JSAC DALLAS, TX. Presented by: June E. Martin Raytheon April 2008

Size: px
Start display at page:

Download "JSAC DALLAS, TX. Presented by: June E. Martin Raytheon April 2008"

Transcription

1 JSAC DALLAS, TX Presented by: June E. Martin Raytheon April 2008

2 Objective Provide Overview of JPAS Policy Provide Information Update JPAS e-qip Suitability/Security Investigation Index (SII) e-fingerprinting

3 Procedures Governing Use of JPAS by Cleared Contractors Defense Security Service April 2008 National Industrial Security Program Operating Manual (NISPOM) paragraph 2-200b states that When the CSA [Cognizant Security Agency] has designated a database as the system of record for contractor eligibility and access, the contractor shall be responsible for annotating and maintaining the accuracy of their employees access records. Specific procedures will be provided by the CSA. The Department of Defense, acting as a CSA, has designated the Joint Personnel Adjudication System (JPAS) as the DoD system of record for contractor eligibility and access. JPAS is a U.S. Government information system that contains official government records. The information in JPAS must be protected from unauthorized disclosure and used only for authorized purposes. Contractors may only use their JPAS accounts to manage the access records of their employees and consultants, and to verify the access levels and affiliations (e.g., employee of ABC Company) of incoming visitors who require access to classified information. The following procedures are issued under the authority provided by NISPOM paragraph 2-200b. Contractors shall follow these procedures when using JPAS and shall ensure that authorized users of JPAS have been properly informed about these procedures and any other specific policies governing access to and use of JPAS. 1. Contractors shall accurately maintain the JPAS records pertaining to their employees and consultants. Contractors must expeditiously update these records when changes occur (e.g., termination of employment). 2. Contractors are prohibited from placing false information in JPAS, and DSS will seek appropriate sanctions against contractors and contractor employees who knowingly place false information in JPAS.

4 Procedures Governing Use of JPAS by Cleared Contractors Defense Security Service April DoD issues JPAS accounts exclusively for use by a specific contractor or corporate family of contractors. Persons given access to JPAS as account holders may only use JPAS on behalf of the cleared contractor or corporate family of contractors through which the account was issued. For example, an employee of ABC Company holding a JPAS account issued through ABC Company and who works at a government site is not authorized to use the contractor-granted account in support of the government customer. If the government customer requires the contractor employee to review or update JPAS records on behalf of the government customer, the government customer must provide the JPAS account for the contractor employee to use. 4. The JPAS account manager must be a company employee. The JPAS account manager cannot be a subcontractor or consultant. 5. Contractors may subcontract or obtain consultant support for administering security services. The using contractor will provide a JPAS account to the subcontractor or consultant under the using contractor s Security Management Office (SMO) for the sole purpose of permitting the subcontractor or consultant to provide security services for the using company. Subcontractors or consultants providing such security services must be under the direct supervision of the using contractor s FSO or FSO s designee. 6. Each individual accessing JPAS must have a separate and unique account created by the individual s JPAS account manager. The account manager must maintain a current record of every JPAS account established. 7. JPAS users may never share their user names, passwords, or other authentication information with any other individual, including anyone who is a designee or an alternate to the account holder. 8. Contractors must not allow any practices that include sharing user names, passwords, or other authentication information, and must have policies in place that guard against such practices. Contractors can establish JPAS accounts for additional users when a reasonable need exists.

5 Procedures Governing Use of JPAS by Cleared Contractors Defense Security Service April Access to JPAS is only authorized by means of company or government-owned equipment with appropriate security controls in place. JPAS users may not access their accounts from personal or home computers. 10. Contractors are not permitted to change an existing date notation in JPAS for the Classified Information Nondisclosure Agreement (SF 312). Contractors must, however, input the date that the SF 312 was signed when JPAS does not reflect a date. 11. Contractors are authorized to verify prospective employees eligibility for access to classified information in JPAS prior to an offer of employment being extended. However, contractors may not use JPAS for recruiting purposes. 12. While access to JPAS is only granted to contractors who have a legitimate need for such access in support of classified work being performed for the Government, JPAS is not a classified system. DSS will not grant a facility security clearance (FCL) for the sole purpose of allowing a company or its employees to gain access to JPAS. 13. Any contractor with JPAS access that becomes aware of a violation of these procedures shall immediately report the nature of the violation, the names of the responsible parties, and a description of remedial action taken, to the servicing DSS Industrial Security Representative. NOTE: Violations of the procedures may lead DSS to suspend or withdraw JPAS access, terminate the JPAS account, or exclude culpable companies or persons from access to JPAS for a specified or indefinite period. DSS will also refer information concerning violations of these procedures to other federal agencies for consideration of administrative, civil or criminal sanctions when circumstances warrant.

6 DSS Gateway The JPAS web site and application access point ( has been decommissioned. All related links, application access and information for JPAS will be available by going to The DSS website is the link to all DSS applications. Scroll over Applications and scroll up to JPAS (Joint Personnel Adjudication System) In the future, DSS will allow single sign-on, so once you enter the site, your password and user ID will provide access to all authorized DSS applications.

7 JPAS Login Page Login screen The JPAS home page is the entry point to JPAS. Access to JPAS requires a User ID and Password from your Account Manager. Once your JPAS account has been established, single-click on JPAS Login the JPAS Disclosure screen will open. Agree and log in.

8 Request to Research/Recertify/ Upgrade Eligibility (RRU) Submit an RRU to: Request CAF to research, recertify, or upgrade an individual's eligibility Request SSN Correction (DISCO may request copy of SSN card) You can only submit one RRU per person at a time Any JCAVS user within the same Security Management Office (SMO) can cancel an RRU if it has not yet been assigned to an adjudicator Once cancelled, a JCAVS user can resubmit another RRU Industry RRUs should be submitted to DISCO ONLY

9 Eligibility (RRU) 25% of RRUs are for investigation and/or adjudication status checks RRUs are currently taking days to process Do NOT submit RRUs for status checks - Call the Customer Call You will be notified of RRU changes by one of the following: RRU Response Notification Eligibility Change Notification Message From CAF It s okay to respond to CAF via RRU

10 JCAVS Request to Research/Recertify/Upgrade Eligibility To Cancel RRU Select Cancel Request Then Click Save

11 Incident Reports/Adverse Information Incident Reports allows JCAVS Users to record Incidents and submit electronically to the CAF. Only the JCAVS User that submitted the Incident Report or those with a PSM Net relationship with the Person should be able view the Incident Report details. HOWEVER Any User Level 2-6 can take on a servicing relationship and view Incident Report details. Workaround Submit as Final report. Be sure to print copy before submitting, once submitted, you will not be able to review the report If you need to submit a Followup report, initiate another Incident Report and indicate in the description that this is a follow-up to the Incident Report submitted on yymmdd. RECOMMEND NOT TO SUSPEND ACCESS!!!

