Secure Web Fingerprint Transaction (SWFT) Access, Registration, and Testing Procedures

Similar documents
Secure Web Fingerprint Transaction (SWFT) Frequently Asked Questions

Login & Registration Quick Start Guide

Defense Information System for Security (DISS) Frequently Asked Questions (FAQs)

DoD ANNEX FOR MOBILE DEVICE FUNDAMENTALS (MDF) PROTECTION PROFILE (PP) V3.1. Version 1, Release July Developed by DISA for the DoD

Defense Security Service

State of Colorado Cyber Security Policies

Presented by: Mike Ray Personnel Security Management Office for Industry (PSMO-I)

Electronic Questionnaire for Investigation Processing (e-qip) JSAC Workshop April June E. Martin Raytheon

The Common Controls Framework BY ADOBE

DEFENSE SECURITY SERVICE PRIVACY IMPACT ASSESSMENT GUIDANCE AND TEMPLATE

Industrial Security Facilities Database (ISFD) Job Aid. December 2014

AskPSMO-I. Security Violations Zaakia Bailey Defense Security Service. October 28, :30 PM EST

COMPLIANCE MONITORING DATA PORTAL ROLE REGISTRATION USER GUIDE

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY

Extreme Management Center Secure Deployment Guide

SSL Certificates Certificate Policy (CP)

Maria Hishikawa MSIX Technical Lead Sarah Storms MSIX Contractor Security

Extractive Sector Transparency Measures Act. NRCan eservices Portal User Guide

Security Guide Release 4.0

Kroger Supplier Information Management System (SIM) Training Documentation

I. PURPOSE III. PROCEDURE

Virginia Commonwealth University School of Medicine Information Security Standard

Security Standards for Electric Market Participants

FiXs - Federated and Secure Identity Management in Operation

MIS Week 9 Host Hardening

eprost System Policies & Procedures

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers

AMPS Snapshot: User Registration External Users

SECURITY & PRIVACY DOCUMENTATION

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

Emsi Privacy Shield Policy

Version 3.4 December 01,

PayThankYou LLC Privacy Policy

American Association for Laboratory Accreditation

How To Complete Your Own GSA Schedule GovernmentContractingTips.com

BCDC 2E, 2012 (On-line Bidding Document for Stipulated Price Bidding)

ONE ID Identity and Access Management System

Interagency Advisory Board HSPD-12 Insights: Past, Present and Future. Carol Bales Office of Management and Budget December 2, 2008

TRUST IDENTITY. Trusted Relationships for Access Management: AND. The InCommon Model

Odyssey File & Serve. Review Queue User Guide Release 3.11

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

SAFE-BioPharma RAS Privacy Policy

ECONOMIC DISCLOSURE STATEMENT AND AFFIDAVIT (EDS) The web link for the Online EDS is

U. S. AIR FORCE. Air Force Way. Vendor Guide. Version Release # S December 15, 2017

NZ Online Forms for Research Software Manual

New Jersey Department of the Treasury Division of Purchase and Property

erequest Frequently Asked Questions

e-lms Electronic Lodgement of Mailing Statements User Guide Version 4.5

Standard CIP 004 3a Cyber Security Personnel and Training

PI Certification Quick Guide

UT HEALTH SAN ANTONIO HANDBOOK OF OPERATING PROCEDURES

Privacy Policy V2.0.1

Advisory Circular. Subject: INTERNET COMMUNICATIONS OF Date: 11/1/02 AC No.: AVIATION WEATHER AND NOTAMS Initiated by: ARS-100

Adobe Sign and 21 CFR Part 11

CALSTRS ONLINE AGREEMENT TERMS AND CONDITIONS

Administrative Changes to TINKERAFBI , Automated Information System (AIS) Access and Data Release Requirements

Doing Business with Army Contracting Command - Warren

Safeguarding of Unclassified Controlled Technical Information. SAFEGUARDING OF UNCLASSIFIED CONTROLLED TECHNICAL INFORMATION (NOV 2013)

UNCLASSIFIED. Tips and Tricks. November, UNCLASSIFIED

Privacy Policy I. COOKEVILLE COMMUNICATIONS PRIVACY POLICY II. GENERAL PRIVACY GUIDELINES

Services Directorate Dual Persona User Guide for DoD Enterprise Portal Service Military Sealift Command Version September 8, 2016

