Connecticut Informational Guide for Noncriminal Justice Use of Criminal History Record Information (CHRI)

Size: px
Start display at page:

Download "Connecticut Informational Guide for Noncriminal Justice Use of Criminal History Record Information (CHRI)"

Transcription

1 Connecticut Informational Guide for Noncriminal Justice Use of Criminal History Record Information (CHRI) This document is designed to guide criminal justice and noncriminal justice agencies, with access criminal justice information (CJI) for noncriminal justice purposes*, with the audit process. All agencies with access to CJI, in any form, will be subjected to an audit. *Noncriminal Justice Purposes: The use of criminal history records for purposes authorized by federal or state law, other than purposes relating to the administration of criminal justice, including employment suitability, licensing determinations, immigration and naturalization matters, and national security clearances. 1

2 Table of Content Subject Page Defining Criminal Justice Information 3 Access to Criminal Justice Information 4 Introduction to the Interstate Identification Index (III) 5 Introduction to Public Law (Pub. L.) Introduction to the National Crime Prevention and Privacy Compact (Compact) Act of Introduction to the Federal Bureau of Investigation (FBI) Criminal Justice Information Services (CJIS) Security Policy 8 Introduction to the National Identity Services (NIS) Audit 9 Basic Parameters for Use 10 Introduction to Privacy Rights 11 Introduction to Physical Protection 12 Introduction to Media Protection 13 Introduction to Dissemination 14 Dissemination & The Applicant 15 Dissemination & Other Agencies 16 Dissemination & The General Public 17 Introduction to Misuse 18 Misuse Reporting Procedures 19 2

3 Defining Criminal Justice Information Personally Identifiable Information (PII): Information which can be used to distinguish or trace an individual s identity, such as name, social security number, or biometric records, alone or when combined with other personal or identifying information which is linked or linkable to a specific individual, such as date and place of birth, or mother s maiden name. Criminal Justice Information (CJI): FBI CJIS-provided data necessary for law enforcement agencies to perform their mission and enforce the laws, including but not limited to: biometric, identity history, person, organization, property (when accompanied by any personally identifiable information), and case/incident history data. FBI CJIS-provided data necessary for civil agencies to perform their mission; including, but not limited to data used to make hiring decisions. Criminal History Record Information (CHRI): Any notations or other written or electronic evidence of an arrest, detention, complaint, indictment, information or other formal criminal charge relating to an identifiable person that includes identifying information regarding the individual as well as the disposition of any charges. Any FBI data maintained by an agency, including but not limited to, education, financial transactions, medical history, and criminal or employment history that may include PII. Any information that confirms the existence or nonexistence of a criminal record. Information that is transferred or reproduced directly from CHRI and associated with the subject of the record. This includes information such as conviction/disposition data as well as identifiers used to index records regardless of format. Applicant status information, which is either directly attributed to or predominately based on a national FBI check, when no authority or inherent need exists for the release of such information. Further defined at Title 42, United States Code (USC), 14616, Article I and Title 28, Code of Federal Regulations (CFR), Examples of formal and informal products or verbalizations include: correspondence such as letters and s; documents such as forms and hand-written notes (including notes on posted notes); conversations either in person or by telephone; and data fields such as those stored in database tables or spreadsheets. CJI is sensitive and confidential data and should be treated as such. 3

4 Access to Criminal Justice Information If you agency accesses CJI, in any way, you will be subjected to an audit. Access to Criminal Justice Information: The physical or logical (electronic) ability, right or privilege to view, modify or make use of Criminal Justice Information. Physical Access The physical ability, right or privilege to view, modify or make use of CJI by means of physical presence within the proximity of computers and network devices. Example: the ability to insert a flash drive into a computer or make a physical connection (touch) with electronic equipment. Logical Access Direct Access The technical means (e.g., read, create, modify, delete a file, execute a program, or use an external connection) for an individual or other computer system to utilize CJI or CJIS applications. Example: the ability to read an or log into a portal to view or print a rap sheet. (1) Having the authority to access systems managed by the FBI CJIS Division, whether by manual or automated methods, not requiring the assistance of, or intervention by, any other party or agency (28 CFR, Chapter 1, Part 20). (2) Having the authority to query or update national databases maintained by the FBI CJIS Division including national queries and updates automatically or manually generated by the CSA. Indirect Access Having the authority to access systems containing CJI without providing the user the ability to conduct transactional activities (the capability to query or update) on state and national systems. 4

5 Introduction to the Interstate Identification Index (III) Since 1921, the FBI has been statutorily authorized to collect and disseminate CHRI to authorized recipients. Title 28, USC, 534 empowers the FBI to exchange CHRI with, and for the official use of, authorized officials of the Federal Government, the United States Sentencing Commissions, States, including State sentencing commissions, Indian tribes, cities, and other institutions. The FBI maintains the national criminal history record repository, known as the Interstate Identification Index (III) System. The III System contains CHRI from all states and U.S. territories, as well as federal agencies. The records in the III System are all based on fingerprints, which provide a positive, biometric match between the individual and his/her record. The III System was initially created for name-based access by criminal justice and law enforcement agencies involved in the administration of criminal justice functions, such as investigations, prosecutions, and sentencing. Over time, however, the use of this criminal history information has been authorized for numerous fingerprint-based noncriminal justice purposes, such as background screening for employment and licensing in industries that are authorized by either state governments or the federal government. The III System provides a means of conducting national criminal history record searches for noncriminal justice purposes as authorized by federal statutes, Executive Orders, and state statutes approved by the Attorney General of the United States. Each statutory authority defines the specific purposes (applicant types) for which CHRI may be requested and used. To ensure that a specific category of applicants is authorized for a national background check, the statutory authority must be closely reviewed. 5