12 Person Summary Screen Displays "INCIDENT REPORT" An industrial individual may be in-processed at a new entity and given access Visit requests may be submitted for the subject when there is a pending incident report Instances reported that the location to be visited will not honor the visit request How the visine is applied to take out the red An adjudicator reviews the report Makes a determination on how to resolve reported issues request an investigation, or decide no additional action is necessary When the issue is resolved or determined it is not of adjudicative significance, the adjudicator closes the incident by updating JPAS The red will be removed

13 Security Management Office Establish Internal Higherarchy Parent/Child Relationship Account Management Function Create/Modify/Update information as applicable

14 Establishing a SMO On main menu select: Maintain SMO Enter Search Criteria on SMO you wish to establish Click search or add Enter required information not required but recommended Check designated box if required (i.e., Polygraph)

15 PSM Net Validation From the Main Menu select PSM Net Will take you to JCAVS Maintain PSM Net Screen Select Person Categories by Organization Click Add - Will take you to PSM Net Add Organization Category Hit Select Organization - Will take you to organization search Select DoD Contractor Companies Enter your cage code (plus *) in last box Click Search selected cage will show up Click blue link indicating cage code; company name will move to top line Click OK Will take you back to PSM Net Add Org Click Search Search result will indicate all persons associated with your cage that are not in your PSM Net Determine if each person listed should be in your PSM Net If Yes In-process and indoctrinate If No In-process and out-process using the same date; then go to add/modify screen and enter separation date and separation code. At midnight the person will drop out of your PSM Net and will no longer be associated with your Cage

16 Data Validation Once you ve established your PSM Net, you ll need to validate the data for each person s record Social Security Numbers Eligibility Investigation Date Date of Birth Place of Birth Marital Status Indoctrinations NdA NdS (RRU) (RRU) (RRU) (Change yourself) (Change yourself) (Change yourself) (Change yourself) (Change yourself) (Change yourself)

17 Reports Several different types of reports: Personnel Report Periodic Reinvestigations PSM Net On Demand Reports Can select One or All Organizations within a SMO Can Sort by Name or SSN Can be downloaded into either PDF or Excel file

18 Frequently Asked Questions (FAQs) Posted on the JPAS Website Applicant Tips for Successful e-qip Submission on JPAS web page under Documentation

19 JPAS/e-QIP

20 Prime Contract Numbers (September 2007) You will need to enter a contract number for each Investigation Request It should include the contract number itself as well as the identification of the Govt customer requiring the PCL Examples: NAVY: N D-0014 AIR FORCE: F D-1234 ARMY: SCI: DA D-7819 If requesting an investigation for SCI access or SAP access, enter SCI or SAP between the Govt customer and the contract number If contract number is classified, enter the word Classified in place of the contract number If contract number and Govt identification is classified enter only the word Classified Do not type various or multiple in this field See DSS website for additional information on this subject

21 Break in Service Allows the user to indicate that a Break in Service has occurred for the person. The JCAVS user can indicate when a person has had a Break in Service. The Break in Service allows a new Investigation Request to be submitted for a person even though their investigation date may be current.

22 Break in Service To Select Break in Service Select Eligibility Enter Contract Number Check Break in Service Then Hit Determine Invest Type

23 Signature Pages Signature Pages must be electronically attached to the SF86 before Industry can submit to DISCO Required signature pages include: Certification Page Authorization for Release of Information Medical Release (if subject answers Yes to Question #21) Subject s name now defaults in typed format Rejection rate for incorrect name has been reduced Methods for submission of Signature Pages Fax - can be faxed to JPAS repository by anyone from anywhere Upload - can only be uploaded by JPAS User Uploading appears to be the preferred method Signature Pages not submitted within 60 days of an eqip submission will cause the eqip to terminate

24 PSI Automation Signature Pages FAX FAX (Fax number: ) JPAS uses Optical Character Recognition (OCR) to read the investigation request number from the signature page and associates each fax to the correct Investigation Request and document type. DO NOT USE COVER SHEETS (clogs up the system). JPAS Users can print signature pages from JPAS, or the subject can print them from e-qip once they ve certified their SF86. Faxed documents are stored in the JPAS repository until the Investigation Request is approved. Documents are sent to OPM upon DISCO Approval. Upon DISCO approval, documents are no longer accessible.

25 PSI Automation Signature Pages Upload Upload The JCAVS User can browse and select a document from a local or network drive to upload. Documents must be scanned and saved individually prior to upload. The User identifies the type of document and appropriate Investigation Request through selections in JPAS. Documents are uploaded directly to JPAS in real-time and are not stored in the JPAS document repository. All uploaded documents must be in.pdf format and cannot be larger than 1 mg. Only JPAS Users can upload signature pages, JPAS access is required.

26 Add/Modify Invest. Request Ready for Review, No Documents Note: When you FAX a document the system will read the Investigation Request Number and automatically populate the appropriate document box. Notice the Submit to DISCO button is not available

27 Invest. Request Documents Ready for Review, No Documents When you scan a document, you must select document type and locate the document. Ensure you have a naming scheme which will clearly identify the appropriate document to be uploaded.

28 Add/Modify Investigation Request Documents attached Submit to DISCO button will only be available when required documents are received in JPAS.

29 Invest. Request Documents Ready for DISCO (JAMS and JCAVS) Signature pages can be viewed and replaced in JPAS and are available for review until approved by DISCO. JPAS displays History of received documents - Method (Fax or Upload), Date and Time, Result (Success or Failure)

30 e-qip Timelines Initiating Once an Investigation Request is initiated in JPAS, an applicant has 30 days to login to e-qip and start their PSQ or the Investigation Request is terminated. Once an Investigation Request is initiated in JPAS, an applicant has 90 days after their initial e-qip login date to complete their PSQ or the Investigation Request is terminated. Reviewing and Approving Once the applicant has completed the PSQ, it must be reviewed and approved by the appropriate agency within 90 days or the Investigation Request is terminated. Pending PSQs An Investigation Request that remains in a Pending Status and is not "Initiated" will be deleted 30 days after creation. Stopped PSQs If an applicant has started to complete a PSQ but the Investigation Request is stopped, it must be resumed within 90 days. If the applicant has not started to complete a PSQ, but the Investigation Request is stopped, it must be resumed within 30 days. Revised PSQs An applicant has 60 days to log into e-qip and complete updates to their PSQ if revisions are required.

