JSAC DALLAS, TX. Presented by: June E. Martin Raytheon April 2008
|
|
- Hubert Foster
- 5 years ago
- Views:
Transcription
1 JSAC DALLAS, TX Presented by: June E. Martin Raytheon April 2008
2 Objective Provide Overview of JPAS Policy Provide Information Update JPAS e-qip Suitability/Security Investigation Index (SII) e-fingerprinting
3 Procedures Governing Use of JPAS by Cleared Contractors Defense Security Service April 2008 National Industrial Security Program Operating Manual (NISPOM) paragraph 2-200b states that When the CSA [Cognizant Security Agency] has designated a database as the system of record for contractor eligibility and access, the contractor shall be responsible for annotating and maintaining the accuracy of their employees access records. Specific procedures will be provided by the CSA. The Department of Defense, acting as a CSA, has designated the Joint Personnel Adjudication System (JPAS) as the DoD system of record for contractor eligibility and access. JPAS is a U.S. Government information system that contains official government records. The information in JPAS must be protected from unauthorized disclosure and used only for authorized purposes. Contractors may only use their JPAS accounts to manage the access records of their employees and consultants, and to verify the access levels and affiliations (e.g., employee of ABC Company) of incoming visitors who require access to classified information. The following procedures are issued under the authority provided by NISPOM paragraph 2-200b. Contractors shall follow these procedures when using JPAS and shall ensure that authorized users of JPAS have been properly informed about these procedures and any other specific policies governing access to and use of JPAS. 1. Contractors shall accurately maintain the JPAS records pertaining to their employees and consultants. Contractors must expeditiously update these records when changes occur (e.g., termination of employment). 2. Contractors are prohibited from placing false information in JPAS, and DSS will seek appropriate sanctions against contractors and contractor employees who knowingly place false information in JPAS.
4 Procedures Governing Use of JPAS by Cleared Contractors Defense Security Service April DoD issues JPAS accounts exclusively for use by a specific contractor or corporate family of contractors. Persons given access to JPAS as account holders may only use JPAS on behalf of the cleared contractor or corporate family of contractors through which the account was issued. For example, an employee of ABC Company holding a JPAS account issued through ABC Company and who works at a government site is not authorized to use the contractor-granted account in support of the government customer. If the government customer requires the contractor employee to review or update JPAS records on behalf of the government customer, the government customer must provide the JPAS account for the contractor employee to use. 4. The JPAS account manager must be a company employee. The JPAS account manager cannot be a subcontractor or consultant. 5. Contractors may subcontract or obtain consultant support for administering security services. The using contractor will provide a JPAS account to the subcontractor or consultant under the using contractor s Security Management Office (SMO) for the sole purpose of permitting the subcontractor or consultant to provide security services for the using company. Subcontractors or consultants providing such security services must be under the direct supervision of the using contractor s FSO or FSO s designee. 6. Each individual accessing JPAS must have a separate and unique account created by the individual s JPAS account manager. The account manager must maintain a current record of every JPAS account established. 7. JPAS users may never share their user names, passwords, or other authentication information with any other individual, including anyone who is a designee or an alternate to the account holder. 8. Contractors must not allow any practices that include sharing user names, passwords, or other authentication information, and must have policies in place that guard against such practices. Contractors can establish JPAS accounts for additional users when a reasonable need exists.
5 Procedures Governing Use of JPAS by Cleared Contractors Defense Security Service April Access to JPAS is only authorized by means of company or government-owned equipment with appropriate security controls in place. JPAS users may not access their accounts from personal or home computers. 10. Contractors are not permitted to change an existing date notation in JPAS for the Classified Information Nondisclosure Agreement (SF 312). Contractors must, however, input the date that the SF 312 was signed when JPAS does not reflect a date. 11. Contractors are authorized to verify prospective employees eligibility for access to classified information in JPAS prior to an offer of employment being extended. However, contractors may not use JPAS for recruiting purposes. 12. While access to JPAS is only granted to contractors who have a legitimate need for such access in support of classified work being performed for the Government, JPAS is not a classified system. DSS will not grant a facility security clearance (FCL) for the sole purpose of allowing a company or its employees to gain access to JPAS. 13. Any contractor with JPAS access that becomes aware of a violation of these procedures shall immediately report the nature of the violation, the names of the responsible parties, and a description of remedial action taken, to the servicing DSS Industrial Security Representative. NOTE: Violations of the procedures may lead DSS to suspend or withdraw JPAS access, terminate the JPAS account, or exclude culpable companies or persons from access to JPAS for a specified or indefinite period. DSS will also refer information concerning violations of these procedures to other federal agencies for consideration of administrative, civil or criminal sanctions when circumstances warrant.
6 DSS Gateway The JPAS web site and application access point ( has been decommissioned. All related links, application access and information for JPAS will be available by going to The DSS website is the link to all DSS applications. Scroll over Applications and scroll up to JPAS (Joint Personnel Adjudication System) In the future, DSS will allow single sign-on, so once you enter the site, your password and user ID will provide access to all authorized DSS applications.
7 JPAS Login Page Login screen The JPAS home page is the entry point to JPAS. Access to JPAS requires a User ID and Password from your Account Manager. Once your JPAS account has been established, single-click on JPAS Login the JPAS Disclosure screen will open. Agree and log in.