6 Introduction to Public Law (Pub. L.) In 1972, Congress enacted Pub. L This federal statute authorizes states to enact legislation that designates specific licensing or employment purposes for which state and local government agencies may submit fingerprints to the FBI and receive CHRI from the FBI. Prior to fingerprint submission and access to CHRI under Pub. L , a state statute must be submitted to the Department of Emergency Services and Public Protection (DESPP) Criminal Justice Business Applications Unit (CJBA) for submission and approval from the FBI Law Unit (FLU) on behalf of the United States Attorney General. The FBI s criteria to approve a statute are as follows: The statute must exist as the result of legislative enactment or its functional equivalent; It must require fingerprinting of the applicant; It must, expressly or by implication, authorize use of FBI records for screening of the applicant; It must not be against public policy; It must identify the specific category(ies) of licensees/employees falling within its purview, thereby avoiding overbreadth; and It may not authorize receipt of the FBI CHRI by a private entity. When changes or modifications to a previously FBI-approved state statute occur, the statute must be re-submitted to the FLU for review and approval. As a matter of FBI policy, fingerprint submissions to the FBI under an approved Pub. L statute must be processed by the DESPP State Police Bureau of Identification (SPBI). This FBI policy requirement was included in Article V of the National Crime Prevention and Privacy Compact (Compact) Act of The states must also determine a governmental agency to be responsible for receiving and screening the results of the record check to determine an applicant s suitability for employment/licensing. 6

7 Introduction to the National Crime Prevention and Privacy Compact (Compact) Act of 1998 In 1998, the Compact was enacted and strengthened the requirements for the use of FBI-maintained CHRI for noncriminal justice purposes. These requirements included that: a subsequent record request must be conducted to obtain current information whenever a new authorized need arises; and fingerprints or other approved forms of positive identification must be submitted with all requests for CHRI for noncriminal justice purposes. The Compact Act established the Compact Council. The Compact Council works in partnership with criminal history record custodians, end users, and policy makers to regulate and facilitate the sharing of complete, accurate, and timely CHRI to noncriminal justice users in order to enhance public safety, welfare, and security of society, while recognizing the importance of individual privacy rights. The Compact formalized into law the policies approved in 1986 by the Advisory Policy Board in the Concept for Exchange of Criminal History Records for Noncriminal Justice Uses by means of the III. The Compact can be found at Title 42, USC, The State of Connecticut agreed to the terms of the Compact Act with the enactment of Connecticut General Statute f. In addition to Compact Council rules, agencies must adhere to the FBI CJIS Security Policy. 7

8 Introduction to the FBI CJIS Security Policy The FBI CJIS Security Policy is the minimum security standard policy used by both criminal and noncriminal justice agencies requiring access to CJI maintained by the FBI CJIS Division. The CJIS Security Policy: Applies to every individual contractor, private entity, noncriminal justice agency representative, or member of a criminal justice entity with access to, or who operate in support of, criminal justice services and information; Provides the appropriate controls to protect the full lifecycle of CJI, whether at rest or in transit; Provides guidance for the creation, viewing, modification, transmission, dissemination, storage, and destruction of CJI; and Can be found on the FBI.gov website and may be posted and shared without restriction. I sent the most recent CJIS Security Policy (effective 6/1/2016) in a previous . 8

9 Introduction to the National Identity Services (NIS) Audit In October 2014, the FBI started cycle 0 (informational) audits on agencies with access to CHRI for noncriminal justice purposes. Prior to 2014, user agencies were never subjected to an FBI audit because their only access to FBI data was for noncriminal justice purposes*. With the creation of a federal audit, states were mandated to audit all recipients of CJI. Audits assess compliance with the III System; National Fingerprint File (NFF) participation standards; federal laws and regulations associated with the access, use, dissemination, and security of national CHRI; Compact rules and procedures; and the FBI CJIS Security Policy. Federally Mandated Formal Audits: All agencies must be audited at least once every (3) three years by the DESPP. Audits are conducted by the CJBA Unit. A randomly selected group of agencies will be audited at least once every (3) three years by the FBI CJIS Audit Unit. The FBI s audit is called the NIS Audit. More frequent audits may occur as a result of a possible system violations. Unannounced security inspections and scheduled audits of contractor facilities may be conducted. The results of the FBI audits are reported to the Compact Council s Sanctions Committee (Sanctions Committee) in accordance with Title 28, CFR, Part 907. The Sanctions Committee reviews the results of the audit and determines a course of action necessary to bring agencies into compliance and makes recommendations to the Compact Council or, if applicable, the FBI. 9

10 Basic Parameters for Use Approved Statutory Authority Authorized Recipient Authorized Use/Purpose Examples: original application for the position or license or the letter of hire. Fingerprint submission Privacy rights forms were sent to recipient agencies by the SPBI on 12/23/2015. Receipt of CHRI Adjudication or fitness determination Closing or maintenance activities The basic parameters for use consists of (chronologically): There must be an approved state statute, federal statute, or Executive Order and approved by the Attorney General (AG) of the United States. The AG s approval authority is delegated to the FBI by Title 28, CFR, 0.85(j) and 50.12(a). The agency must be designated to request civil fingerprint-based background checks, with the full consent of the individual to whom a background check is taking place, for noncriminal justice functions. The agency must be able to prove that the applicant met the statutory requirement to be fingerprinted, under the approved statute, and based on the positive identification via fingerprint submission of the applicant. This documentation must be retained for at least one (1) year, regardless if the applicant was not hired or approved. All applicants must receive the Noncriminal Justice Applicant Privacy Rights Form and FBI Privacy Act Statement, prior to being fingerprinted. The Reason Fingerprinted Field (RFP) or Applying For section of the fingerprint card must contain the correct statutory authority and specific position that the applicant is applying for. The National Child Protection Act/Volunteer for Children s Act (NCPA/VCA) Notice and Consent Form is required for persons fingerprinted under the NCPA/VCA. Electronic and Hardcopy forms of CHRI must be protected pursuant to the CJIS Security Policy. Agency must meet Privacy Requirements for Noncriminal Justice Applicants. This is a federal requirement and failure to do so may result in a civil actions. The Agency Privacy Requirements for Noncriminal Justice Applicant's form was provided to recipient agencies by the SPBI on 12/23/2015. Information must be properly secured until retention is no longer required by state or federal law and then properly destroyed pursuant to the CJIS Security Policy. 10

