A Uniform Identification Badge for Medical and Emergency Workers: Managing a Regional Personal Identification Verification Program
|
|
|
- Joel Floyd
- 10 years ago
- Views:
Transcription
1 A Uniform Identification Badge for Medical and Emergency Workers: Managing a Regional Personal Identification Verification Program Rasa Silenas Texas A&M Health Science Center Eric Epley Southwest Texas Regional Advisory Council for Trauma Alexander McLeod University of Texas at San Antonio Abstract South Central Texas emergency planners organized a personal identity verification project for emergency and health care workers. This paper describes the development and administrative challenges in designing and implementing a PIV system across multiple organizations in a 22-county region. Keywords: personal identity verification, emergency worker identification, regional id system, regional identity verification, PIV system Introduction Managing personnel identification and access control for workers who are not their employees is a significant security issue for hospitals, and carrying a plethora of identification badges is a nuisance for health care and emergency personnel who work in multiple hospitals. This paper describes one region s solution. After the terrorist attacks of September 11, 2001, a group of medical and Emergency Medical Services (EMS) executives in the greater San Antonio area organized a voluntary committee to improve regional preparedness. One of the workgroups under this committee is the EMS/Hospital Disaster Group (EHDG), which focused on hospital and pre-hospital aspects of medical disaster response. EHDG aligned itself with the Southwest Texas Regional Advisory Council for Trauma (STRAC), which has a legislative mandate to organize trauma response on a regional level, as its disaster committee. Additionally, the region s hospital leadership designated EHDG as the planning group for Health Resources and Services Administration (HRSA) Bioterrorism funds, allowing federal funding to support the preparedness plans of EHDG. One of the first problems that EHDG identified was that the hospitals and Fire/EMS agencies within the 22-county STRAC region did not have a uniform method for
2 Pg 4-2 identifying physicians and Fire/EMS personnel and disaster volunteer medical workers. This created three primary problems for regional emergency preparedness. 1. Difficulty securing hospitals and other facilities. 2. Inability to identify and authenticate affiliated medical professionals. 3. Lack of adequate identification and tracking of personnel at routine Fire Department and EMS responses as well as disaster incidents. Process To address these problems, EHDG tasked its Hospital Security workgroup to develop the concept of a uniform identification (ID) badge for the region. The Bexar County Medical Society (BCMS), embraced this project as addressing a number of its own needs, including assisting hospitals compliance with the requirement of the Joint Commission for Accreditation of Healthcare Organizations (JCAHO) for hospital personnel to wear identification. Other early supporters included all STRAC EMS agencies, the San Antonio Fire Department (SAFD), the Bexar County Fire Marshal s Office (BCFMO) and the Alamo Area Fire Chiefs Association. Approximately $150,000 was allocated to the project in the 2003 fiscal year. Initial Steps Risk assessment: The EHDG requested briefings from Emergency Management personnel, the Federal Bureau of Investigation (FBI), and others. Inadequate hospital and disaster site security was high among the concerns identified in these risk discussions, specifically the inability to: 1. Rapidly and effectively lock down a facility, while remaining functional for patient care 2. Easily identify the various non-hospital employees that routinely enter and exit hospitals (Physicians, Fire/EMS personnel, and during disasters, volunteer medical workers) 3. Track non-traditional personnel at a disaster incident (self-presenting physicians, disaster medical volunteers, Fire/EMS personnel from other jurisdictions, etc). Review of local and other disaster after-action reports reveals that such personnel have created significant problems, ranging from non-licensed personnel practicing medicine to the inability to know who was left in a particular area when the location was evacuated 4. Use the Personnel Accountability Reporting (PAR) system for all personnel at an incident site 5. Instantly know the certification level of other medical personnel and the current level at which their agencies local policies allow them to practice. The threat of terrorism has amplified these concerns, especially the ability to rapidly secure a hospital and remain in a lock-down mode for an extended time. Since Jan 03, the Department of Homeland Security (DHS) has put the nation at Threat Level Orange twice, for weeks or months at a time. Security alerts have referenced the potential for
3 Pg 4-3 terrorists to obtain Fire/EMS uniforms and ambulances to gain access to secure areas. The possibility for physician impersonation exists as well, with possible penetration into hospitals, including sensitive hospital areas such as Intensive Care Units or pharmacies. Hospitals have not been able to implement higher security measures without significant hindrances to daily operations. Access Control assessment EHDG conducted a survey of hospital access control systems in the area. They found four main technologies in use, from multiple vendors: 1. Varieties of magnetic stripes on the card, which require a swipe of the card through a card reader, similar to a credit card swipe 2. Proximity Radio Frequency Identification (RFID) cards or other devices that emit a small signal that wirelessly connects the card to the reader 3. One-dimensional bar codes, which require a bar code scanner, similar to the type used at the checkout counter of the grocery store 4. Keypads that require personnel to remember a specific numerical code to enter the door. Most ED keypads in the city were programmed to variations of a single, simple code, creating a vulnerability. Some facilities used a mixture of these technologies. Initial Goals and Assumptions The uniform ID badge had to meet a complex set of requirement from badge wearers, hospitals, Fire/EMS and Emergency Management agencies. Physicians and Fire/EMS personnel, as prospective badge holders, had similar desires. Their ideal ID badge would: 1. Allow entry to areas where the cardholder has approved access 2. Restrict movement into areas where the cardholder does not have approved access 3. Provide easy visual identification, at least with picture, first/last name, clinical certification/license, specialty/rank and home agency if applicable 4. Provide additional data directly from the card to a reading device (such as a laptop or handheld card reader) that would give incident command or security personnel additional details not normally desired on the visible portion of the card. This might include additional qualifications and other information, such as medical history, blood type, or smallpox vaccination status 5. Have a simple and quick process for requesting, obtaining and replacing the card while maintaining the ability to verify the badge-holder s credentials 6. Ensure security of the ID badges and validate the data associated with them 7. Reduce the number of badges and parking cards an individual needs to carry
