Secure Web Fingerprint Transaction (SWFT) Frequently Asked Questions
|
|
- Dominick Cummings
- 5 years ago
- Views:
Transcription
1 Defense Manpower Data Center Personnel Security and Assurance Secure Web Fingerprint Transaction (SWFT) Frequently Asked Questions Version 1.4 March 1, 2017 Contract Number: GS00Q09BGD0027 Task Order: GSQ0316DS0057 SWF.1084.U*5 Prepared by
2 REVISION HISTORY Date Version Number Section Comments CM # Name 2/23/ All Initial draft SWF.1084.U*5 SWFT Team 2/23/ All Technical Writer review SWF.1084.U*5 TW Team 2/28/ All Updates from DMDC PM SWF.1084.U*5 SWFT Team Note: The controlled master of this document is available on-line. Hard copies of this document are for information only and are not subject to document control. DOCUMENT INFORMATION Required Information Definition Document Title: Document ID: Personnel Security/Assurance (PSA) Systems Support Secure Web Fingerprint Transaction (SWFT) Frequently Asked Questions SWF.1084.U*5 Version: Version 1.4 Approval Date: March 1, 2017 Location: Owner: Author: Approved by: GOVERNMENT PURPOSE RIGHTS SharePoint - SWFT Documents\Documentation\SWFT Release 7.2.2\SWFT Frequently Asked Questions PSA Systems Support Team PSA Systems Support Team PSA Systems Support Team The Government's rights to use, modify, reproduce, release, perform, display, or disclose these technical data are restricted by paragraph (b)(2) of the Rights in Technical Data-Noncommercial Items clause contained in the DMDC PSA Systems Support contract GS00Q09BGD0027. Any reproduction of technical data or portions thereof marked with this legend must also reproduce the markings. i
3 Secure Web Fingerprint Transaction (SWFT) Frequently Asked Questions Contents Index... 1 Questions about Access, System Requirements, and User Guide What is SWFT? What is efp Enrollment (SWFT+)? Who can use SWFT? Who can use SWFT Plus Enrollment (SWFT+)? How do I obtain a SWFT account? What are the minimum security requirements for obtaining a SWFT account? Where can I find the Personnel Security System Access Request (PSSAR) form? How recent must the training certificates that I submit with my PSSAR be? Can I PSSARs to the SWFT Helpdesk? How often must I log into my account in order to avoid my account being locked or terminated? What do I do if my account has been locked or terminated? As an Organization or Site Administrator, how do I reinstate a user who has had his or her account terminated due to 45 days of inactivity? What are the system requirements for SWFT? Does an Organization need to have a fingerprint capture device (livescan or card scan) before they can obtain a SWFT account? Is there a User Guide for the SWFT system? My Organization will be utilizing another cleared Organization/Third Party Vendor s equipment for creating efp files. Which part of the Access, Registration, and Testing Procedures is relevant for our situation?... 3 Questions about the Equipment What fingerprint scanning hardware and software can be used? What are the requirements for scanner configuration and settings? My Organization is a Third Party Vendor whose fingerprint scanner is being sponsored for production use by a cleared DoD contractor. Will I have to re-register the same fingerprint scanner each time I provide services to other authorized SWFT Users? My Organization will be utilizing a cleared Organization/Third Party Vendor s equipment for creating efp files. Will they be able to submit efps on our behalf? What is the policy for getting server-based/web-based fingerprint systems registered and tested? What is the timeline for scanner registration and approval? Can I submit efps to the Authorized Destination if I never submit a Test efp?... 5 Questions about the Fingerprints Do the efps ever get deleted from SWFT? Are both rolled fingerprints and flat fingerprints accepted? How do I complete fingerprints for an amputee?... 5 ii
4 27. How are the fingerprint files matched with the Electronic Questionnaires for Investigations Processing (e-qip)? What makes up the Transaction Control Number (TCN)? Does the investigation number need to be included in the efp file? What data is entered in the Social Security Number (SSN) field if a person is a Foreign National and does not have a SSN? Can the SWFT support staff change biographic information that was entered incorrectly in an efp file? My efp s processing is taking a long time. How can I find out why?... 6 iii
5 Index Topic Question Number Acceptable fingerprint types 25, 26 Access 1, 2, 3, 4, 5, 13 Account Policies 6, 9, 10 Account Reinstatement 11 Documentation 15 e-qip 27, 29 Editing efps 31 efp Submission and Status 32 Foreign Nationals 30 Obtaining SWFT Account 5 PSSAR 7 Record Retention 24 Scanner Registration Process 16, 18, 21, 22, 23 Scanner Types Supported 17 Server-based Systems 21 System Requirements 12 TCN 28 Third Party Providers 14, 19, 20 Training Requirements 8 Questions about Access, System Requirements, and User Guide 1. What is SWFT? ANSWER - The Secure Web Fingerprint Transaction (SWFT) is a Department of Defense (DoD) enterprise system for centralized collection and distribution of electronic fingerprints for applicants requiring a background check. SWFT eliminates the need for paper-based capture and handling of fingerprints, expedites the background check process by reducing invalid fingerprint submissions, provides end-to-end accountability for sensitive Personally Identifiable Information (PII) data, and implements stringent security standards. 2. What is efp Enrollment or what is SWFT+? ANSWER - SWFT Plus Enrollment (SWFT+) is a DoD enterprise system for web-based collection and distribution of electronic fingerprints. The SWFT+ system provides centralized enrollment of electronic fingerprints, with the capacity to transmit fingerprints to critical Investigative Service Providers (ISPs) and other authorized government entities. SWFT+ frees its users from maintaining their own software for enrolling the biographic and biometric data. Users are responsible only for providing their own fingerprint capture device and software development kit (SDK). 1
