and Groups UR-0001 UR-0002 UR-0003 UR-0004 UR-0005 UR-0006 UR-0007 UR-0008 UR-0009 UR-0010 UR-0011 UR-0012 UR-0013 UR-0014 UR-0015 UR-0016 UR-0017 UR-0018 UR-0019 The system shall allow local, state and federal officials to request and order resources. The system shall accommodate both resource providers and requestors. The system shall differentiate between Federal, State, and Local Government users. The system shall contain different user types. The system shall enforce special user roles. The system shall provide access to the first responder community. The system shall provide data entry and update rights to local officials. The system shall provide data entry and update rights to state officials. The system shall provide data entry and update rights to federal officials. The system shall provide data entry and update rights to DHS/FEMA officials. The system shall provide data viewing rights to local officials. The system shall provide data viewing rights to state officials. The system shall provide data viewing rights to federal officials. The system shall provide data viewing rights to DHS/FEMA officials. The system shall enable states to restrict access to the system. The system shall make the state the gatekeeper of the State s resources. The system shall only enable the gatekeeper to certify resources. The system shall allow federal POCs to order resources from the system. Deleted. The system shall grant the states the responsibility for validating input from local jurisdictions Data Interface ARMS will pull and push data from existing information systems and databases. The following table contains the requirements that pertain to ARMS data interfaces. Table Data Interface Requirements DI = Data Interface DI-0001 DI-0002 DI-0003 The system shall interface and utilize current existing systems. The system shall be capable of importing data from other systems. The system shall interface with existing mutual aid resource management systems. Booz Allen Hamilton 3-9
17 DI = Data Interface DI-0004 The system shall periodically connect to existing systems to update cost information Hardware The following table contains the list of ARMS hardware requirements. Table Hardware Requirements HW = Hardware HW-0001 HW-0002 HW-0003 The system shall consist of two servers: one to be used as a database server and one to be used as an application server. The system shall consist of a mirrored fail-safe. The system shall utilized Compaq, Dell, or Sun servers based on design requirements. Booz Allen Hamilton 3-10
18 3.2.5 Software The following table contains the list of ARMS software requirements. Table Software Requirements SW = Software SW-0001 SW-0002 SW-0003 SW-0004 SW-0005 SW-0006 The system shall utilize a Windows, Linux, or Solaris operating system based on design requirements. The system shall utilize Apache or IIS web server software as dictated by design requirements. The system shall utilize eauthentication egov project for certificates if certificates are necessary. The system shall utilize an Oracle or SQL Server as dictated by scale to meet the design requirements. The system shall use XML for data exchanges. The system shall utilize ecommerce industry accepted practices for getting data from an external server onto the ARMS server. Booz Allen Hamilton 3-11
Consensus Report: EMAC and EMS Resources for National Disaster Response. (from the June 20, 2007 EMS Stakeholders Meeting in Arlington, VA)
NASEMSO February 26, 2008 Consensus Report: EMAC and EMS Resources for National Disaster Response (from the June 20, 2007 EMS Stakeholders Meeting in Arlington, VA) National Association of State Emergency
More informationEmergency Operations Center Management Exercise Evaluation Guide
Emergency Operations Center Management Exercise Evaluation Guide I respectfully submit the completed Exercise Evaluation Guide for the Canopy Oaks Tabletop Exercise conducted March 25 2010 for the Leon
More informationEmergency Support Function #12 Energy Annex. ESF Coordinator: Support Agencies:
Emergency Support Function #12 Energy Annex ESF Coordinator: Department of Energy Primary Agency: Department of Energy Support Agencies: Department of Agriculture Department of Commerce Department of Defense
More informationKansas City s Metropolitan Emergency Information System (MEIS)
Information- Sharing Interagency Cooperation Resources Management Law Enforcement Fire Emergency Medical Services Public Health Private Sector Kansas City s Metropolitan Emergency Information System (MEIS)
More informationBundling Arrows: Making a Business Case for Adopting an Incident Command System (ICS) 2012 The Flynt Group, Inc.; All Rights Reserved. FlyntGroup.