8 Request to Research/Recertify/ Upgrade Eligibility (RRU) Submit an RRU to: Request CAF to research, recertify, or upgrade an individual's eligibility Request SSN Correction (DISCO may request copy of SSN card) You can only submit one RRU per person at a time Any JCAVS user within the same Security Management Office (SMO) can cancel an RRU if it has not yet been assigned to an adjudicator Once cancelled, a JCAVS user can resubmit another RRU Industry RRUs should be submitted to DISCO ONLY
9 Eligibility (RRU) 25% of RRUs are for investigation and/or adjudication status checks RRUs are currently taking days to process Do NOT submit RRUs for status checks - Call the Customer Call You will be notified of RRU changes by one of the following: RRU Response Notification Eligibility Change Notification Message From CAF It s okay to respond to CAF via RRU
10 JCAVS Request to Research/Recertify/Upgrade Eligibility To Cancel RRU Select Cancel Request Then Click Save
11 Incident Reports/Adverse Information Incident Reports allows JCAVS Users to record Incidents and submit electronically to the CAF. Only the JCAVS User that submitted the Incident Report or those with a PSM Net relationship with the Person should be able view the Incident Report details. HOWEVER Any User Level 2-6 can take on a servicing relationship and view Incident Report details. Workaround Submit as Final report. Be sure to print copy before submitting, once submitted, you will not be able to review the report If you need to submit a Followup report, initiate another Incident Report and indicate in the description that this is a follow-up to the Incident Report submitted on yymmdd. RECOMMEND NOT TO SUSPEND ACCESS!!!
12 Person Summary Screen Displays "INCIDENT REPORT" An industrial individual may be in-processed at a new entity and given access Visit requests may be submitted for the subject when there is a pending incident report Instances reported that the location to be visited will not honor the visit request How the visine is applied to take out the red An adjudicator reviews the report Makes a determination on how to resolve reported issues request an investigation, or decide no additional action is necessary When the issue is resolved or determined it is not of adjudicative significance, the adjudicator closes the incident by updating JPAS The red will be removed
13 Security Management Office Establish Internal Higherarchy Parent/Child Relationship Account Management Function Create/Modify/Update information as applicable
14 Establishing a SMO On main menu select: Maintain SMO Enter Search Criteria on SMO you wish to establish Click search or add Enter required information not required but recommended Check designated box if required (i.e., Polygraph)
15 PSM Net Validation From the Main Menu select PSM Net Will take you to JCAVS Maintain PSM Net Screen Select Person Categories by Organization Click Add - Will take you to PSM Net Add Organization Category Hit Select Organization - Will take you to organization search Select DoD Contractor Companies Enter your cage code (plus *) in last box Click Search selected cage will show up Click blue link indicating cage code; company name will move to top line Click OK Will take you back to PSM Net Add Org Click Search Search result will indicate all persons associated with your cage that are not in your PSM Net Determine if each person listed should be in your PSM Net If Yes In-process and indoctrinate If No In-process and out-process using the same date; then go to add/modify screen and enter separation date and separation code. At midnight the person will drop out of your PSM Net and will no longer be associated with your Cage
16 Data Validation Once you ve established your PSM Net, you ll need to validate the data for each person s record Social Security Numbers Eligibility Investigation Date Date of Birth Place of Birth Marital Status Indoctrinations NdA NdS (RRU) (RRU) (RRU) (Change yourself) (Change yourself) (Change yourself) (Change yourself) (Change yourself) (Change yourself)
17 Reports Several different types of reports: Personnel Report Periodic Reinvestigations PSM Net On Demand Reports Can select One or All Organizations within a SMO Can Sort by Name or SSN Can be downloaded into either PDF or Excel file
18 Frequently Asked Questions (FAQs) Posted on the JPAS Website Applicant Tips for Successful e-qip Submission on JPAS web page under Documentation
19 JPAS/e-QIP
20 Prime Contract Numbers (September 2007) You will need to enter a contract number for each Investigation Request It should include the contract number itself as well as the identification of the Govt customer requiring the PCL Examples: NAVY: N D-0014 AIR FORCE: F D-1234 ARMY: SCI: DA D-7819 If requesting an investigation for SCI access or SAP access, enter SCI or SAP between the Govt customer and the contract number If contract number is classified, enter the word Classified in place of the contract number If contract number and Govt identification is classified enter only the word Classified Do not type various or multiple in this field See DSS website for additional information on this subject
21 Break in Service Allows the user to indicate that a Break in Service has occurred for the person. The JCAVS user can indicate when a person has had a Break in Service. The Break in Service allows a new Investigation Request to be submitted for a person even though their investigation date may be current.
22 Break in Service To Select Break in Service Select Eligibility Enter Contract Number Check Break in Service Then Hit Determine Invest Type
23 Signature Pages Signature Pages must be electronically attached to the SF86 before Industry can submit to DISCO Required signature pages include: Certification Page Authorization for Release of Information Medical Release (if subject answers Yes to Question #21) Subject s name now defaults in typed format Rejection rate for incorrect name has been reduced Methods for submission of Signature Pages Fax - can be faxed to JPAS repository by anyone from anywhere Upload - can only be uploaded by JPAS User Uploading appears to be the preferred method Signature Pages not submitted within 60 days of an eqip submission will cause the eqip to terminate
24 PSI Automation Signature Pages FAX FAX (Fax number: ) JPAS uses Optical Character Recognition (OCR) to read the investigation request number from the signature page and associates each fax to the correct Investigation Request and document type. DO NOT USE COVER SHEETS (clogs up the system). JPAS Users can print signature pages from JPAS, or the subject can print them from e-qip once they ve certified their SF86. Faxed documents are stored in the JPAS repository until the Investigation Request is approved. Documents are sent to OPM upon DISCO Approval. Upon DISCO approval, documents are no longer accessible.