31 PR Requests &Fingerprint Cards If the previous Investigation is annotated as NACLC or ANACI, the Investigation Request will be recognized as a Periodic Investigation. Fingerprint cards are not required If the previous Investigation is annotated as NAC, ENAC, or NACI, the Investigation Request will NOT be recognized as a Periodic Investigation Request. Fingerprint cards are required. Periodic Reinvestigation = Yes if previous investigation is: NACLC ANACI Periodic Reinvestigation = No if previous investigation is: NAC ENAC NACI

32 Releases and Fingerprint Cards Send fingerprint cards to: Mail: FedEx: e-qip Rapid Response Team OPM-FIPC PO Box 618 Boyers, PA New zip code effective 07/07 e-qip Rapid Response Team OPM-FIPC 1137 Branchton Road Boyers, PA New zip code effective 07/07

33 e-fingerprinting DSS is looking into implementing a store-andforward E-Fingerprint capability that will provide the fingerprint files to OPM Phase I Beta Testing scheduled for end of June Phase II Evaluate results of Beta Test

34 Perform SII Search (SII - Suitability/Security Investigations Index) The information contained on the e-clearance screen is read only and is used to verify the following info: JPAS Person Information Indicates Last Name, SSN and DOB entered by the user to search for a record. SII Person Information Indicates Last Name, SSN and DOB returned by the SII. SII AKA Names Indicates any AKA information returned by the SII. SII Investigation Summary Indicates investigation information returned by SII. SII Clearance Summary Indicates information returned by SII. SII Messages This portion of the screen displays any messages returned by SII. Note. If the OPM SII database is down, the following text will be displayed under "SII Messages:" The OPM CVS/SII System is NOT available *PASSCODE ERROR: When initiating an investigation request and names do not match.

35 SII Search - Status Info (Investigation Summary) RECEIVED - The case has been received at OPM via e-qip and is in the review process prior to being SCHEDULED SCHEDULED - The case is open at OPM and the investigation has started. UNACCEPTABLE - The case does not meet OPM standards and has been rejected. These must be entirely resubmitted. CA CONSIDERED - This is used when during the course of an investigation, information is developed which requires the opening of a new lead that is beyond the normal scope of an investigation at that particular level. It is not necessarily a bad thing, just a need for more information. In some cases OPM uses this when they are waiting for information from outside agencies that has delayed the case. Unlike the CLOSED PENDING designation, these cases are still open and seem to progress reasonably well. CP Closed Pending - The case is closed awaiting information from an outside agency that has taken too long. In some cases this may be due to an inability to perform a subject interview due to deployment of the subject to a location that is not served by OPM. RSI Reopen Security Investigation - When a closed case is reopened as a request from DISCO for additional information before an adjudication is determined.

36 Eligibility Update The NRO is manually loading eligibility info into JPAS for all cases they process effective January 2008 (New and PRs) We no longer have to track the completion to then submit an RRU to DISCO to have the eligibility verified and crossed over Saves Industry time and effort Saves 3-4 months in cycle time RRUs are still required for eligibility updates prior to January 2008 NSA is providing data loads nightly to JPAS and a full refresh of all data once a month

Electronic Questionnaire for Investigation Processing (e-qip) JSAC Workshop April June E. Martin Raytheon

Electronic Questionnaire for Investigation Processing (e-qip) JSAC Workshop April June E. Martin Raytheon Electronic Questionnaire for Investigation Processing (e-qip) JSAC Workshop April 2008 June E. Martin Raytheon 1 Electronic Questionnaire for Investigation Processing (e-qip) JSAC Workshop Acknowledgement

More information

Electronic Submission of Signature Pages Developed by the JPAS Industry Team

Electronic Submission of Signature Pages Developed by the JPAS Industry Team Electronic Submission of Signature Pages Developed by the JPAS Industry Team JAN 07 Page 1 Agenda Overview PSI Automation Signature Pages Fax (Fax number TBD) Upload Screen Shot Review JPAS Questions &

More information

AskPSMO-I. Security Violations Zaakia Bailey Defense Security Service. October 28, :30 PM EST

AskPSMO-I. Security Violations Zaakia Bailey Defense Security Service. October 28, :30 PM EST AskPSMO-I For audio, dial: 1-888-946-3805 Enter participant code: 8672177 Security Violations Zaakia Bailey Defense Security Service October 28, 2014 1:30 PM EST Dashboard Announcements SWFT JPAS OPM PSMO-I

More information

AskPSMO-I. Customer Service Requests Nicholas Levasseur Defense Security Service. August 26, :30 PM EST

AskPSMO-I. Customer Service Requests Nicholas Levasseur Defense Security Service. August 26, :30 PM EST AskPSMO-I For audio, dial: 1-888-989-9786 Enter participant code: 6039400 Customer Service Requests Nicholas Levasseur Defense Security Service August 26, 2014 1:30 PM EST Dashboard Announcements JPAS

More information

Presented by: Mike Ray Personnel Security Management Office for Industry (PSMO-I)

Presented by: Mike Ray Personnel Security Management Office for Industry (PSMO-I) PSMO-I Personnel Security Update July 2016 Presented by: Mike Ray Personnel Security Management Office for Industry (PSMO-I) Functions of the PSMO-I Personnel Clearance Oversight Initiate Investigate Adjudicate

More information

Industrial Security Facilities Database (ISFD) Job Aid. December 2014

Industrial Security Facilities Database (ISFD) Job Aid. December 2014 Industrial Security Facilities Database (ISFD) Job Aid December 2014 Page 2 Table of Contents Introduction Logging into ISFD Navigating ISFD Changing Passwords Update My Info Request for Information Submit

More information

ISFD Release Notices Industrial Security Facilities Database (ISFD) v Metrics Release Notes [Effective February 22, 2014]:

ISFD Release Notices Industrial Security Facilities Database (ISFD) v Metrics Release Notes [Effective February 22, 2014]: ISFD Release Notices Industrial Security Facilities Database (ISFD) v4.0.0.4 Metrics Release Notes [Effective February 22, 2014]: The ISFD system provides a centralized web-based platform for the Industrial

More information

Defense Information System for Security (DISS) Frequently Asked Questions (FAQs)

Defense Information System for Security (DISS) Frequently Asked Questions (FAQs) Defense Manpower Data Center Personnel Security & Assurance Defense Information System for Security (DISS) Frequently Asked Questions (FAQs) Document Version 1.3 28 March 2017 Document History Version