4 Pg 4-4 Hospital, Fire/EMS and Emergency Management agency desires, as badge system users, included the following capabilities: 1. Visual/manual identification of personnel with an easily recognized ID badge that is consistently worn 2. Ability to scan the ID badge for additional data about the badge-holder, such as clinical skills, specialty knowledge, and medical information such as immunization status 3. Ability to implement restrictive hospital access control during heightened security without a significant impact on daily operations 4. Hospital compliance with Joint Commission for accreditation of Healthcare Organizations (JCAHO) requirements with respect to physician identification, while also providing an easy method for physicians to comply with these requirements 5. Ability for Fire/EMS and Emergency Management agencies to track and maintain accountability for personnel on an emergency scene to ensure their safety when safety conditions deteriorate 6. Tracking, with time stamp information, of badge-holders who have entered specific areas of a hospital or other access-controlled facility 7. Ability to track personnel who were possibly exposed to a contagious/infectious agent or hazardous substance 8. Ability to immediately lock out an individual whose employment with an agency or affiliation with a hospital is terminated In the initial stages, badging was to begin with practitioners who regularly work at hospitals but are not hospital employees: physicians and EMS. Hospitals needed to agree to the concept of uniform badging for these groups and to modify their access control systems to accommodate input from the uniform ID system allowing the uniform ID card to serve as the card-holder s method for entering the building or authorized areas such as parking facilities. The hospitals were to retain full control of who has permission to enter specific areas of their facilities. SAFD would participate by badging the majority of area EMS personnel. Badge Design A mixture of the technologies was selected to accommodate all of the above needs. The badge is a 3.3 inch tall x 2.1 inch wide polyvinyl chloride (PVC) card that has information printed on both sides. The visual layout of the front of the badge was based on a design in use by the Austin/Travis County EMS System and includes badge-holder demographic information such as a digital photograph, first and last name, specialty and agency affiliation. Collaboration between the participating agencies allowed the creation of a standardized color scheme which, when printed on the badge, indicates medical certification, title/rank and access type. Images of the agency s logo and medical certification patch further assist with identification of the badge-holders credentials. The
5 Pg 4-5 various populations (physician vs. Fire/EMS) have different colored layouts on the front of the badge but include the same basic information for visual identification. The back of the badge contains an industry standard three track magnetic stripe which is encoded during production to contain access control information. The addition of a PDF D bar code allowed interoperability with FireTrax, a proprietary system from Salamander Technologies, which facilitates personnel accountability at emergency scenes. A one-dimensional bar code (along with the magnetic stripe) is used to interface with the access control systems and achieved compatibility across multiple legacy systems already in daily use at participating facilities. The current version of the badge does not implement the use of RFID or proximity due to limited local demand and cost factors, however, the uniform ID system can accommodate these technologies when their use becomes more widespread. The addition of a second one-dimensional bar code provided agencies with an option to integrate an employee ID number into the badge for equipment tracking or timekeeping applications. The badge is shown in Figure 1. Figure 1. Uniform ID Badge Medical Certification Color (Gold Physician, Red to White paramedic, Green to White Intermediate, Blue to White Basic) STRAC-ID Unified ID Badge Project Hospital Affiliation (Ex. BHS for Baptist Health System, SWG for Southwest General Hospital) Magnetic Stripe Fire-TRAX Hi-capacity 2- (12 digit random number, to dimensional barcode allow card swipe entrance at (Allows qualifications, name, rank, etc to be scanned hospital ER s, etc) directly from card. Used for on-scene personnel tracking/accountability, etc) Certification Caduceus for physicians, Certification patch for Fire-Rescue/EMS Status bar EMS (Red only Fire-Rescue only Blue only EMS only Red/Blue Fire-Rescue/EMS dual role) Rank color (Ex. Yellow Firefighter, Red Company officer, White Chief officer, Green Administrative, etc) Bar Code (12 digit random number, to allow card swipe entrance to hospital ER s, etc) ID System Design Once the overall look and functionality of the badge was formalized, the next step was to design and implement a system in which the badges could be easily created, managed and
6 Pg 4-6 produced. BCMS partnered with a local technology firm, World Net, to create the system, because this company offered knowledge and experience in both Internet application development and emergency response. The application was designed to provide a user-friendly interface to multiple concurrent users located throughout the 22 county region. The basic functionality included the ability to create, edit, review, and print badges along with extensive reporting capability. Because each agency possesses a unique set of access control and identification requirements, a matrix of access levels was designed to allow users to perform tasks commensurate with the role assigned by each agency. Each agency governed permissions and controlled ID cards for their employees. In order to avoid the unauthorized production of badges on the system, specific permission is granted to agencies with badge printers. On the back end, a database was employed to manage the data. The system design included the means necessary to communicate with the access control system at each hospital in order to distribute access information for the badgeholders. The enrollment process uses a Secure Socket Layer (SSL) encrypted Web-based application housed on a central server. Each agency authenticates and inputs badgeholder information into a database. A variety of fields meet the needs of all users, however each agency is only able to access data fields specific to their agency or group. Each agency authorized on the system enters basic identification information, rank, clinical licensure and certifications, along with other fields, both mandatory and optional. This interface and the current database fields are shown in Figure 2. Hospital administration of the system includes authorizing physicians access to hospital facilities by affiliating individual badge-holders in the database, authorizing badges to be printed and/or activated, as well as printing and issuing the badge. Authorized staff members at each hospital may log onto the server and affiliate badge-holders with the specific hospital but are unable to affiliate or disaffiliate badge-holders with other hospitals. The access control system at each hospital communicates with the uniform badge server at least once every 24 hours to retrieve the unique access ID numbers of affiliated badge-holders. The hospital s access control system then grants the affiliated badge-holders access to an area or group of areas as determined by the individual hospital. For instance, many hospitals granted access into parking facilities in addition to the ED doors to entice badge-holders to always carry the card. Since the hospital s access control system determines what areas the badge-holder may enter, individual hospitals may allow access to specific areas within the facility.
