National Credit Union Administration Personal Identity Verification Training. Applicant



Similar documents
GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201.

E X E C U T I V E O F F I CE O F T H E P R E S I D EN T

Privacy Impact Assessment of. Personal Identity Verification Program

NIST s FIPS 201: Personal Identity Verification (PIV) of Federal Employees and Contractors Masaryk University in Brno Faculty of Informatics

SYSTEM NAME: Digital Identity Access Management System (DIAMS) - P281. SYSTEM LOCATION: U.S. Department of Housing and Urban Development, 451 Seventh

Identity Verification Program Guide

How To Get A Piv Credential

NOAA HSPD-12 PIV-II Implementation October 23, Who is responsible for implementation of HSPD-12 PIV-II?

Small Business Administration Privacy Impact Assessment

Federal Identity Management Handbook

Administrative Procedure 5800 Prevention of Identity Theft in Student Financial Transactions

The Government-wide Implementation of Biometrics for HSPD-12

Information Technology Policy

Texas State Library & Archives Commission Criminal Background Checks and Application Guidelines

Smart Cards and Biometrics in Physical Access Control Systems

POLICY AND PROCEDURES. OFFICE OF MANAGEMENT Student Volunteer Employment Program (SVEP) Table of Contents

UNION COUNTY S IDENTITY THEFT PREVENTION PROGRAM

For Official Use Only (FOUO)

~ Final Credentialing Standards for Issuing Personal Identity Verification Cards under HSPD-12

Agency Information Collection Activities: REAL ID: Minimum Standards for Driver s

CLIENT INFORMATION FORM

A Message for Warehouse Operators And Security Guidelines for Warehouse Operators

KenCom Public Safety Dispatch 1100 Cornell Lane, Yorkville, Illinois Phone (630)

Personal Identity Verification

Identity Theft Prevention Program Derived from the FTC Red Flags Rule requirements

Background Check Service

SENATE FILE NO. SF0065. Sponsored by: Senator(s) Johnson and Case A BILL. for. AN ACT relating to consumer protection; providing for

How To File An Identity Theft Complaint And Affidavit

Identity Theft Victims Universal Complaint Form (FTC)

November 13, 2013 Mortgagee Letter

Pre-Employment Background Checks. October 2, 2006

AMERICAN CERTIFICATION AGENCY FOR HEALTCARE PROFESSIONALS. P.O. BOX 58 OSCEOLA, IN TEL: (574) Fax: (574)

The Social Security Administration s Internal Controls over Issuing and Monitoring Contractors Homeland Security Presidential Directive-12 Credentials

Identity Theft Policy

University Policy Number : POLICY ON BACKGROUND CHECKS: CRIMINAL CONVICTIONS AND CREDIT CHECKS

ABBVIE C-TPAT SUPPLY CHAIN SECURITY QUESTIONNAIRE

Texas Annotated Statutes Title 2 Competition and Trade Practices Chapter 20 Regulation of Consumer Credit Reporting Agencies

Audio: This overview module contains an introduction, five lessons, and a conclusion.

APPLICATION FOR REINSTATEMENT OF NURSE AIDE CERTIFICATION

Importers must have written and verifiable processes for the selection of business partners including manufacturers, product suppliers and vendors.

BASEMENT FLOOD PREVENTION ASSISTANCE PROGRAM

Intermec Security Letter of Agreement

HSPD-12 Homeland Security Presidential Directive #12 Overview

COUNCIL POLICY NO. C-13

Minnetonka Assisted Living and Hospice Employment Application Please print and complete all sections.

GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2005 H 2 HOUSE BILL 629 Committee Substitute Favorable 5/18/05

31-R-11 A RESOLUTION ADOPTING THE CITY OF EVANSTON IDENTITY PROTECTION POLICY. WHEREAS, The Fair and Accurate Credit Transactions Act of 2003,

Security Awareness Training

The Department of Education (ED) may use a servicer to handle billing and other communications related to your loan.

POLICY NO. 449 IDENTITY THEFT PREVENTION POLICY

Senate Bill 9 Background Checks for Education A Reference Guide January 1, 2008

ELKHORN RURAL PUBLIC POWER DISTRICT POLICY #1230. Identity Theft Prevention Policy

D1-P: CRIMINAL AND ABUSE REGISTRY CHECKS IN VERMONT SCHOOLS

Data Centers and Mission Critical Facilities Access and Physical Security Procedures

ACCG Identity Theft Prevention Program. ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia (404) (404)

CHAPTER 101: IDENTITY THEFT PREVENTION PROGRAM

Central Oregon Community College. Identity Theft Prevention Program

2016 Scholarship Program

STAFF EMPLOYMENT APPLICATION

U.S. Department of Housing and Urban Development

Introduction to The Privacy Act

Commercial Switch Kit

How To Write A Mortgagee Letter

C-TPAT Importer Security Criteria

City of Sonoma PRE-QUALIFICATION QUESTIONNAIRE (FOR SALE HOUSING) Application submitted for purchase of unit at: (street address)

U.S. Nuclear Regulatory Commission Privacy Impact Assessment

NOTICE TO ALL APPLICANTS FOR CONTRACTOR'S OCCUPATIONAL REGISTRATION

Funds Transfer Agreement

Federal Bureau of Prisons. Privacy Impact Assessment for the HR Automation System. Issued by: Sonya D. Thompson Deputy Assistant Director/CIO

Best Practices for the Use of RF-Enabled Technology in Identity Management. January Developed by: Smart Card Alliance Identity Council

Subj: Appointment as a Contracting Officer's Technical Representative (COTR)

City of Geneva. Draft Under Review Approved Obsolete. Policy Number: 1.0. April 27, Effective Date: Last Revised Date: Responsible Office:

Customs & Trade Partnership Against Terrorism (C TPAT)

DHS / UKvisas Project

Additionally, this policy shall include drug testing for reasonable suspicion/cause of drug use by any athlete.

