SecurityManager. Enterprise Personnel & Physical Security Case Management Solution for Federal Agencies

Size: px
Start display at page:

Download "SecurityManager. Enterprise Personnel & Physical Security Case Management Solution for Federal Agencies"

Transcription

1 SecurityManager Enterprise Personnel & Physical Security Case Management Solution for Federal Agencies SecurityManager is THE CENTECH GROUP, Inc s (CENTECH s) Web-based enterprise case management solution providing workflow and process support functions that address the needs of Federal Department/Agency Personnel and Physical Security divisions. Capabilities SecurityManager s application suite provides the industry s most advanced configurable and customizable rule-based workflow processes to streamline and automate Personnel Security and Physical Security tasks related to: Pre-Appointment / Entry-on-Duty Suitability Security Clearance Adjudication Associating Contractors to Contracts DD 254 Automation Classified Visit Management Information Security Foreign National Visitor Management SMartPIV Identity Management System (IDMS) SMartPIV Card Management System (CMS) Benefits Supports Executive Order (EO) eligibility determination process reform goals All transactions audit logged Extensive automation through system interfaces and data import/export edelivery upload and context sensitive association with subject, case, investigation eadjudication for low risk non-issue cases Task workflow queue management for effective management of workforce/workload Supports timeliness goals of the Performance Accountability Council (PAC) Interfaces with Office of Personnel Management (OPM) Personnel Investigation Processing System (PIPS), OPM Central Verification System (CVS), National Finance Center (NFC) and others Complete integration between the adjudicative system and the IDMS/CMS IDMS/CMS - CENTECH s SMartPIV is one of only nine GSA FIPS-201 certified CMSs (APL#1215) SecurityManager supports Homeland Security Presidential Directive (HSPD)-12 mandates through our Federal Information Processing Standards (FIPS)-201 General Services Administration (GSA) approved SMartPIV IDMS and CMS. Our comprehensive workflow and business rules ensure successful navigation of FIPS-201 while maintaining the biometric chain of trust, investigative data and credential history. The integration between the SecurityManager personnel security processes (adjudication of trust) and physical security IDMS/CMS (identity proofing and card issuance/ maintenance) provide a robust integrated solution that eliminates duplicate data entry, streamlines adjudicative and card issuance decisions, ensures adherence to FIPS-201 standards, and provides for adjudication and card life cycle management and auditing. For more information, contact: THE CENTECH GROUP, Inc Arlington Blvd., 10th Floor Falls Church, VA (P)

2 Personnel and Physical Security / FIPS-201 / HSPD-12 Personnel Security (PerSec) Rule-based, workflow driven, case management system to manage the life cycle of federal employee and contractor pre-appointment, suitability and security clearance processing Automated interfaces, imports and exports with OPM, CVS, NFC, Scattered Castles, human resource (HR) systems, IDMS, CMS, and others edelivery with automatic parsing, upload and attachment to person, case and investigation eadjudication with automatic task completion and adjudication for issue-free cases Supports multi-tenancy, multiple positions, cases and investigations Attached documents and electronic notifications for maintaining communications audit trail National Institute of Standards and Technology (NIST) security control compliant for High and Moderate risk systems Contracts & DD 254 Supports the association, management and tracking of contracts to contractors; automatic generation of DD 254 forms, and links to the PerSec module to support contractor personnel management. Visitor Management Manages incoming and outgoing visitors enforcing clearance level requirements; records sponsor and sponsoring entity, point of contact, etc. Generates outgoing and revocation visitor letters Allows for incoming letter upload and attachment to the person Information Security Rules-based management of classified documents, containers, rooms, facilities and related audits. Integrates with PerSec enforcing custodial clearance requirements and asset reassignment before separation. Foreign National Visitor Manages visitor approval adjudication process including index checks with Federal Bureau of Investigation s ( FBI s) III and Central Intelligence Agency s (CIA s) Scattered Castles Enforces rules for country relationship of visitor, visit length, sponsor and others SMartPIV IDMS Biometric collection and management supporting FIPS-201 workflow for enrollment and registration SMartPIV Card Management System (CMS) FIPS-201 approved for HSPD-12 Personal Identity Verification (PIV) card personalization and FIPS-201 card life cycle workflow Personalizes and encodes PIV, PIV-I, and other smart cards formats according to client needs Interfaces with IDMS, Certificate Authorities (CAs) and public key infrastructure (PKI) certificate providers 2

3 Personnel Security (PerSec) Module The PerSec Module is the core of SecurityManager, providing the capability to manage all aspects of personnel security including enforcing business rules; workflow driven processes; generation of automated forms, letters and reports; electronic notifications; productivity metrics on processes and people; automated import/export and web services to/from other systems/agencies; and auditable records meeting NIST and FIPS-201 compliance mandates. Specific processes include: Employee/Contractor Pre-Employment/Entry on Duty (EOD) º º Interfaces with CMS to authorize creation of a PIV credential case Employee/Contractor Suitability includes FIPS-201 compliant steps for fingerprint check, credit check, FBI name check º º Interfaces with CMS to provide adjudication results; approval or revocation º º Contractors can be associated with contracts/task orders to better manage separation, PIV collection accountability and Physical Access Control System (PACS) deprovisioning Employee/Contractor Security Clearance º º Special Access º º Suspension/Denial/Revocation º º Appeals º º Security Re-Briefing º º Periodic Re-Investigation Incoming/Outgoing Classified Visit Request Management Import/Exports OPM PIPS, OPM CVS, NFC, and other systems edelivery Automatic file parsing and attachment upload to the Person, Case, and/or Investigation record eadjudication Automatic Personnel and Security Research Center (PERSEREC) rule evaluation and adjudication for no issue cases Contract Module The Contract Module is included with the core SecurityManager. It enables the definition and management of contracts and contractors. It enables linkage and rule enforcement of contractor personnel processed in PerSec to the contracts and task orders of contracts for which suitability can be approved. It also allows for the creation and management of DD 254 documents for contracts, and can enforce the dependency of contractor suitability and security clearance processing in PerSec on current DD 254 authorization. Creation of solicitation, initiation, revision & final DD 254 Select and assign pre-defined standard text inserts from field specific lists Select and assign contractor address information from contractor record Auto fill Commercial and Government Entity (CAGE) Code and Cognizant Security Office (CSO) information for contractor & address selected Manage contract data, including related prime & subcontractors Manage task order data, including task order specific subcontractors Enforce DD 254 authorization in adding subcontractors to a contract or task order 3