7 Pg 4-7 Figure 2. Web interface and database fields
8 Pg 4-8 Fire/EMS agency administration of the system is similar with the exception of the affiliation process. All agency personnel that require access to the ED during normal operation are automatically affiliated with every hospital on the system, since they previously had access to the EDs as a group through then-current access control methods. Individual hospitals have the ability to grant access to Fire and EMS members into additional areas of the hospital on a case by case basis. Badging workstations have a computer and monitor, an automated camera system, a barcode/magnetic stripe reader, and a badge printer. Stations have been deployed to several hospitals and other agencies throughout the city and surrounding areas to simplify the logistics of issuing badges. Emergency Management agencies or hospitals receiving out-of-area personnel, volunteers or visitors, may issue badges to those personnel on arrival and program their access as appropriate. Use of the system by a badge-holder is straightforward. Color-coded signs were placed at locations where the badge may be used, indicating which type of access control system controls the entrance. Magnetic stripe readers display a blue sign depicting a badgeholder swiping the card long edge down in the reader. A matching blue stripe running along the long edge of the card next to the magnetic stripe provided additional assistance. Barcode readers display a red sign depicting a badge-holder swiping the badge short edge down in the reader. A matching red stripe running along the short edge of the card on top of the barcode allows for easy identification. Labeling of the card readers is shown in Figure 3. Figure 3. Labels on card readers
9 Pg 4-9 Infrastructure Management The information technology at the core of the system is maintained with standard best practices. The database and web-based application undergo daily backup with off-site rotation of storage media so that historical information is preserved. For security, all activity on the system is logged. Penetration attempts and suspicious activities are flagged for administrator investigation. Firewalls and intrusion detection systems serve as the front line of defense, with regular security evaluations allowing for the elimination of possible threats before they are exploited. Future applications At the time of this writing, the entire system was in place in the San Antonio area: all region hospitals had access control systems, the application and database was operational, and badges had been issued to 2600 physicians and approximately 2000 EMS personnel. The system had just gone live with minimal irregularities. As funds become available, hospitals will be able to extend the uniform badge to their own employees in nursing and support functions. The Alamo Area Council of Governments has also adopted the uniform ID badge for first response agencies throughout its 12 county area (this area partially overlaps TSA-P). The City of San Antonio is further developing the badge to be part of a two-factor biometric authentication capability and incorporating its use in the SAFD Incident Command System. The University of Texas at San Antonio has received a $100K grant to demonstrate the use of biometric authentication and incorporation of the badge system with SAFD information systems. This system will be compatible with FIPS 201 standards in the event the City of San Antonio adopts smart card badging. Deployment of the badge to Fire/EMS agencies in the rest of the 22-counties of TSA-P will proceed as funds become available. Finally, the San Antonio Uniform ID Badge program is being integrated with a parallel effort by the Department of Homeland Security (DHS). DHS has created a First Responder Authentication Credential (FRAC), currently being implemented for First Responders, Response Support, and Critical Government personnel in the National Capital Area. The FRAC has substantial physical and system similarities to the STRAC/BCMS uniform ID; however, the FRAC is a smart card embedded with an integrated circuit chip (ICC) capable of Public Key enabling (PKE) data. It reflects the Federal Information Processing Standard 201 (FIPS 201) (NIST 2006), issued by the National Institute of Standards and Technology (NIST) as directed by Homeland Security Presidential Directive 12 (HSPD 12) (Bush 2004). This standard specifies the architecture and technical requirements for a common identification standard for the Personal Identity Verification (PIV) of Federal Employees and Contractors. FIPS 201 defines a process to issue secure and reliable forms of identification based on sound
10 Pg 4-10 criteria for personal identity proofing, registration, and issuance. FIPS 201 specifies use of identity credentials with ICCs that resist identity fraud, tampering, counterfeiting, and terrorist exploitation. These identity credentials can be rapidly authenticated electronically and are to be issued only by providers whose reliability has been established by an official accreditation process. The identity proofing requirements remain the responsibility of the local jurisdictions but must meet a basic level of identity assurance in accordance with the Federal Bridge Certificate Authority (FBCA) Levels of Assurance. Additionally, the FRAC supports the integration of baseline critical skill sets (attributes) as defined in the National Response Plan s (NRP) National Incident Management System s (NIMS) 15 Emergency Support Functions (ESFs) (DHS 2004), or the National Infrastructure Protection Plan s (NIPP) 17 Sectors (DHS 2006). Most of the San Antonio badge database contains information that would be classified as attributes on the FRAC. Development of the phase two STRAC/BCMS uniform ID badge will follow the FIPS 