More information

UNCLASSIFIED. Tips and Tricks. November, UNCLASSIFIED

UNCLASSIFIED. Tips and Tricks. November, UNCLASSIFIED UNCLASSIFIED Tips and Tricks November, 19 2018 UNCLASSIFIED User Manual Location Upon logging in, you can access the JVS User Manual by selecting the Help link located at the top left of your screen 2

More information

Secure Web Fingerprint Transaction (SWFT) Access, Registration, and Testing Procedures

Secure Web Fingerprint Transaction (SWFT) Access, Registration, and Testing Procedures Defense Manpower Data Center Personnel Security & Assurance Secure Web Fingerprint Transaction (SWFT) Access, Registration, and Testing Procedures Version 3.2 July 20, 2016 CONTRACT NUMBER GS00Q09BGD0027

More information

Revised 8/15/2013 OIG COMPLIANCE NOW VENDOR PROGRAM INSTRUCTION MANUAL 1. REGISTRATION 2. TERMS AND CONDITIONS 3. PAYMENT

Revised 8/15/2013 OIG COMPLIANCE NOW VENDOR PROGRAM INSTRUCTION MANUAL 1. REGISTRATION 2. TERMS AND CONDITIONS 3. PAYMENT OIG COMPLIANCE NOW VENDOR PROGRAM INSTRUCTION MANUAL 1. REGISTRATION 2. TERMS AND CONDITIONS 3. PAYMENT 4. LOGIN 5. ADD USERS 6. UPLOAD EMPLOYEE DATA 7. INVESTIGATION 8. REPORTING 9. EXCLUSIONS 10. W-9

More information

Enterprise Income Verification (EIV) System User Access Authorization Form

Enterprise Income Verification (EIV) System User Access Authorization Form Enterprise Income Verification (EIV) System User Access Authorization Form Date of Request: (Please Print or Type) PART I. ACCESS AUTHORIZATION * All required information must be provided in order to be

More information

INSTRUCTION MANUAL OIGCN VENDOR PROGRAM

INSTRUCTION MANUAL OIGCN VENDOR PROGRAM INSTRUCTION MANUAL OIGCN VENDOR PROGRAM REGISTRATION TERMS AND CONDITIONS PAYMENT LOGIN ADD USERS UPLOAD EMPLOYEE DATA INVESTIGATION REPORTING EXCLUSIONS W-9 FORM REGISTRATION Go to Home page: http://www.sanctionscreeningnow.com

More information

UNCLASSIFIED. Tips and Tricks. August 20, 2018 UNCLASSIFIED

UNCLASSIFIED. Tips and Tricks. August 20, 2018 UNCLASSIFIED UNCLASSIFIED Tips and Tricks August 20, 2018 UNCLASSIFIED User Manual Location Upon logging in, you can access the JVS User Manual by selecting the Help link located at the top left of your screen 2 Provisioning

More information

Wide Area Network Approvals Memorandum of Understanding SIPRNET. JSAC Dallas Fort Worth April JD Springer

Wide Area Network Approvals Memorandum of Understanding SIPRNET. JSAC Dallas Fort Worth April JD Springer Wide Area Network Approvals Memorandum of Understanding SIPRNET JSAC Dallas Fort Worth 16 17 April 2008 JD Springer There are essentially two types of WAN connections Those where some other Agency is the

More information

ECA Trusted Agent Handbook

ECA Trusted Agent Handbook Revision 8.0 September 4, 2015 Introduction This Trusted Agent Handbook provides instructions for individuals authorized to perform personal presence identity verification of subscribers enrolling for

More information

COVERED CALIFORNIA ENROLLMENT ASSISTANCE PROGRAM

COVERED CALIFORNIA ENROLLMENT ASSISTANCE PROGRAM This document outlines all features and functions available to Entity Business Contacts in the Certification Portal. It details the functions that you as an Entity User have including the account registration

More information

Secure Web Fingerprint Transaction (SWFT) Frequently Asked Questions

Secure Web Fingerprint Transaction (SWFT) Frequently Asked Questions Defense Manpower Data Center Personnel Security and Assurance Secure Web Fingerprint Transaction (SWFT) Frequently Asked Questions Version 1.4 March 1, 2017 Contract Number: GS00Q09BGD0027 Task Order:

More information

Federal Vendor Portal & e-invoicing User Guide. January 2018

Federal Vendor Portal & e-invoicing User Guide. January 2018 Federal Vendor Portal & e-invoicing User Guide January 2018 Federal Vendor Portal IMPORTANT NOTICE TO: Deloitte s Federal Practice Suppliers As part of our due diligence to pre-qualify suppliers for potential

More information

PCORI Online: Awardee User Guide Research Awards

PCORI Online: Awardee User Guide Research Awards PCORI Online: Awardee User Guide Research Awards Updated as of 1/31/18 1 Table of Contents Section 1: Introduction to PCORI Online... 3 1.1 Getting Started - Tips for Using PCORI Online... 4 1.2 Logging

More information

Table of Contents. Overview of the TEA Login Application Features Roles in Obtaining Application Access Approval Process...

Table of Contents. Overview of the TEA Login Application Features Roles in Obtaining Application Access Approval Process... TEAL Help Table of Contents Overview of the TEA Login Application... 7 Features... 7 Roles in Obtaining Application Access... 7 Approval Process... 8 Processing an Application Request... 9 The Process

More information

Virginia Commonwealth University School of Medicine Information Security Standard

Virginia Commonwealth University School of Medicine Information Security Standard Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Personnel Security Standard This standard is applicable to all VCU School of Medicine personnel. Approval

More information

DEFENSE SECURITY SERVICE PRIVACY IMPACT ASSESSMENT GUIDANCE AND TEMPLATE

DEFENSE SECURITY SERVICE PRIVACY IMPACT ASSESSMENT GUIDANCE AND TEMPLATE DEFENSE SECURITY SERVICE PRIVACY IMPACT ASSESSMENT GUIDANCE AND TEMPLATE Version 1.0 28 October 2008 1 DSS PRIVACY IMPACT ASSESSMENT For Industrial Security Facilities Database (ISFD) Project Identifying

More information

FCC USAC Joint Training Event

FCC USAC Joint Training Event FCC USAC Joint Training Event Certification and Recertification June 19, 2012 Washington, DC To edit this footer, select the View tab, then Slide Master and edit the first Master Slide. 1 Initial Certification