Bundling Arrows: Making a Business Case for Adopting an Incident Command System (ICS) 2012 The Flynt Group, Inc.; All Rights Reserved FlyntGroup.com Flynt Group White Paper Bundling Arrows: Making a Business
More information2 ESF 2 Communications
2 ESF 2 Communications THIS PAGE LEFT BLANK INTENTIONALLY Table of Contents 1 Introduction... 1 1.1 Purpose and Scope... 1 1.2 Relationship to Other ESF Annexes... 1 1.3 Policies and Agreements... 1 2
More informationEMERGENCY SUPPORT FUNCTION (ESF) 13 PUBLIC SAFETY AND SECURITY
EMERGENCY SUPPORT FUNCTION (ESF) 13 PUBLIC SAFETY AND SECURITY PRIMARY AGENCY: SUPPORT AGENCIES: Savannah-Chatham Metropolitan Police Department Armstrong-Atlantic Campus Police Department Bloomingdale
More informationMemorandum of Agreement
Memorandum of Agreement I. Parties This agreement is entered into between the Disaster Management Electronic Government Initiative (DM Egov) in the Department of Homeland Security (DHS), and the Emergency
More informationSTANDARD OPERATING PROCEDURE Critical Infrastructure Credentialing/Access Program Hurricane Season
STANDARD OPERATING PROCEDURE Critical Infrastructure Credentialing/Access Program Hurricane Season IBERIA PARISH STATE OF LOUISIANA STANDARD OPERATING PROCEDURE Critical Infrastructure Owners/Operators
More informationQuadrennial Homeland Security Review (QHSR) Ensuring Resilience to Disasters
Quadrennial Homeland Security Review (QHSR) Ensuring Resilience to Disasters QHSR Background Implementing Recommendations of the 9/11 Commission Act of 2007 directed DHS to Conduct a Quadrennial Homeland
More informationEmergency Support Function #2 Communications Annex INTRODUCTION. Purpose. Scope. ESF Coordinator: Support Agencies: Primary Agencies:
ESF Coordinator: Homeland Security/National Protection and Programs/Cybersecurity and Communications Primary Agencies: Homeland Security/National Protection and Programs/Cybersecurity and Communications
More informationSection 1 Metrics: Community Adoption
FY07 NIMS Compliance Metrics: Local/Tribal Section 1 Metrics: Community Adoption Compliance Requirement: Adopt NIMS at the community level for all government departments and agencies; as well as promote
More informationNational Preparedness System (NPS) Kathleen Fox, Acting Assistant Administrator National Preparedness Directorate, FEMA April 27, 2015
National Preparedness System (NPS) Kathleen Fox, Acting Assistant Administrator National Preparedness Directorate, FEMA April 27, 2015 The Post Katrina Emergency Management Reform Act (2006) Required the
More informationI. PURPOSE III. PROCEDURE
A.R. Number: 2.11 Effective Date: 2/1/2009 Page: 1 of 5 I. PURPOSE This policy outlines the procedures that third party organizations must follow when connecting to the City of Richmond (COR) networks
More informationVMware vcloud Air Accelerator Service
DATASHEET AT A GLANCE The VMware vcloud Air Accelerator Service assists customers with extending their private VMware vsphere environment to a VMware vcloud Air public cloud. This Accelerator Service engagement
More informationMULTI-AGENCY COORDINATION SYSTEM PUBLICATION RESOURCE DESIGNATION SYSTEM FORMS PACKET MACS 400-3
MULTI-AGENCY COORDINATION SYSTEM PUBLICATION RESOURCE DESIGNATION SYSTEM FORMS PACKET MACS 400-3 JULY 1, 2009 This document contains information relative to the Incident Command System (ICS) component
More informationUnit 5: Multiagency Coordination. Visual 5.1 Multiagency Coordination
Unit 5: Multiagency Coordination Visual 5.1 Unit Objectives (1 of 2) Describe the kinds of incident/event management problems that can occur due to a lack of multiagency coordination. Define essential
More informationThe Common Controls Framework BY ADOBE
The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.