COMPANY (MU1) FORM FILING - EXTENDED

EXHIBIT A. - HIPAA Security Assessment Template -

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

Enterprise Income Verification (EIV) System User Access Authorization Form

NEW Submit all reports online for FREE

ACCEPTABLE USE POLICY (AUP), v 1.4, 6 January 2012

Customer Proprietary Network Information

CONNECT TRANSIT CARD Pilot Program - Privacy Policy Effective Date: April 18, 2014

existing customer base (commercial and guidance and directives and all Federal regulations as federal)

CERTIFIED MAIL LABELS TERMS OF USE and PRIVACY POLICY Agreement

DATA PRIVACY & PROTECTION POLICY POLICY INFORMATION WE COLLECT AND RECEIVE. Quality Management System

Gradintelligence student support FAQs

<PROJECT NAME> IMPLEMENTATION PLAN

2.5. Funeral Director / Staff User Manual. Michigan EDRS. Michigan Department of Information Technology. (Electronic Death Registration System)

Alternative Credentials for SIPRNet Disadvantaged Users Concept of Operations (CONOPS)

(1) Jisc (Company Registration Number ) whose registered office is at One Castlepark, Tower Hill, Bristol, BS2 0JA ( JISC ); and

Supplier Reference Guide (QRG) Table of Contents

Department of Defense Public Affairs Guidance for Official Use of Social Media

Change Healthcare CLAIMS Provider Information Form *This form is to ensure accuracy in updating the appropriate account

QNB Bank-ONLINE AGREEMENT

Upgrading the Procura Database

User's Guide for IFMA's Credential Application and Maintenance Program (CAMP)

VETDATA PRIVACY POLICY

Texas Department of Family and Protective Services

Committee on National Security Systems. CNSS Policy No. 14 November 2002

Child Care Civil Background Check System (CC-CBC System) User Manual for Providers and Approved Entities

MasterCard NFC Mobile Device Approval Guide v July 2015

Munis Self Service Vendor Self Service. User Guide Version 11.2

Site Impact Policies for Website Use

Introduction to SURE

Agency User Manual. Version 2.0

FLORIDA S PREHOSPITAL EMERGENCY MEDICAL SERVICES TRACKING & REPORTING SYSTEM

Requirements Page 2 of 39

Regional Growth Fund Initial Application Form Snapshots from GMS Portal

Defense Cost and Research Center

OSIsoft PI Cloud Services Privacy Statement

JSAC DALLAS, TX. Presented by: June E. Martin Raytheon April 2008

Privacy Policy. Overview:

Transcription:

Defense Manpower Data Center Personnel Security & Assurance Secure Web Fingerprint Transaction (SWFT) Access, Registration, and Testing Procedures Version 3.2 July 20, 2016 CONTRACT NUMBER GS00Q09BGD0027 TASK ORDER NUMBER GST0313DS0018 SWF.1029.U*5 Prepared by

REVISION HISTORY Date Version Number Section Comments CM # Name 06/13/2016 1.0 All Initial Update SWF.1029.U*5 SWFT Team 07/08/2016 1.0 All Technical Writer review SWF.1029.U*5 TW Team 07/20/2016 1.0 All Final Review and delivery SWF.1029.U*5 PSA Systems Support Team Note: The controlled master of this document is available on-line. Hard copies of this document are for information only and are not subject to document control. DOCUMENT INFORMATION Required Information Definition Document Title: Document ID: Personnel Security/Assurance (PSA) Systems Support Secure Web Fingerprint Transaction (SWFT) Access, Registration, and Testing Procedures for SWFT SWFT 1029.U*5 Version: Version 3.2 Approval Date: July 20, 2016 Location: Owner: Author: Approved by: StarTeam - \SWFT Documentation\SWFT Access Registration & Test Procedures PSA Systems Support Team PSA Systems Support Team PSA Systems Support Team GOVERNMENT PURPOSE RIGHTS The Government's rights to use, modify, reproduce, release, perform, display, or disclose these technical data are restricted by paragraph (b)(2) of the Rights in Technical Data-Noncommercial Items clause contained in the DMDC PSA Systems Support contract GS00Q09BGD0027. Any reproduction of technical data or portions thereof marked with this legend must also reproduce the markings. i