201 identity credential issuance, architecture, topology, and technical requirements. Implementation of a FIPS 201 technically-compliant credential, the First Responder Authentication Credential (FRAC), for First Responders, Response Support, or Critical Government personnel will enable interoperability not only with local jurisdictions, but also the Texas National Guard, United States Coast Guard, and all federal emergency response officials in compliance with HSPD 12. The STRAC/BCMS team will coordinate with DHS/NCRC to ensure future interoperability / compatibility through participation in a near future pandemic exercise/demonstration. Discussion This uniform badging project was developed in a 22-county region that has one of the most complex, inclusive, voluntary, trans-jurisdictional and trans-organizational medical disaster planning systems in the nation. This level of cooperation, at the highest levels of the organizations involved, is fragile and requires constant attention and transparency. However, broadly welcome and successful projects such as the uniform ID are also a powerful tool for building regional collaborations. A key factor in our success was the emphasis on consensus-driven decisions, which ensured buy-in from all participants. To create a uniform ID badge system in another area, we believe the following steps would be appropriate. 1. Define the user community. What professional groups will use the system initially? Will the system be purely medical, or will the responder community use it as well? Will it reside in one jurisdiction or across a region? 2. Define requirements. The requirements we designed are a good starting point for discussion; other user communities may add or subtract according to local needs.
11 Pg Study existing access control infrastructure and identify gaps. Do all users have entry control systems? Do these cover all doors and gates that need to be covered at each facility? What types of systems are used? What access mechanisms (bar codes, magnetic strips, RFID chips, etc) need to be included on a uniform badge for present and future compatibility across the area? 4. Identify who will own the system who will be responsible for funding, administration and maintenance? Also, identify a project manager for organizing and installing the system. The owner and project manager may be different people. In our area, the STRAC/EHDG Hospital Security Committee is the owner but the Bexar County Medical Society (BCMS) did much of the start-up project management, in close collaboration with the STRAC: a local vendor developed the database and Web-based application 5. Confirm agreement of all users to commit the necessary resources to conform to the system s physical and administrative requirements and to use the system. This must be done at senior administrative levels since the project will most likely involve multiple departments in the hospitals, i.e. security, physician services, human resources, facility/plant maintenance, etc. 6. Establish start-up funding. The STRAC/EHDG provided funding from HRSA bioterrorism hospital preparedness grants, which will be less available in the future. 7. Define database fields. 8. Acquire and install access control systems where needed 9. Acquire server, database software and badge printers 10. Test and refine any deficiencies noted in the system 11. Train agency-level badge administrators 12. Deploy system Much work remains in determining appropriate data fields for individual qualifications. There has been much enthusiasm for using such a platform for carrying information on which to base emergency credentials for out-of-area volunteer responders, whether physicians or others. Caution is in order. The term credentialing has a different meaning for physicians than for other professional groups. First responders use the word simply to indicate that they are who and what their badge says they are, such as a Basic EMT or a Paramedic, according to a national standard for what those words mean. Physician credentials are granted by individual hospitals through a detailed process dictated by both JCAHO and local policies, based on the physician s specialty training, currency and performance history. The credentials are specific down to individual procedures, such as specific surgical operations, and care of specific conditions. They are highly sensitive information, especially if a physician s credentials were limited or revoked for alleged poor performance. Furthermore, information as detailed as a physician s credentials may not be necessary or appropriate for inclusion in the uniform ID badge database. What information should be included is currently being discussed.
12 Pg 4-12 Even for non-physicians, the validity of training information and other certifications is currently on the honor system. There is no mechanism for verification at the system level that an individual has completed specific training or that their training is current. However, in its present state of development, the uniform ID badge has already demonstrated that it meets a large and complex set of requirements from a large and complex set of users in a uniformly satisfying way. Such systems will improve safety, security and accountability for hospitals and emergency responders wherever they are adopted. References Bush, G. W. (2004). Homeland Security Presidential Directive/HSPD-12 Subject: Policy for a Common Identification Standard for Federal Employees and Contractors. T. W. House. DHS (2004). National Incident Management System, US Department of Homeland Security: DHS (2006). National Infrastructure Protection Plan, US Department of Homeland Security: NIST (2006). Personal Identity Verification (PIV) of Federal Employees and Contractors. N. I. o. S. a. Technology, US Department of Commerce: 1-91.