11 Introduction to Privacy Rights Overview of Agency Requirements for Noncriminal Justice Applicants: Officials must provide to the applicant written notice that his/her fingerprints will be used to check the criminal history records of the FBI. Officials using the FBI criminal history record (if one exists) to make a determination of the applicant s suitability for the job, license, or other benefit must provide the applicant the opportunity to complete or challenge the accuracy of the information in the record. Officials must advise the applicant that procedures for obtaining a change, correction, or updating of an FBI criminal history record are set forth at Title 28, CFR, Officials should not deny the job, license, or other benefit based on information in the criminal history record until the applicant has been afforded a reasonable time to correct or complete the record or has declined to do so. Officials must use the criminal history record solely for the purpose requested and cannot disseminate the record outside the receiving department, related agency, or other authorized entity. Written notification includes electronic notification, but excludes oral notification. Overview of FBI Privacy Act Statement: Principal Purpose: Certain determinations, such as employment, licensing, and security clearances, may be predicated on fingerprint-based background checks. Your fingerprints and associated information/biometrics may be provided to the employing, investigating, or otherwise responsible agency, and/or the FBI for the purpose of comparing your fingerprints to other fingerprints in the FBI s Next Generation Identification (NGI) system or its successor systems (including civil, criminal, and latent fingerprint repositories) or other available records of the employing, investigating, or otherwise responsible agency. The FBI may retain your fingerprints and associated information/biometrics in NGI after the completion of this application and, while retained, your fingerprints may continue to be compared against other fingerprints submitted to or retained by NGI. Routine Uses: During the processing of this application and for as long thereafter as your fingerprints and associated information/biometrics are retained in NGI, your information may be disclosed pursuant to your consent, and may be disclosed without your consent as permitted by the Privacy Act of 1974 and all applicable Routine Uses as may be published at any time in the Federal Register, including the Routine Uses for the NGI system and the FBI s Blanket Routine Uses. Routine uses include, but are not limited to, disclosures to: employing, governmental or authorized nongovernmental agencies responsible for employment, contracting licensing, security clearances, and other suitability determinations; local, state, tribal, or federal law enforcement agencies; criminal justice agencies; and agencies responsible for national security or public safety. Agencies are obligated to ensure that applicants are provided with certain notices and other information and that the results of the check are handled in a manner that protects the applicant s privacy. 11

12 Introduction to Physical Protection Physically Secure Location: A facility, a criminal justice conveyance, or an area, a room, or a group of rooms, within a facility with both the physical and personnel security controls sufficient to protect CJI and associated information systems. All individuals need to remain cognizant of the designated physically secure areas and ensure that all personnel abide by access control points, entrance and exit procedures, visitor control and handling procedures. All individuals need to maintain vigilance in recognizing individuals who may not have appropriate access and may have been left unescorted. Visitors must be authenticated before escorted access to a secure location can be authorized. Visitors must be escorted at all times. An escort is an authorized individual who accompanies a visitor at all times while within a secure location to ensure the protection and integrity of the secure location and any CJI therein. The use of cameras or other electronic means used to monitor a secure location does not constitute an escort. All individuals should report areas of sensitive access that may be unsecure such as emergency exit doors which may have been left propped open. All authorized individuals must ensure that CJI, whether in physical or electronic form, remain in the secured areas unless they have specific authorization and procedures for taking that information out of the secure area. All authorized individuals are subject to the agency physical protection policy to ensure that the security of CJI is maintained. All agencies are required to implement a physical protection policy. I will send out an audit guide on policy requirements. Physical security incidents must be reported to the Terminal Agency Coordinator (TAC) in a timely manner. 12

13 Introduction to Media Protection Physical Media: Physical media refers to media in printed form. This definition includes, but is not limited to, printed documents, printed imagery, printed facsimile. Digital Media: Any form of electronic media designed to store data in a digital format. This includes, but is not limited to: memory device in laptops, computers, and mobile devices; and any removable, transportable electronic media, such as magnetic tape or disk, optical disk, flash drives, external hard drives, or digital memory card. All physical forms of CJI should be clearly marked and labeled ensuring documents are maintained according to policy and procedures. It is highly recommended that documents, at a minimum be clearly labeled. Coversheets designating the sensitive nature of the data and user responsibility in handling that data should also be considered as an appropriate measure. Electronic forms of media can become mishandled rather quickly due to the hidden nature of the data. Optical media and flash drives should be clearly labeled especially given those forms of media that are not protected by encryption. When contains sensitive information, it should be standard practice to label those items as well and to ensure transmission is encrypted when applicable. Encryption is the only approved method for traffic containing CJI. Users must protect their passwords accordingly, not sharing their individual account access or allowing for the possibility of compromise. All passwords must follow secure password attributes as listed in the CJIS Security Policy. All authorized individuals are subject to the agency media protection policy to ensure that the security of CJI is maintained. All agencies are required to implement a media protection policy. I will send out an audit guide on policy requirements. 13