TABLE OF CONTENTS 1.0 CONVENTIONS...1 2.0 ACCESS, REGISTRATION, AND TESTING PROCEDURES (ART) OVERVIEW...2 3.0 INTRODUCTION...2 3.1 Phases... 2 3.1.1 SWFT Access... 2 3.1.2 Fingerprint Scanner Registration... 3 3.1.3 Fingerprint Scanner or Server Platform Testing and Approval for Production... 3 4.0 ACCESS, REGISTRATION, AND TESTING PROCEDURES...4 4.1 Obtain SWFT Access... 4 4.2 Fingerprint Scanner or Server Platform Registration... 5 4.3 Test efp Upload... 6 5.0 EFP SUBMISSION FOR DIFFERENT UPLOADER TYPES...7 5.1 Option One: Organization Uploader... 7 5.2 Option Two: Multi-Site Uploader with limited permissions... 7 5.3 Option Three: Multi-Site Uploader with full permissions... 8 6.0 SERVER PLATFORM FINGERPRINT SYSTEMS...9 7.0 RE-REGISTRATION AND RE-TESTING...10 APPENDIX A- ACRONYMS...11 APPENDIX B SWFT ART PROCESS FLOW...12 APPENDIX C - REFERENCES...13 APPENDIX D ACCESS, REGISTRATION AND TEST RESPONSIBILITIES...14 ii

1.0 CONVENTIONS This guide is intended to provide information for the proper use of the Secure Web Fingerprint Transaction (SWFT) application. Throughout the document, clickable links, buttons, and names of screen shots are bolded. This document utilizes hyperlinks for easier navigation. When viewing this document in Microsoft Word, controlclick any direct reference to a table, section, or specific number to navigate there instantly. Helpful hints are printed in blue italicized font and are displayed with this icon. This guide assumes that the user has a thorough comprehension of using web browsers and browser-based applications, along with an understanding of basic Microsoft Windows file management principles. The SWFT Access Registration and Testing Procedures Document is a living document and is subject to revision with project policy changes. Changes to the guide will be managed and controlled. Important Note: All users are required to read and accept the rules and terms of use regarding the SWFT application before logging into the system by checking the acknowledgement box on the login page. Below is the text of the Department of Defense (DoD) Notice and Consent banner displayed on the login page. You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: - The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, Communication Security (COMSEC) monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. - At any time, the USG may inspect and seize data stored on this IS. - Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG authorized purpose. - This IS includes security measures (for example, authentication and access controls) to protect USG interests - not for your personal benefit or privacy. - Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details. All Personally Identifiable Information (PII) data used in this document is fictitious. 1

2.0 ACCESS, REGISTRATION, AND TESTING PROCEDURES (ART) OVERVIEW The ART provides potential SWFT Users a preview of the procedures necessary for gaining access to SWFT and preparing the electronic fingerprint (efp) workstation/facility for the use of SWFT. 3.0 INTRODUCTION SWFT is a web-enabled system for the collection and transmission of electronic fingerprints for applicants requiring a background investigation for a personnel security clearance. The SWFT system eliminates the need for paper-based capture and handling of fingerprints, expedites the background check process by reducing invalid fingerprint submissions, provides end-to-end accountability for sensitive PII data, and implements stringent security standards for all electronic transactions. Access to SWFT can be granted to the following users: National Industrial Security Program (NISP) cleared organizations U.S. Military components and Department of Defense (DoD) agencies Prior to procuring a fingerprint capture device and software, prospective SWFT users should verify that they qualify for obtaining a SWFT account by reviewing the Personnel Security System Access Request (PSSAR) Checklist on the SWFT PSA Website at, https://www.dmdc.mil/psawebdocs/docpage.jsp?p=swft. The SWFT PSSAR instructions, PSSAR form and sample can also be found at this location. 3.1 Phases There are three phases that must be completed before cleared organizations can submit production efps to SWFT. Appendix B provides an access, registration and testing process flow diagram. 1. SWFT access 2. Fingerprint Scanner or Server Platform registration 3. Fingerprint Scanner or Server Platform testing and approval 3.1.1 SWFT Access Each organization or fingerprint processing facility should appoint primary and backup Organization Administrators who will be responsible for processing all other standard user access requests, managing user and site accounts and creating and maintaining scanner registrations for the entire organization. Site Administrators are not required roles for each organization but larger organizations that have multiple locations should consider appointing primary and backup Site Administrators for each site. The Site Administrator will be responsible for processing standard user access requests, managing user accounts and creating and maintaining scanner registrations for their assigned site. Refer to Appendix D Access and Registration Responsibilities for a list of the SWFT User roles and the responsibilities of each user in the ART process. 2