6 3. Who can use SWFT? ANSWER - All DoD Components and cleared DoD Industry companies that participate in the National Industrial Security Program (NISP). 4. Who can use SWFT Plus Enrollment (SWFT+)? ANSWER - All DoD Components. The Office of the Under Secretary of Defense for Intelligence OUSD(I) released a memorandum (available at directing all DoD services and agencies to work directly with DMDC on migrating their existing and future fingerprint equipment to SWFT+ and taking advantage of the SWFT+ capability. 5. How do I obtain a SWFT account? ANSWER - Please refer to the SWFT Access, Registration and Testing Procedures. The document is available at Click on the Access, Reg, Test Guide link in the Access Request section of the PSA SWFT Web page. 6. What are the minimum security requirements for obtaining a SWFT account? ANSWER - In order to receive a SWFT account, a potential user must have a favorable security clearance eligibility determination. SWFT requires a minimum of Interim Secret eligibility. Applicants should not submit a Personnel Security System Access Request (PSSAR) form until they have been granted at least an Interim Secret Clearance. 7. Where can I find the Personnel Security System Access Request (PSSAR) form? ANSWER - The document is available at Click on the PSSAR Form in the Access Request section. 8. How recent must the training certificates that I submit with my PSSAR be? ANSWER - Training certificates must be less than 12 months old when submitted with your PSSAR form. 9. Can I PSSARs to the SWFT Helpdesk? ANSWER - Only PSSARs requesting an account for the Organization Administrator are submitted to Defense Manpower Data Center (DMDC) Contact Center via encrypted to: dmdc.contactcenter@mail.mil. PSSARs for Site Administrator accounts must be submitted directly to your Organization Administrator, and PSSARs for regular User accounts should be submitted to your Site Administrator or your Organization Administrator, if permitted. 10. How often must I log into my account in order to avoid my account being locked or terminated? ANSWER - Users must log into their accounts at least once in 30 days in order to avoid their account being locked. Accounts that are not accessed within 45 days of the last login will be terminated. 2
7 11. What do I do if my account has been locked or terminated? ANSWER - Only an account that has been locked can be reactivated. Terminated accounts will require a new PSSAR to be submitted to the appropriate account administrator. Standard users should contact their Site or Organization Administrators. Organization Administrators must contact the Executive Administrator at the DMDC Contact Center. 12. As an Organization or Site Administrator, how do I reinstate a user who has had his or her account terminated due to 45 days of inactivity? ANSWER - If a SWFT User in your Organization has had their account terminated, you will need to create a new account for that user once you have received a completed PSSAR from that user. You will not be able to reuse the user s previous Login ID. 13. What are the system requirements for SWFT? ANSWER - The only requirement is internet access and a compatible web browser. SWFT currently supports only Microsoft Internet Explorer 9.0 or above. Other browsers may work as well. Optionally, in order to be able to upload multiple electronic fingerprints (efps) at a time, Adobe Flash Player 11 or higher must be installed and enabled. A free download is available at: Prior to installing Adobe Flash Player please check your Organization s Information Technology (IT) policy. Users of SWFT+ also require Java Runtime Engine (JRE) version 1.7 and higher, and SDK for fingerprint capture device (see more detailed information at Does an Organization need to have a fingerprint capture device (livescan or card scan) before they can obtain a SWFT account? ANSWER - No, your Organization does not have to own or sponsor any scanning devices in order to obtain a SWFT account for the organization. User accounts and device registrations can be added to such organization accounts later or not at all if fingerprints will be submitted on behalf of your organization by a service provider. 15. Is there a User Guide for the SWFT system? ANSWER - A User Guide is available online in the Help section of the SWFT web application. Log into the SWFT and click the Help button that is available on each web page. The User Guide is For Official Use Only (FOUO), and is not available to the general public. 16. My Organization will be utilizing another cleared Organization/Third Party Vendor s equipment for creating efp files. Which part of the Access, Registration, and Testing Procedures is relevant for our situation? ANSWER - If your Organization will only submit the efps, then only the Access section of the SWFT Access, Registration, and Testing Procedures is relevant to your situation. However, your Organization must verify that the Organization/Third Party Vendor that will generate the efps for you had their equipment registered and approved for production with SWFT. Consult the User Guide for details. 3
8 Questions about the Equipment 4 (SWFT) Frequently Asked Questions 17. What fingerprint scanning hardware and software can be used? ANSWER - The Federal Bureau of Investigation (FBI) maintains a list of certified products, which is available on the FBI Biometric Specifications (BioSpecs) website under Certifications: SWFT Users may choose to acquire any certified product that supports Type-4 fingerprint images. Users of SWFT+ should refer to the list of supported devices that is available at in section efp Enrollment (SWFT+). 18. What are the requirements for scanner configuration and settings? ANSWER - The device must be configured to capture Type-4 fingerprint images. There are also other configuration items and settings that are required by the FBI and the investigative service providers. Please consult the SWFT Scanner Configuration and Registration Guide that is available in the Help section of the SWFT web application. 