More informationTechnology Advances in FEMA Response and Recovery to Disasters
Technology Advances in FEMA Response and Recovery to Disasters Homeland Security in Action: Air * Space * Maritime Conference and Showcase Robert J. Fenton, Jr. Director, Disaster Assistance Division Acting
More informationIndustrial Security Facilities Database (ISFD) Job Aid. December 2014
Industrial Security Facilities Database (ISFD) Job Aid December 2014 Page 2 Table of Contents Introduction Logging into ISFD Navigating ISFD Changing Passwords Update My Info Request for Information Submit
More informationSparta Systems TrackWise Solution
Systems Solution 21 CFR Part 11 and Annex 11 Assessment October 2017 Systems Solution Introduction The purpose of this document is to outline the roles and responsibilities for compliance with the FDA
More informationSecurity Architecture
Security Architecture RDX s top priority is to safeguard our customers sensitive information. Introduction RDX understands that our customers have turned over the keys to their sensitive data stores to
More informationData Management and Sharing Plan
1. PURPOSE: Data generated as a result of the response, or germane to the mitigation of the incident, are used to generate a Common Operating Picture (COP) display and provide information for the Situation
More informationDocument Section: 3. Interoperability
METRO REGION 800 MHz Trunked Regional Public Safety Radio System Standards, Protocols, Procedures Document Section: 3. Interoperability Radio TOC Recommendation Guidelines Sub-Section: METRO 3.17.6 Date:
More informationIOWA INCIDENT MANAGEMENT TEAM
THE IOWA INCIDENT MANAGEMENT TEAM Providing Competent and Caring Assistance to Local Agencies 1 What we d like to share with you today: 1. The All-Hazards Incident Management Team (AHIMT) Concept 2. Details
More informationA company built on security
Security How we handle security at Flywheel Flywheel was founded in 2012 on a mission to create an exceptional platform to help creatives do their best work. As the leading WordPress hosting provider for
More informationIA2. Flood (Including Dam Failure)
IA2 Flood (Including Dam Failure) This page left blank intentionally. Marion 2. IA2 - Flood Phase of Activity PRE-INCIDENT PHASE RESPONSE PHASE Flood Incident Checklist Action Items Arrange for personnel
More informationHAMILTON COUNTY EMERGENCY OPERATIONS PLAN ANNEX L - EMERGENCY SUPPORT FUNCTION #12 ENERGY
HAMILTON COUNTY EMERGENCY OPERATIONS PLAN ANNEX L - EMERGENCY SUPPORT FUNCTION #12 ENERGY COORDINATING: SUPPORT: Hamilton County Engineer s Office Duke Energy/Local Public Utility Companies Hamilton County
More informationAutomate sharing. Empower users. Retain control. Utilizes our purposebuilt cloud, not public shared clouds
EXECUTIVE BRIEF SHAREBASE BY HYLAND Automate sharing. Empower users. Retain control. With ShareBase by Hyland, empower users with enterprise file sync and share (EFSS) technology and retain control over
More informationProvider Monitoring Process
Provider Monitoring Process This statewide provider monitoring process is applicable for all providers including direct vendors, Agency with Choice (AWC) Financial Management Services (FMS) providers and
More informationSECURITY & PRIVACY DOCUMENTATION
Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive
More informationPublished Privacy Impact Assessments on the Web. ACTION: Notice of Publication of Privacy Impact Assessments (PIA).
This document is scheduled to be published in the Federal Register on 03/22/2012 and available online at http://federalregister.gov/a/2012-06847, and on FDsys.gov 9110-9L DEPARTMENT OF HOMELAND SECURITY
More informationInteragency Advisory Board HSPD-12 Insights: Past, Present and Future. Carol Bales Office of Management and Budget December 2, 2008
Interagency Advisory Board HSPD-12 Insights: Past, Present and Future Carol Bales Office of Management and Budget December 2, 2008 Importance of Identity, Credential and Access Management within the Federal
More informationMemorandum of Understanding Template for Emergency Alerting to the Public
Memorandum of Understanding Template for Emergency Alerting to the Public 1 Overview 1.1 Background The Integrated Public Alert and Warning System (IPAWS) provides a powerful tool for notifying the public
More informationHEALTHCARE CERTIFICATION APPLICATION For CURENT FPEM s & FAEM s
FLORIDA EMERGENCY PREPAREDNESS ASSOCIATION Applicant: Agency: FPEM-HC FAEM-HC HEALTHCARE CERTIFICATION APPLICATION For CURENT FPEM s & FAEM s February 19, 2017v.1 Applicants are encouraged to work with
More informationOffice for Interoperability and Compatibility Emergency Interoperable Standards Efforts
Office for Interoperability and Compatibility Emergency Interoperable Standards Efforts 8th Annual Technologies for Critical Incident Preparedness Conference and Exposition Chip Hines Director, Office
More informationAfilias DNSSEC Practice Statement (DPS) Version
Afilias DNSSEC Practice Statement (DPS) Version 1.07 2018-02-26 Page 1 of 8 1. INTRODUCTION 1.1. Overview This document was created using the template provided under the current practicing documentation.