Commonwealth of Virginia Personal Identity Verification-Interoperable (PIV-I) First Responder Authentication Credential (FRAC) Program
Commonwealth of Virginia Personal Identity Verification-Interoperable (PIV-I) First Responder Authentication Credential (FRAC) Program October 2012 W. Duane Stafford Statewide Credentialing Coordinator
GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201.
PERSONAL IDENTITY VERIFICATION (PIV) OVERVIEW INTRODUCTION (1) Welcome to the Homeland Security Presidential Directive 12 (HSPD-12) Personal Identity Verification (PIV) Overview module, designed to familiarize
For Official Use Only (FOUO)
The FEMA Mission To support our citizens and first responders to ensure that as a nation we work together to build, sustain, and improve our capability to prepare for, protect against, respond to, and
Audio: This overview module contains an introduction, five lessons, and a conclusion.
Homeland Security Presidential Directive 12 (HSPD 12) Overview Audio: Welcome to the Homeland Security Presidential Directive 12 (HSPD 12) overview module, the first in a series of informational modules
NOAA HSPD-12 PIV-II Implementation October 23, 2007. Who is responsible for implementation of HSPD-12 PIV-II?
NOAA HSPD-12 PIV-II Implementation What is HSPD-12? Homeland Security Presidential Directive 12 (HSPD-12) is a Presidential requirement signed on August 27, 2004 requiring Federal agencies comply with
STATE OF LOUISIANA STANDARD OPERATING PROCEDURE. Statewide Credentialing/Access Program. All Hazards Access
STATE OF LOUISIANA STANDARD OPERATING PROCEDURE Statewide Credentialing/Access Program All Hazards Access STATE OF LOUISIANA STANDARD OPERATING PROCEDURE Critical Infrastructure Owners/Operators Pilot
Smart Cards and Biometrics in Physical Access Control Systems
Smart Cards and Biometrics in Physical Access Control Systems Robert J. Merkert, Sr. Vice President of Sales Americas Biometric Consortium 2005 Conference September 21, 2005 All Company and/or product
NEBRASKA EMERGENCY MANAGEMENT AGENCY
NEBRASKA EMERGENCY MANAGEMENT AGENCY Directive Type: Special Number: 6150 Topic: Nebraska Credentialing Policy Issued By: Al Berndt Date: 5 January 2011 Revised: 25 September 2013 Supersedes: Reference:
US Security Directive FIPS 201
Security US Security Directive FIPS 201 Compliance Strategies Learn about compliance strategies for governmental agencies in meeting requirements of Homeland Security Presidential Directive 12 (HSPD-12),
NIST Cyber Security Activities
NIST Cyber Security Activities Dr. Alicia Clay Deputy Chief, Computer Security Division NIST Information Technology Laboratory U.S. Department of Commerce September 29, 2004 1 Computer Security Division
Information Technology Policy
Information Technology Policy Identity Protection and Access Management (IPAM) Architectural Standard Identity Management Services ITP Number ITP-SEC013 Category Recommended Policy Contact [email protected]
E X E C U T I V E O F F I CE O F T H E P R E S I D EN T
EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503 THE DIRECTOR M-05-24 August 5, 2005 MEMORANDUM FOR THE HEADS OF ALL DEPARTMENTS AND AGENCIES FROM: SUBJECT: Joshua
FEDERAL IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT AND PERSONAL IDENTITY VERIFICATION (PIV) SOLUTIONS
FEDERAL IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT AND PERSONAL IDENTITY VERIFICATION (PIV) SOLUTIONS Homeland Security Presidential Directive 12 (HSPD 12), FIPS 201, and the latest Federal Identity,
HSPD-12 Implementation Architecture Working Group Concept Overview. Version 1.0 March 17, 2006
HSPD-12 Implementation Architecture Working Group Concept Overview Version 1.0 March 17, 2006 Table of Contents 1 PIV Lifecycle... 3 2 High Level Component Interaction Diagram... 4 3 PIV Infrastructure
NSF AuthentX Identity Management System (IDMS) Privacy Impact Assessment. Version: 1.1 Date: 12/04/2006. National Science Foundation
This document has been archived and replaced by piaauthentx1207..0 National Science Foundation NSF AuthentX Identity Management System (IDMS) Privacy Impact Assessment Version: 1.1 Date: 12/04/2006 Table
The Government-wide Implementation of Biometrics for HSPD-12
The Government-wide Implementation of Biometrics for HSPD-12 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy September 24, 2008 1 The HSPD-12 Mandate Home Security
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
System Security Plan University of Texas Health Science Center School of Public Health
System Security Plan University of Texas Health Science Center School of Public Health Note: This is simply a template for a NIH System Security Plan. You will need to complete, or add content, to many
Information System Audit. Arkansas Administrative Statewide Information System (AASIS) General Controls
Information System Audit Arkansas Administrative Statewide Information System (AASIS) General Controls ARKANSAS DIVISION OF LEGISLATIVE AUDIT April 12, 2002 April 12, 2002 Members of the Legislative Joint
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked
IDaaS: Managed Credentials for Local & State Emergency Responders
IDaaS: Managed Credentials for Local & State Emergency Responders NextgenID ID*TRUST Platform NextgenID - Headquarters USA 10226 San Pedro, Suite 100 San Antonio, TX 78216 +1 (210) 530-9991 www.nextgenid.com
NIST s FIPS 201: Personal Identity Verification (PIV) of Federal Employees and Contractors Masaryk University in Brno Faculty of Informatics
NIST s FIPS 201: Personal Identity Verification (PIV) of Federal Employees and Contractors Masaryk University in Brno Faculty of Informatics Jan Krhovják Outline Introduction and basics of PIV Minimum
GAO PERSONAL ID VERIFICATION. Agencies Should Set a Higher Priority on Using the Capabilities of Standardized Identification Cards
GAO United States Government Accountability Office Report to Congressional Requesters September 2011 PERSONAL ID VERIFICATION Agencies Should Set a Higher Priority on Using the Capabilities of Standardized
National Capital Region. Electronic Designation and Validation of Federal/Emergency Response Officials (F/EROs) in support of National Preparedness
National Capital Region Electronic Designation and Validation of Federal/Emergency Response Officials (F/EROs) in support of National Preparedness Presented to TechAmerica February 25, 2009 Topics for
AIE Frequently Asked Questions
AIE Frequently Asked Questions Q: What is AIE? A: AIE stands for Automated Installation Entry (AIE) The AIE system is designed to leverage technology to increase security for Soldiers, Family Members,
Connect C CURE 9000 with dozens of applications for a holistic business-empowering, all inclusive solution
Connect C CURE 9000 with dozens of applications for a holistic business-empowering, all inclusive solution Chances are, you re not just responsible for making sure people get in and out of your facilities.