19. My Organization is a Third Party Vendor whose fingerprint scanner is being sponsored for production use by a cleared DoD contractor. Will I have to re-register the same fingerprint scanner each time I provide services to other authorized SWFT Users? ANSWER - Fingerprint scanning workstations have to be registered and tested only once. They do not have to be re-registered or re-tested separately for each of your clients. Provide to your customers the manufacturer and serial number of your scanners, or provide them your Org/CAGE Code or the Org/CAGE Code of the Organization that sponsored the registration of your devices so that your customers can verify in SWFT that your equipment has been registered and approved for use. Note that any change in your sponsoring organization or change in the system (e.g., software patches or upgrade, hardware replacement, scanner relocation, and so on) requires the equipment to be retested. 20. My Organization will be utilizing a cleared Organization/Third Party Vendor s equipment for creating efp files. Will they be able to submit efps on our behalf? ANSWER - Yes, another Organization that already has a SWFT account can submit efps on your behalf. There are two available options which are detailed in the SWFT Access, Registration and Testing Procedures document available at: What is the policy for getting server-based/web-based fingerprint systems registered and tested? ANSWER - Server-based/web-based fingerprint systems typically involve two components: 1) One or more fingerprint scanning devices; 2) Server that integrates fingerprint images and biographic data and generates the electronic fingerprint file. Multiple scanning devices can be connected to a single server. At least one scanner-server pair must be registered and tested with SWFT. The registration must prove that the hardware and software components in the server-based/web-based system meet the FBI certification
9 guidelines. The test of the scanner-server pair must prove that the system is properly configured and generates efp files that comply with the FBI Electronic Biometric Transmission Specification (EBTS) and DMDC requirements. Additional scanning devices that communicate with the server must be registered, but do not have to be tested. Scanning devices that will connect to an already registered and tested server- based system must include in the registration form a reference to the registered scanner/server platform. 22. What is the timeline for scanner registration and approval? ANSWER - It usually takes less than two weeks to complete the scanner registration process and receive approval to operate in the production environment. The time frame is contingent upon timely responses to actions requested by the SWFT Coordinator. 23. Can I submit efps to the Authorized Destination if I never submit a Test efp? ANSWER - No. Submitting an efp from a device that has not been tested and approved for production could result in rejection of the fingerprint transaction and adverse action against the SWFT user and/or Organization. Questions about the Fingerprints 24. Do the efps ever get deleted from SWFT? ANSWER - Each efp that was processed by SWFT is temporarily archived and then purged in accordance with directives from the National Archives and Records Administration (NARA). 25. Are both rolled fingerprints and flat fingerprints accepted? ANSWER - Tenprint Type-4 images in EBTS transactions contain: Ten rolled fingerprints; standard four finger slaps for right and left hand; and individual thumb slaps for right and left hand. More information is available at How do I complete fingerprints for an amputee? ANSWER - For efps being uploaded to SWFT, you will want to contact your software vendor for additional instructions. For efps being uploaded from efp enrollment (SWFT+), when you are on the efp capture screen, you will select "Amputation" as the option and follow the instructions on the efp capture screen. 27. How are the fingerprint files matched with the Electronic Questionnaires for Investigations Processing (e-qip)? ANSWER - Fingerprint file is matched by the investigative service provider with the appropriate e-qip by means of selected personal identifying information data. To ensure that a request for investigation is processed efficiently, it is important that the personal identification information in the subject's e-qip record match with the same information contained in the efp. The following match criteria apply: 5
10 SUBJECT NAME o Last Name: efp and e-qip must match exactly o First Name: efp and e-qip must match exactly o Middle Name: Minor difference/discrepancy may be acceptable (that is, Marcie Gail Smith in e-qip versus M. Gail Smith or Marcie G. Smith in e-fingerprint) SOCIAL SECURITY NUMBER - efp and e-qip must match exactly DATE OF BIRTH - efp and e-qip must match exactly 28. What makes up the Transaction Control Number (TCN)? ANSWER - The TCN must be unique for each fingerprint transaction, and consists of the TCN Prefix and TCN Suffix. The TCN Prefix remains constant, while TCN Suffix is unique in each fingerprint transaction. The TCN structure must adhere to the SWFT convention. Refer to the Scanner Configuration and Registration Guide, which is accessible through the SWFT Application in the Help Files. The Scanner Configuration and Registration Guide is FOUO, and is not available to the general public. 29. Does the investigation number need to be included in the efp file? ANSWER - The e-qip request Identification (ID) is not part of the efp data. 30. What data is entered in the Social Security Number (SSN) field if a person is a Foreign National and does not have a SSN? ANSWER - Enter all 9s, all 0s, or all 9s with the last digit being a Can the SWFT support staff change biographic information that was entered incorrectly in an efp file? ANSWER - The SWFT support staff is not equipped to modify any information contained in the efp Files. If biographic information needs to be corrected or updated, a new efp will need to be submitted to SWFT. 32. My efp s processing is taking a long time. How can I find out why? ANSWER - The SWFT forwards all efp submissions to the investigative service provider within 24 hours. Once the fingerprint file is received by the investigative service provider, the role of SWFT has been completed. To check the current status of an efp, go to the efp Search screen in SWFT. From there you can search for an efp by SSN, Last Name, First Name or TCN. Please note that any discrepancies in data like Name, SSN, DOB, or POB between the submitted efp and the e-qip can cause delays in processing the request for investigation. 6