14 Introduction to Dissemination Dissemination: The transmission/distribution of CJI to Authorized Recipients within an agency. CHRI may only be disseminated to entities that are authorized to receive it relative to the state or federal statutory authority used to submit the fingerprint check. CHRI must be maintained in such a manner as to not result in unauthorized access. The concept of dissemination applies when CHRI is made available to recipients through physical and logical access: regardless of whether or not the access was intentional; and regardless of whether CHRI is pushed to recipients or pulled by recipients since the end result is the same. Example: A contract cleaning crew that have unsupervised after-hours access to files containing CHRI is considered unintentional residual access. This is a considered unauthorized dissemination and will result in a out-of-compliance finding during an audit. Access to CHRI must be limited to the minimum necessary sub-offices and personnel within a department or agency that are actually required for a particular use. Persons with access to CHRI must have a need/right to know. While authorized receiving agencies may exercise some level of discretion and freedom of maneuver to distribute CHRI within their organizational structure, they must be able to demonstrate a reasonable need for doing so. Example: A local board of education may be designated as an authorized recipient of CHRI for the purpose of conducting background checks for prospective teachers. CHRI is stored as part of an electronic personnel records management system, accessible by all board of education employees. Although the board of education is an authorized recipient, access to CHRI must be limited to personnel within the human resources department responsible for making fitness determinations. This will also limit the board of education s exposure to the inherent risks associated with unauthorized dissemination of CHRI and violation of the prospective teacher s privacy rights. The exchange of CHRI is subject to cancellation if dissemination is made outside the receiving departments or related agencies. 14

15 Dissemination & The Applicant Agencies may disseminate fingerprint-based criminal history obtained for noncriminal justice purposes to the subject of the record only. This is permissible only when the applicant is challenging an adverse decision based on the CHRI. Agencies cannot initiate national criminal history record checks for the sole intended purpose of providing a subject a copy of his/her record for review or challenge. CHRI cannot be disseminated to spouses, other household or family members, or other parties such as potential employers, even at the subject s request. CHRI can be disseminated to an attorney acting on subject s behalf when the applicant is challenging the agency s adverse decision based on the CHRI obtained. The identity of the attorney and applicant must be satisfactorily established. If an inherent need does exists to advise a particular entity not otherwise authorized relevant to the federal statutory authority being leveraged for the national criminal history check, then it is acceptable to notify the entity of the outcome of applicant fitness determinations. Entities to which an applicant is seeking employment or licensing may receive status notifications which indicate the positive or negative outcome of fitness determinations. Status notifications: Cannot confirm the existence or non-existence of a federal record; Must contain generic pass/fail language to the greatest extent possible, with the understanding that a reasonable balance must exist between the need to notify a potential employer and not indirectly confirming the existence or non-existence of CHRI; Notification language cannot directly reference that a national FBI check was conducted; Cannot be posted to a public website or national directory. 15

16 Dissemination & Other Agencies CHRI cannot be re-used for subsequent unrelated needs by the original requestor/recipient. CHRI cannot be disseminated to another recipient. CHRI cannot be disseminated to another recipient for future anticipated uses, regardless of whether or not the needs are formally related. CHRI cannot be disseminated outside of the State of Connecticut s jurisdiction. Auditors: Some auditors may require residual access to CHRI based on statutory authority or regulatory obligations. Such access should be limited to only the minimum level of personnel necessary to accomplish oversight responsibilities and controls must be established to reasonably prevent unauthorized disclosure of CHRI. Auditors cannot take or make copies of CHRI for their records. Example: The Department of Education s regulatory auditors must audit a school s personnel file to ensure that a criminal history background check was conducted on a teacher. Agencies must be able to provide the authority for authorized dissemination to auditors upon request. 16

17 Dissemination &The General Public CHRI cannot be disseminated to the general public. This includes maintaining CHRI in formats that are accessible by the public or within records that are subject to release through public record requests. However, CHRI may be disclosed as part of an adjudication process during a hearing that is open to the public. The agency demonstrates must demonstrate the following: 1) The hearing is based on a formally established requirement; 2) The applicant is aware prior to the hearing that CHRI may be disclosed; 3) The applicant is not prohibited from being present at the hearing; and 4) CHRI is not disclosed during the hearing if the applicant withdraws from the application process. For example, a board or commission may be authorized to access CHRI, and as part of regularly scheduled meetings, applicant appeals are discussed as standard agenda items. Even when the specific conditions are met to allow disclosure during a public hearing, the most preferable method for introducing CHRI is to enter into a closed session which limits participation by the public at large. Agencies must be able to reasonably demonstrate how the prerequisite criteria are being met for audit purposes. 17

18 Introduction to Misuse All noncriminal justice agencies have authorized access to CJI for noncriminal justice purposes pursuant to a federal law or state statute approved by the United States Attorney General. Any access and/or dissemination of CJI for other purposes are considered misuses of the information. Most misuse cases stem from affairs of the heart, political motivation, monetary gain, idle curiosity, or trying to help out a friend. Misuse does not depend upon whether or not additional compensation was received for such unauthorized activity. Methods of Misuse: Unauthorized requests, receipt, release, interception, dissemination or discussion of CJI; Improper use of information obtained from any CJI System and/or related applications and devices; and/or Violating the confidentiality of any data or record information and using it for personal purposes. Unauthorized requests, receipt, release, interception, dissemination or discussion of CJI is considered misuse. Physical security violations and/or misuse of CJI can and has resulted in: Administrative (internal) investigations and/or sanctions; Termination of access to CJI for the individual user; Termination of access to CJI for the associated agency; Termination of employment or contract; Criminal investigations and/or arrests; and Prosecution and conviction for violation of state and/or federal crimes designed to protect the confidentiality and integrity of CJI. 18