HSPD-12 Homeland Security Presidential Directive #12 Overview
HSPD-12 Homeland Security Presidential Directive #12 Overview HSPD-12 Stands for Homeland Security Presidential Directive #12. HSPD-12 is the Policy for a Common Identification Standard for Federal Employees
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
Justice Management Division
Justice Management Division Privacy Impact Assessment for the Personal Identity Verification (PIV) Card System Issued by: Stuart Frisch, Senior Component Official for Privacy Reviewed by: Vance E. Hitch,
Best Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council
Best Practices for the Use of RF-Enabled Technology in Identity Management January 2007 Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
Hosted Testing and Grading
Hosted Testing and Grading Technical White Paper July 2014 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or
ISSUE BRIEF. Cloud Security for Federal Agencies. Achieving greater efficiency and better security through federally certified cloud services
ISSUE BRIEF Cloud Security for Federal Agencies Achieving greater efficiency and better security through federally certified cloud services This paper is intended to help federal agency executives to better
PCI Data Security and Classification Standards Summary
PCI Data Security and Classification Standards Summary Data security should be a key component of all system policies and practices related to payment acceptance and transaction processing. As customers
7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008
U.S. D EPARTMENT OF H OMELAND S ECURITY 7 Homeland Fiscal Year 2008 HOMELAND SECURITY GRANT PROGRAM ty Grant Program SUPPLEMENTAL RESOURCE: CYBER SECURITY GUIDANCE uidelines and Application Kit (October
Conducting Security System Site Surveys
Conducting Security System Site Surveys Written By: Harold C. Gillens, PSP, CFC, CHS-III Quintech Security Consultants, Inc. 102 Sangaree Park Court Suite 4 Summerville, SC 29483 CONDUCTING SECURITY SYSTEM
Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
IBM Connections Cloud Security
IBM Connections White Paper September 2014 IBM Connections Cloud Security 2 IBM Connections Cloud Security Contents 3 Introduction 4 Security-rich Infrastructure 6 Policy Enforcement Points Provide Application
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
Critical Controls for Cyber Security. www.infogistic.com
Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability
CHIS, Inc. Privacy General Guidelines
CHIS, Inc. and HIPAA CHIS, Inc. provides services to healthcare facilities and uses certain protected health information (PHI) in connection with performing these services. Therefore, CHIS, Inc. is classified
How To Protect The Time System From Being Hacked
WISCONSIN TIME SYSTEM Training Materials TIME SYSTEM SECURITY AWARENESS HANDOUT Revised 11/21/13 2014 Security Awareness Handout All System Security The TIME/NCIC Systems are criminal justice computer
Managed Hosting & Datacentre PCI DSS v2.0 Obligations
Any physical access to devices or data held in an Melbourne datacentre that houses a customer s cardholder data must be controlled and restricted only to approved individuals. PCI DSS Requirements Version
QUE Accounting Inc. QUE Accounting Software and Services October 2010
QUE Accounting Software and Services October 2010 A) Time and Attendance Calculate gross payroll hours for employees using access control time stamps as time punches Stand Alone PC entry, Time Clock, Bar
SYRACUSE CITY SCHOOL DISTRICT
SYRACUSE CITY SCHOOL DISTRICT EMERGENCY OPERATIONS PLAN Sharon L. Contreras, Superintendent of Schools Effective Date: September 2014 1 Table of Contents Contents Section I. Introduction:... 4 1.1 Purpose...
Federal Identity Management Handbook
September 2005 PUBLIC DRAFT Acknowledgements The Office of Management and Budget and the Federal Identity Credentialing Committee would like to acknowledge the significant contributions of the National
The following NIMS FAQ was prepared by NIMS on-line, which has additional information at www.nimsonline.com.