Secure Web Fingerprint Transaction (SWFT) Access, Registration, and Testing Procedures
Defense Manpower Data Center Personnel Security & Assurance Secure Web Fingerprint Transaction (SWFT) Access, Registration, and Testing Procedures Version 3.2 July 20, 2016 CONTRACT NUMBER GS00Q09BGD0027
More informationDefense Information System for Security (DISS) Frequently Asked Questions (FAQs)
Defense Manpower Data Center Personnel Security & Assurance Defense Information System for Security (DISS) Frequently Asked Questions (FAQs) Document Version 1.3 28 March 2017 Document History Version
More informationAskPSMO-I. Security Violations Zaakia Bailey Defense Security Service. October 28, :30 PM EST
AskPSMO-I For audio, dial: 1-888-946-3805 Enter participant code: 8672177 Security Violations Zaakia Bailey Defense Security Service October 28, 2014 1:30 PM EST Dashboard Announcements SWFT JPAS OPM PSMO-I
More informationLogin & Registration Quick Start Guide
Login & Registration Quick Start Guide Prepared by: Joint Contingency & Expeditionary Services (JCXS) Defense Logistics Agency (DLA) https://www.jccs.gov/ casm v2.1.12 Last Modified August 13, 2018 Total
More informationAskPSMO-I. Customer Service Requests Nicholas Levasseur Defense Security Service. August 26, :30 PM EST
AskPSMO-I For audio, dial: 1-888-989-9786 Enter participant code: 6039400 Customer Service Requests Nicholas Levasseur Defense Security Service August 26, 2014 1:30 PM EST Dashboard Announcements JPAS
More informationElectronic Questionnaire for Investigation Processing (e-qip) JSAC Workshop April June E. Martin Raytheon
Electronic Questionnaire for Investigation Processing (e-qip) JSAC Workshop April 2008 June E. Martin Raytheon 1 Electronic Questionnaire for Investigation Processing (e-qip) JSAC Workshop Acknowledgement
More informationGuidelines for Capturing Palmprints and Supplementals
Guidelines for Capturing Palmprints and Supplementals Guidelines for Capturing Palmprints and Supplementals General Overview: The FBI will implement palmprint and supplemental print search capabilities
More informationAMPS Snapshot: Complete and Submit a Role Request External User
For external users assigned to one of the following AMPS user types: civilian, military, or contractor. How to complete and submit a role request in AMPS: 1. Start by launching AMPS in a browser window:
More informationTexas Department of Family and Protective Services
Texas Department of Family and Protective Services Automated Background Check System (ABCS) User Guide Updated November 2016 Table of Contents DFPS AUTOMATED BACKGROUND CHECK SYSTEM (ABCS) USER MANUAL
More informationPresented by: Mike Ray Personnel Security Management Office for Industry (PSMO-I)
PSMO-I Personnel Security Update July 2016 Presented by: Mike Ray Personnel Security Management Office for Industry (PSMO-I) Functions of the PSMO-I Personnel Clearance Oversight Initiate Investigate Adjudicate
More informationTexas Department of Family and Protective Services
Texas Department of Family and Protective Services Automated Background Check System (ABCS) User Guide Updated April 2018 Table of Contents DFPS AUTOMATED BACKGROUND CHECK SYSTEM (ABCS) USER MANUAL Summary
More informationFrequently Asked Questions TSA Fingerprint System (FPS) Updated 5/13/2013
1. What assurances do airports have that the transition to the new Fingerprint Processing System (FPS) will not cause unacceptable disruptions to the badge issuance process? Airports should not experience
More informationAppendix 3: Subscribing Entity Reference Guide to NGI s Rap Back Service Version 2.1 June 1, 2014
Appendix 3: Subscribing Entity Reference Guide to NGI s Rap Back Service Version 2.1 June 1, 2014 Note to Submitters: The information in this document is provided for you to use in any manner most appropriate
More information(EHR) Incentive Program
REGISTRATION USER GUIDE For Eligible Professionals Medicare Electronic Health Record (EHR) Incentive Program JULY 2012 (07.02.12 ver8) CONTENTS Step 1...Getting started 3 Step 2... Login 5 Step 3...Welcome
More informationAmerican Association for Laboratory Accreditation
R311 - Specific Requirements: Federal Risk and Authorization Management Program Page 1 of 10 R311 - Specific Requirements: Federal Risk and Authorization Management Program 2017 by A2LA. All rights reserved.
More informationSLED Certification of 3 rd Party NCIC/SCIC Applications Overview February 2, 2004
SLED Certification of 3 rd Party NCIC/SCIC Applications Overview February 2, 2004 This document provides an overview of the program put into place by the South Carolina Law Enforcement Division (SLED)
More informationDEFENSE SECURITY SERVICE PRIVACY IMPACT ASSESSMENT GUIDANCE AND TEMPLATE
DEFENSE SECURITY SERVICE PRIVACY IMPACT ASSESSMENT GUIDANCE AND TEMPLATE Version 1.0 28 October 2008 1 DSS PRIVACY IMPACT ASSESSMENT For Industrial Security Facilities Database (ISFD) Project Identifying
More informationOregon registration will open next Monday, the 26th. First register with CMS, then with your state.
Sent: Tuesday, September 20, 2011 2:53 PM Subject: Meaningful Use Registration I want to make sure that the Portland Area I/T/U's are on track to receive the EHR Incentive payments. So far, who has registered
More informationJSAC DALLAS, TX. Presented by: June E. Martin Raytheon April 2008
JSAC DALLAS, TX Presented by: June E. Martin Raytheon April 2008 Objective Provide Overview of JPAS Policy Provide Information Update JPAS e-qip Suitability/Security Investigation Index (SII) e-fingerprinting
More informationTable of Contents. Overview of the TEA Login Application Features Roles in Obtaining Application Access Approval Process...
TEAL Help Table of Contents Overview of the TEA Login Application... 7 Features... 7 Roles in Obtaining Application Access... 7 Approval Process... 8 Processing an Application Request... 9 The Process
More informationRequirements Page 2 of 39
Requirements Prepared by: Joint Contingency & Expeditionary Services (JCXS) Defense Logistics Agency (DLA) https://www.jccs.gov/ casm v2.1.13 Last Modified November 20, 2018 Total Quality Systems, Inc.