25 PSI Automation Signature Pages Upload Upload The JCAVS User can browse and select a document from a local or network drive to upload. Documents must be scanned and saved individually prior to upload. The User identifies the type of document and appropriate Investigation Request through selections in JPAS. Documents are uploaded directly to JPAS in real-time and are not stored in the JPAS document repository. All uploaded documents must be in.pdf format and cannot be larger than 1 mg. Only JPAS Users can upload signature pages, JPAS access is required.
26 Add/Modify Invest. Request Ready for Review, No Documents Note: When you FAX a document the system will read the Investigation Request Number and automatically populate the appropriate document box. Notice the Submit to DISCO button is not available
27 Invest. Request Documents Ready for Review, No Documents When you scan a document, you must select document type and locate the document. Ensure you have a naming scheme which will clearly identify the appropriate document to be uploaded.
28 Add/Modify Investigation Request Documents attached Submit to DISCO button will only be available when required documents are received in JPAS.
29 Invest. Request Documents Ready for DISCO (JAMS and JCAVS) Signature pages can be viewed and replaced in JPAS and are available for review until approved by DISCO. JPAS displays History of received documents - Method (Fax or Upload), Date and Time, Result (Success or Failure)
30 e-qip Timelines Initiating Once an Investigation Request is initiated in JPAS, an applicant has 30 days to login to e-qip and start their PSQ or the Investigation Request is terminated. Once an Investigation Request is initiated in JPAS, an applicant has 90 days after their initial e-qip login date to complete their PSQ or the Investigation Request is terminated. Reviewing and Approving Once the applicant has completed the PSQ, it must be reviewed and approved by the appropriate agency within 90 days or the Investigation Request is terminated. Pending PSQs An Investigation Request that remains in a Pending Status and is not "Initiated" will be deleted 30 days after creation. Stopped PSQs If an applicant has started to complete a PSQ but the Investigation Request is stopped, it must be resumed within 90 days. If the applicant has not started to complete a PSQ, but the Investigation Request is stopped, it must be resumed within 30 days. Revised PSQs An applicant has 60 days to log into e-qip and complete updates to their PSQ if revisions are required.
31 PR Requests &Fingerprint Cards If the previous Investigation is annotated as NACLC or ANACI, the Investigation Request will be recognized as a Periodic Investigation. Fingerprint cards are not required If the previous Investigation is annotated as NAC, ENAC, or NACI, the Investigation Request will NOT be recognized as a Periodic Investigation Request. Fingerprint cards are required. Periodic Reinvestigation = Yes if previous investigation is: NACLC ANACI Periodic Reinvestigation = No if previous investigation is: NAC ENAC NACI
32 Releases and Fingerprint Cards Send fingerprint cards to: Mail: FedEx: e-qip Rapid Response Team OPM-FIPC PO Box 618 Boyers, PA New zip code effective 07/07 e-qip Rapid Response Team OPM-FIPC 1137 Branchton Road Boyers, PA New zip code effective 07/07
33 e-fingerprinting DSS is looking into implementing a store-andforward E-Fingerprint capability that will provide the fingerprint files to OPM Phase I Beta Testing scheduled for end of June Phase II Evaluate results of Beta Test
34 Perform SII Search (SII - Suitability/Security Investigations Index) The information contained on the e-clearance screen is read only and is used to verify the following info: JPAS Person Information Indicates Last Name, SSN and DOB entered by the user to search for a record. SII Person Information Indicates Last Name, SSN and DOB returned by the SII. SII AKA Names Indicates any AKA information returned by the SII. SII Investigation Summary Indicates investigation information returned by SII. SII Clearance Summary Indicates information returned by SII. SII Messages This portion of the screen displays any messages returned by SII. Note. If the OPM SII database is down, the following text will be displayed under "SII Messages:" The OPM CVS/SII System is NOT available *PASSCODE ERROR: When initiating an investigation request and names do not match.
35 SII Search - Status Info (Investigation Summary) RECEIVED - The case has been received at OPM via e-qip and is in the review process prior to being SCHEDULED SCHEDULED - The case is open at OPM and the investigation has started. UNACCEPTABLE - The case does not meet OPM standards and has been rejected. These must be entirely resubmitted. CA CONSIDERED - This is used when during the course of an investigation, information is developed which requires the opening of a new lead that is beyond the normal scope of an investigation at that particular level. It is not necessarily a bad thing, just a need for more information. In some cases OPM uses this when they are waiting for information from outside agencies that has delayed the case. Unlike the CLOSED PENDING designation, these cases are still open and seem to progress reasonably well. CP Closed Pending - The case is closed awaiting information from an outside agency that has taken too long. In some cases this may be due to an inability to perform a subject interview due to deployment of the subject to a location that is not served by OPM. RSI Reopen Security Investigation - When a closed case is reopened as a request from DISCO for additional information before an adjudication is determined.