3.1.2 Fingerprint Scanner Registration SWFT Access, Registration, and Testing Procedures for Release 7.1 The hardware and software used for capturing the biometric and biographic data and producing the efp must be listed in the Federal Bureau of Investigation (FBI) list of certified products. Hardware must be registered with SWFT/DMDC and approved by the Registration Authority (RA). The registration must prove that the hardware and software components of the fingerprinting system meet the FBI certification guidelines. The SWFT Scanner Registration module on the SWFT Web Application provides an online registration process for registering new fingerprint scanners or server platforms and/or editing the registration information of existing fingerprint scanners or server platforms. 3.1.3 Fingerprint Scanner or Server Platform Testing and Approval for Production All fingerprint scanner or server platform equipment must be tested through the SWFT Web Application and approved for transmission by the registration authority before the scanner or server platform can be used for production efp submissions. The test of the fingerprinting system must prove that the system is properly configured and generates electronic fingerprint files that comply with the FBI Electronic Biometric Transmission Specification (EBTS) and the registration authority specifications. The SWFT+ Coordinators are the point-of-contact to the Registration Authority. They arrange test sessions with the Registration Authority and assist in verifying and/or resolving issues with the Test efp files. 3

4.0 ACCESS, REGISTRATION, AND TESTING PROCEDURES This section provides a step-by-step overview of the procedures for obtaining access to SWFT, registering fingerprint scanners or server platforms, and testing these devices for the purpose of submitting production efps. If there are any questions related to these procedures, refer to the SWFT User Guide and SWFT Scanner Configuration and Registration Guide which are accessible to SWFT account holders. 4.1 Obtain SWFT Access Step 1: Complete the PSSAR form The Authorized Organization Representative obtains the PSSAR form from the Personnel Security/Assurance (PSA) website at: https://www.dmdc.mil/psawebdocs/docpage.jsp?p=swft. The SWFT PSSAR instructions and sample PSSAR form can also be found at this location. Follow the instructions on the PSSAR and provide the information as requested. PSSARs with errors or missing information will be returned to the submitting organization for correction. Verify all of the required information on the PSSAR is filled out and correct to ensure the access request is processed without delay. PSSARs submitted without the Nominating Official's statement regarding duties and signature will not be processed. Step 2: Submit PSSAR Organization Administrators complete and submit their PSSAR to the DMDC Contact Center by encrypted e-mail to dmdc.contactcenter@mail.mil. Once the SWFT account has been created, the DMDC Contact Center will e-mail the Organization Administrator their username, and will request that they call the DMDC Contact Center to obtain their temporary password. Site Administrators complete and submit their PSSAR to their Organization Administrator. Organization Administrators are responsible for creating and managing Site Administrator and standard user accounts. The Organization Administrator will provide the username and temporary password to the requesting user. Do not submit the PSSAR to the DMDC Contact Center. All other users complete and submit their PSSAR to their Organization or Site Administrator. Organization/Site Administrators are responsible for creating and managing user accounts. The Organization/Site Administrator will provide the username and temporary password to the requesting user. Do not submit the PSSAR to the DMDC Contact Center. Do not submit PSSARs to the SWFT+ Coordinator. Step 3: Log into SWFT All users will need to use their username and temporary password during the first login to SWFT in order to associate their Public Key Infrastructure (PKI) token with their SWFT account. Thereafter, the PKI token will be used to authenticate the user to SWFT. 4