The National Incident Management System is a structure for management large-scale or multi-jurisdictional incidents. It is being phased in at the federal, state and local levels. Eventually, any jurisdiction
Moving to Multi-factor Authentication. Kevin Unthank
Moving to Multi-factor Authentication Kevin Unthank What is Authentication 3 steps of Access Control Identification: The entity makes claim to a particular Identity Authentication: The entity proves that
STATEMENT OF WORK. For
STATEMENT OF WORK For Credentialing and Validation Support for DC Homeland Security & Emergency Management Agency (DC HSEMA) IN SUPPORT OF THE GOVERNMENT OF THE DISTRICT OF COLUMBIA November 15, 2012 1.
visit us on the web at: www.strategicsecuritycorp.com
CAMERAS & ALARMS Closed Circuit Television (CCTV) / SMART Home Structured Wiring & Systems Commercial and Residential Alarm Systems / Central Monitoring Integrated Access Control Systems (Proximity Cards,
Payment Card Industry Self-Assessment Questionnaire
How to Complete the Questionnaire The questionnaire is divided into six sections. Each section focuses on a specific area of security, based on the requirements included in the PCI Data Security Standard.
DBIDS/IACS PRIVACY IMPACT ASSESSMENT (PIA) 2. Name of IT System: Defense Biometric Identification System (DBIDS)
DBIDS/IACS PRIVACY IMPACT ASSESSMENT (PIA) (Use N/A where appropriate) 1. DoD Component: Defense Manpower Data Center (DMDC) 2. Name of IT System: Defense Biometric Identification System (DBIDS) 3. Budget
Introduction. Conducting a Security Review
Chapter 3 PHYSICAL SECURITY Introduction In elections, physical security refers to standards, procedures, and actions taken to protect voting systems and related facilities and equipment from natural and
More Power and Performance With Each Printed Card
s tan d ar d ID SOlutions GUIDE More Power and Performance With Each Printed Card the importance of secure identity Today s society shares information at incredible speeds. A technologically advanced world
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Integration of Visitor Management with Access Control Systems
Easy Lobby White Pap er Integration of Visitor Management with Access Control Systems Bringing them Together Introduction Why You Need It This white paper provides a description of the integration process
HIPAA Security. assistance with implementation of the. security standards. This series aims to
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical
SECURITY OVERVIEW FOR MY.ENDNOTE.COM. In line with commercial industry standards, Thomson Reuters employs a dedicated security team to protect our
ENDNOTE ONLINE SECURITY OVERVIEW FOR MY.ENDNOTE.COM In line with commercial industry standards, Thomson Reuters employs a dedicated security team to protect our servers from attacks and other attempts
Small Business IT Risk Assessment
Small Business IT Risk Assessment Company name: Completed by: Date: Where Do I Begin? A risk assessment is an important step in protecting your customers, employees, and your business, and well as complying
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES
WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES Executive Overview U.S. Federal mandates dictates that personal with defense related initiatives must prove access
Evolving Bar Codes. Y398 Internship. William Holmes
Evolving Bar Codes Y398 Internship By William Holmes Table of contents Introduction: What is RFID? Types of Tags: Advantages of Tags: RFID applications Conclusion: Introduction: Bar codes have evolved
Status: Final. Form Date: 30-SEP-13. Question 1: OPDIV Question 1 Answer: OS
Status: Final Form Date: 30-SEP-13 Question 1: OPDIV Question 1 Answer: OS Question 2: PIA Unique Identifier (UID): Question 2 Answer: P-2277902-798208 Question 2A: Name: Question 2A Answer: Identity and
Information Security @ Blue Valley Schools FEBRUARY 2015
Information Security @ Blue Valley Schools FEBRUARY 2015 Student Data Privacy & Security Blue Valley is committed to providing an education beyond expectations to each of our students. To support that
V. IMMUNIZATION INFORMATION SYSTEMS
V. IMMUNIZATION INFORMATION SYSTEMS A. Utilize ImmTrac Effectively in LHD Clinics Standard Local health department (LHD) contractors will utilize ImmTrac effectively in all LHD clinics. Background Immunization
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific
SAFE SYSTEM: SECURE APPLICATIONS FOR FINANCIAL ENVIRONMENTS USING MOBILE PHONES
SAFE SYSTEM: SECURE APPLICATIONS FOR FINANCIAL ENVIRONMENTS USING MOBILE PHONES Sead Muftic 1, Feng Zhang 1 1Department of Computer and System Sciences, Royal Institute of Technology, Stockholm, Sweden
OFFICE OF THE INSPECTOR GENERAL SOCIAL SECURITY ADMINISTRATION
OFFICE OF THE INSPECTOR GENERAL SOCIAL SECURITY ADMINISTRATION CONTRACTOR SECURITY OF THE SOCIAL SECURITY ADMINISTRATION S HOMELAND SECURITY PRESIDENTIAL DIRECTIVE 12 CREDENTIALS June 2012 A-14-11-11106
Final Exam for: IS-700.a: National Incident Management System (NIMS) An Introduction
Final Exam for: IS-700.a: National Incident Management System (NIMS) An Introduction Each time that this test is taken online, questions and answers are scrambled to protect the integrity of the exam Completion
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the