More information

Emsi Privacy Shield Policy

Emsi Privacy Shield Policy Emsi Privacy Shield Policy Scope The Emsi Privacy Shield Policy ( Policy ) applies to the collection and processing of Personal Data that Emsi obtains from Data Subjects located in the European Union (

More information

Private Sector Clearance Program (PSCP) Webinar

Private Sector Clearance Program (PSCP) Webinar Private Sector Clearance Program (PSCP) Webinar Critical Infrastructure Protection Committee November 18, 2014 Nathan Mitchell, ESCC Clearance Liaison Agenda History NERC CIPC Private Sector Clearance

More information

Application and Instructions for Firms

Application and Instructions for Firms United States Environmental Protection Agency Office of Prevention Pesticides, and Toxic Substances EPA 747-B-99-001 March 2010 https://www.epa.gov/lead Application and Instructions for Firms Applying

More information

Defense Security Service

Defense Security Service Office of the Chief Information Officer National Industrial Security Program (NISP) Central Access Information Security System (NCAISS) Project HS0021-15-F-0111 CICN: 0000-DOC-GD-27588-00 November 29,

More information

403(b) & 457 TPA Participant Website Instructions

403(b) & 457 TPA Participant Website Instructions 403(b) & 457 TPA Participant Website Instructions 403(b) & 457 TPA Participant Website Instructions In order to access the website via the login page (above), please do the following: Go to the main Envoy

More information

EXCEL HEALTHCARE STAFFING AND REFERRAL AGENCY

EXCEL HEALTHCARE STAFFING AND REFERRAL AGENCY APPLICATION FOR EMPLOYMENT (Please Fill Out Completely) Date of Application Social Security Number / / Print Full Name Home Phone: Mobile: Email: Address City State Zip Code Position Applied For Documents

More information

Texas Department of Family and Protective Services

Texas Department of Family and Protective Services Texas Department of Family and Protective Services Automated Background Check System (ABCS) User Guide Updated April 2018 Table of Contents DFPS AUTOMATED BACKGROUND CHECK SYSTEM (ABCS) USER MANUAL Summary

More information

System Administration Guide

System Administration Guide System Administration Guide 1. Access Commander 7. System Profile 2. Getting Started 8. User Monitor 3. System Utilities 9. User Profile 4. Facility Info Appendix A: JPAS Data Import/ Refresh Configuration

More information

Medicare Enrollment Application Submission Options

Medicare Enrollment Application Submission Options The Basics of Internet-based Provider Enrollment, Chain and Ownership System (PECOS) for Durable Medical Equipment, Prosthetics, Orthotics, and Supplies (DMEPOS) Suppliers Beginning October 4, 2010, the

More information

Child Care Civil Background Check System (CCCBC System) User Manual for Providers and Approved Entities

Child Care Civil Background Check System (CCCBC System) User Manual for Providers and Approved Entities Child Care Civil Background Check System (CCCBC System) User Manual for Providers and Approved Entities Issue Date: March 13, 2019 1 Table of Contents Overview of the Child Care Criminal Background Check

More information

Child Care Civil Background Check System (CC-CBC System) User Manual for Providers and Approved Entities

Child Care Civil Background Check System (CC-CBC System) User Manual for Providers and Approved Entities Child Care Civil Background Check System (CC-CBC System) User Manual for Providers and Approved Entities Issue Date: March 5, 2018 Table of Contents Overview of Changes 3 New Child Care Criminal Background

More information

Appendix 3: Subscribing Entity Reference Guide to NGI s Rap Back Service Version 2.1 June 1, 2014

Appendix 3: Subscribing Entity Reference Guide to NGI s Rap Back Service Version 2.1 June 1, 2014 Appendix 3: Subscribing Entity Reference Guide to NGI s Rap Back Service Version 2.1 June 1, 2014 Note to Submitters: The information in this document is provided for you to use in any manner most appropriate

More information

NFAAS. Navy Family Member s Guide

NFAAS. Navy Family Member s Guide NAVY FAMILY ACCOUNTABILITY AND ASSESSMENT SYSTEM NFAAS Version 2.2 Navy Family Member s Guide Version 1.3 11 February 2008 SPAWAR Systems Center Pacific 53560 Hull Street, Code 53255 San Diego CA 92152-5000

More information

Oracle Banking Digital Experience

Oracle Banking Digital Experience Oracle Banking Digital Experience Checking Account Originations User Manual Release 18.2.0.0.0 Part No. E97823-01 June 2018 Checkings Account Originations User Manual June 2018 Oracle Financial Services

More information

QNB Bank-ONLINE AGREEMENT

QNB Bank-ONLINE AGREEMENT This is an Agreement between you and QNB Bank ("QNB"). It explains the rules of your electronic access to your accounts through QNB Online. By using QNB-Online, you accept all the terms and conditions

More information

RFM Procedure 3: Certification Body Approval for Chain of Custody Standard. Alaska Responsible Fisheries Management (RFM) Certification Program 17065

RFM Procedure 3: Certification Body Approval for Chain of Custody Standard. Alaska Responsible Fisheries Management (RFM) Certification Program 17065 RFM Procedure 3: Certification Body Approval for Chain of Custody Standard Alaska Responsible Fisheries Management (RFM) Certification Program 17065 RFM Version 4, Jan 2018 1 1.0 Purpose This document

More information

Screening Point Army Master Screener Product Quality Deficiency Report (PQDR) Processing In Product Data Reporting and Evaluation Program (PDREP)

Screening Point Army Master Screener Product Quality Deficiency Report (PQDR) Processing In Product Data Reporting and Evaluation Program (PDREP) Screening Point Army Master Screener Product Quality Deficiency Report (PQDR) Processing In Product Data Reporting and Evaluation Program (PDREP) User Guide February 2018 Table of Contents FOREWORD 1 INTRODUCTION

More information

Oracle Banking Digital Experience

Oracle Banking Digital Experience Oracle Banking Digital Experience US Originations Checking Account User Manual Release 17.1.0.0.0 Part No. E83887-01 March 2017 US Originations Checking Account User Manual March 2017 Oracle Financial

More information

Managed Access Gateway. Request Management Guide (For Administrators)

Managed Access Gateway. Request Management Guide (For Administrators) Managed Access Gateway Request Management Guide (For Administrators) Version 2.0 Exostar, LLC October 14, 2013 Table of Contents Purpose...1 Overview...2 Organization Administrator Tasks...3 Verify User's

More information

User Manual for. Architect-Engineer Contract Administration Support System (ACASS) And Construction Contractor Appraisal Support System (CCASS)