More informationCMS RETROACTIVE ENROLLMENT & PAYMENT VALIDATION RETROACTIVE PROCESSING CONTRACTOR (RPC) STATE AND COUNTY CODE UPDATE STANDARD OPERATING PROCEDURE
CMS RETROACTIVE ENROLLMENT & PAYMENT VALIDATION RETROACTIVE PROCESSING CONTRACTOR (RPC) STATE AND COUNTY CODE UPDATE STANDARD OPERATING PROCEDURE TABLE OF CONTENTS RETROACTIVE PROCESSING CONTRACTOR (RPC)
More informationSetting up Providers for Successful MU Attestation Part One: Steps You Need to Take with CMS
Setting up Providers for Successful MU Attestation Part One: Steps You Need to Take with CMS Illinois EHR Incentive Help Desk muhelpdesk@chitrec.org 855-684-3571 Agenda Modify EHR Program Registration
More informationDigital Intelligence Systems, LLC PeopleSoft Guide Vendors
Digital Intelligence Systems, LLC PeopleSoft Guide Vendors Version 1.0 July 2016 CONTENTS INTRODUCTION... 3 1.1 Change Password... 3 PROFILE INFORMATION... 5 2.1 Identifying Information... 6 2.2 Address...
More informationUNCLASSIFIED. Tips and Tricks. November, UNCLASSIFIED
UNCLASSIFIED Tips and Tricks November, 19 2018 UNCLASSIFIED User Manual Location Upon logging in, you can access the JVS User Manual by selecting the Help link located at the top left of your screen 2
More informationECONOMIC DISCLOSURE STATEMENT AND AFFIDAVIT (EDS) The web link for the Online EDS is https://webapps.cityofchicago.org/edsweb
CITY OF CHICAGO Department of Procurement Services Jamie L. Rhee, Chief Procurement Officer 121 North LaSalle Street, Room 403 Chicago, Illinois 60602-1284 ECONOMIC DISCLOSURE STATEMENT AND AFFIDAVIT (EDS)
More information1 efilega Frequently Asked Questions
1 efilega Frequently Asked Questions Topics Covered in this Chapter General General How do I access the Odyssey File & Serve system? To access the Odyssey File & Serve website, go to efilega (https://efilega.tylerhost.net/).
More informationPrivate Sector Clearance Program (PSCP) Webinar
Private Sector Clearance Program (PSCP) Webinar Critical Infrastructure Protection Committee November 18, 2014 Nathan Mitchell, ESCC Clearance Liaison Agenda History NERC CIPC Private Sector Clearance
More informationSAC PA Security Frameworks - FISMA and NIST
SAC PA Security Frameworks - FISMA and NIST 800-171 June 23, 2017 SECURITY FRAMEWORKS Chris Seiders, CISSP Scott Weinman, CISSP, CISA Agenda Compliance standards FISMA NIST SP 800-171 Importance of Compliance
More informationFiXs - Federated and Secure Identity Management in Operation
FiXs - Federated and Secure Identity Management in Operation Implementing federated identity management and assurance in operational scenarios The Federation for Identity and Cross-Credentialing Systems
More informationIndustrial Security Facilities Database (ISFD) Job Aid. December 2014
Industrial Security Facilities Database (ISFD) Job Aid December 2014 Page 2 Table of Contents Introduction Logging into ISFD Navigating ISFD Changing Passwords Update My Info Request for Information Submit
More informationThomas Jefferson University College of Nursing Undergraduate BSN Programs Center City & Abington-Dixon Campuses Pre-matriculation Completion Guide
Thomas Jefferson University College of Nursing Undergraduate BSN Programs Center City & Abington-Dixon Campuses Pre-matriculation Completion Guide Part I: Placing your order in Complio Pre-Step A Navigate
More informationInForm Functionality Reference Manual for Sites. Version 1.0
InForm Functionality Reference Manual for Sites Version 1.0 1-Mar-2012 2012 by Merck & Co., Inc., Whitehouse Station, New Jersey, USA All Rights Reserved No part of this book may be reproduced in any form
More informationApplication Process Page 1 of 12. Application Process
Page 1 of 12 Application Process Login Initiate an Online Application Process Payment of Application Fees Uploading Required Documentation Cloning Unlocking Program Related Applications Initial Grant of
More informationHDS Web Compliance Management System (WCMS) User s Guide Version 6. Virginia Housing Development Authority
HDS Web Compliance Management System (WCMS) User s Guide Version 6 Virginia Housing Development Authority 601 South Belvidere Street Richmond, Virginia 23220-6505 (804) 782-1986 HDS WEB COMPLIANCE MANAGEMENT
More informationDHCS PPSDS. End User Guide. Applies to: California DHCS. WITS Version 18.0+
DHCS PPSDS End User Guide Applies to: WITS Version 18.0+ California DHCS Last Updated September 22, 2017 Preface California DHCS DHCS PPSDS Prevention WITS is a web-based application specifically designed
More informationAdministrative Changes to TINKERAFBI , Automated Information System (AIS) Access and Data Release Requirements
Administrative Changes to TINKERAFBI 33-110, Automated Information System (AIS) Access and Data Release Requirements OPR: 72 ABW/SCP: Special Mission Division References throughout to https://wwwmil.tinker.af.mil/ites/opr.asp
More informationPRODUCT DESCRIPTIONS AND METRICS
PRODUCT DESCRIPTIONS AND METRICS Adobe PDM - Adobe LiveCycle Managed Services (2013v3) The Services described in this PDM are Managed Services and are governed by the terms of the General Terms, the Exhibit
More informationUCSC Visa Document Request Tool Quick Guide **Please make sure you are able to receive s from
UCSC Visa Document Request Tool Quick Guide **Please make sure you are able to receive emails from istudent@ucsc.edu** Part 1: Accessing the Document Request Tool 1. All communication will be sent to your
More information11.0 Random Assignment
11.0 Random Assignment Random assignment is the procedure by which enrolled youth will be assigned to either the Usual Services or ASPIRE Services groups. Random assignment is performed in a computer system,
More informationCOUNTY OF LOS ANGELES REQUEST FOR INFORMATION. RFI No. 414-SH MULTI-BIOMETRIC IDENTIFICATION SYSTEM
COUNTY OF LOS ANGELES REQUEST FOR INFORMATION RFI No. 414-SH MULTI-BIOMETRIC IDENTIFICATION SYSTEM RFI NO. 414-SH COUNTY OF LOS ANGELES SHERIFF S DEPARTMENT Request for Information (RFI) Project No. 414-SH
More information2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY
2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY Purpose: The purpose of this policy is to provide instruction and information to staff, auditors, consultants, contractors and tenants on
More informationONE ID Identity and Access Management System
ONE ID Identity and Access Management System Local Registration Authority User Guide Document Identifier: 2274 Version: 1.8 Page 1 Copyright Notice Copyright 2011, ehealth Ontario All rights reserved No
More informationChapter 9 Section 3. Digital Imaging (Scanned) And Electronic (Born-Digital) Records Process And Formats
Records Management (RM) Chapter 9 Section 3 Digital Imaging (Scanned) And Electronic (Born-Digital) Records Process And Formats Revision: 1.0 GENERAL 1.1 The success of a digitized document conversion
More informationRisk Management FAQs NYSWYSA LPGA Drive Corning, NY 14830
Risk Management FAQs 2016-17 NYSWYSA 11397 LPGA Drive Corning, NY 14830 Contents Policies and Procedures... 3 Purpose... 3 Who is Required to Have Risk Management?... 3 Minor Risk Management Process...