STATE OF NEBRASKA STATE RECORDS ADMINISTRATOR DURABLE MEDIUM WRITTEN BEST PRACTICES & PROCEDURES (ELECTRONIC RECORDS GUIDELINES) OCTOBER 2009
STATE OF NEBRASKA STATE RECORDS ADMINISTRATOR DURABLE MEDIUM WRITTEN BEST PRACTICES & PROCEDURES (ELECTRONIC RECORDS GUIDELINES) OCTOBER 2009 Following is a voluntary guideline issued by the State Records
PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR
PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR AUTHOR: UDIT PATHAK SENIOR SECURITY ANALYST [email protected] Public Network Intelligence India 1 Contents 1. Background... 3 2. PCI Compliance
Cybersecurity Enhancement Account. FY 2017 President s Budget
Cybersecurity Enhancement Account FY 2017 President s Budget February 9, 2016 Table of Contents Section 1 Purpose... 3 1A Mission Statement... 3 1.1 Appropriations Detail Table... 3 1B Vision, Priorities
Goals. Understanding security testing
Getting The Most Value From Your Next Network Penetration Test Jerald Dawkins, Ph.D. True Digital Security p. o. b o x 3 5 6 2 3 t u l s a, O K 7 4 1 5 3 p. 8 6 6. 4 3 0. 2 5 9 5 f. 8 7 7. 7 2 0. 4 0 3
Typical System Architecture YOU CAN T MANAGE WHAT YOU CAN T MEASURE
HEALTHCARE Typical System Architecture Why RFID.. Bar Code Requires Line of - Site Requires correct orientation Easily obscured by dirt Easily scratched or damaged Contents cannot be modified Can only
Ten Steps for Preventing a terrorist Attack
WAR IN IRAQ AND ONGOING THREAT OF TERRORISM COMPEL NEW URGENCY TO MISSION OF SECURITY AND PROTECTION C-level Executives, Companies Should Take Specific Actions to Protect Employees and Help Ensure Business
OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific documents requested,
Gallagher Command Centre
DATASHEET Gallagher Command Centre security.gallagher.com Gallagher Command Centre is the central management platform for the Gallagher security system. Leveraging a client server architecture, the software
Security Overview. BlackBerry Corporate Infrastructure
Security Overview BlackBerry Corporate Infrastructure Published: 2015-04-23 SWD-20150423095908892 Contents Introduction... 5 History... 6 BlackBerry policies...7 Security organizations...8 Corporate Security
Personal Identity Verification (PIV) of Federal Employees and Contractors
FIPS PUB 201-2 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Personal Identity Verification (PIV) of Federal Employees and Contractors Computer Security Division Information Technology Laboratory
Implementing Federal Personal Identity Verification for VMware View. By Bryan Salek, Federal Desktop Systems Engineer, VMware
Implementing Federal Personal Identity Verification for VMware View By Bryan Salek, Federal Desktop Systems Engineer, VMware Technical WHITE PAPER Introduction This guide explains how to implement authentication
Privacy Impact Assessment of. Personal Identity Verification Program
Official of Federal Governors Reserve seal of of the System. Board Program or application name. Privacy Impact Assessment of Personal Identity Verification Program Personal Identity Verification (PIV)
Executive Summary P 1. ActivIdentity
WHITE PAPER WP Converging Access of IT and Building Resources P 1 Executive Summary To get business done, users must have quick, simple access to the resources they need, when they need them, whether they
Bridging the Great Divide. The Convergence of Physical and Logical Security
Bridging the Great Divide The Convergence of Physical and Logical Security Bridging the Great Divide: The Convergence of Physical and Logical Security 1 Table of Contents The Convergence of Physical and
TONAQUINT DATA CENTER, INC. CLOUD SECURITY POLICY & PROCEDURES. Tonaquint Data Center, Inc Cloud Security Policy & Procedures 1
TONAQUINT DATA CENTER, INC. CLOUD SECURITY POLICY & PROCEDURES Tonaquint Data Center, Inc Cloud Security Policy & Procedures 1 Table of Contents 1. Operational Security 2. Physical Security 3. Network
Emergency Response Official Credentials A Smart Card Alliance White Paper. Salvatore D Agostino CEO, IDmachines LLC sal@idmachines.
Emergency Response Official Credentials A Smart Card Alliance White Paper Salvatore D Agostino CEO, IDmachines LLC [email protected] Smart Card Alliance Broad collection of professionals working with
Court Security Guidelines
July 3, 2002 Court Security Guidelines Michigan State Court Administrative Office TABLE OF CONTENTS Introduction and Application of Guidelines....................................... 2 SECTION 1 Administrative
Network/Cyber Security
Network/Cyber Security SCAMPS Annual Meeting 2015 Joe Howland,VC3 Source: http://www.information-age.com/technology/security/123458891/how-7-year-old-girl-hacked-public-wi-fi-network-10-minutes Security
Evaluation Report. Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review. April 30, 2014 Report Number 14-12
Evaluation Report Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review April 30, 2014 Report Number 14-12 U.S. Small Business Administration Office of Inspector General
Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee
Marquee Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Securing the Workplace Executive Summary OPTIMIZE TODAY S WORKPLACE Protecting
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