4

5 Credentialing Module The Credentialing Module is an optional module that integrates with the PerSec Module and allows for the enrollment and/or enrollment data import from external enrollment systems consistent with PIV enrollment data standards of NIST When integrated with the PerSec Module, it will provide the agency the ability to meet FIPS- 201 Appendix A identity proofing and registration requirements, enabling authorization messages and identity information passage to card management systems, and accepting messages confirming card issuance from the card management system. Processes - When interfaced with a card management system, SecurityManager will provide the process management capabilities for: PIV Credential Issuance Authorization including: Ability to import and view identity documents, photos & fingerprints Ability to export identity information to a PIV credential station Satisfies FIPS 201 PIV 1 process related requirements PIV Credential Revocation Authorization PIV Credential Re-issuance Authorization External Interfaces SecurityManager has an interface capability for receiving PIV identity information (including fingerprints and photo) from external enrollment systems as well as a corresponding interface for sending identity information to external systems. The standard external interfaces include Web services, Extensible Markup Language (XML) schemas and/or direct file uploads. Information Security (InfoSec) Module The InfoSec Module is an optional feature that integrates with the PerSec Module to enable management and audits of secure buildings, rooms, containers, documents and custodial responsibilities. It can enforce custodial security clearance requirements, require custodial transfer of all documents and storage/room/building responsibilities before separation and other business rules. Classified Document Management & Inspections Secure Container Management & Inspections Host Facility Management & Inspections Host Facility Locations (Rooms) Management & Inspections Foreign National Visitor (FNV) Module The FNV Module is an optional feature that integrates with the PerSec Module for sponsorship and processing of foreign national visitor requests. It enforces business rules for country relationship of visitor, length of visit, sponsor and other factors. Additional modules including Investigation & Intelligence Module, Emergency Management Module, Anti-Terrorism Module, etc. have been developed for custom contracts and are available upon request. 6

6 SMartPIV IDMS/CMS provides strong workflow support for credential verification and card operations with enforcement of FIPS-201 roles; provides fully integrated end-to-end establishment and management of employee and contractor trust level and PIV card access rights when used with the SecurityManager suite. Available to be configured as a stand-alone IDMS/CMS with integration with your existing adjudication system, SMartPIV provides: Enrollment Identity Proofing Biometrics Capture, Management & Transmission to OPM/Integrated Automated Fingerprint Identification System (IAFIS) Automated Approval Checks & Adjudication Approvals Card Personalization, Encoding, Issuance & Activation Card Maintenance & Life Cycle Management SMartPIV and SecurityManager with its cutting edge e-delivery technology, team up to create a comprehensive process that follows a subject through enrollment, credentialing, adjudication, card management, card maintenance and post-employment activities. With automated and manual data collection options at almost every step of the way, everything flows together and assembles into the complete view of a subject s trust relationship with your agency. Subject Information eqip Enrollment Package Identity Proofing Documents Investigation Requests Investigation Status Updates Investigation Documents Fingerprint Submission Fingerprint Response Employment Status Adjudicative Decisions Miscellaneous Attachments PIV Card Status (Logical and Physical) Automatic Live Transactions Import Export Manual Entry IN OUT 7

7 Federal Government Implementations of SecurityManager U. S. Department of Homeland Security (DHS) Headquarters U.S. Customs and Border Protection (CBP) Federal Emergency Management Agency (FEMA) Federal Law Enforcement Training Center (FLETC) U. S. Immigration and Customs Enforcement (USCIS) U. S. Citizenship and Immigration Services (USCIS) U. S. Secret Service (USSS) Transportation Security Administration (TSA) U.S. Coast Guard (USCG) U. S. Department of Commerce Headquarters Bureau of economic Analysis (BEA) Bureau of Industry and Security (BIS) U. S. Census Bureau (CENSUS) Economic Development Administration (EDA) Economics and Statistics Administration (ESA) International Trade Administration (ITA) Minority Business Development Agency (MBDA) National Oceanic and Atmospheric Administration (NOAA) National Telecommunications and Information Administration (NTIA) National Institute of Standards and Technology (NIST) National Technical Information Services (NTIS) U. S. Patent and Trademark Office (USPTO) U. S. Department of Education U. S. Department of Veterans Affairs U. S. Health and Human Services Headquarters Centers for Medicare & Medicaid Services (CMS) Administration for Children and Families (ACF) Administration for Community Living (ACL) Agency for Healthcare Research and Quality (AHRQ) Agency for Toxic Substances and Disease Registry (ATSDR) Centers for Disease Control and Prevention (CDC) Food and Drug Administration (FDA) Health Resources and Services Administration (HRSA) Indian Health Service (IHS) National Institutes of Health (NIH) Substance Abuse and Mental Health Services Administration (SAMHSA) Since 1988, THE CENTECH GROUP, Inc. (CENTECH) has become a leader in performance based contracting, program management, as a provider of systems and solutions for numerous federal government agencies and as a an excellent place to expand your career objectives. We have the experience, skills, systems and processes to deliver customer satisfaction on every project and an unrivaled history in delivering ON TIME, ON BUDGET, IN THE FIELD, EVERY TIME. CENTECH has technical solutions in the areas of: Program & Acquisition Management Support Services Systems Engineering/Technical Assistance (SETA) Web Solutions & Services Business Operations Support Computer Data Center Operations Engineering Services Help Desk Systems & Services Logistics Support Systems & Services Network & Infrastructure Services Security Systems & Services Software Development & Maintenance Test & Evaluation Services Training/Knowledge Transfer Systems & Services For more information, contact: THE CENTECH GROUP, Inc Arlington Blvd., 10th Floor Falls Church, VA (P) _0314

GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201.

GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201. PERSONAL IDENTITY VERIFICATION (PIV) OVERVIEW INTRODUCTION (1) Welcome to the Homeland Security Presidential Directive 12 (HSPD-12) Personal Identity Verification (PIV) Overview module, designed to familiarize

More information

HSPD-12 Implementation Architecture Working Group Concept Overview. Version 1.0 March 17, 2006

HSPD-12 Implementation Architecture Working Group Concept Overview. Version 1.0 March 17, 2006 HSPD-12 Implementation Architecture Working Group Concept Overview Version 1.0 March 17, 2006 Table of Contents 1 PIV Lifecycle... 3 2 High Level Component Interaction Diagram... 4 3 PIV Infrastructure

More information

Integrated Security Management System (ISMS)

Integrated Security Management System (ISMS) for the (ISMS) September 16, 2014 Contact Point David Colangelo Security Systems Division, Office of the Chief Security Officer Management Directorate (202) 447-5320 Reviewing Official Karen L. Neuman

More information

How To Get A Piv Credential

How To Get A Piv Credential Homeland Security Presidential Directive HSPD-12 PIV-1 Implementation And Suitability Processing POLICIES & PROCEDURES U.S. Department of Commerce National Oceanic and Atmospheric Administration (Revised

More information

~ Final Credentialing Standards for Issuing Personal Identity Verification Cards under HSPD-12

~ Final Credentialing Standards for Issuing Personal Identity Verification Cards under HSPD-12 UNITED STATES OFFICE OF PERSONNEL MANAGEMENT Washington, DC 20415 The Director July 31, 2008 MEMORANDUM FOR HEADS OF DEPARTMENTS AND AGENCIES FROM: SUBJECT: LINDA M. SPRINGER DIRECTOR ~ Final Credentialing

More information

DEPARTMENTAL REGULATION

DEPARTMENTAL REGULATION U.S. DEPARTMENT OF AGRICULTURE WASHINGTON, D.C. 20250 DEPARTMENTAL REGULATION SUBJECT: Identity, Credential, and Access Management Number: 3640-001 DATE: December 9, 2011 OPI: Office of the Chief Information

More information

NOAA HSPD-12 PIV-II Implementation October 23, 2007. Who is responsible for implementation of HSPD-12 PIV-II?

NOAA HSPD-12 PIV-II Implementation October 23, 2007. Who is responsible for implementation of HSPD-12 PIV-II? NOAA HSPD-12 PIV-II Implementation What is HSPD-12? Homeland Security Presidential Directive 12 (HSPD-12) is a Presidential requirement signed on August 27, 2004 requiring Federal agencies comply with

More information

Status: Final. Form Date: 30-SEP-13. Question 1: OPDIV Question 1 Answer: OS

Status: Final. Form Date: 30-SEP-13. Question 1: OPDIV Question 1 Answer: OS Status: Final Form Date: 30-SEP-13 Question 1: OPDIV Question 1 Answer: OS Question 2: PIA Unique Identifier (UID): Question 2 Answer: P-2277902-798208 Question 2A: Name: Question 2A Answer: Identity and

More information

FEDERAL CLOUD COMPUTING SUMMIT

FEDERAL CLOUD COMPUTING SUMMIT FEDERAL CLOUD COMPUTING SUMMIT Federal Cloud Computing Summit January 14-15, 2015 Washington Marriott at Metro Center The Federal Cloud Computing Summit will be held on January 14-15, 2015, at the Washington

More information

1. The human guard at the access control entry point determines whether the PIV Card appears to be genuine and has not been altered in any way.

1. The human guard at the access control entry point determines whether the PIV Card appears to be genuine and has not been altered in any way. + Expiration date + Agency card serial number (back of card) + Issuer identification (back of card). The PIV Card may also bear the following optional components: + Agency name and/or department + Department

More information

E X E C U T I V E O F F I CE O F T H E P R E S I D EN T

E X E C U T I V E O F F I CE O F T H E P R E S I D EN T EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503 THE DIRECTOR M-05-24 August 5, 2005 MEMORANDUM FOR THE HEADS OF ALL DEPARTMENTS AND AGENCIES FROM: SUBJECT: Joshua

More information

DEPARTMENTAL DIRECTIVE

DEPARTMENTAL DIRECTIVE ADMINISTRATIVE COMMUNICATIONS SYSTEM U.S. DEPARTMENT OF EDUCATION DEPARTMENTAL DIRECTIVE OM:5-101 Page 1 of 17 (07/16/2010) Distribution: All Department of Education employees Approved by: /s/ Winona H.

More information

United States Public Health Service (USPHS) Social Work Career Map & Mentoring Guide

United States Public Health Service (USPHS) Social Work Career Map & Mentoring Guide Social Work Professional Advisory Group (SWPAG) Mentoring Subcommittee United States Public Health Service (USPHS) Social Work Career Map & Mentoring Guide Developed by SWPAG Mentoring Subcommittee 1 Table

More information

Audio: This overview module contains an introduction, five lessons, and a conclusion.

Audio: This overview module contains an introduction, five lessons, and a conclusion. Homeland Security Presidential Directive 12 (HSPD 12) Overview Audio: Welcome to the Homeland Security Presidential Directive 12 (HSPD 12) overview module, the first in a series of informational modules

More information

HSPD-12 Homeland Security Presidential Directive #12 Overview

HSPD-12 Homeland Security Presidential Directive #12 Overview HSPD-12 Homeland Security Presidential Directive #12 Overview HSPD-12 Stands for Homeland Security Presidential Directive #12. HSPD-12 is the Policy for a Common Identification Standard for Federal Employees

More information

U.S. DEPARTMENT OF COMMERCE UNITED STATES PATENT AND TRADEMARK OFFICE. Privacy Impact Assessment

U.S. DEPARTMENT OF COMMERCE UNITED STATES PATENT AND TRADEMARK OFFICE. Privacy Impact Assessment U.S. DEPARTMENT OF COMMERCE UNITED STATES PATENT AND TRADEMARK OFFICE Privacy Impact Assessment Personal Identity Verification System Card Management System (HSPD12-PIVS/CMS) PTOI-007-00 September 18,

More information

Justice Management Division

Justice Management Division Justice Management Division Privacy Impact Assessment for the Personal Identity Verification (PIV) Card System Issued by: Stuart Frisch, Senior Component Official for Privacy Reviewed by: Vance E. Hitch,