User Manual for. Architect-Engineer Contract Administration Support System (ACASS) And Construction Contractor Appraisal Support System (CCASS) User Manual for Architect-Engineer Contract Administration Support System (ACASS) And Construction Contractor Appraisal Support System (CCASS) November 2012 Current Version 3.11.0 HTTPS://WWW.CPARS.GOV

More information

CONTENTS. SETUP SECURITY ENHANCEMENTS Existing User New User (Enrolled by Employer or Self)... 18

CONTENTS. SETUP SECURITY ENHANCEMENTS Existing User New User (Enrolled by Employer or Self)... 18 FSA EMPLOYEE WEBSITE GUIDE CONTENTS BROWSER COMPATIBILITY... 2 ONLINE ENROLLMENT... 3 Online Enrollment Process... 3 Online Enrollment Option for Existing Employees... 11 REGISTERING YOUR ACCOUNT FOR ONLINE

More information

Product Data Reporting and Evaluation Program (PDREP) Automated Information System (AIS) Corrective Action Record (CAR)

Product Data Reporting and Evaluation Program (PDREP) Automated Information System (AIS) Corrective Action Record (CAR) Product Data Reporting and Evaluation Program (PDREP) Automated Information System (AIS) Corrective Action Record (CAR) User Guide May 2018 TABLE OF CONTENTS FOREWORD 3 INTRODUCTION 4 1. CORRECTIVE ACTION

More information

Texas Department of Family and Protective Services

Texas Department of Family and Protective Services Texas Department of Family and Protective Services Automated Background Check System (ABCS) User Guide Updated November 2016 Table of Contents DFPS AUTOMATED BACKGROUND CHECK SYSTEM (ABCS) USER MANUAL

More information

Common Operating Environment (COE) Platform Certification Program. Certification Policy

Common Operating Environment (COE) Platform Certification Program. Certification Policy Common Operating Environment (COE) Platform Certification Program Certification Policy February 2004 Version 2.0 Copyright February 2004, The Open Group All rights reserved. No part of this publication

More information

Oracle Banking Digital Experience

Oracle Banking Digital Experience Oracle Banking Digital Experience Checking Account Originations User Manual Release 17.2.0.0.0 Part No. E88573-01 July 2017 Checkings Account Originations User Manual July 2017 Oracle Financial Services

More information

EDENRED COMMUTER BENEFITS SOLUTIONS, LLC PRIVACY POLICY. Updated: April 2017

EDENRED COMMUTER BENEFITS SOLUTIONS, LLC PRIVACY POLICY. Updated: April 2017 This Privacy Policy (this Privacy Policy ) applies to Edenred Commuter Benefits Solutions, LLC, (the Company ) online interface (i.e., website or mobile application) and any Edenred Commuter Benefit Solutions,

More information

Product Data Reporting and Evaluation Program (PDREP) Automated Information System (AIS) Prime Contractor Module

Product Data Reporting and Evaluation Program (PDREP) Automated Information System (AIS) Prime Contractor Module Product Data Reporting and Evaluation Program (PDREP) Automated Information System (AIS) Prime Contractor Module User Guide February 2018 Table of Contents FOREWORD 1 INTRODUCTION 2 1 ACCESSING THE PDREP-AIS

More information

CHAP LinQ User Guide. CHAP IT Department Community Health Accreditation Partner 1275 K Street NW Suite 800 Washington DC Version 1.

CHAP LinQ User Guide. CHAP IT Department Community Health Accreditation Partner 1275 K Street NW Suite 800 Washington DC Version 1. 2015 CHAP LinQ User Guide CHAP IT Department Community Health Accreditation Partner 1275 K Street NW Suite 800 Washington DC 2005 Version 1.1 CHAP LINQ USER GUIDE - OCTOBER 2015 0 Table of Contents ABOUT

More information

DFARS Cyber Rule Considerations For Contractors In 2018

DFARS Cyber Rule Considerations For Contractors In 2018 Portfolio Media. Inc. 111 West 19 th Street, 5th Floor New York, NY 10011 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com DFARS Cyber Rule Considerations For Contractors

More information

Rhode Island Medicaid Provider Enrollment User Guide. Executive Office of Health and Human Services Medicaid

Rhode Island Medicaid Provider Enrollment User Guide. Executive Office of Health and Human Services Medicaid Rhode Island Executive Office of Health and Human Services Medicaid Ordering, Prescribing, Referring Provider User Guide Version 1.0 DXC Technology PR0123 V1.0 06/19/2017 Rhode Island Page 1 of 24 Revision

More information

Licensure and Certification Tracking System (LACTS) User Manual. July 2013

Licensure and Certification Tracking System (LACTS) User Manual. July 2013 Licensure and Certification Tracking System (LACTS) User Manual July 2013 Contents Overview... 2 Who this document is for?... 2 Supported Browsers... 2 Internet Explorer 9 Settings... 2 Search Facility

More information

Voya s Distributions with EASE User Guide

Voya s Distributions with EASE User Guide Voya s Distributions with EASE User Guide Version 3.13 February 2018 Table of Contents Page Introduction / How Does it Work?... 3 When is Paperwork Required?... 4 Participant Online Reacceptance... 4 Security

More information

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY 2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY Purpose: The purpose of this policy is to provide instruction and information to staff, auditors, consultants, contractors and tenants on

More information

Prevention of Identity Theft in Student Financial Transactions AP 5800

Prevention of Identity Theft in Student Financial Transactions AP 5800 Reference: Fair and Accurate Credit Transactions Act (Pub. L. 108-159) The Board recognizes that some activities of the Shasta-Tehama-Trinity Joint Community College District, "District," are subject to

More information

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS?

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS? FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? Financial companies choose how they share your personal information. Federal law gives consumers the right to limit

More information

Development Application Online. HowTo guide for applicants

Development Application Online. HowTo guide for applicants Development Application Online HowTo guide for applicants Disclaimer While every reasonable effort has been made to ensure that this document is correct at the time of printing, the State of NSW, its agents

More information

Course Outline Repository Guide

Course Outline Repository Guide Contents... 1 How do I access the Course Outline Repository?... 1 How do I use the Course Outline Repository?... 2 How do I search the Course Repository?... 2 Where do I download the course outline?...