19 Misuse Reporting Procedures Security incidents and misuse threaten the confidentiality, integrity or availability of state/fbi CJIS data. All employees, contractors and third party users are required to promptly report any security incident and/or misuse to the TAC. All information must be communicated in a timely manner allowing timely corrective action to be taken. Security incidents and/or system misuse may also be reported to the CSO, Darryl Hayes. Events can be reported by mail, phone, fax, and using the information provided below: Mailing Address Department of Emergency Services and Public Protection Division of State Police Criminal Justice Business Applications Unit 1111 Country Club Road Middletown, CT Phone Fax Address collect.unit.dps@ct.gov Subject Title <CJI Violation for {insert agency name}> 19

Point of Contact (POC): District s contact person when SDDCI sends out Audit information, the contact person when an onsite Audit is scheduled.

Point of Contact (POC): District s contact person when SDDCI sends out Audit information, the contact person when an onsite Audit is scheduled. BACKGROUND CHECKS FILE: GCDB The School District is committed to the selection of quality staff and to providing a safe environment for students and staff. As part of that commitment, the district will

More information

APPLICATION FOR A SUPPORT STAFF POSITION 505 West Burkhart St Malden, MO 63863

APPLICATION FOR A SUPPORT STAFF POSITION 505 West Burkhart St Malden, MO 63863 APPLICATION FOR A SUPPORT STAFF POSITION 505 West Burkhart St Malden, MO 63863 The Malden R-1 School District Board of Education does not discriminate on basis of race, color, religion, sex, national origin,

More information

Teacher Education Programs Background Check Requirements

Teacher Education Programs Background Check Requirements Date Received: Received By: Teacher Education Programs Background Check Requirements Application Instructions Complete and submit this application: You have the obligation to complete, sign, and have notarized

More information

APPLICATION FOR AN ADMINISTRATIVE POSITION Malden R-I School District 505 West Burkhart Street Malden, MO 63863

APPLICATION FOR AN ADMINISTRATIVE POSITION Malden R-I School District 505 West Burkhart Street Malden, MO 63863 APPLICATION FOR AN ADMINISTRATIVE POSITION Malden R-I School District 505 West Burkhart Street Malden, MO 63863 The Malden R-1 School District Board of Education does not discriminate on basis of race,

More information

Federal Criminal Background Check

Federal Criminal Background Check Federal Criminal Background Check The College of Education at Montana State University Billings (MSUB) requires that a national criminal history background check, including fingerprinting, to be completed

More information

MANHATTAN SCHOOL DISTRICT NO. 3 Application for Classified / Coaching / Activities / Substitute Teaching Employment

MANHATTAN SCHOOL DISTRICT NO. 3 Application for Classified / Coaching / Activities / Substitute Teaching Employment District Use Only Date Completed Application Received: SS Card Driver s license TB Test W-4 I-9 Other Background Check: Form received Date requested Date received Hiring personnel review record. Please

More information

I. PARTIES AUTHORITIES

I. PARTIES AUTHORITIES Page 1 of 8 MEMORANDUM OF UNDERSTANDING BETWEEN AIRPORT OPERATOR OR AIRCRAFT OPERATOR AND TRANSPORTATION SECURITY ADMINISTRATION FOR PARTICIPATION IN THE TSA AVIATION RAP BACK PROGRAM I. PARTIES The Airport

More information

GAPS REGISTRATION PROCESS FOR WHITFIELD COUNTY SCHOOLS

GAPS REGISTRATION PROCESS FOR WHITFIELD COUNTY SCHOOLS GAPS REGISTRATION PROCESS FOR WHITFIELD COUNTY SCHOOLS 1. Access the GAPS website at https://www.aps.gemalto.com/ga/index.htm 2. Click on Applicant Registration 3. Select EDUCATION AGENCIES (EA) 4. Select

More information

TEXAS DEPARTMENT OF PUBLIC SAFETY 5805 NORTH LAMAR BOULEVARD POST OFFICE BOX 4087, AUSTIN, TX /

TEXAS DEPARTMENT OF PUBLIC SAFETY 5805 NORTH LAMAR BOULEVARD POST OFFICE BOX 4087, AUSTIN, TX / TEXAS DEPARTMENT OF PUBLIC SAFETY 5805 NORTH LAMAR BOULEVARD POST OFFICE BOX 4087, AUSTIN, TX 78773-0252 512/424-2365 THOMAS A. DAVIS, JR. DIRECTOR DAVID McEATHRON ASST. DIRECTOR SCHOOL CONTRACTOR DOCUMENT

More information

Interstate Commission for Adult Offender Supervision

Interstate Commission for Adult Offender Supervision Interstate Commission for Adult Offender Supervision Privacy Policy Interstate Compact Offender Tracking System Version 3.0 Approved 04/23/2009 Revised on 4/18/2017 1.0 Statement of Purpose The goal of

More information

STATE OF ILLINOIS ILLINOIS STATE POLICE ADAM WALSH CHILD PROTECTION ACT USER AGREEMENT BETWEEN THE ILLINOIS STATE POLICE AND