More information

IDaaS: Managed Credentials for Local & State Emergency Responders

IDaaS: Managed Credentials for Local & State Emergency Responders IDaaS: Managed Credentials for Local & State Emergency Responders NextgenID ID*TRUST Platform NextgenID - Headquarters USA 10226 San Pedro, Suite 100 San Antonio, TX 78216 +1 (210) 530-9991 www.nextgenid.com

More information

Department of Veterans Affairs VA Directive 0710 PERSONNEL SECURITY AND SUITABILITY PROGRAM

Department of Veterans Affairs VA Directive 0710 PERSONNEL SECURITY AND SUITABILITY PROGRAM Department of Veterans Affairs VA Directive 0710 Washington, DC 20420 Transmittal Sheet June 4, 2010 PERSONNEL SECURITY AND SUITABILITY PROGRAM 1. REASON FOR ISSUE: To revise Department of Veterans Affairs

More information

The Government-wide Implementation of Biometrics for HSPD-12

The Government-wide Implementation of Biometrics for HSPD-12 The Government-wide Implementation of Biometrics for HSPD-12 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy September 24, 2008 1 The HSPD-12 Mandate Home Security

More information

US Security Directive FIPS 201

US Security Directive FIPS 201 Security US Security Directive FIPS 201 Compliance Strategies Learn about compliance strategies for governmental agencies in meeting requirements of Homeland Security Presidential Directive 12 (HSPD-12),

More information

The Social Security Administration s Internal Controls over Issuing and Monitoring Contractors Homeland Security Presidential Directive-12 Credentials

The Social Security Administration s Internal Controls over Issuing and Monitoring Contractors Homeland Security Presidential Directive-12 Credentials Audit Report The Social Security Administration s Internal Controls over Issuing and Monitoring Contractors Homeland Security Presidential Directive-12 Credentials A-15-11-11178 April 2013 MEMORANDUM Date:

More information

NSF AuthentX Identity Management System (IDMS) Privacy Impact Assessment. Version: 1.1 Date: 12/04/2006. National Science Foundation

NSF AuthentX Identity Management System (IDMS) Privacy Impact Assessment. Version: 1.1 Date: 12/04/2006. National Science Foundation This document has been archived and replaced by piaauthentx1207..0 National Science Foundation NSF AuthentX Identity Management System (IDMS) Privacy Impact Assessment Version: 1.1 Date: 12/04/2006 Table

More information

Derived credentials. NIST SP 800-63-1 ( 5.3.5) provides for long term derived credentials

Derived credentials. NIST SP 800-63-1 ( 5.3.5) provides for long term derived credentials Daon your trusted Identity Partner Derived Credentials A Use Case Cathy Tilton Daon 1 February 2012 Derived credentials NIST SP 800-63-1 ( 5.3.5) provides for long term derived credentials Derived credential

More information

Federal Identity Management Handbook

Federal Identity Management Handbook September 2005 PUBLIC DRAFT Acknowledgements The Office of Management and Budget and the Federal Identity Credentialing Committee would like to acknowledge the significant contributions of the National

More information

Background Check Service

Background Check Service for the Background Check Service Contact Point Elizabeth Gaffin USCIS Privacy Officer United States Citizenship and Immigration Services 202-272-1400 Reviewing Official Hugo Teufel III Chief Privacy Officer

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 1000.13 January 23, 2014 USD(P&R) SUBJECT: Identification (ID) Cards for Members of the Uniformed Services, Their Dependents, and Other Eligible Individuals References:

More information

U.S. Department of Energy Washington, D.C.

U.S. Department of Energy Washington, D.C. U.S. Department of Energy Washington, D.C. ORDER DOE O 206.2 Approved: SUBJECT: IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT (ICAM) 1. PURPOSE. To establish requirements and responsibilities for DOE s identity,

More information

Department of Homeland Security

Department of Homeland Security Evaluation of DHS Information Security Program for Fiscal Year 2013 OIG-14-09 November 2013 Washington, DC 20528 / www.oig.dhs.gov November 21, 2013 MEMORANDUM FOR: FROM: SUBJECT: Jeffrey Eisensmith Chief

More information

DEPARTMENT OF DEFENSE GUIDEBOOK FOR CAC-ELIGIBLE CONTRACTORS FOR UNCLASSIFIED NETWORK ACCESS

DEPARTMENT OF DEFENSE GUIDEBOOK FOR CAC-ELIGIBLE CONTRACTORS FOR UNCLASSIFIED NETWORK ACCESS DEPARTMENT OF DEFENSE GUIDEBOOK FOR CAC-ELIGIBLE CONTRACTORS FOR UNCLASSIFIED NETWORK ACCESS 21 NOVEMBER 2014 Contents SCOPE CHAPTER 1 INTRODUCTION... 4 1.1 PURPOSE AND BACKGROUND... 4 1.2 POLICY AND REGULATIONS...

More information

Biometrics in Identity as a Service

Biometrics in Identity as a Service Daon - your trusted Identity Partner Biometrics in Identity as a Service What is BaaS and who is doing it? Catherine Tilton 28 September 2011 The Need As the world becomes more interdependent, as transactions

More information

Defense Security Service

Defense Security Service Defense Security Service Electronic Fingerprint Capture Options for Industry Version 2.0 January 2013 Issuing Office: Defense Security Service Russell Knox Building 27130 Telegraph Rd Quantico VA 22134

More information

NEIS HELP DESK FAQS. HSPD-12 Policy/Business Process. General HSPD-12 FAQs can be found online at: http://lincpass.usda.gov/faq.

NEIS HELP DESK FAQS. HSPD-12 Policy/Business Process. General HSPD-12 FAQs can be found online at: http://lincpass.usda.gov/faq. General HSPD-12 FAQs can be found online at: http://lincpass.usda.gov/faq.html HSPD-12 Policy/Business Process 1. How long is the entire process for Non-Employees? After enrollment, applicants should receive

More information

OFFICE OF THE SECRETARY Office of the Secretary s Working Capital Fund Billing Control Issues Resulted in Incorrect Charges

OFFICE OF THE SECRETARY Office of the Secretary s Working Capital Fund Billing Control Issues Resulted in Incorrect Charges OFFICE OF THE SECRETARY Office of the Secretary s Working Capital Fund Billing Control Issues Resulted in Incorrect Charges FINAL REPORT NO. OIG-14-020-A MAY 15, 2014 U.S. Department of Commerce Office

More information

STATEMENT OF WORK. For

STATEMENT OF WORK. For STATEMENT OF WORK For Credentialing and Validation Support for DC Homeland Security & Emergency Management Agency (DC HSEMA) IN SUPPORT OF THE GOVERNMENT OF THE DISTRICT OF COLUMBIA November 15, 2012 1.