36 Eligibility Update The NRO is manually loading eligibility info into JPAS for all cases they process effective January 2008 (New and PRs) We no longer have to track the completion to then submit an RRU to DISCO to have the eligibility verified and crossed over Saves Industry time and effort Saves 3-4 months in cycle time RRUs are still required for eligibility updates prior to January 2008 NSA is providing data loads nightly to JPAS and a full refresh of all data once a month
Electronic Questionnaire for Investigation Processing (e-qip) JSAC Workshop April June E. Martin Raytheon
Electronic Questionnaire for Investigation Processing (e-qip) JSAC Workshop April 2008 June E. Martin Raytheon 1 Electronic Questionnaire for Investigation Processing (e-qip) JSAC Workshop Acknowledgement
More informationElectronic Submission of Signature Pages Developed by the JPAS Industry Team
Electronic Submission of Signature Pages Developed by the JPAS Industry Team JAN 07 Page 1 Agenda Overview PSI Automation Signature Pages Fax (Fax number TBD) Upload Screen Shot Review JPAS Questions &
More informationAskPSMO-I. Security Violations Zaakia Bailey Defense Security Service. October 28, :30 PM EST
AskPSMO-I For audio, dial: 1-888-946-3805 Enter participant code: 8672177 Security Violations Zaakia Bailey Defense Security Service October 28, 2014 1:30 PM EST Dashboard Announcements SWFT JPAS OPM PSMO-I
More informationAskPSMO-I. Customer Service Requests Nicholas Levasseur Defense Security Service. August 26, :30 PM EST
AskPSMO-I For audio, dial: 1-888-989-9786 Enter participant code: 6039400 Customer Service Requests Nicholas Levasseur Defense Security Service August 26, 2014 1:30 PM EST Dashboard Announcements JPAS
More informationPresented by: Mike Ray Personnel Security Management Office for Industry (PSMO-I)
PSMO-I Personnel Security Update July 2016 Presented by: Mike Ray Personnel Security Management Office for Industry (PSMO-I) Functions of the PSMO-I Personnel Clearance Oversight Initiate Investigate Adjudicate
More informationIndustrial Security Facilities Database (ISFD) Job Aid. December 2014
Industrial Security Facilities Database (ISFD) Job Aid December 2014 Page 2 Table of Contents Introduction Logging into ISFD Navigating ISFD Changing Passwords Update My Info Request for Information Submit
More informationISFD Release Notices Industrial Security Facilities Database (ISFD) v Metrics Release Notes [Effective February 22, 2014]:
ISFD Release Notices Industrial Security Facilities Database (ISFD) v4.0.0.4 Metrics Release Notes [Effective February 22, 2014]: The ISFD system provides a centralized web-based platform for the Industrial
More informationDefense Information System for Security (DISS) Frequently Asked Questions (FAQs)
Defense Manpower Data Center Personnel Security & Assurance Defense Information System for Security (DISS) Frequently Asked Questions (FAQs) Document Version 1.3 28 March 2017 Document History Version
More informationUNCLASSIFIED. Tips and Tricks. November, UNCLASSIFIED
UNCLASSIFIED Tips and Tricks November, 19 2018 UNCLASSIFIED User Manual Location Upon logging in, you can access the JVS User Manual by selecting the Help link located at the top left of your screen 2
More informationSecure Web Fingerprint Transaction (SWFT) Access, Registration, and Testing Procedures
Defense Manpower Data Center Personnel Security & Assurance Secure Web Fingerprint Transaction (SWFT) Access, Registration, and Testing Procedures Version 3.2 July 20, 2016 CONTRACT NUMBER GS00Q09BGD0027
More informationRevised 8/15/2013 OIG COMPLIANCE NOW VENDOR PROGRAM INSTRUCTION MANUAL 1. REGISTRATION 2. TERMS AND CONDITIONS 3. PAYMENT
OIG COMPLIANCE NOW VENDOR PROGRAM INSTRUCTION MANUAL 1. REGISTRATION 2. TERMS AND CONDITIONS 3. PAYMENT 4. LOGIN 5. ADD USERS 6. UPLOAD EMPLOYEE DATA 7. INVESTIGATION 8. REPORTING 9. EXCLUSIONS 10. W-9
More informationEnterprise Income Verification (EIV) System User Access Authorization Form
Enterprise Income Verification (EIV) System User Access Authorization Form Date of Request: (Please Print or Type) PART I. ACCESS AUTHORIZATION * All required information must be provided in order to be
More informationINSTRUCTION MANUAL OIGCN VENDOR PROGRAM
INSTRUCTION MANUAL OIGCN VENDOR PROGRAM REGISTRATION TERMS AND CONDITIONS PAYMENT LOGIN ADD USERS UPLOAD EMPLOYEE DATA INVESTIGATION REPORTING EXCLUSIONS W-9 FORM REGISTRATION Go to Home page: http://www.sanctionscreeningnow.com
More informationUNCLASSIFIED. Tips and Tricks. August 20, 2018 UNCLASSIFIED
UNCLASSIFIED Tips and Tricks August 20, 2018 UNCLASSIFIED User Manual Location Upon logging in, you can access the JVS User Manual by selecting the Help link located at the top left of your screen 2 Provisioning
More informationWide Area Network Approvals Memorandum of Understanding SIPRNET. JSAC Dallas Fort Worth April JD Springer
Wide Area Network Approvals Memorandum of Understanding SIPRNET JSAC Dallas Fort Worth 16 17 April 2008 JD Springer There are essentially two types of WAN connections Those where some other Agency is the
More informationECA Trusted Agent Handbook
Revision 8.0 September 4, 2015 Introduction This Trusted Agent Handbook provides instructions for individuals authorized to perform personal presence identity verification of subscribers enrolling for
More informationCOVERED CALIFORNIA ENROLLMENT ASSISTANCE PROGRAM
This document outlines all features and functions available to Entity Business Contacts in the Certification Portal. It details the functions that you as an Entity User have including the account registration
More informationSecure Web Fingerprint Transaction (SWFT) Frequently Asked Questions
Defense Manpower Data Center Personnel Security and Assurance Secure Web Fingerprint Transaction (SWFT) Frequently Asked Questions Version 1.4 March 1, 2017 Contract Number: GS00Q09BGD0027 Task Order:
More informationFederal Vendor Portal & e-invoicing User Guide. January 2018
Federal Vendor Portal & e-invoicing User Guide January 2018 Federal Vendor Portal IMPORTANT NOTICE TO: Deloitte s Federal Practice Suppliers As part of our due diligence to pre-qualify suppliers for potential
More informationPCORI Online: Awardee User Guide Research Awards
PCORI Online: Awardee User Guide Research Awards Updated as of 1/31/18 1 Table of Contents Section 1: Introduction to PCORI Online... 3 1.1 Getting Started - Tips for Using PCORI Online... 4 1.2 Logging
More informationTable of Contents. Overview of the TEA Login Application Features Roles in Obtaining Application Access Approval Process...