STATE OF ILLINOIS ILLINOIS STATE POLICE ADAM WALSH CHILD PROTECTION ACT USER AGREEMENT BETWEEN THE ILLINOIS STATE POLICE AND STATE OF ILLINOIS ILLINOIS STATE POLICE ADAM WALSH CHILD PROTECTION ACT USER AGREEMENT BETWEEN THE ILLINOIS STATE POLICE AND The Illinois State Police (hereinafter ISP ) acting as the state central repository

More information

Applicant Rights and Consent to Fingerprint

Applicant Rights and Consent to Fingerprint Applicant Rights and Consent to Fingerprint As an applicant who is the subject of a national fingerprint-based criminal history record check for a noncriminal justice purpose (such as an application for

More information

Specific Requirements Pertaining to Fingerprinting and Criminal History Records Checks

Specific Requirements Pertaining to Fingerprinting and Criminal History Records Checks Specific Requirements Pertaining to Fingerprinting and Criminal History Records Checks The new fingerprinting requirements supplement previous requirements issued by the Executive Secretary's Increased

More information

Cherokee County Fire & Emergency Services

Cherokee County Fire & Emergency Services Cherokee County Fire & Emergency Services Application for the Position of: VOLUNTEER SERVICE REV.9/2010 CHEROKEE COUNTY FIRE & EMERGENCY SERVICES 150 Chattin Drive, Canton, GA 30115 678-493-4000 (phone)

More information

803 CMR: DEPARTMENT OF CRIMINAL JUSTICE INFORMATION SERVICES 803 CMR 11.00: CONSUMER REPORTING AGENCY (CRA) Section

803 CMR: DEPARTMENT OF CRIMINAL JUSTICE INFORMATION SERVICES 803 CMR 11.00: CONSUMER REPORTING AGENCY (CRA) Section 803 CMR 11.00: CONSUMER REPORTING AGENCY (CRA) Section 11.01: Purpose and Scope 11.02: Definitions 11.03: icori Registration 11.04: Access to CORI by a CRA to Evaluate a Subject 11.05: Procedures for Requesting

More information

Annex 1: Standard Contractual Clauses (processors)

Annex 1: Standard Contractual Clauses (processors) Annex 1: Standard Contractual Clauses (processors) For the purposes of Article 26(2) of Directive 95/46/EC for the transfer of personal data to processors established in third countries which do not ensure

More information

SECTION 1. TABLE OF CONTENTS.

SECTION 1. TABLE OF CONTENTS. --S.2022-- S.2022 One Hundred Fifth Congress of the United States of America AT THE SECOND SESSION Begun and held at the City of Washington on Tuesday, the twenty-seventh day of January, one thousand nine

More information

Department of Police Services

Department of Police Services Department of Police Services Town of Southington, Connecticut 69 Lazy Lane Southington, CT 06489 860-621-0101 Chief of Police John F. Daly CT TEMPORARY PISTOL PERMIT APPLICATION INSTRUCTIONS For Applicant

More information

Privacy Impact Assessment. April 25, 2006

Privacy Impact Assessment. April 25, 2006 for the Immigration and Customs Enforcement (ICE) General Counsel Electronic Management System (GEMS) April 25, 2006 Contact Point William C. Birkett Chief, Knowledge Management Division Office of the

More information

THE GEORGIA CRIME INFORMATION CENTER Georgia Guide for Non Criminal Justice Agency Access to Criminal History Record Information (Rev.

THE GEORGIA CRIME INFORMATION CENTER Georgia Guide for Non Criminal Justice Agency Access to Criminal History Record Information (Rev. THE GEORGIA CRIME INFORMATION CENTER Georgia Guide for Non Criminal Justice Agency Access to Criminal History Record Information (Rev. August 2010) 1 Table of Contents Introduction... 3 Authority... 3

More information

Management Control Agreement

Management Control Agreement WISCONSIN DEPARTMENT OF JUSTICE CRIME INFORMATION BUREAU Management Control Agreement Non-Criminal Justice Agency: Criminal Justice Agency: UPURPOSE U: This agreement is intended to establish the minimum

More information

PRACTICE DIRECTION [ ] DISCLOSURE PILOT FOR THE BUSINESS AND PROPERTY COURTS

PRACTICE DIRECTION [ ] DISCLOSURE PILOT FOR THE BUSINESS AND PROPERTY COURTS Draft at 2.11.17 PRACTICE DIRECTION [ ] DISCLOSURE PILOT FOR THE BUSINESS AND PROPERTY COURTS 1. General 1.1 This Practice Direction is made under Part 51 and provides a pilot scheme for disclosure in

More information

NEW YORK STATE INTELLIGENCE CENTER PRIVACY POLICY

NEW YORK STATE INTELLIGENCE CENTER PRIVACY POLICY NEW YORK STATE INTELLIGENCE CENTER 630 COLUMBIA STREET EXT. LATHAM, NEW YORK 12110 NEW YORK STATE INTELLIGENCE CENTER INFORMATION and INTELLIGENCE PRIVACY POLICY NEW YORK STATE INTELLIGENCE CENTER INFORMATION

More information

Template Commission pursuant to Section 11 BDSG

Template Commission pursuant to Section 11 BDSG Template Commission pursuant to Section 11 BDSG Agreement between... - (the Principal ) - and... - (the Agent ) - 1. Subject-matter and duration of the commission Subject-matter of the commission: The

More information

a. Suspend or discontinue user access to the information;

a. Suspend or discontinue user access to the information; THE IDAHO CRIMINAL INTELLGENCE CENTER PRIVACY POLICY 1. PURPOSE The mission of the Idaho Criminal Intelligence Center (IC)² is to collect, store, analyze and disseminate information on crimes, including