4.2 Fingerprint Scanner or Server Platform Registration Step 4: Procure fingerprint scanner or server platform equipment SWFT Access, Registration, and Testing Procedures for Release 7.1 The Authorized Organization Representative will procure fingerprint scanner or server platform equipment. The list of FBI certified products and software is available on the following website: https://www.fbibiospecs.cjis.gov/certifications Organizations that wish to procure their own equipment should obtain access to SWFT prior to procuring any scanning hardware. Any scanning equipment that is intended for producing efps must meet the FBI certification guidelines, and must be registered with SWFT and the registration authority. DMDC will collect and forward to the registration authority all required registration information. Step 5: Register the fingerprint scanning equipment Using the credentials obtained in Step 3, the Organization Administrator or Site Administrator will log into SWFT to register their scanner(s). For information on how to register the scanner, click Help in the SWFT application to access the SWFT Scanner Configuration and Registration Guide. The registration and testing of the scanning equipment can be requested and conducted only by a cleared contractor organization or approved agency. Any other organization that intends to provide electronic fingerprinting services to NISP contractors must seek sponsorship from a cleared contractor organization in order to be able to register its scanning equipment. IMPORTANT: When registering the scanner, ensure that the Transaction Control Number (TCN) Prefix format matches one of the examples listed in the SWFT Scanner Configuration and Registration Guide. Each fingerprint scanner and fingerprint card scanner must have its unique TCN Prefix, even if multiple devices are managed by the same computer workstation. TCN prefixes for efps submitted by service providers on behalf of other organizations should remain unchanged. Click Help in SWFT to access the Scanner Configuration and Registration Guide. Upon completing the entry of the fingerprint scanner registration information, the Organization or Site Administrator submits the scanner registration to the SWFT+ Coordinator by clicking Submit. IMPORTANT: Be sure to click Submit rather than Save, or the scanner registration will not be processed. The SWFT+ Coordinator reviews the fingerprint scanner registration information for completeness and accuracy. Scanners that do not pass this validation check will be returned to the submitting Organization or Site Administrator for correction. Completed fingerprint scanner registrations are submitted by the SWFT+ Coordinator to the registration authority. Step 6: Configure fingerprint scanner or server platform equipment and software The Organization/Site Administrator will receive an e-mail from the SWFT+ Coordinator confirming the scanner has been registered and authorized for testing by the registration authority. The scanner must be properly configured to produce test and production efp files. For information on how to configure the scanner, click Help in the SWFT application to access the SWFT Scanner Configuration and Registration Guide. 5

If you are a service provider whose fingerprint scanner or fingerprint card scanner is being sponsored for production use by an authorized SWFT account holder, you do not have to re-register the equipment each time you provide services to other organizations that have SWFT accounts. 4.3 Test efp Upload Step 7: Submit the Test efp to SWFT The Organization Administrator submits the Test efp to SWFT and notifies the SWFT+ Coordinator by e-mail at dmdc.swft@mail.mil after the efp is successfully submitted. For instructions pertaining to uploading a Test efp, click Help in the SWFT application to access the SWFT Scanner Configuration and Registration Guide. Step 8: Test efp submitted to the registration authority The SWFT+ Coordinator reviews the uploaded efp for errors. If errors are identified in the efp, the SWFT+ Coordinator will work with the Organization Administrator to resolve them. This will require the submission of a corrected efp to SWFT. If the efp does not contain errors, the SWFT+ Coordinator will submit the Test efp file to the registration authority for validation. The Organization Administrator will be notified by e-mail when the Test efp is submitted to the registration authority. The test results are typically received within two business days. Step 9: Receive Test Results For each Test efp submitted to the registration authority, the SWFT+ Coordinator will communicate one of the following test results by e-mail to the Organization Administrator: The Test efp was successfully processed and the scanner is authorized to submit efps to production. The Test efp was rejected by the registration authority. The SWFT+ Coordinator will provide the reason it was rejected and will provide assistance to the Organization Administrator to resolve the issue with the Test efp. Errors found during the registration authority validation of the Test efp will require resubmission of a corrected Test efp to SWFT. Steps 7, 8, and 9, will be repeated until the scanner has been approved for production use by the registration authority. 6