More information

GAO PERSONAL ID VERIFICATION. Agencies Should Set a Higher Priority on Using the Capabilities of Standardized Identification Cards

GAO PERSONAL ID VERIFICATION. Agencies Should Set a Higher Priority on Using the Capabilities of Standardized Identification Cards GAO United States Government Accountability Office Report to Congressional Requesters September 2011 PERSONAL ID VERIFICATION Agencies Should Set a Higher Priority on Using the Capabilities of Standardized

More information

2. APPLICABILITY AND SCOPE

2. APPLICABILITY AND SCOPE Department of Defense DIRECTIVE NUMBER 1000.25 July 19, 2004 Certified Current as of April 23, 2007 USD(P&R) SUBJECT: DoD Personnel Identity Protection (PIP) Program References: (a) DoD Directive 1000.22,

More information

PRIME IDENTITY MANAGEMENT CORE

PRIME IDENTITY MANAGEMENT CORE PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It

More information

Department of Veterans Affairs VA DIRECTIVE 6510 VA IDENTITY AND ACCESS MANAGEMENT

Department of Veterans Affairs VA DIRECTIVE 6510 VA IDENTITY AND ACCESS MANAGEMENT Department of Veterans Affairs VA DIRECTIVE 6510 Washington, DC 20420 Transmittal Sheet VA IDENTITY AND ACCESS MANAGEMENT 1. REASON FOR ISSUE: This Directive defines the policy and responsibilities to

More information

2. Each server or domain controller requires its own server certificate, DoD Root Certificates and enterprise validator installed.

2. Each server or domain controller requires its own server certificate, DoD Root Certificates and enterprise validator installed. Purpose and Scope The purpose of this policy is to define the roles and responsibilities on implementing the Homeland Security Presidential Directive 12 (HSPD-12) Logical Access Control (LAC) throughout

More information

One Research Court, Suite 200 Rockville, MD 20850 www.ctisinc.com Tel: 301.948.3033 Fax: 301.948.2242

One Research Court, Suite 200 Rockville, MD 20850 www.ctisinc.com Tel: 301.948.3033 Fax: 301.948.2242 TRANSFORMATION OF HEALTH INDUSTRY THROUGH PERFORMANCE PYRAMID: Providing Excellent End-to-End Healthcare to the Population with a 30% Reduction in Cost and Time. Introduction The American health industry

More information

SIGNIFICANT CHANGES DOCUMENT

SIGNIFICANT CHANGES DOCUMENT SIGNIFICANT CHANGES DOCUMENT Descriptive Title Schedule 70_MassModification_Health IT SIN Significant Changes Disclaimer Language DISCLAIMER: GSA FAS is posting this notification of a planned solicitation

More information

Life After PIV. Authentication In Federated Spaces. Presented to. Card Tech/Secure Tech. May 2009. By Lynne Prince Defense Manpower Data Center

Life After PIV. Authentication In Federated Spaces. Presented to. Card Tech/Secure Tech. May 2009. By Lynne Prince Defense Manpower Data Center Life After PIV Authentication In Federated Spaces Presented to Card Tech/Secure Tech By Lynne Prince Defense Manpower Data Center Interoperability with HSPD12 Capability PIV provides a secure common credential,

More information

U.S. Department of Housing and Urban Development

U.S. Department of Housing and Urban Development U.S. Department of Housing and Urban Development PRIVACY IMPACT ASSESSMENT FOR: PERSONAL IDENTITY VERIFICATION (PIV) PROCESS TECHNOLOGY AND DATABASE IN COMPLIANCE WITH HOMELAND SECURITY PRESIDENTIAL DIRECTIVE

More information

Identity Verification Program Guide

Identity Verification Program Guide Identity Verification Program Guide The National Crime Prevention and Privacy Compact Council (Compact Council) is a15-member body of local, state, and federal governmental officials which prescribes system

More information

ATLANTA. May 18-21. U.S. Public Health Service Scientific and Training Symposium. Sheraton, Atlanta, Georgia.

ATLANTA. May 18-21. U.S. Public Health Service Scientific and Training Symposium. Sheraton, Atlanta, Georgia. ATLANTA 2015 U.S. Public Health Service Scientific and Training Symposium May 18-21 Sheraton, Atlanta, Georgia. As a sponsor or exhibitor at the USPHS Scientific and Training Symposium your organization

More information

Announcing Approval of Federal Information Processing Standard (FIPS) Publication 201-2,

Announcing Approval of Federal Information Processing Standard (FIPS) Publication 201-2, This document is scheduled to be published in the Federal Register on 09/05/2013 and available online at http://federalregister.gov/a/2013-21491, and on FDsys.gov Billing Code 3510-13 DEPARTMENT OF COMMERCE

More information

Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust

Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust Imprivata Confirm ID and the DEA Interim Final Rule on EPCS Technology requirements to comply with the DEA

More information

An Operational Architecture for Federated Identity Management

An Operational Architecture for Federated Identity Management An Operational Architecture for Federated Identity Management March 2011 Implementing federated identity management and assurance in operational scenarios Federated Identity Solution The Federated identity

More information

U.S. Nuclear Regulatory Commission

U.S. Nuclear Regulatory Commission ADAMS ML11066A005 U.S. Nuclear Regulatory Commission Privacy Impact Assessment (Designed to collect the information necessary to make relevant determinations regarding the applicability of the Privacy

More information

Evaluation of DHS' Information Security Program for Fiscal Year 2015

Evaluation of DHS' Information Security Program for Fiscal Year 2015 Evaluation of DHS' Information Security Program for Fiscal Year 2015 January 5, 2016 OIG-16-08 (Revised) DHS OIG HIGHLIGHTS Evaluation of DHS Information Security Program for Fiscal Year 2015 January 5,