More information

CHAPTER 1 RECORDS RETENTION AND DISPOSITION

CHAPTER 1 RECORDS RETENTION AND DISPOSITION Page 1 of 15 Official City of Los Angeles Charter (TM) and Administrative Code (TM) ADMINISTRATIVE CODE DIVISION 12 RECORDS CHAPTER 1 RECORDS RETENTION AND DISPOSITION CHAPTER 1 RECORDS RETENTION AND DISPOSITION

More information

September 15, 2015 GENERAL MEMORANDUM

September 15, 2015 GENERAL MEMORANDUM 2120 L Street, NW, Suite 700 T 202.822.8282 HOBBSSTRAUS.COM Washington, DC 20037 F 202.296.8834 September 15, 2015 GENERAL MEMORANDUM 15-065 BIA Implementation Procedures for the Purpose Code X Program;

More information

HIPAA BUSINESS ASSOCIATE AGREEMENT. ( BUSINESS ASSOCIATE ) and is effective as of ( Effective Date ). RECITALS

HIPAA BUSINESS ASSOCIATE AGREEMENT. ( BUSINESS ASSOCIATE ) and is effective as of ( Effective Date ). RECITALS HIPAA BUSINESS ASSOCIATE AGREEMENT This HIPAA Business Associate Agreement ( Agreement ) is entered into by and between the Trustees of the University of Pennsylvania as owner and operator of the University

More information

THE PRIVACY ACT OF 1974 (As Amended) Public Law , as codified at 5 U.S.C. 552a

THE PRIVACY ACT OF 1974 (As Amended) Public Law , as codified at 5 U.S.C. 552a THE PRIVACY ACT OF 1974 (As Amended) Public Law 93-579, as codified at 5 U.S.C. 552a Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, that

More information

Colorado Secretary of State Election Rules [8 CCR ]

Colorado Secretary of State Election Rules [8 CCR ] Rule 2. Voter Registration 2.1 Submission of voter registration forms 2.1.1 An applicant may submit a properly executed voter registration form to the county clerk in person, by mail, by fax, by online

More information

Nestlé Canada Inc. Privacy Policies and Practices April 13, 2012

Nestlé Canada Inc. Privacy Policies and Practices April 13, 2012 Nestlé Canada Inc. Privacy Policies and Practices April 13, 2012 Glossary of Terms... 3 The Privacy Principles at Nestlé Canada... 5 Accountability... 5 Identifying Purpose... 5 Consent... 6 Obtaining

More information

OFFICE OF TEMPORARY AND DISABILITY ASSISTANCE SECURITY OVER PERSONAL INFORMATION. Report 2007-S-78 OFFICE OF THE NEW YORK STATE COMPTROLLER

OFFICE OF TEMPORARY AND DISABILITY ASSISTANCE SECURITY OVER PERSONAL INFORMATION. Report 2007-S-78 OFFICE OF THE NEW YORK STATE COMPTROLLER Thomas P. DiNapoli COMPTROLLER OFFICE OF THE NEW YORK STATE COMPTROLLER DIVISION OF STATE GOVERNMENT ACCOUNTABILITY Audit Objectives... 2 Audit Results Summary... 2 Background... 2 Audit Findings and Recommendations...

More information

PRIVACY POLICY. 1. OVERVIEW MEGT is committed to protecting privacy and will manage personal information in an open and transparent way.

PRIVACY POLICY. 1. OVERVIEW MEGT is committed to protecting privacy and will manage personal information in an open and transparent way. Page 1 of 10 1. OVERVIEW MEGT is committed to protecting privacy and will manage personal information in an open and transparent way. MEGT will fulfil its obligations under the Privacy Amendment (Enhancing

More information

rdd Doc 825 Filed 12/11/17 Entered 12/11/17 16:29:55 Main Document Pg 1 of 4

rdd Doc 825 Filed 12/11/17 Entered 12/11/17 16:29:55 Main Document Pg 1 of 4 17-22770-rdd Doc 825 Filed 12/11/17 Entered 12/11/17 16:29:55 Main Document Pg 1 of 4 UNITED STATES BANKRUPTCY COURT SOUTHERN DISTRICT OF NEW YORK ) In re: ) Chapter 11 ) 21st CENTURY ONCOLOGY HOLDINGS,

More information

The University of Texas System System Administration Internal Policy

The University of Texas System System Administration Internal Policy 1. Title 2. Policy Criminal Background Checks Sec. 1 Sec. 2 Purpose and Policy Statement. The University of Texas System Administration is committed to promoting the safety and security of personnel and

More information

Subpart A General Provisions

Subpart A General Provisions Pt. 11 necessitated such an action within 24 hours or sooner if requested by the Deputy Commissioner. In the absence or unavailability of the Deputy Commissioner, the presiding officer shall notify the

More information

Instructions Clergy Fingerprint - Madison County ROE

Instructions Clergy Fingerprint - Madison County ROE Instructions Clergy Fingerprint - Madison County ROE 1. Pages 1, 2 and 3: Clergy - Complete pages 2, 3 and 5 Clergy - Send pages 1 and 3 to the Office for Safe Environment Clergy Call Regional Office of

More information

Minnesota Department of Health Tribal Governments Grant Agreement

Minnesota Department of Health Tribal Governments Grant Agreement Instructions for completing this form are in blue and bracketed. Fill in every blank and delete all instructions, including these instructions, before sending this document to Financial Management for

More information

DATA PROCESSING AGREEMENT. between [Customer] (the "Controller") and LINK Mobility (the "Processor")