More informationEnterprise Income Verification (EIV) System User Access Authorization Form
Enterprise Income Verification (EIV) System User Access Authorization Form Date of Request: (Please Print or Type) PART I. ACCESS AUTHORIZATION * All required information must be provided in order to be
More informationAccountable Care Organizations: Testing Their Impact
Accountable Care Organizations: Testing Their Impact Eligibility Criteria * * Indicates required Preference will be given to applicants that are public agencies or are tax-exempt under Section 501(c)(3)
More informationRequest for Proposal for Technical Consulting Services
Request for Proposal for Technical Consulting Services The Node.js Foundation is requesting proposals from highly qualified consultants with demonstrated expertise in providing Node.js technical consultation
More informationGeneral Requirements and Information for Construction Inspection Agreements Revised 01/03/2008
General Requirements G e n e l R e q u r e m e n t s Revised to allow documents to be presented in.pdf format only and use of new Construction Inspection Resume Templates. General Requirements and Information
More informationEnrollment Instructions for Member-Applicant
This document is intended to provide guidance to AmeriCorps member applicants about the WSC/WRC enrollment process. This year, we are using a secure online system called DocuSign to facilitate web-based
More informationSime Darby eprocurement Portal Frequently Asked Questions (FAQs)
Sime Darby eprocurement Portal Frequently Asked Questions (FAQs) 1 Online Vendor Registration (OVR) Frequently Asked Questions Contents Pre-Application Questions... 3 Password / Login Matters... 4 Registration
More informationDefense Security Service
Office of the Chief Information Officer National Industrial Security Program (NISP) Central Access Information Security System (NCAISS) Project HS0021-15-F-0111 CICN: 0000-DOC-GD-27588-00 November 29,
More informationDEPARTMENT OF DEFENSE CONTRACTING OFFICERS REPRESENTATIVE TRACKING TOOL (CORT Tool) JANUARY 2012
DEPARTMENT OF DEFENSE CONTRACTING OFFICERS REPRESENTATIVE TRACKING TOOL (CORT Tool) JANUARY 2012 Ground Rules Please mute your phones We can all hear your background conversations Please do not put you
More informationHong Kong Access Federation (HKAF) Identity Management Practice Statement (IMPS)
Hong Kong Access Federation (HKAF) Identity Management Practice Statement (IMPS) This document (IMPS) facilitates an organization to provide relevant information to describe how it fulfils the normative
More informationMarket Participant Client Platform
PUBLIC IESO_ISTD_0017 Market Participant Client Platform Information Technology Standard Issue 2.0 This document is intended to clearly and concisely present the standards and guidelines for the upgrade
More informationElectronic Grants Administration & Management System - EGrAMS
Electronic Grants Administration & Management System - EGrAMS Introduction EGrAMS is an enterprise-wide web-based scalable, configurable, business rule driven and workflow based end-to-end electronic grants
More informationBasic User Management
Basic User Management Register Myself 1. On your site s home page, click the Register Now button. 2. Complete the registration form and click Save. Account Status Active - Users can log in, manage their
More informationPI Certification Quick Guide
PI Certification Quick Guide 1 P age Table of Contents Certifications... 3 PI Self-Certification... 3 PI is Certifying via Link in Email Notification... 3 PI Goes Directly to the Proposal... 6 Certification
More informationUniversity Health Network (UHN)
University Health Network (UHN) RESOURCE MATCHING AND REFERRAL (RM&R) AND ONLINE REFERRAL BUSINESS INTELLIGENCE TOOL (ORBIT) Policy Governing User Account Management Version: 4.0 Date: Last modified on
More informationNorth Dakota Court System Frequently Asked Questions
North Dakota Court System Frequently Asked Questions Topics Covered in this Chapter General E-filing Fees E-serving Format Errors General How do I access the Odyssey File & Serve system? To access the
More informationAbout Office 365 [PLACEHOLDER]
Office 365 [PLACEHOLDER] Service Description Applies to: Office 365 [PLACEHOLDER] Topic Last Modified: 22-Apr-2016 In response to the unique and evolving requirements of the United States federal government
More informationRequired Volunteer Paperwork - Page 1 of 2
CBC Process Packet Rev 2/2016 CBC Process Packet Rev 2/2016 Required Volunteer Paperwork - Page 1 of 2 CBC Process Packet Required Paperwork Rev 2/2016 Required Volunteer Paperwork - Page 2 of 2 CBC Process
More informationStatewide Student Identifiers (SSIDs or SIDs)
Statewide Student Identifiers (SSIDs or SIDs) Overview SSIDs, which are unique to the state of Ohio, are used for funding and tracking longitudinal student data. The SSID system provides a way for ODE
More informationCOMPLIANCE MONITORING DATA PORTAL ROLE REGISTRATION USER GUIDE
COMPLIANCE MONITORING DATA PORTAL ROLE REGISTRATION USER GUIDE USING SHARED CROMERR SERVICES (SCS) PREPARED BY: U.S. EPA OFFICE OF WATER OFFICE OF GROUND WATER AND DRINKING WATER DRINKING WATER PROTECTION
More information(EHR) Incentive Program
REGISTRATION USER GUIDE For Eligible Professionals Medicaid Electronic Health Record (EHR) Incentive Program DECEMBER 2010 (12.28.10 ver2) CONTENTS Step 1... Getting started 3 Step 2... Login instruction
More informationGRANTS AND CONTRIBUTIONS ONLINE SERVICES USER GUIDE: CANADA SUMMER JOBS
GRANTS AND CONTRIBUTIONS ONLINE SERVICES USER GUIDE: CANADA SUMMER JOBS DECEMBER 2016 TABLE OF CONTENTS IMPORTANT THINGS TO REMEMBER... 4 1. SUBMITTING A CANADA SUMMER JOBS APPLICATION... 4 1.1 How to
More informationFRAMEWORK FOR CERTIFICATION OF BIOMETRIC FINGERPRINT SCANNERS. (PUBLIC)