More information

TOP MANAGEMENT CHALLENGES MOST FREQUENTLY IDENTIFIED December 2000

TOP MANAGEMENT CHALLENGES MOST FREQUENTLY IDENTIFIED December 2000 TOP MANAGEMENT CHALLENGES MOST FREQUENTLY IDENTIFIED December 2000 Agency Information Technology Management & Security GPRA Compliance, Implementation & Accountability Financial Management & CFO Statements

More information

Department of Homeland Security Office of Inspector General

Department of Homeland Security Office of Inspector General Department of Homeland Security Office of Inspector General Vulnerabilities Highlight the Need for More Effective Web Security Management (Redacted) OIG-09-101 September 2009 Office of Inspector General

More information

NASA DESK GUIDE FOR SUITABILITY AND SECURITY CLEARANCE PROCESSING. Version 2

NASA DESK GUIDE FOR SUITABILITY AND SECURITY CLEARANCE PROCESSING. Version 2 NASA DESK GUIDE FOR SUITABILITY AND SECURITY CLEARANCE PROCESSING Version 2 Agency Human Resources Division NASA Headquarters SREF-3000-0003 (This page intentionally left blank.) Page 2 of 94 Status (Basic/Revision

More information

Capabilities Briefing 2015

Capabilities Briefing 2015 Linking Security with Business Strategies www.anasec.com Service Disabled Veteran Owned Small Business (SDVOSB) 125 Woodstream Blvd Suite 204 Stafford, VA 22556 (540) 657-9465 Capabilities Briefing 2015

More information

Small Business Administration Privacy Impact Assessment

Small Business Administration Privacy Impact Assessment Small Business Administration Privacy Impact Assessment Name of Project: Personal Identity Verification (PIV)/ Homeland Security Presidential Directive 12 (HSPD-12) (Note: This PIA is intended to cover

More information

Department of Homeland Security

Department of Homeland Security Department of Homeland Security Biometrics Overview Neal Latta US-VISIT IDENT Program Manager 1 Importance of Biometric Standards in Post 9/11 Environment Dramatic Increase in Utilization of Biometric

More information

Using FICAM as a model for TSCP Best Prac:ces in Physical Iden:ty and Access Management. TSCP Symposium November 2013

Using FICAM as a model for TSCP Best Prac:ces in Physical Iden:ty and Access Management. TSCP Symposium November 2013 Using FICAM as a model for TSCP Best Prac:ces in Physical Iden:ty and Access Management TSCP Symposium November 2013 Quantum Secure s Focus on FICAM and Related Standards Complete Suite of Physical Iden:ty

More information

For Official Use Only (FOUO)

For Official Use Only (FOUO) The FEMA Mission To support our citizens and first responders to ensure that as a nation we work together to build, sustain, and improve our capability to prepare for, protect against, respond to, and

More information

Enrolling with PIV and PIV-I Velocity Enrollment Manager

Enrolling with PIV and PIV-I Velocity Enrollment Manager Enrolling with PIV and PIV-I Velocity Enrollment Manager Overview The Homeland Security Presidential Directive 12 (HSPD-12) called for a common identification standard to be adopted by all Federal Government

More information

Privacy Impact Assessment of. Personal Identity Verification Program

Privacy Impact Assessment of. Personal Identity Verification Program Official of Federal Governors Reserve seal of of the System. Board Program or application name. Privacy Impact Assessment of Personal Identity Verification Program Personal Identity Verification (PIV)

More information

CoSign by ARX for PIV Cards

CoSign by ARX for PIV Cards The Digital Signature Company CoSign by ARX for PIV Cards Seamless and affordable digital signature processes across FIPS 201-compliant systems Introduction to Personal Identity Verification (PIV) In response

More information

STATEMENT OF CHARLES EDWARDS DEPUTY INSPECTOR GENERAL U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE

STATEMENT OF CHARLES EDWARDS DEPUTY INSPECTOR GENERAL U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE STATEMENT OF CHARLES EDWARDS DEPUTY INSPECTOR GENERAL U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE COMMITTEE ON HOMELAND SECURITY SUBCOMMITTEE ON OVERSIGHT AND MANAGEMENT EFFICIENCY U.S. HOUSE OF REPRESENTATIVES

More information

Personal Identity Verification (PIV) of Federal Employees and Contractors

Personal Identity Verification (PIV) of Federal Employees and Contractors FIPS PUB 201-2 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Personal Identity Verification (PIV) of Federal Employees and Contractors Computer Security Division Information Technology Laboratory

More information

AML.ms. Management System. Case Study by AML.ms, LLC. Anti-Money Laundering / Combating the Financing of Terrorism (AML/CFT)

AML.ms. Management System. Case Study by AML.ms, LLC. Anti-Money Laundering / Combating the Financing of Terrorism (AML/CFT) AML.ms Anti-Money Laundering / Combating the Financing of Terrorism (AML/CFT) Management System Case Study by AML.ms, LLC Overview About AML.ms Enterprise Platform Application Case Study Introduction Challenge

More information

Personal Identity Verification

Personal Identity Verification for the Personal Identity Verification Contact Point Cynthia Sjoberg Program Manager, HSPD 12 Training and Operations Security Division Office of Security Department of Homeland Security (202) 447 5010

More information

ACI - NA PUBLIC SAFETY & SECURITY FALL CONFERENCE 2012 AVIATION BADGING EFFICIENCIES

ACI - NA PUBLIC SAFETY & SECURITY FALL CONFERENCE 2012 AVIATION BADGING EFFICIENCIES ACI - NA PUBLIC SAFETY & SECURITY FALL CONFERENCE 2012 AVIATION BADGING EFFICIENCIES ACI-NA PUBLIC SAFETY & SECURITY, FALL CONFERENCE 2012 BADGING BEST PRACTICES SURVEY Cheryl Vauk Productive Solutions

More information

STATEMENT OF JOHN E. MCCOY II DEPUTY ASSISTANT INSPECTOR GENERAL FOR AUDITS U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE

STATEMENT OF JOHN E. MCCOY II DEPUTY ASSISTANT INSPECTOR GENERAL FOR AUDITS U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE STATEMENT OF JOHN E. MCCOY II DEPUTY ASSISTANT INSPECTOR GENERAL FOR AUDITS U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM SUBCOMMITTEE ON GOVERNMENT ORGANIZATION,

More information

What Does it Mean to be PIVish in PACS ICAM PIV in E-PACS Guidance v2.0.2 the short form. December 3, 2012