More information

Loan Closing Advisor SM. User Guide. December 2017

Loan Closing Advisor SM. User Guide. December 2017 Loan Closing Advisor SM User Guide December 2017 Notice This User Guide is Freddie Mac s CONFIDENTIAL INFORMATION as defined in and subject to the provisions of the Freddie Mac Single Family Seller/Servicer

More information

INFORMATION SYSTEM SECURITY

INFORMATION SYSTEM SECURITY INFORMATION SYSTEM SECURITY For Users of Classified Information Systems (IS) 1 Disclaimer This briefing is generic in nature and should be used as a guideline for briefing System Users. 2 Overview Acronyms

More information

Voya s Distributions with EASE

Voya s Distributions with EASE Voya s Distributions with EASE User Guide for Third Party Administrators Version 3.10 November 2016 Table of Contents Introduction. 3 When is Paperwork Required. 3 Security Roles... 3 How does It Work

More information

Shaw Privacy Policy. 1- Our commitment to you

Shaw Privacy Policy. 1- Our commitment to you Privacy Policy last revised on: Sept 16, 2016 Shaw Privacy Policy If you have any questions regarding Shaw s Privacy Policy please contact: privacy@shaw.ca or use the contact information shown on any of

More information

GETS Procurement Officer Guide. School Infrastructure. Education Infrastructure Service (EIS)

GETS Procurement Officer Guide. School Infrastructure. Education Infrastructure Service (EIS) Education Infrastructure Service (EIS) GETS Procurement Officer Guide School Infrastructure School Property Procurement GETS Procurement Officer Guide 2017-2 Page 1 of 19 Index Section Page 1. Glossary

More information

INDUSTRIAL SECURITY. 1. (1-200) Security for Wireless Devices, Services and Technologies (ISL 05L-1 #10)

INDUSTRIAL SECURITY. 1. (1-200) Security for Wireless Devices, Services and Technologies (ISL 05L-1 #10) DEPARTMENT OF DEFENSE DEFENSE SECURITY SERVICE, INDUSTRIAL SECURITY PROGRAM OFFICE INDUSTRIAL SECURITY LETTER Industrial Security letters will be issued periodically to inform Industry, User Agencies and

More information

DSS/International Division Overseas - Request for Visit Instruction

DSS/International Division Overseas - Request for Visit Instruction This form has two separate Annex documents: Request for Visit Annex 1, (additional facilities) Request for Visit Annex 2, (additional names) DSS/International Division Overseas - Request for Visit Instruction

More information

Electronic Subcontracting Reporting System (esrs) Department of Defense Government Training

Electronic Subcontracting Reporting System (esrs)  Department of Defense Government Training 0 Electronic Subcontracting Reporting System (esrs) http://www.esrs.gov Department of Defense Government Training 1 Submitting an Individual Subcontracting Report (ISR) 2 Subcontracting Program: The Basics

More information

Applicant User Guide

Applicant User Guide Washington Headquarters Services Mass Transportation Benefit Program (MTBP) Web Application Applicant User Guide June 2011 SW Release Version 1.3 User Guide Version 1.6 Table of Contents 1. Introduction...

More information

How To Apply for a State Job Opening

How To Apply for a State Job Opening How To Apply for a State Job Opening DAS Statewide Human Resources Management Talent Acquisition Team July 12, 2018 2 Application Process Prepare View Job Openings Apply Get Hired What Materials & Resources

More information

Oracle Insurance QuickView Service Ordering User Guide. Version 8.0

Oracle Insurance QuickView Service Ordering User Guide. Version 8.0 Oracle Insurance QuickView Service Ordering User Guide Version 8.0 February 2009 Oracle Insurance QuickView Service Ordering User Guide Version 8.0 Part # E14966-01 Library # E14885-01 E14886-01 February

More information

1 Privacy Statement INDEX

1 Privacy Statement INDEX INDEX 1 Privacy Statement Mphasis is committed to protecting the personal information of its customers, employees, suppliers, contractors and business associates. Personal information includes data related

More information

American Association for Laboratory Accreditation

American Association for Laboratory Accreditation R311 - Specific Requirements: Federal Risk and Authorization Management Program Page 1 of 10 R311 - Specific Requirements: Federal Risk and Authorization Management Program 2017 by A2LA. All rights reserved.

More information

COMPLIANCE INFORMATION SYSTEM. Vendor/Consultant. User Guide

COMPLIANCE INFORMATION SYSTEM. Vendor/Consultant. User Guide COMPLIANCE INFORMATION SYSTEM Vendor/Consultant User Guide December 2015 The following revisions have been made to this manual: CURRENT REVISIONS- DECEMBER 2015 Revision Description Revision Page What

More information

User Manual for. Contractor Performance Assessment Reporting System (CPARS) December 2014 Current Version UHTTPS://WWW.CPARS.

User Manual for. Contractor Performance Assessment Reporting System (CPARS) December 2014 Current Version UHTTPS://WWW.CPARS. User Manual for Contractor Performance Assessment Reporting System (CPARS) December 2014 Current Version 4.0.2 UHTTPS://WWW.CPARS.GOV 2BForeword The purpose of this manual is to provide working-level procedures

More information

FedRAMP: Understanding Agency and Cloud Provider Responsibilities

FedRAMP: Understanding Agency and Cloud Provider Responsibilities May 2013 Walter E. Washington Convention Center Washington, DC FedRAMP: Understanding Agency and Cloud Provider Responsibilities Matthew Goodrich, JD FedRAMP Program Manager US General Services Administration

More information

BCN Telecom, Inc. Customer Proprietary Network Information Certification Accompanying Statement

BCN Telecom, Inc. Customer Proprietary Network Information Certification Accompanying Statement BCN Telecom, Inc. Customer Proprietary Network Information Certification Accompanying Statement BCN TELECOM, INC. ( BCN" or "Company") has established practices and procedures adequate to ensure compliance

More information

Product Data Reporting and Evaluation Program (PDREP) Automated Information System (AIS) Supplier Audit Program (SAP) Application

Product Data Reporting and Evaluation Program (PDREP) Automated Information System (AIS) Supplier Audit Program (SAP) Application Product Data Reporting and Evaluation Program (PDREP) Automated Information System (AIS) Supplier Audit Program (SAP) Application User Guide May 2018 TABLE OF CONTENTS FOREWORD 3 INTRODUCTION 4 1 ACCESS

More information

Timber Products Inspection, Inc.