More informationTSA/FTA Security and Emergency Management Action Items for Transit Agencies
TSA/FTA Security and Emergency Management Action Items for Transit Agencies AACTION ITEM LIST Management and Accountability 1. Establish Written System Security Programs and Emergency Management Plans:
More informationKenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V3.0, MAY 2017 Multiple Layers of Protection Overview Password Salted-Hash Thank you
More informationFedRAMP: Understanding Agency and Cloud Provider Responsibilities
May 2013 Walter E. Washington Convention Center Washington, DC FedRAMP: Understanding Agency and Cloud Provider Responsibilities Matthew Goodrich, JD FedRAMP Program Manager US General Services Administration
More informationORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers
All Affiliate Research Policy Subject: HIPAA File Under: For Researchers ORA HIPAA Issuing Department: Office of Research Administration Original Policy Date Page 1 of 5 Approved by: May 9,2005 Revision
More informationSparta Systems TrackWise Digital Solution
Systems TrackWise Digital Solution 21 CFR Part 11 and Annex 11 Assessment February 2018 Systems TrackWise Digital Solution Introduction The purpose of this document is to outline the roles and responsibilities
More informationSiebel Project and Resource Management Administration Guide. Siebel Innovation Pack 2013 Version 8.1/8.2 September 2013
Siebel Project and Resource Management Administration Guide Siebel Innovation Pack 2013 Version 8.1/ September 2013 Copyright 2005, 2013 Oracle and/or its affiliates. All rights reserved. This software
More informationRev.1 Solution Brief
FISMA-NIST SP 800-171 Rev.1 Solution Brief New York FISMA Cybersecurity NIST SP 800-171 EventTracker 8815 Centre Park Drive, Columbia MD 21045 About EventTracker EventTracker delivers business critical
More informationCEMA. WebEOC User Guide
CEMA WebEOC User Guide 1 2 Table of Contents Introduction.... Page 4 Logging into WebEOC... Page 5 Control Panel... Page 8 Sign In/Out. Page 11 Position Log... Page 13 Mission/Task... Page 16 Significant
More informationHIPAA Federal Security Rule H I P A A
H I P A A HIPAA Federal Security Rule nsurance ortability ccountability ct of 1996 HIPAA Introduction - What is HIPAA? HIPAA = The Health Insurance Portability and Accountability Act A Federal Law Created
More informationFlorida State University
Florida State University Disaster Recovery & Business Continuity Planning Overview October 24, 2017 1 Key Readiness Questions Has your department identified the business functions and infrastructure that
More informationManatee County Government Administrative Center Commission Chambers, First Floor 9:00 a.m. - August 24, 2017
Manatee County Government Administrative Center Commission Chambers, First Floor 9:00 a.m. - August 24, 2017 August 24, 2017 - Work Session Agenda Item #4 Subject CERT (Community Emergency Response Team)
More informationDEPARTMENT OF HEALTH and HUMAN SERVICES. HANDBOOK for
DEPARTMENT OF HEALTH and HUMAN SERVICES HANDBOOK for FEDERAL ACQUISITION CERTIFICATION PROGRAM/PROJECT MANAGERS Issuer Office of the Secretary Office of the Assistant Secretary for Financial Resources
More informationOverview of KC Resources and Resource Usage
Overview of KC Resources and Resource Usage Overview of KC Resource Allocation (0.00) Introduction (0.01) Module: Overview of KC Resource Allocation Introduction Knowledge Center has a set of tools that
More informationStreamlined FISMA Compliance For Hosted Information Systems
Streamlined FISMA Compliance For Hosted Information Systems Faster Certification and Accreditation at a Reduced Cost IT-CNP, INC. WWW.GOVDATAHOSTING.COM WHITEPAPER :: Executive Summary Federal, State and
More informationFEMA Update. Tim Greten Technological Hazards Division Deputy Director. NREP April 2017
FEMA Update Tim Greten Technological Hazards Division Deputy Director NREP April 2017 FEMA Strategic Priorities Priority 1: Be survivor-centric in mission and program delivery. Priority 2: Become an expeditionary
More informationAdvisory Circular. Subject: INTERNET COMMUNICATIONS OF Date: 11/1/02 AC No.: AVIATION WEATHER AND NOTAMS Initiated by: ARS-100
U.S. Department of Transportation Federal Aviation Administration Advisory Circular Subject: INTERNET COMMUNICATIONS OF Date: 11/1/02 AC No.: 00-62 AVIATION WEATHER AND NOTAMS Initiated by: ARS-100 1.