What Does it Mean to be PIVish in PACS ICAM PIV in E-PACS Guidance v2.0.2 the short form. December 3, 2012 Federal CIO Council Information Security and Identity Management Committee IDManagement.gov What Does it Mean to be PIVish in PACS ICAM PIV in E-PACS Guidance v2.0.2 the short form December 3, 2012 HSPD-12

More information

Integration of Access Security with Cloud- Based Credentialing Services

Integration of Access Security with Cloud- Based Credentialing Services Integration of Access Security with Cloud- Based Credentialing Services Global Identity Summit September 17, 2014 All text, graphics, the selection and arrangement thereof, unless otherwise cited as externally

More information

Single Sign-On. Security and comfort can be friend. Arnd Langguth. alangguth@novell.com. September, 2006

Single Sign-On. Security and comfort can be friend. Arnd Langguth. alangguth@novell.com. September, 2006 Single Sign-On Security and comfort can be friend. Arnd Langguth alangguth@novell.com September, 2006 Identity proliferation in the enterprise Password management problem How many passwords do you have?

More information

National Security Adjudicator Training Program

National Security Adjudicator Training Program DIRECTOR OF NATIONAL INTELLIGENCE WASHINGTON, DC 20511 E/S 00530 MEMORANDUM FOR: SUBJECT: Distribution National Security Adjudicator Training Program In my role as Security Executive Agent pursuant to

More information

OFFICE OF THE GENERAL COUNSEL HONORS ATTORNEY PROGRAM AND SUMMER LAW INTERN PROGRAM for 2011

OFFICE OF THE GENERAL COUNSEL HONORS ATTORNEY PROGRAM AND SUMMER LAW INTERN PROGRAM for 2011 OFFICE OF THE GENERAL COUNSEL HONORS ATTORNEY PROGRAM AND SUMMER LAW INTERN PROGRAM for 2011 Eligibility Requirements Open only to U.S. citizens Does not include lawful permanent residents Must obtain

More information

The Security Clearance and Investigation Process

The Security Clearance and Investigation Process The Security Clearance and Investigation Process OPM s Mission OPM s Mission is to Recruit, Retain and Honor a World-Class Workforce to Serve the American People OPM s Federal Investigative Services (FIS)

More information

emipp Extending Medicaid Connectivity for Managing EHR Incentive Payments Overview

emipp Extending Medicaid Connectivity for Managing EHR Incentive Payments Overview Extending Medicaid Connectivity for Managing EHR Incentive Payments JANUARY 2011 Registration for EHR Incentive Program begins APRIL 2011 Attestation for the Medicare EHR Incentive Program begins NOVEMBER

More information

PRIVACY IMPACT ASSESSMENT

PRIVACY IMPACT ASSESSMENT PRIVACY IMPACT ASSESSMENT U.S. Office of Personnel Management (OPM) Electronic Delivery System March 2013 FDIC External System Table of Contents System Overview Personally Identifiable Information (PII)

More information

Identity, Credential, and Access Management. An information exchange For Information Security and Privacy Advisory Board

Identity, Credential, and Access Management. An information exchange For Information Security and Privacy Advisory Board Federal CIO Council Information Security and Identity Management Committee Identity, Credential, and Access Management An information exchange For Information Security and Privacy Advisory Board Deb Gallagher

More information

DHS Trusted Identity Exchange

DHS Trusted Identity Exchange for the DHS Trusted Identity Exchange DHS/ALL/PIA-050 April 2, 2015 Contact Point Ashley Stevenson Identity, Credential & Access Management (ICAM) PMO Information Sharing Environment Office (ISEO) Office

More information

1. First, how familiar are you with Master of Public Administration (MPA) and Master of Public Policy (MPP) degrees?

1. First, how familiar are you with Master of Public Administration (MPA) and Master of Public Policy (MPP) degrees? . First, how familiar are you with Master of Public Administration (MPA) and Master of Public Policy (MPP) degrees? Not familiar at all 6.2% 64 2 3.4% 3 3 26.6% 0 4 9.2% 76 Extremely familiar 23.8% 94

More information

Financial Procedure Note FPN 13. Financial Conflict of Interest Policy

Financial Procedure Note FPN 13. Financial Conflict of Interest Policy Financial Procedure Note FPN 13 Financial Conflict of Interest Policy September 2013 Financial Procedure Notes supplement Financial Regulations, providing detailed guidance on various topics. Failure to

More information

Security Language for IT Acquisition Efforts CIO-IT Security-09-48

Security Language for IT Acquisition Efforts CIO-IT Security-09-48 Security Language for IT Acquisition Efforts CIO-IT Security-09-48 Office of the Senior Agency Information Security Officer VERSION HISTORY/CHANGE RECORD Change Number Person Posting Change Change Reason

More information

Office of Inspector General

Office of Inspector General DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Review of DHS Security Controls for Portable Storage Devices OIG-08-95 September 2008 Office of Inspector General U.S. Department of Homeland

More information

DHS DIRECTIVES INSTRUCTION HANDBOOK DHS INSTRUCTION HANDBOOK 121-01-007 THE DEPARTMENT OF HOMELAND SECURITY PERSONNEL SUITABILITY AND SECURITY PROGRAM

DHS DIRECTIVES INSTRUCTION HANDBOOK DHS INSTRUCTION HANDBOOK 121-01-007 THE DEPARTMENT OF HOMELAND SECURITY PERSONNEL SUITABILITY AND SECURITY PROGRAM DHS DIRECTIVES INSTRUCTION HANDBOOK DHS INSTRUCTION HANDBOOK 121-01-007 THE DEPARTMENT OF HOMELAND SECURITY PERSONNEL SUITABILITY AND SECURITY PROGRAM APPROVAL DATE: JUNE 2009 DEPARTMENT OF HOMELAND SECURITY

More information

Physical Access Control System

Physical Access Control System for the Physical Access Control System DHS/ALL 039 June 9, 2011 Contact Point David S. Coven Chief, Access Control Branch (202) 282-8742 Reviewing Official Mary Ellen Callahan Chief Privacy Officer (703)