FRAMEWORK FOR CERTIFICATION OF BIOMETRIC FINGERPRINT SCANNERS. (PUBLIC) Version 1.1 Approved 1.1 Certification Department 24 th October 2018. PUBLIC Introduction This document covers the requirements for
More informationNYSED Teacher Student Roster Verification (TSRV) system
NYSED Teacher Student Roster Verification (TSRV) system FREQUENTLY ASKED QUESTIONS (FAQS) [updated 1/23/2014] GENERAL INFORMATION 1) Where can I find out more about the Teacher Leader Evaluation process?
More informationChange Healthcare CLAIMS Provider Information Form *This form is to ensure accuracy in updating the appropriate account
PAYER ID: SUBMITTER ID: 1 Provider Organization Practice/ Facility Name Change Healthcare CLAIMS Provider Information Form *This form is to ensure accuracy in updating the appropriate account Provider
More informationDEPARTMENT OF DEFENSE CONTRACTING OFFICERS REPRESENTATIVE TRACKING TOOL (CORT Tool)
DEPARTMENT OF DEFENSE CONTRACTING OFFICERS REPRESENTATIVE TRACKING TOOL (CORT Tool) Contracting Officer/Contract Specialist (CO/CS) Training OCTOBER 2011 1 ARMY/DEFENSE KNOWLEDGE ONLINE (AKO/DKO) https://www.us.army.mil
More information2.5. Funeral Director / Staff User Manual. Michigan EDRS. Michigan Department of Information Technology. (Electronic Death Registration System)
December 2017 2.5 Michigan Department of Information Technology Funeral Director / Staff User Manual Michigan EDRS (Electronic Death Registration System) EDRS Funeral Director User Manual COPYRIGHT INFORMATION
More informationDEPARTMENT OF DEFENSE CONTRACTING OFFICERS REPRESENTATIVE TRACKING TOOL (CORT Tool)
DEPARTMENT OF DEFENSE CONTRACTING OFFICERS REPRESENTATIVE TRACKING TOOL (CORT Tool) Contract Officer/Contract Specialist (CO/CS) Training JANUARY 2012 1 ARMY/DEFENSE KNOWLEDGE ONLINE (AKO/DKO) https://www.us.army.mil
More informatione-frr SYSTEM USER GUIDE
e-frr SYSTEM USER GUIDE for Electronic Submission of Financial Return Version 1.5 Jun 2015 Table of Contents 1. Introduction... 4 2. Background... 4 3. System Purpose... 4 4. Baseline Specification of
More informationORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers
All Affiliate Research Policy Subject: HIPAA File Under: For Researchers ORA HIPAA Issuing Department: Office of Research Administration Original Policy Date Page 1 of 5 Approved by: May 9,2005 Revision
More informationServices Directorate Dual Persona User Guide for DoD Enterprise Portal Service Military Sealift Command Version September 8, 2016
Services Directorate Dual Persona User Guide for DoD Enterprise Portal Service Military Sealift Command Version Document Approval Document Approved By Date Approved Name: Brian Purdy??/??/2016 ii Revision
More informationeirb Electronic Institutional Review Board User Guide For more information contact: Research Administration (803)
eirb Electronic Institutional Review Board User Guide For more information contact: Research Administration (803) 434 4899 Developed August 2008 by Research Development University of South Carolina 1 Introduction
More informationSparta Systems TrackWise Solution
Systems Solution 21 CFR Part 11 and Annex 11 Assessment October 2017 Systems Solution Introduction The purpose of this document is to outline the roles and responsibilities for compliance with the FDA
More information2 Creating New CCQAS 2.8 User Accounts
2 Creating New CCQAS 2.8 User Accounts The deployment of CCQAS 2.8 which introduced the online privilege application, review, and approval functionality, significantly expanded the number of CCQAS users
More informationUser Registration Guide
This document contains For Official Use Only (FOUO) information for SAF/FMF (AFFSO). It shall not be duplicated, used, or disclosed in whole or in part without prior written permission from the Information
More informationPhase I CAQH CORE 102: Eligibility and Benefits Certification Policy version March 2011
Phase I CAQH CORE 102: Eligibility and Benefits Certification Policy GUIDING PRINCIPLES After signing the CORE Pledge, the entity has 180 days to complete CORE certification testing. CORE will not certify
More informationBiometric Enabling Capabilities Increment 1 (BEC Inc 1) Information Exchange. LTC Eric Pavlick PM, Biometric Enabling Capabilities
Biometric Enabling Capabilities Increment 1 (BEC Inc 1) Information Exchange LTC Eric Pavlick PM, Biometric Enabling Capabilities 30 JULY 2013 BEC Inc 1 Agenda Program Overview LTC Eric Pavlick, Product
More informationChild Care Civil Background Check System (CCCBC System) User Manual for Providers and Approved Entities
Child Care Civil Background Check System (CCCBC System) User Manual for Providers and Approved Entities Issue Date: March 13, 2019 1 Table of Contents Overview of the Child Care Criminal Background Check
More informationNAVIGATION GUIDE FEDERAL REGISTRY. General Information
NAVIGATION GUIDE FEDERAL REGISTRY General Information Purpose This navigation guide is designed to provide institution and individual users with a general concept and navigation of NMLS. Copyright 2014
More informationChild Care Civil Background Check System (CC-CBC System) User Manual for Providers and Approved Entities
Child Care Civil Background Check System (CC-CBC System) User Manual for Providers and Approved Entities Issue Date: March 5, 2018 Table of Contents Overview of Changes 3 New Child Care Criminal Background
More informationEDI ENROLLMENT AGREEMENT INSTRUCTIONS
EDI ENROLLMENT AGREEMENT INSTRUCTIONS The Railroad EDI Enrollment Form (commonly referred to as the EDI Agreement) should be submitted when enrolling for electronic billing. It should be reviewed and signed
More information<PROJECT NAME> IMPLEMENTATION PLAN
IMPLEMENTATION PLAN Version VERSION HISTORY [Provide information on how the development and distribution of the Project Implementation Plan was controlled and tracked.