Timber Products Inspection, Inc. Timber Products Inspection, Inc. Product Certification Public Document Timber Products Inspection, Inc. P.O. Box 919 Conyers, GA 30012 Phone: (770) 922-8000 Fax: (770) 922-1290 TP Product Certification

More information

2. What is Personal Information and Non-Personally Identifiable Information?

2. What is Personal Information and Non-Personally Identifiable Information? Privacy Notice Snipp Interactive, Inc. Last Updated: February 11, 2016 Contents: 1. Introduction 2. What is Personal Information? 3. Information we collect about you 4. Use of Your Information 5. Location

More information

Committee on National Security Systems. CNSS Policy No. 14 November 2002

Committee on National Security Systems. CNSS Policy No. 14 November 2002 Committee on National Security Systems CNSS Policy No. 14 November 2002 National Policy Governing the Release of Information Assurance (IA) Products and Services to Authorized U.S. Persons or Activities

More information

Information Security Incident Response and Reporting

Information Security Incident Response and Reporting Information Security Incident Response and Reporting Original Implementation: July 24, 2018 Last Revision: None This policy governs the actions required for reporting or responding to information security

More information

User Manual for. Contractor Performance Assessment Reporting System (CPARS) January 2018 Current Version UHTTPS://WWW.CPARS.

User Manual for. Contractor Performance Assessment Reporting System (CPARS) January 2018 Current Version UHTTPS://WWW.CPARS. User Manual for Contractor Performance Assessment Reporting System (CPARS) January 2018 Current Version 5.1.0 UHTTPS://WWW.CPARS.GOV 2BForeword The purpose of this manual is to provide working-level procedures

More information

PROJECT: NEW JERSEY WATER QUALITY DATA EXCHANGE WQX REPORTER USER S GUIDE. Prepared for New Jersey Department of Environmental Protection

PROJECT: NEW JERSEY WATER QUALITY DATA EXCHANGE WQX REPORTER USER S GUIDE. Prepared for New Jersey Department of Environmental Protection PROJECT: NEW JERSEY WATER QUALITY DATA EXCHANGE WQX REPORTER USER S GUIDE Prepared for New Jersey Department of Environmental Protection January 29, 2009 11 Princess Road, Unit A Lawrenceville, New Jersey

More information

APPENDIX H: McMURDO STATION COMPUTER INFORMATION For more information, visit

APPENDIX H: McMURDO STATION COMPUTER INFORMATION For more information, visit APPENDIX H: McMURDO STATION COMPUTER INFORMATION For more information, visit http://www.usap.gov/technology/contenthandler.cfm?id=94 In this appendix, you will find information on the following: H.1 Information

More information

Quick Reference Guide for e-qip Applicants

Quick Reference Guide for e-qip Applicants 2016 U.S. Navy Quick Reference Guide for e-qip Applicants OPR CNIC/CSO Welcome, You have been initiated for a background investigation in the Electronic Questionnaires for Investigations Processing (e-qip)

More information

Using Manage Alarm Tool

Using Manage Alarm Tool Using Manage Alarm Tool Release 1.0 Issue 1 April 2013 2013 Avaya Inc. All Rights Reserved. Notice While reasonable efforts have been made to ensure that the information in this document is complete and

More information

EPAF User Guide. Your guide for navigating the EPAF System

EPAF User Guide. Your guide for navigating the EPAF System EPAF User Guide Your guide for navigating the EPAF System This booklet outlines the use of Electronic Personnel Action Forms in the Banner Web for Employees. Office of Human Resources 02/08/2013 Frequently

More information

2017 ACA Form Processing Large Employers

2017 ACA Form Processing Large Employers 2017 ACA Form Processing Large Employers Fiscal Coordination December 2017 1 Table of Contents Understanding ACA Reporting... 3 Entering an ACA 1095C Record... 5 Verifying Employee ACA Codes.... 7 Identifying

More information

CAMP USER S GUIDE IFMA CREDENTIALS CREDENTIALS APPLICATION AND MAINTENANCE PROGRAM

CAMP USER S GUIDE IFMA CREDENTIALS CREDENTIALS APPLICATION AND MAINTENANCE PROGRAM CAMP USER S GUIDE IFMA CREDENTIALS CREDENTIALS APPLICATION AND MAINTENANCE PROGRAM VV0118CREDENTIALS APPLICATION AND MAINTENANCE PROGRAM CA User's Guide for IFMA's Credential Application and Maintenance

More information

Benefits Participant Guide

Benefits Participant Guide Benefits Participant Guide Table of Contents Refer to the Table of Contents for a full summary of the information contained within this guide. Click the section headings to be brought directly to that

More information

PilieroMazza Webinar Preparing for NIST SP December 14, 2017

PilieroMazza Webinar Preparing for NIST SP December 14, 2017 PilieroMazza Webinar Preparing for NIST SP 800-171 December 14, 2017 Presented by Jon Williams, Partner jwilliams@pilieromazza.com (202) 857-1000 Kimi Murakami, Counsel kmurakami@pilieromazza.com (202)

More information

Administrative Changes to TINKERAFBI , Automated Information System (AIS) Access and Data Release Requirements

Administrative Changes to TINKERAFBI , Automated Information System (AIS) Access and Data Release Requirements Administrative Changes to TINKERAFBI 33-110, Automated Information System (AIS) Access and Data Release Requirements OPR: 72 ABW/SCP: Special Mission Division References throughout to https://wwwmil.tinker.af.mil/ites/opr.asp

More information

Training Guide for Arkansas Law Enforcement Officers and Licensing Board Representatives

Training Guide for Arkansas Law Enforcement Officers and Licensing Board Representatives Training Guide for Arkansas Law Enforcement Officers and Licensing Board Representatives Arkansas Department of Health Prescription Monitoring Program March 2016 Contents Contents 1 Document Overview...

More information

Provider Monitoring Process

Provider Monitoring Process Provider Monitoring Process This statewide provider monitoring process is applicable for all providers including direct vendors, Agency with Choice (AWC) Financial Management Services (FMS) providers and

More information

Pennsylvania Certification by Endorsement

Pennsylvania Certification by Endorsement Pennsylvania Certification by Endorsement Thank you for your interest in obtaining Pennsylvania EMS Certification by Endorsement. This is the process whereby a person certified by a state other than Pennsylvania

More information

Mobile Application Privacy Policy

Mobile Application Privacy Policy Mobile Application Privacy Policy Introduction This mobile application is hosted and operated on behalf of your health plan. As such, some information collected through the mobile application may be considered

More information

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers All Affiliate Research Policy Subject: HIPAA File Under: For Researchers ORA HIPAA Issuing Department: Office of Research Administration Original Policy Date Page 1 of 5 Approved by: May 9,2005 Revision

More information

University of Pittsburgh Security Assessment Questionnaire (v1.7)

University of Pittsburgh Security Assessment Questionnaire (v1.7) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided

More information