More information

Enterprise IT. Aligning Strong Solutions, Assuring Enterprise Strength

Enterprise IT. Aligning Strong Solutions, Assuring Enterprise Strength Enterprise IT Aligning Strong Solutions, Assuring Enterprise Strength Strategic planning aligns your enterprise IT infrastructure with your mission, operational and efficiency goals. From the start, we

More information

OFFICE OF INSPECTOR GENERAL DEPARTMENT OF HOMELAND SECURITY

OFFICE OF INSPECTOR GENERAL DEPARTMENT OF HOMELAND SECURITY s ANNUAL PERFORMANCE PLAN FOR FISCAL YEAR 2013 OFFICE OF INSPECTOR GENERAL DEPARTMENT OF HOMELAND SECURITY The Government Performance and Results Act of 1993, Public Law 103-62, requires agencies to submit

More information

GSA FIPS 201 Evaluation Program

GSA FIPS 201 Evaluation Program GSA FIPS 201 Evaluation Program David Temoshok Director, Federal Identity Policy and Management GSA Office of Governmentwide Policy NIST/DHS/TSA TWIC QPL Workshop April 21, 2010 1 HSPD-12 Government-wide

More information

Identity - Privacy - Security

Identity - Privacy - Security Identity - Privacy - Security Systems Security Engineering and Privacy Privacy and Security Workshop 3 Nov 2006 Toronto Recent Digital FIPS Border 201 Motivation Identity Security for Security Privacy

More information

Taking Adverse Actions Based on Suitability or Security Issues

Taking Adverse Actions Based on Suitability or Security Issues Taking Adverse Actions Based on Suitability or Security Issues Objectives Discuss the various purposes for personnel investigations HSPD-12 (PIV access) Suitability/Fitness (character and conduct) National

More information

Canine Website System (CWS System) DHS/TSA/PIA-036 January 13, 2012

Canine Website System (CWS System) DHS/TSA/PIA-036 January 13, 2012 for the (CWS System) DHS/TSA/PIA-036 January 13, 2012 Contact Point Carolyn Y. Dorgham Program Manager, National Explosives Detection Canine Team Program Carolyn.Dorgham@dhs.gov Reviewing Official Mary

More information

Agency Information Collection Activities: REAL ID: Minimum Standards for Driver s

Agency Information Collection Activities: REAL ID: Minimum Standards for Driver s This document is scheduled to be published in the Federal Register on 05/11/2016 and available online at http://federalregister.gov/a/2016-11133, and on FDsys.gov 9110-9B DEPARTMENT OF HOMELAND SECURITY

More information

Evaluation of DHS' Information Security Program for Fiscal Year 2015

Evaluation of DHS' Information Security Program for Fiscal Year 2015 Evaluation of DHS' Information Security Program for Fiscal Year 2015 November 13, 2015 OIG-16-08 DHS OIG HIGHLIGHTS Evaluation of DHS Information Security Program for Fiscal Year 2015 November 13, 2015

More information

AIRSPACE WAIVERS AND FLIGHT AUTHORIZATIONS FOR CERTAIN AVIATION OPERATIONS (INCLUDING DCA) (Amended)

AIRSPACE WAIVERS AND FLIGHT AUTHORIZATIONS FOR CERTAIN AVIATION OPERATIONS (INCLUDING DCA) (Amended) for the AIRSPACE WAIVERS AND FLIGHT AUTHORIZATIONS FOR CERTAIN AVIATION OPERATIONS (INCLUDING DCA) (Amended) Contact Point Lisa S. Dean Privacy Officer Transportation Security Administration (571) 227-3947

More information

ARC Outreach on HSPD 12 and Mandatory Use of ODIN

ARC Outreach on HSPD 12 and Mandatory Use of ODIN ARC Outreach on HSPD 12 and Mandatory Use of ODIN August 28 & 29, 2007 Agenda Center Management Opening Remarks CIO Perspective Homeland Security Presidential Directive (HSPD) 12 Questions & Answers Mandatory

More information

FEDERAL IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT AND PERSONAL IDENTITY VERIFICATION (PIV) SOLUTIONS

FEDERAL IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT AND PERSONAL IDENTITY VERIFICATION (PIV) SOLUTIONS FEDERAL IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT AND PERSONAL IDENTITY VERIFICATION (PIV) SOLUTIONS Homeland Security Presidential Directive 12 (HSPD 12), FIPS 201, and the latest Federal Identity,

More information

IT SECURITY EDUCATION AWARENESS TRAINING POLICY OCIO-6009-09 TABLE OF CONTENTS

IT SECURITY EDUCATION AWARENESS TRAINING POLICY OCIO-6009-09 TABLE OF CONTENTS OFFICE OF THE CHIEF INFORMATION OFFICER Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: Section I. PURPOSE II. AUTHORITY III. SCOPE IV. DEFINITIONS V. POLICY VI. RESPONSIBILITIES

More information

Understanding the differences in PIV, PIV-I, PIV-C August 23, 2010

Understanding the differences in PIV, PIV-I, PIV-C August 23, 2010 Federal CIO Council Information Security and Identity Management Committee Identity, Credential, and Access Management Understanding the differences in PIV, PIV-I, PIV-C August 23, 2010 Tim Baldridge AWG

More information

This directive establishes the Department of Homeland Security (DHS) Security Education, Training, and Awareness (SETA) Program.

This directive establishes the Department of Homeland Security (DHS) Security Education, Training, and Awareness (SETA) Program. Department of Homeland Security Management Directive System MD Number: 11053 Issue Date: 10/12/2004 SECURITY EDUCATION, TRAINING, AND AWARENESS PROGRAM DIRECTIVE 1. Purpose This directive establishes the

More information

DS-2019 is controlled by the U.S. Department of State.

DS-2019 is controlled by the U.S. Department of State. United States Department of Homeland Security document issued by colleges, universities, and vocational schools that provides supporting information for the issuance of a student visa or change of status

More information

Appendix -- Homeland Security Mission Funding by Agency and Budget Account (budget authority in millions of dollars)

Appendix -- Homeland Security Mission Funding by Agency and Budget Account (budget authority in millions of dollars) Department of Agriculture 508.8-528.6-603.6 Agricultural Research Service/ Buildings and Facilities/005-18-1401 - - 45.0-113.7 Protecting Critical Infrastructure and Key Assets - - 45.0-113.7 Agricultural

More information