TEAL Help Table of Contents Overview of the TEA Login Application... 7 Features... 7 Roles in Obtaining Application Access... 7 Approval Process... 8 Processing an Application Request... 9 The Process
More informationVirginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Personnel Security Standard This standard is applicable to all VCU School of Medicine personnel. Approval
More informationDEFENSE SECURITY SERVICE PRIVACY IMPACT ASSESSMENT GUIDANCE AND TEMPLATE
DEFENSE SECURITY SERVICE PRIVACY IMPACT ASSESSMENT GUIDANCE AND TEMPLATE Version 1.0 28 October 2008 1 DSS PRIVACY IMPACT ASSESSMENT For Industrial Security Facilities Database (ISFD) Project Identifying
More informationFCC USAC Joint Training Event
FCC USAC Joint Training Event Certification and Recertification June 19, 2012 Washington, DC To edit this footer, select the View tab, then Slide Master and edit the first Master Slide. 1 Initial Certification
More informationEmsi Privacy Shield Policy
Emsi Privacy Shield Policy Scope The Emsi Privacy Shield Policy ( Policy ) applies to the collection and processing of Personal Data that Emsi obtains from Data Subjects located in the European Union (
More informationPrivate Sector Clearance Program (PSCP) Webinar
Private Sector Clearance Program (PSCP) Webinar Critical Infrastructure Protection Committee November 18, 2014 Nathan Mitchell, ESCC Clearance Liaison Agenda History NERC CIPC Private Sector Clearance
More informationApplication and Instructions for Firms
United States Environmental Protection Agency Office of Prevention Pesticides, and Toxic Substances EPA 747-B-99-001 March 2010 https://www.epa.gov/lead Application and Instructions for Firms Applying
More informationDefense Security Service
Office of the Chief Information Officer National Industrial Security Program (NISP) Central Access Information Security System (NCAISS) Project HS0021-15-F-0111 CICN: 0000-DOC-GD-27588-00 November 29,
More information403(b) & 457 TPA Participant Website Instructions
403(b) & 457 TPA Participant Website Instructions 403(b) & 457 TPA Participant Website Instructions In order to access the website via the login page (above), please do the following: Go to the main Envoy
More informationEXCEL HEALTHCARE STAFFING AND REFERRAL AGENCY
APPLICATION FOR EMPLOYMENT (Please Fill Out Completely) Date of Application Social Security Number / / Print Full Name Home Phone: Mobile: Email: Address City State Zip Code Position Applied For Documents
More informationTexas Department of Family and Protective Services
Texas Department of Family and Protective Services Automated Background Check System (ABCS) User Guide Updated April 2018 Table of Contents DFPS AUTOMATED BACKGROUND CHECK SYSTEM (ABCS) USER MANUAL Summary
More informationSystem Administration Guide
System Administration Guide 1. Access Commander 7. System Profile 2. Getting Started 8. User Monitor 3. System Utilities 9. User Profile 4. Facility Info Appendix A: JPAS Data Import/ Refresh Configuration
More informationMedicare Enrollment Application Submission Options
The Basics of Internet-based Provider Enrollment, Chain and Ownership System (PECOS) for Durable Medical Equipment, Prosthetics, Orthotics, and Supplies (DMEPOS) Suppliers Beginning October 4, 2010, the
More informationChild Care Civil Background Check System (CCCBC System) User Manual for Providers and Approved Entities
Child Care Civil Background Check System (CCCBC System) User Manual for Providers and Approved Entities Issue Date: March 13, 2019 1 Table of Contents Overview of the Child Care Criminal Background Check
More informationChild Care Civil Background Check System (CC-CBC System) User Manual for Providers and Approved Entities
Child Care Civil Background Check System (CC-CBC System) User Manual for Providers and Approved Entities Issue Date: March 5, 2018 Table of Contents Overview of Changes 3 New Child Care Criminal Background
More informationAppendix 3: Subscribing Entity Reference Guide to NGI s Rap Back Service Version 2.1 June 1, 2014
Appendix 3: Subscribing Entity Reference Guide to NGI s Rap Back Service Version 2.1 June 1, 2014 Note to Submitters: The information in this document is provided for you to use in any manner most appropriate
More informationNFAAS. Navy Family Member s Guide
NAVY FAMILY ACCOUNTABILITY AND ASSESSMENT SYSTEM NFAAS Version 2.2 Navy Family Member s Guide Version 1.3 11 February 2008 SPAWAR Systems Center Pacific 53560 Hull Street, Code 53255 San Diego CA 92152-5000
More informationOracle Banking Digital Experience
Oracle Banking Digital Experience Checking Account Originations User Manual Release 18.2.0.0.0 Part No. E97823-01 June 2018 Checkings Account Originations User Manual June 2018 Oracle Financial Services
More informationQNB Bank-ONLINE AGREEMENT
This is an Agreement between you and QNB Bank ("QNB"). It explains the rules of your electronic access to your accounts through QNB Online. By using QNB-Online, you accept all the terms and conditions
More informationRFM Procedure 3: Certification Body Approval for Chain of Custody Standard. Alaska Responsible Fisheries Management (RFM) Certification Program 17065
RFM Procedure 3: Certification Body Approval for Chain of Custody Standard Alaska Responsible Fisheries Management (RFM) Certification Program 17065 RFM Version 4, Jan 2018 1 1.0 Purpose This document
More informationScreening Point Army Master Screener Product Quality Deficiency Report (PQDR) Processing In Product Data Reporting and Evaluation Program (PDREP)