More informationActions to Improve Chemical Facility Safety and Security A Shared Commitment Report of the Federal Working Group on Executive Order 13650
Actions to Improve Chemical Facility Safety and Security A Shared Commitment Report of the Federal Working Group on Executive Order 13650 President Obama issued Executive Order (EO) 13650 - Improving Chemical
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE Digital Policy Management consists of a set of computer programs used to generate, convert, deconflict, validate, assess
More informationTRACKVIA SECURITY OVERVIEW
TRACKVIA SECURITY OVERVIEW TrackVia s customers rely on our service for many mission-critical applications, as well as for applications that have various compliance and regulatory obligations. At all times
More informationSparta Systems Stratas Solution
Systems Solution 21 CFR Part 11 and Annex 11 Assessment October 2017 Systems Solution Introduction The purpose of this document is to outline the roles and responsibilities for compliance with the FDA
More informationNational Preparedness System. Update for EMForum June 11, 2014
National Preparedness System Update for EMForum June 11, 2014 Approach to National Preparedness Whole community integration Risk-driven Capability-based DRAFT 2 Presidential Policy Directive 8 (PPD) 8
More informationUnified Incident Command and Decision Support (UICDS)
Unified Incident Command and Decision Support (UICDS) UICDS is the middleware foundation that enables information sharing and decision support among commercial and government incident management technologies
More informationNational Incident Management System and National Response Plan. Overview
National Incident Management System and National Response Plan Overview March 2006 HSPD-5: Management of Domestic Incidents HSPD-5 Objectives: Single comprehensive national approach Prevention, Preparedness,
More informationNERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS
NERC CIP VERSION 6 COMPLIANCE BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements
More informationSystem Administrator s Guide Login. Updated: May 2018 Version: 2.4
System Administrator s Guide Login Updated: May 2018 Version: 2.4 Contents CONTENTS... 2 WHAT S NEW IN THIS VERSION 2018R1 RELEASE... 4 Password Retrieval via Email (GDPR Alignment)... 4 Self-Registration
More informationACHIEVING COMPLIANCE WITH NIST SP REV. 4:
ACHIEVING COMPLIANCE WITH NIST SP 800-53 REV. 4: How Thycotic Helps Implement Access Controls OVERVIEW NIST Special Publication 800-53, Revision 4 (SP 800-53, Rev. 4) reflects the U.S. federal government
More informationCyber Security & Homeland Security:
Cyber Security & Homeland Security: Cyber Security for CIKR and SLTT Michael Leking 19 March 2014 Cyber Security Advisor Northeast Region Office of Cybersecurity and Communications (CS&C) U.S. Department
More informationDHS S&T supports National Level Exercise 2011 using SUMMIT
Fall 2011 STANDARD UNIFIED MODELING & MAPPING INTEGRATION TOOLKIT DHS S&T supports National Level Exercise 2011 using SUMMIT SUMMIT provides next-generation exercise capabilities to NLE 11 The Department
More informationSAC PA Security Frameworks - FISMA and NIST
SAC PA Security Frameworks - FISMA and NIST 800-171 June 23, 2017 SECURITY FRAMEWORKS Chris Seiders, CISSP Scott Weinman, CISSP, CISA Agenda Compliance standards FISMA NIST SP 800-171 Importance of Compliance
More informationDATABASE ADMINISTRATOR
DATABASE ADMINISTRATOR Department FLSA Status Reports To Supervises Information Technology Exempt IT Director N/A DISTINGUISHING CHARACTERISTICS: The principal function of an employee in this class is
More informationHomeland Security Perspective on Modeling and Simulation (M&S)
Homeland Security Perspective on Modeling and Simulation (M&S) From Science.Security From Technology.Trust George R. Ryan Director T&E / Standards 2 How is M&S used for Homeland Security? Current Capabilities
More informationNational Level Exercise 2018 After-Action Findings
National Level Exercise 2018 After-Action Findings National Level Exercise (NLE) 2018 examined the ability of all levels of government, private industry, and nongovernmental organizations to protect against,
More informationCriminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud
Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Introduction The Criminal Justice Information Security (CJIS) Policy is a publically accessible document that contains
More informationGoogle Cloud & the General Data Protection Regulation (GDPR)
Google Cloud & the General Data Protection Regulation (GDPR) INTRODUCTION General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation to
More informationAppendix 2 Part A National Security and Emergency Preparedness (NS/EP) Functional Requirements Implementation Plan (FRIP)
Appendix 2 Part A National Security and Emergency Preparedness (NS/EP) Functional Requirements Implementation Plan (FRIP) Part B Assured Service in the National Capital Region DRAFT December 13, 2006 Revision
More informationEpicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017)
Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017) GENERAL TERMS & INFORMATION A. GENERAL TERMS & DEFINITIONS 1. This Services Specification
More informationFIRE CODE ADMINISTRATOR PROGRAM
DEPARTMENT OF FINANCIAL SERVICES Division of State Fire Marshal Bureau of Fire Standards & Training Release Date: December 2012 Revised Date: May 2017 FIRE CODE ADMINISTROR PROGRAM I. Program Overview
More informationMissouri Housing Development Commission Certified Property Management Agent Program
Missouri Housing Development Commission Certified Property Management Agent Program History Over the past few years, MHDC has been working towards establishing a management certification program that fairly
More informationBelarc Product Description
Belarc Product Description BelManage Base Belarc's architecture is based on a single enterprise-wide server and database. There is no requirement to maintain local servers or scanners. Belarc's discovery
More informationNumber: USF System Emergency Management Responsible Office: Administrative Services
POLICY USF System USF USFSP USFSM Number: 6-010 Title: USF System Emergency Management Responsible Office: Administrative Services Date of Origin: 2-7-12 Date Last Amended: 8-24-16 (technical) Date Last
More informationTARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS
Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS
More informationSecurity Standards for Electric Market Participants
Security Standards for Electric Market Participants PURPOSE Wholesale electric grid operations are highly interdependent, and a failure of one part of the generation, transmission or grid management system
More informationArizona Sports Foundation WEBSITE MAINTENANCE & REDESIGN RFP
Arizona Sports Foundation WEBSITE MAINTENANCE & REDESIGN RFP REQUEST FOR PROPOSAL for Website Maintenance, Design & Development for the Arizona Sports Foundation February, 2015 INTRODUCTION The Arizona
More informationSecurity and Compliance at Mavenlink
Security and Compliance at Mavenlink Table of Contents Introduction....3 Application Security....4....4....5 Infrastructure Security....8....8....8....9 Data Security.... 10....10....10 Infrastructure
More informationManaged Security Services - Endpoint Managed Security on Cloud
Services Description Managed Security Services - Endpoint Managed Security on Cloud The services described herein are governed by the terms and conditions of the agreement specified in the Order Document
More informationForeScout Extended Module for VMware AirWatch MDM
ForeScout Extended Module for VMware AirWatch MDM Version 1.7.2 Table of Contents About the AirWatch MDM Integration... 4 Additional AirWatch Documentation... 4 About this Module... 4 How it Works... 5
More informationUniversity of Hawaii Hosted Website Service
University of Hawaii Hosted Website Service Table of Contents Website Practices Guide About These Practices 3 Overview 3 Intended Audience 3 Website Lifecycle 3 Phase 3 Begins 3 Ends 3 Description 3 Request
More informationNORTH CAROLINA EMERGENCY MANAGEMENT CERTIFICATION PROGRAM
NORTH CAROLINA EMERGENCY MANAGEMENT CERTIFICATION PROGRAM Developed by the North Carolina Emergency Management Association And the North Carolina Division of Emergency Management Revision # 6 Revision
More informationInformation Security for Mail Processing/Mail Handling Equipment