I. Purpose. Definition. a. Identity Theft - a fraud committed or attempted using the identifying information of another person without authority.

State Of Florida's Real Estate Law

Enrollment consideration is as follows:

Justice Management Division

The Virginia Electronic Notarization Assurance Standard

Attachment A Page 1 of 11 STATEMENT OF WORK U.S. IMMIGRATION AND CUSTOMS ENFORCEMENT TITLE III TRANSLATION/TRANSCRIPTION SERVICES

IDENTITY THEFT PREVENTION PROGRAM

Policies and Procedures: IDENTITY THEFT PREVENTION

Identity Theft Policy Created: June 10, 2009 Author: Financial Services and Information Technology Services Version: 1.0

United States Visitor and Immigrant Status Indicator Technology Program (US-VISIT)

REGULATION NO. 6 REGULATIONS GOVERNING THE LICENSING AND PRACTICE OF OCCUPATIONAL THERAPISTS

Customs-Trade Partnership against Terrorism Supply Chain Security Profile

ST. CLOUD STATE UNIVERSITY IDENTITY THEFT PREVENTION PROGRAM Effective November 1, 2009

INDIAN AFFAIRS MANUAL Part: 45 Job Placement and Training Chapter: 1 Employment Assistance and Vocational Training Page 1

COUNCIL POLICY STATEMENT

How To Validate a Digitally Signed PDF document. [7 th September 2006] SECURITY TRUST COMPLIANCE REGIONALITY

Privacy Impact Assessment

Delaware Tribe of Indians 170 NE Barbara, Bartlesville, OK Telephone: (918) Fax: (918)

PHARMACY TECHNICIAN APPLICATION & INSTRUCTIONS

NSECD Student Application Provider Worksheet

Seventh Avenue Inc. 1

DEPARTMENTAL DIRECTIVE

U.S. Securities and Exchange Commission. Easy Lobby PRIVACY IMPACT ASSESSMENT (PIA)

Dear Teacher Preparation Student,

FEDERAL IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT AND PERSONAL IDENTITY VERIFICATION (PIV) SOLUTIONS

Transcription:

National Credit Union Administration Personal Identity Verification Training Applicant

PURPOSE To introduce you to your role as Applicant in the National Credit Union Administration (NCUA) Personal Identity Verification (PIV) Program. As an Applicant, you are required to successfully complete the training to be eligible to receive government identification, now known as a PIV card.

What is PIV? The PIV program provides a commonly accepted identification card and reliable form of secure identification for all Federal employees that: Is issued based on sound criteria for verifying an individual s identity Is strongly resistant to identity fraud, tampering, counterfeiting and terrorist exploitation Can be rapidly authenticated electronically Is only issued by providers whose reliability has been established Your PIV card will allow you computer access, entrance to NCUA facilities and provide more efficient access to other Federal buildings.

Applicant Role, Description and Requirements As a PIV Applicant, you are the individual to whom a PIV card will be issued To apply for the card, you should meet one of the following eligibility requirements: Be a prospective or current Federal employee, as defined in Title 5 U.S.C 2105 Employee, within NCUA Be an individual who is or will be under contract to the Federal government, to whom the NCUA would normally issue a long-term (greater than six months) Federal identity card, consistent with existing security policies Be a guest researcher, volunteer, intern, intermittent, temporary, or seasonal employee who has been directed to receive a PIV card

Procedures You will be required to: Complete and sign Section 1 of the I-9 Form. Complete and submit background investigation forms (SF85, SF85P, or SF86 and associated documents), as directed by your Sponsor Appear in person (at the location indicated by your Sponsor) with two forms of valid identification, one of which must be a Federal or State-issued photo identification Be fingerprinted Have a passport-quality photo taken for placement on your PIV card Print and bring in the training certificate from this course Sign for your PIV card and acknowledge understanding of your rights and responsibilities Your Sponsor will notify you of any other supporting documents or additional information that may be required

Rights and Responsibilities You will be presented with information about your rights and responsibilities with respect to privacy, security, and protection of your PIV card Some of your rights include: Notification of how your personal Information will be protected while being stored or processed, both manually and electronically Correction of errors in the identity source documents and all decisions based on them Notification of the disposition of your application status If you are rejected, notification of the steps required to re-apply will be provided

Privacy, Security, and Protection All Federal employees and contractors have a responsibility to contribute to privacy, security, and protection of the PIV Program By Title 18 of the U.S. Code, it is a Federal offense to counterfeit, alter, or misuse the PIV card and program All personnel issued a PIV card are responsible for: Immediately reporting a lost/missing/stolen card Replacing the card when it has become unusable or worn Protecting the card

Summary As a PIV Applicant, your functions include: Working with your Sponsor to complete appropriate documentation Submitting forms and providing identity source documents in person Learning about and acknowledging your rights and responsibilities in the program Protecting your PIV card

NATIONAL CREDIT UNION ADMINISTRATION Certificate of Completion is hereby granted to (signature) (Print name) to certify completion of Applicant Personal Identity Verification (PIV) Training Granted: April 16, 2014

Completion In order to receive credit for satisfactorily completing this training you must sign and submit a hard copy of your certificate of completion to OHR. If you have questions about or need assistance with this training, please contact the Office of Human Resources at 703-518-6510