Screening Point Army Master Screener Product Quality Deficiency Report (PQDR) Processing In Product Data Reporting and Evaluation Program (PDREP) User Guide February 2018 Table of Contents FOREWORD 1 INTRODUCTION
More informationOracle Banking Digital Experience
Oracle Banking Digital Experience US Originations Checking Account User Manual Release 17.1.0.0.0 Part No. E83887-01 March 2017 US Originations Checking Account User Manual March 2017 Oracle Financial
More informationManaged Access Gateway. Request Management Guide (For Administrators)
Managed Access Gateway Request Management Guide (For Administrators) Version 2.0 Exostar, LLC October 14, 2013 Table of Contents Purpose...1 Overview...2 Organization Administrator Tasks...3 Verify User's
More informationUser Manual for. Architect-Engineer Contract Administration Support System (ACASS) And Construction Contractor Appraisal Support System (CCASS)
User Manual for Architect-Engineer Contract Administration Support System (ACASS) And Construction Contractor Appraisal Support System (CCASS) November 2012 Current Version 3.11.0 HTTPS://WWW.CPARS.GOV
More informationCONTENTS. SETUP SECURITY ENHANCEMENTS Existing User New User (Enrolled by Employer or Self)... 18
FSA EMPLOYEE WEBSITE GUIDE CONTENTS BROWSER COMPATIBILITY... 2 ONLINE ENROLLMENT... 3 Online Enrollment Process... 3 Online Enrollment Option for Existing Employees... 11 REGISTERING YOUR ACCOUNT FOR ONLINE
More informationProduct Data Reporting and Evaluation Program (PDREP) Automated Information System (AIS) Corrective Action Record (CAR)
Product Data Reporting and Evaluation Program (PDREP) Automated Information System (AIS) Corrective Action Record (CAR) User Guide May 2018 TABLE OF CONTENTS FOREWORD 3 INTRODUCTION 4 1. CORRECTIVE ACTION
More informationTexas Department of Family and Protective Services
Texas Department of Family and Protective Services Automated Background Check System (ABCS) User Guide Updated November 2016 Table of Contents DFPS AUTOMATED BACKGROUND CHECK SYSTEM (ABCS) USER MANUAL
More informationCommon Operating Environment (COE) Platform Certification Program. Certification Policy
Common Operating Environment (COE) Platform Certification Program Certification Policy February 2004 Version 2.0 Copyright February 2004, The Open Group All rights reserved. No part of this publication
More informationOracle Banking Digital Experience
Oracle Banking Digital Experience Checking Account Originations User Manual Release 17.2.0.0.0 Part No. E88573-01 July 2017 Checkings Account Originations User Manual July 2017 Oracle Financial Services
More informationEDENRED COMMUTER BENEFITS SOLUTIONS, LLC PRIVACY POLICY. Updated: April 2017
This Privacy Policy (this Privacy Policy ) applies to Edenred Commuter Benefits Solutions, LLC, (the Company ) online interface (i.e., website or mobile application) and any Edenred Commuter Benefit Solutions,
More informationProduct Data Reporting and Evaluation Program (PDREP) Automated Information System (AIS) Prime Contractor Module
Product Data Reporting and Evaluation Program (PDREP) Automated Information System (AIS) Prime Contractor Module User Guide February 2018 Table of Contents FOREWORD 1 INTRODUCTION 2 1 ACCESSING THE PDREP-AIS
More informationCHAP LinQ User Guide. CHAP IT Department Community Health Accreditation Partner 1275 K Street NW Suite 800 Washington DC Version 1.
2015 CHAP LinQ User Guide CHAP IT Department Community Health Accreditation Partner 1275 K Street NW Suite 800 Washington DC 2005 Version 1.1 CHAP LINQ USER GUIDE - OCTOBER 2015 0 Table of Contents ABOUT
More informationDFARS Cyber Rule Considerations For Contractors In 2018
Portfolio Media. Inc. 111 West 19 th Street, 5th Floor New York, NY 10011 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com DFARS Cyber Rule Considerations For Contractors
More informationRhode Island Medicaid Provider Enrollment User Guide. Executive Office of Health and Human Services Medicaid
Rhode Island Executive Office of Health and Human Services Medicaid Ordering, Prescribing, Referring Provider User Guide Version 1.0 DXC Technology PR0123 V1.0 06/19/2017 Rhode Island Page 1 of 24 Revision
More informationLicensure and Certification Tracking System (LACTS) User Manual. July 2013
Licensure and Certification Tracking System (LACTS) User Manual July 2013 Contents Overview... 2 Who this document is for?... 2 Supported Browsers... 2 Internet Explorer 9 Settings... 2 Search Facility
More informationVoya s Distributions with EASE User Guide
Voya s Distributions with EASE User Guide Version 3.13 February 2018 Table of Contents Page Introduction / How Does it Work?... 3 When is Paperwork Required?... 4 Participant Online Reacceptance... 4 Security
More information2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY
2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY Purpose: The purpose of this policy is to provide instruction and information to staff, auditors, consultants, contractors and tenants on
More informationPrevention of Identity Theft in Student Financial Transactions AP 5800
Reference: Fair and Accurate Credit Transactions Act (Pub. L. 108-159) The Board recognizes that some activities of the Shasta-Tehama-Trinity Joint Community College District, "District," are subject to
More informationFACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS?
FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? Financial companies choose how they share your personal information. Federal law gives consumers the right to limit
More informationDevelopment Application Online. HowTo guide for applicants
Development Application Online HowTo guide for applicants Disclaimer While every reasonable effort has been made to ensure that this document is correct at the time of printing, the State of NSW, its agents
More informationCourse Outline Repository Guide
Contents... 1 How do I access the Course Outline Repository?... 1 How do I use the Course Outline Repository?... 2 How do I search the Course Repository?... 2 Where do I download the course outline?...
More informationLoan Closing Advisor SM. User Guide. December 2017
Loan Closing Advisor SM User Guide December 2017 Notice This User Guide is Freddie Mac s CONFIDENTIAL INFORMATION as defined in and subject to the provisions of the Freddie Mac Single Family Seller/Servicer
More informationINFORMATION SYSTEM SECURITY
INFORMATION SYSTEM SECURITY For Users of Classified Information Systems (IS) 1 Disclaimer This briefing is generic in nature and should be used as a guideline for briefing System Users. 2 Overview Acronyms
More informationVoya s Distributions with EASE
Voya s Distributions with EASE User Guide for Third Party Administrators Version 3.10 November 2016 Table of Contents Introduction. 3 When is Paperwork Required. 3 Security Roles... 3 How does It Work
More informationShaw Privacy Policy. 1- Our commitment to you
Privacy Policy last revised on: Sept 16, 2016 Shaw Privacy Policy If you have any questions regarding Shaw s Privacy Policy please contact: privacy@shaw.ca or use the contact information shown on any of
More informationGETS Procurement Officer Guide. School Infrastructure. Education Infrastructure Service (EIS)
Education Infrastructure Service (EIS) GETS Procurement Officer Guide School Infrastructure School Property Procurement GETS Procurement Officer Guide 2017-2 Page 1 of 19 Index Section Page 1. Glossary
More informationINDUSTRIAL SECURITY. 1. (1-200) Security for Wireless Devices, Services and Technologies (ISL 05L-1 #10)
DEPARTMENT OF DEFENSE DEFENSE SECURITY SERVICE, INDUSTRIAL SECURITY PROGRAM OFFICE INDUSTRIAL SECURITY LETTER Industrial Security letters will be issued periodically to inform Industry, User Agencies and
More informationDSS/International Division Overseas - Request for Visit Instruction
This form has two separate Annex documents: Request for Visit Annex 1, (additional facilities) Request for Visit Annex 2, (additional names) DSS/International Division Overseas - Request for Visit Instruction
More informationElectronic Subcontracting Reporting System (esrs) Department of Defense Government Training
0 Electronic Subcontracting Reporting System (esrs) http://www.esrs.gov Department of Defense Government Training 1 Submitting an Individual Subcontracting Report (ISR) 2 Subcontracting Program: The Basics
More informationApplicant User Guide
Washington Headquarters Services Mass Transportation Benefit Program (MTBP) Web Application Applicant User Guide June 2011 SW Release Version 1.3 User Guide Version 1.6 Table of Contents 1. Introduction...
More informationHow To Apply for a State Job Opening
How To Apply for a State Job Opening DAS Statewide Human Resources Management Talent Acquisition Team July 12, 2018 2 Application Process Prepare View Job Openings Apply Get Hired What Materials & Resources
More informationOracle Insurance QuickView Service Ordering User Guide. Version 8.0
Oracle Insurance QuickView Service Ordering User Guide Version 8.0 February 2009 Oracle Insurance QuickView Service Ordering User Guide Version 8.0 Part # E14966-01 Library # E14885-01 E14886-01 February
More information1 Privacy Statement INDEX
INDEX 1 Privacy Statement Mphasis is committed to protecting the personal information of its customers, employees, suppliers, contractors and business associates. Personal information includes data related
More informationAmerican Association for Laboratory Accreditation
R311 - Specific Requirements: Federal Risk and Authorization Management Program Page 1 of 10 R311 - Specific Requirements: Federal Risk and Authorization Management Program 2017 by A2LA. All rights reserved.
More informationCOMPLIANCE INFORMATION SYSTEM. Vendor/Consultant. User Guide
COMPLIANCE INFORMATION SYSTEM Vendor/Consultant User Guide December 2015 The following revisions have been made to this manual: CURRENT REVISIONS- DECEMBER 2015 Revision Description Revision Page What
More informationUser Manual for. Contractor Performance Assessment Reporting System (CPARS) December 2014 Current Version UHTTPS://WWW.CPARS.
User Manual for Contractor Performance Assessment Reporting System (CPARS) December 2014 Current Version 4.0.2 UHTTPS://WWW.CPARS.GOV 2BForeword The purpose of this manual is to provide working-level procedures
More informationFedRAMP: Understanding Agency and Cloud Provider Responsibilities
May 2013 Walter E. Washington Convention Center Washington, DC FedRAMP: Understanding Agency and Cloud Provider Responsibilities Matthew Goodrich, JD FedRAMP Program Manager US General Services Administration
More informationBCN Telecom, Inc. Customer Proprietary Network Information Certification Accompanying Statement
BCN Telecom, Inc. Customer Proprietary Network Information Certification Accompanying Statement BCN TELECOM, INC. ( BCN" or "Company") has established practices and procedures adequate to ensure compliance
More informationProduct Data Reporting and Evaluation Program (PDREP) Automated Information System (AIS) Supplier Audit Program (SAP) Application
Product Data Reporting and Evaluation Program (PDREP) Automated Information System (AIS) Supplier Audit Program (SAP) Application User Guide May 2018 TABLE OF CONTENTS FOREWORD 3 INTRODUCTION 4 1 ACCESS
More informationTimber Products Inspection, Inc.