Information Security for Mail Processing/Mail Handling Equipment Handbook AS-805-G March 2004 Transmittal Letter Explanation Increasing security across all forms of technology is an integral part of the
More informationTelos and Amazon Web Services (AWS): Accelerating Secure and Compliant Cloud Deployments
` Telos and Amazon Web Services (AWS): Accelerating Secure and Compliant Cloud Deployments Telos Corporation 19886 Ashburn Road Ashburn, VA 24445 www.telos.com ` Introduction Telos Corporation and Amazon
More informationParticipant Agreement. Updated December 1, 2016 and approved by the OK-First Advisory Committee
1 Participant Agreement Updated December 1, 2016 and approved by the OK-First Advisory Committee 1. Eligibility Participation in the OK-First program is limited to Oklahoma agencies with jurisdictional
More informationService Description: CNS Federal High Touch Technical Support
Page 1 of 1 Service Description: CNS Federal High Touch Technical Support This service description ( Service Description ) describes Cisco s Federal High Touch Technical support (CNS-HTTS), a tier 2 in
More informationAchieving a FIPS Compliant Wireless Infrastructure using Intel Centrino Mobile Technology Clients
Achieving a FIPS Compliant Wireless Infrastructure using Intel Centrino Mobile Technology Clients This document is provided as is with no warranties whatsoever, including any warranty of merchantability,
More informationexisting customer base (commercial and guidance and directives and all Federal regulations as federal)
ATTACHMENT 7 BSS RISK MANAGEMENT FRAMEWORK PLAN [L.30.2.7, M.2.2.(7), G.5.6; F.2.1(41) THROUGH (76)] A7.1 BSS SECURITY REQUIREMENTS Our Business Support Systems (BSS) Risk MetTel ensures the security of
More informationSchools and Libraries (E-rate) Program FCC Form 473 User Guide
Schools and Libraries (E-rate) Program FCC Form 473 User Guide 1 Universal Service Administrative Company FCC Form 473 (SPAC) User Guide TABLE OF CONTENTS Contents Purpose of FCC Form 473... 3 Before You
More informationVirtustream Cloud and Managed Services Solutions for US State & Local Governments and Education
Data Sheet Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education Available through NASPO ValuePoint Cloud Services VIRTUSTREAM CLOUD AND MANAGED SERVICES SOLUTIONS
More informationTECHNICAL INFRASTRUCTURE AND SECURITY PANOPTO ONLINE VIDEO PLATFORM
TECHNICAL INFRASTRUCTURE AND SECURITY PANOPTO ONLINE VIDEO PLATFORM CONTENTS Introduction... 3 Architecture... 3 Hardware and Software... 3 Panopto Components/Prerequisites... 3 Amazon Server Locations...
More informationREQUEST FOR PROPOSALS Mobile Application for Public Health Surveillance
TABLE OF CONTENTS: REQUEST FOR PROPOSALS Mobile Application for Public Health Surveillance Part I. Overview Information Part II. Full Text of Announcement Section I. Funding Opportunity Description 1.
More informationConnected Health Principles
Version 2.1 Table of Contents 1 INTRODUCTION... 1 2 TERMINOLOGY... 1 3 CONNECTED HEALTH PRINCIPLES... 4 3.1 CONNECTED HEALTH FOUNDATION PRINCIPLES...5 3.2 CONNECTED HEALTH ARCHITECTURAL PRINCIPLES... 6
More informationVSP18 Venafi Security Professional
VSP18 Venafi Security Professional 13 April 2018 2018 Venafi. All Rights Reserved. 1 VSP18 Prerequisites Course intended for: IT Professionals who interact with Digital Certificates Also appropriate for:
More informationCloud First Policy General Directorate of Governance and Operations Version April 2017
General Directorate of Governance and Operations Version 1.0 24 April 2017 Table of Contents Definitions/Glossary... 2 Policy statement... 3 Entities Affected by this Policy... 3 Who Should Read this Policy...
More informationZENworks Service Desk 8.0 Using ZENworks with ZENworks Service Desk. November 2018
ZENworks Service Desk 8.0 Using ZENworks with ZENworks Service Desk November 2018 Legal Notices For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions,
More informationRailroad Infrastructure Security
TRB Annual Meeting January 14, 2002 Session 107 - Railroad Security William C. Thompson william.thompson@jacobs.com 402-697-5011 Thanks to: Bob Ulrich Dr. William Harris Byron Ratcliff Frank Thigpen John
More information