5.0 efp SUBMISSION FOR DIFFERENT UPLOADER TYPES 5.1 Option One: Organization Uploader The Organization is responsible for submitting their own efps An organization submits fingerprints for their own personnel, typically associated with the Organization, Site acronym or CAGE (Commercial and Government Entity) code assigned to their SWFT account. This allows the SWFT User to access detailed SWFT reports that contain PII data for their site. The SWFT User will be able to generate reports that identify the date and number of efps uploaded on behalf of their site. 5.2 Option Two: Multi-Site Uploader with limited permissions Service Provider Acts with Limited Permissions on Behalf of another Organization A Multi-Site Uploader can submit efps on behalf of any organization that is registered in the SWFT system. Any SWFT account holder can act as a Service Provider for one or more organizations if a Multi-Site Uploader role is enabled for that account. This allows the Service Provider to submit efps for other organizations and generate reports that identify efps uploaded on behalf of other organizations, which is useful for billing and accountability purposes. Serviced organizations must obtain their own SWFT account in order to view detailed SWFT reports or upload efps on their own behalf. Serviced organizations do not have to maintain their own SWFT user account in order to be serviced by another organization but, serviced organizations do need stand-alone organization accounts or need to be registered in SWFT as approved sites. The DMDC Contact Center Executive Administrators can grant the permission to use the Multi-Site Uploader role after receiving a valid PSSAR approved by the appropriate nominating official from the service provider. Serviced Organizations: Verify the service provider that will generate the efps for your organization has its equipment registered and approved for production by SWFT/DMDC and the registration authority. To confirm the approval status of the equipment, perform the following steps: Obtain the Org/CAGE Code from the Service Provider Log into SWFT as an Organization or Site Administrator Run the Scanner Registration Status by Hardware Vendor and Serial Number or the Scanner Registration Status by Org/CAGE Code report accessible via the Reports button on the SWFT menu. Refer to the SWFT Administrator Guide for further information pertaining to SWFT reports. It is not mandatory for a Serviced Organization to maintain their own user account but it is recommended in order to monitor the status of efps uploaded by the service providers on their behalf and to access SWFT status reports. 7

5.3 Option Three: Multi-Site Uploader with full permissions A Service Provider Acts with Full Permissions on Behalf of another Organization SWFT Access, Registration, and Testing Procedures for Release 7.1 A service provider must have its own SWFT account established under the organization for which it provides services. This account must be associated with one or more of the serviced organizations Org/CAGE Codes. A SWFT account under the serviced organization grants the service provider the ability to submit efps on their behalf. The service provider can access SWFT reports and PII data for efps they submitted on behalf of their serviced organizations. Each request for adding an additional Org/CAGE Code to an existing SWFT account requires a separate PSSAR approved by the appropriate nominating official from the serviced organization. 8

6.0 SERVER PLATFORM FINGERPRINT SYSTEMS Server platform fingerprint systems typically involve two components: 1) One or more fingerprint scanning devices; 2) Server that integrates fingerprint images and biographic data and generates the electronic fingerprint file. Multiple scanning devices can be connected to a single server. At least one scanner-server platform pair must be registered and tested with SWFT/DMDC and the registration authority. Additional scanning devices that communicate with a server platform solution that has been approved for production by SWFT/DMDC and the registration authority must be registered, but do not have to be tested. Fingerprint scanning devices that will connect to an approved server platform system must include the server platform which has already been tested and approved for production by SWFT/DMDC and the registration authority. On the scanner registration form, the user must select the Device Type Scanner and the Operation Mode Server Platform when registering the scanner. 9

7.0 RE-REGISTRATION AND RE-TESTING All fingerprint scanner equipment must be re-registered and re-tested under the following circumstances: Any part of the system is replaced (laptop and/or scanner) A hardware component is repaired or replaced A software upgrade, replacement, or configuration change is performed Equipment has been transferred to a new building Step 1: Contact the SWFT+ Coordinator at dmdc.swft@mail.mil and request that the status of the scanner(s) be reset in SWFT so the pertinent changes can be made by the Organization or Site Administrator in the Scanner Registration screen (that is, Physical Location of Scanner, Software Vendor, Operating System, and so on) Step 2: Once confirmation that the Scanner status has been reset is received, edit the pertinent entries on the Scanner Registration screen. The Organization or Site Administrator will be required to enter the reason for reregistration and re-testing in the comments section (that is, Scanner must be re-registered and re-tested due to software upgrade ). Step 3: The Organization or Site Administrator submits the form to the SWFT+ Coordinator by clicking Submit. IMPORTANT: Be sure to click Submit rather than Save, or the scanner registration will not be processed. Step 4: Continue from section 4.2, Step 6: Configure fingerprint scanner or server platform, within this document. 10