Timber Products Inspection, Inc. Product Certification Public Document Timber Products Inspection, Inc. P.O. Box 919 Conyers, GA 30012 Phone: (770) 922-8000 Fax: (770) 922-1290 TP Product Certification
More information2. What is Personal Information and Non-Personally Identifiable Information?
Privacy Notice Snipp Interactive, Inc. Last Updated: February 11, 2016 Contents: 1. Introduction 2. What is Personal Information? 3. Information we collect about you 4. Use of Your Information 5. Location
More informationCommittee on National Security Systems. CNSS Policy No. 14 November 2002
Committee on National Security Systems CNSS Policy No. 14 November 2002 National Policy Governing the Release of Information Assurance (IA) Products and Services to Authorized U.S. Persons or Activities
More informationInformation Security Incident Response and Reporting
Information Security Incident Response and Reporting Original Implementation: July 24, 2018 Last Revision: None This policy governs the actions required for reporting or responding to information security
More informationUser Manual for. Contractor Performance Assessment Reporting System (CPARS) January 2018 Current Version UHTTPS://WWW.CPARS.
User Manual for Contractor Performance Assessment Reporting System (CPARS) January 2018 Current Version 5.1.0 UHTTPS://WWW.CPARS.GOV 2BForeword The purpose of this manual is to provide working-level procedures
More informationPROJECT: NEW JERSEY WATER QUALITY DATA EXCHANGE WQX REPORTER USER S GUIDE. Prepared for New Jersey Department of Environmental Protection
PROJECT: NEW JERSEY WATER QUALITY DATA EXCHANGE WQX REPORTER USER S GUIDE Prepared for New Jersey Department of Environmental Protection January 29, 2009 11 Princess Road, Unit A Lawrenceville, New Jersey
More informationAPPENDIX H: McMURDO STATION COMPUTER INFORMATION For more information, visit
APPENDIX H: McMURDO STATION COMPUTER INFORMATION For more information, visit http://www.usap.gov/technology/contenthandler.cfm?id=94 In this appendix, you will find information on the following: H.1 Information
More informationQuick Reference Guide for e-qip Applicants
2016 U.S. Navy Quick Reference Guide for e-qip Applicants OPR CNIC/CSO Welcome, You have been initiated for a background investigation in the Electronic Questionnaires for Investigations Processing (e-qip)
More informationUsing Manage Alarm Tool
Using Manage Alarm Tool Release 1.0 Issue 1 April 2013 2013 Avaya Inc. All Rights Reserved. Notice While reasonable efforts have been made to ensure that the information in this document is complete and
More informationEPAF User Guide. Your guide for navigating the EPAF System
EPAF User Guide Your guide for navigating the EPAF System This booklet outlines the use of Electronic Personnel Action Forms in the Banner Web for Employees. Office of Human Resources 02/08/2013 Frequently
More information2017 ACA Form Processing Large Employers
2017 ACA Form Processing Large Employers Fiscal Coordination December 2017 1 Table of Contents Understanding ACA Reporting... 3 Entering an ACA 1095C Record... 5 Verifying Employee ACA Codes.... 7 Identifying
More informationCAMP USER S GUIDE IFMA CREDENTIALS CREDENTIALS APPLICATION AND MAINTENANCE PROGRAM
CAMP USER S GUIDE IFMA CREDENTIALS CREDENTIALS APPLICATION AND MAINTENANCE PROGRAM VV0118CREDENTIALS APPLICATION AND MAINTENANCE PROGRAM CA User's Guide for IFMA's Credential Application and Maintenance
More informationBenefits Participant Guide
Benefits Participant Guide Table of Contents Refer to the Table of Contents for a full summary of the information contained within this guide. Click the section headings to be brought directly to that
More informationPilieroMazza Webinar Preparing for NIST SP December 14, 2017
PilieroMazza Webinar Preparing for NIST SP 800-171 December 14, 2017 Presented by Jon Williams, Partner jwilliams@pilieromazza.com (202) 857-1000 Kimi Murakami, Counsel kmurakami@pilieromazza.com (202)
More informationAdministrative Changes to TINKERAFBI , Automated Information System (AIS) Access and Data Release Requirements
Administrative Changes to TINKERAFBI 33-110, Automated Information System (AIS) Access and Data Release Requirements OPR: 72 ABW/SCP: Special Mission Division References throughout to https://wwwmil.tinker.af.mil/ites/opr.asp
More informationTraining Guide for Arkansas Law Enforcement Officers and Licensing Board Representatives
Training Guide for Arkansas Law Enforcement Officers and Licensing Board Representatives Arkansas Department of Health Prescription Monitoring Program March 2016 Contents Contents 1 Document Overview...
More informationProvider Monitoring Process
Provider Monitoring Process This statewide provider monitoring process is applicable for all providers including direct vendors, Agency with Choice (AWC) Financial Management Services (FMS) providers and
More informationPennsylvania Certification by Endorsement
Pennsylvania Certification by Endorsement Thank you for your interest in obtaining Pennsylvania EMS Certification by Endorsement. This is the process whereby a person certified by a state other than Pennsylvania
More informationMobile Application Privacy Policy
Mobile Application Privacy Policy Introduction This mobile application is hosted and operated on behalf of your health plan. As such, some information collected through the mobile application may be considered
More informationORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers
All Affiliate Research Policy Subject: HIPAA File Under: For Researchers ORA HIPAA Issuing Department: Office of Research Administration Original Policy Date Page 1 of 5 Approved by: May 9,2005 Revision
More informationUniversity of Pittsburgh Security Assessment Questionnaire (v1.7)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided
More information