More informationDelegated Entity Exclusion, Sanction & Debarment Checks. OIG/GSA database screening
Delegated Entity Exclusion, Sanction & Debarment Checks OIG/GSA database screening 2016 Contents Sanction/Exclusion/Debarment Checks... 2 Office of Inspector General (OIG)... 2 Searching for Exclusions
More informationWebsite Privacy Policy
Website Privacy Policy Last updated: May 12, 2016 This privacy policy (the Privacy Policy ) applies to this website and all services provided through this website, including any games or sweepstakes (collectively,
More informationPII Policies and Procedures
PII Policies and Procedures HEALTHCARE BENEFIT SERVICES INC. Kirk Peters HEALTHCARE BENEFIT SERVICES INC. 2061 BOCA RATON BLVD. SUITE 202 BOCA RATON, FL Table of Contents What is PII... 2 PII Overview...
More informationMedicare Enrollment Application Submission Options
The Basics of Internet-based Provider Enrollment, Chain and Ownership System (PECOS) for Durable Medical Equipment, Prosthetics, Orthotics, and Supplies (DMEPOS) Suppliers Beginning October 4, 2010, the
More informationVirginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Personnel Security Standard This standard is applicable to all VCU School of Medicine personnel. Approval
More informationSafeguarding Controlled Unclassified Information and Cyber Incident Reporting. Kevin R. Gamache, Ph.D., ISP Facility Security Officer
Safeguarding Controlled Unclassified Information and Cyber Incident Reporting Kevin R. Gamache, Ph.D., ISP Facility Security Officer Why Are We Seeing These Rules? Stolen data provides potential adversaries
More informationDoD Internet Protocol Version 6 (IPv6) Contractual Language
DoD Internet Protocol Version 6 (IPv6) Contractual Language 1. Purpose: Contents of this document shall be incorporated in Government Acquisition Programs, Procurements, Services, and Contracts (including
More informationRed Flags Program. Purpose
Red Flags Program Purpose The purpose of this Red Flags Rules Program is to document the protocol adopted by the University of Memphis in compliance with the Red Flags Rules. Many offices at the University
More informationHow-to Guide for the use of the On-line UPR Submissions Registration System (https://uprdoc.ohchr.org) (17 March 2015)
How-to Guide for the use of the On-line UPR Submissions Registration System (https://uprdoc.ohchr.org) (17 March 2015) This How-to Guide is issued in relation to the On-line UPR Submissions Registration
More informationUser Manual for Exchange Visitor Program Sponsor Users (RO/ARO) of SEVIS: Volume II Form DS November 1, 2005
User Manual for Exchange Visitor Program Sponsor Users (RO/ARO) of SEVIS: Volume II Form DS-2019 TABLE OF CONTENTS 1. INTRODUCTION... 1 1.1 Purpose of SEVIS...1 1.2 Privacy Act Considerations...1 1.3 Security
More informationMunis Self Service Vendor Self Service. User Guide Version 11.2
Munis Self Service Vendor Self Service User Guide Version 11.2 TABLE OF CONTENTS Vendor Self Service Overview... 3 Vendor Self Service Users... 3 Vendor Registration... 4 Vendor Self Service Home Page...
More informationELECTRONIC SITE DELEGATION LOG (esdl) USER MANUAL
Version 1.0 24May16 ELECTRONIC SITE DELEGATION LOG (esdl) USER MANUAL - Table of Contents - 1. INTRODUCTION... 3 Background... 3 Purpose of the Site Delegation Log... 3 TNCC Contacts... 3 2. SYSTEM REQUIREMENTS...
More informationOffer Description : Cisco Webex
: Cisco Webex This (the ) describes Cisco Webex (the Cloud Service ). Your subscription is governed by this and the Cisco Universal Cloud Agreement located at www.cisco.com/go/uca (or similar terms existing
More informationEmsi Privacy Shield Policy
Emsi Privacy Shield Policy Scope The Emsi Privacy Shield Policy ( Policy ) applies to the collection and processing of Personal Data that Emsi obtains from Data Subjects located in the European Union (
More information