APPENDIX A- ACRONYMS Acronym ART CI COMSEC DMDC DoD EBTS efp EBTS FBI FCL FOUO IS ISFD LE NISP OPM Org/CAGE PII PM PSMO PSSAR RA SSN SWFT SWFT+ TCN USG Definition Access, Registration, and Testing Procedures Counterintelligence Communications Security Defense Manpower Data Center Department of Defense Electronic Biometric Transmission Specification Electronic Fingerprint Electronic Biometric Transmission Specification Federal Bureau of Investigation Facility Clearance For Official Use Only Information System Industrial Security Facilities Database Law Enforcement National Industrial Security Program Office of Personnel Management Organization/Commercial and Government Entity Personally Identifiable Information Personnel Misconduct Personnel Security Management Office Personnel Security System Access Request Registration Authority Social Security Number Secure Web Fingerprint Transaction Coordinator responsible for SWFT and BioSP Transaction Control Number United States Government 11

APPENDIX B SWFT ART PROCESS FLOW 12

APPENDIX C - REFERENCES SWFT PSA Website https://www.dmdc.mil/psawebdocs/docpage.jsp?p=swft SWFT PSSAR Instructions https://www.dmdc.mil/psawebdocs/docrequest/filepathnm=psa/appid=560/app_key_id=1559jsow24d/s iteid=7/edipnid=0/userid=public/filenm=swft+pssar+instr+and+checklist.pdf Personnel Security System Access Request (PSSAR) DD Form 2962 https://www.dmdc.mil/psawebdocs/docrequest//filepathnm=psa/appid=560/app_key_id=1559jsow24d/ siteid=7/edipnid=0/userid=public/filenm=dd2962.pdf Cyber Awareness Training https://www.dmdc.mil/psawebdocs/docrequest//filepathnm=psa/appid=560/app_key_id=1559jsow24d/ siteid=7/edipnid=0/userid=public/filenm=training+requirements+final.pdf PII Training https://www.dmdc.mil/psawebdocs/docrequest//filepathnm=psa/appid=560/app_key_id=1559jsow24d/ siteid=7/edipnid=0/userid=public/filenm=training+requirements+final.pdf Digital Encryption Instructions https://www.dmdc.osd.mil/psawebdocs/docrequest/filepathnm=psa/appid=560/app_key_id=1559jsow2 4d/siteId=7/ediPnId=0/userId=public/fileNm=Contact+Center+Encryption.pdf FBI Certified Products Listing enter Live Scan in the Category search criteria https://www.fbibiospecs.cjis.gov/certifications SWFT Scanner Configuration and Registration Guide - Accessing this document requires a SWFT account https://swft.dmdc.mil/help/swft_scanner_configuration_and_registration_guide.pdf SWFT Administrator Guide - Accessing this document requires a SWFT account https://swft.dmdc.mil/help/swft_organization_site_administrator.pdf 13

APPENDIX D ACCESS, REGISTRATION AND TEST RESPONSIBILITIES User Role Standard SWFT User Organization Administrator Site Administrator (Actions are performed only for users and scanners assigned to the Site) SWFT+ Coordinator DMDC Contact Center/Executive Administrator OPM Representative (Registration Authority) Service Provider with limited permissions Service Provider with full permissions Serviced Organization (SWFT Account is not mandatory) Responsibility Request Access, send completed PSSAR to your Organization/Site Administrator Generate reports Submit and review efps Process PSSARs for users Manage user and site accounts Create and maintain scanner registration Grant Multi-Site Uploader permissions to their users Process PSSARs for users Manage user accounts Create and maintain scanner registration Manages the scanner registration process Coordinates the scanner test Acts as the POC for communication between the Registration Authorities and Organization/Site Administrators Process PSSARs to create accounts for Organization Administrators only. Grant Multi-Site Uploader permissions to Organization Administrators Provide verification to SWFT+ Coordinator Submit efps on behalf of other organizations Submit efps on behalf of other organizations Generate reports Verify Service Provider has registered equipment Send efps to Service Provider to be submitted 14