DATA PROCESSING AGREEMENT. between [Customer] (the Controller) and LINK Mobility (the Processor) DATA PROCESSING AGREEMENT between [Customer] (the "Controller") and LINK Mobility (the "Processor") Controller Contact Information Name: Title: Address: Phone: Email: Processor Contact Information Name:

More information

Northern California Regional Intelligence Center

Northern California Regional Intelligence Center Memorandum of Understanding and Agreement Northern California Regional Intelligence Center Mike L. Sena Director, Northern California Regional Intelligence Center & High Intensity Drug Trafficking Area

More information

DEPARTMENT OF DEFENSE BILLING CODE Defense Contract Audit Agency (DCAA) Privacy Act Program

DEPARTMENT OF DEFENSE BILLING CODE Defense Contract Audit Agency (DCAA) Privacy Act Program This document is scheduled to be published in the Federal Register on 02/06/2014 and available online at http://federalregister.gov/a/2014-01882, and on FDsys.gov DEPARTMENT OF DEFENSE BILLING CODE 5001-06

More information

Privacy Act of 1974; Department of Homeland Security, U.S. Customs and Border

Privacy Act of 1974; Department of Homeland Security, U.S. Customs and Border 9110-06 This document is scheduled to be published in the Federal Register on 11/02/2011 and available online at http://federalregister.gov/a/2011-28405. DEPARTMENT OF HOMELAND SECURITY Office of the Secretary

More information

Policy To Protect Personal Information

Policy To Protect Personal Information Policy To Protect Personal Information 1. Accountability 1.1. Melody Deeley is hereby appointed as the Personal Information Compliance Officer (the Officer ) for Summit Pacific College ( SPC ). 1.2. All

More information

Arrival and Departure Information System Information Sharing Update

Arrival and Departure Information System Information Sharing Update for the Arrival and Departure Information System Information Sharing Update DHS/CBP/PIA 024 March 7, 2014 Contact Point Matt Schneider Assistant Director, DHS/CBP/OFO/PPAE Entry/Exit Transformation Office

More information

SUPPLIER DATA PROCESSING AGREEMENT

SUPPLIER DATA PROCESSING AGREEMENT SUPPLIER DATA PROCESSING AGREEMENT This Data Protection Agreement ("Agreement"), dated ("Agreement Effective Date") forms part of the ("Principal Agreement") between: [Company name] (hereinafter referred

More information

Immigration and Customs Enforcement (ICE) Secure Communities (SC)

Immigration and Customs Enforcement (ICE) Secure Communities (SC) Immigration and Customs Enforcement (ICE) Secure Communities (SC) Standard Operating Procedures (SOP) Distributed for adoption by participating county and local law enforcement agencies Table of Contents

More information

Limited Data Set Data Use Agreement

Limited Data Set Data Use Agreement Limited Data Set Data Use Agreement This Agreement is made and entered into by and between (hereinafter Applicant ) and the State of Florida Agency for Health Care Administration, Florida Center for Health

More information

EUROPEAN COMMISSION DIRECTORATE-GENERAL JUSTICE. Directorate C: Fundamental rights and Union citizenship Unit C.3: Data protection

EUROPEAN COMMISSION DIRECTORATE-GENERAL JUSTICE. Directorate C: Fundamental rights and Union citizenship Unit C.3: Data protection EUROPEAN COMMISSION DIRECTORATE-GENERAL JUSTICE Directorate C: Fundamental rights and Union citizenship Unit C.3: Data protection Commission Decision C(2010)593 Standard Contractual Clauses (processors)

More information

PUBLIC RECORDS POLICY OF COVENTRY TOWNSHIP, SUMMIT COUNTY

PUBLIC RECORDS POLICY OF COVENTRY TOWNSHIP, SUMMIT COUNTY PUBLIC RECORDS POLICY OF COVENTRY TOWNSHIP, SUMMIT COUNTY Resolution No. 071108-07 Introduction: It is the policy of Coventry Township in Summit County that openness leads to a better informed citizenry,

More information

Privacy Act; System of Records: Legal Case Management Records, State- to amend an existing system of records, Legal Case Management Records,

Privacy Act; System of Records: Legal Case Management Records, State- to amend an existing system of records, Legal Case Management Records, This document is scheduled to be published in the Federal Register on 06/22/2016 and available online at http://federalregister.gov/a/2016-14828, and on FDsys.gov Billing Code: 4710-08 DEPARTMENT OF STATE

More information

Sales Order (Processing Services)

Sales Order (Processing Services) SO# DIRECT CUST# INDIRECT CUST# Sales Order (Processing Services) Note: RelayHealth will assign CUST# s and SO# will be completed upon receipt. Sold To ( End User ): Bill To: Note: cannot be a P.O. Box

More information

WASHINGTON COUNTY GUIDELINES AND PROCEDURES FOR MINNESOTA GOVERNMENT DATA PRACTICES ACT

WASHINGTON COUNTY GUIDELINES AND PROCEDURES FOR MINNESOTA GOVERNMENT DATA PRACTICES ACT General Administration Policy #1300 - Manual WASHINGTON COUNTY GUIDELINES AND PROCEDURES FOR MINNESOTA GOVERNMENT DATA PRACTICES ACT Manual #1300 Adopted by the Washington County Board of Commissioners

More information

PRIVACY, CIVIL LIBERTIES, AND CIVIL RIGHTS POLICY JULY 2014 REVISION

PRIVACY, CIVIL LIBERTIES, AND CIVIL RIGHTS POLICY JULY 2014 REVISION St. Louis Fusion Center: Terrorism Early Warning Group PRIVACY, CIVIL LIBERTIES, AND CIVIL RIGHTS POLICY JULY 2014 REVISION Table of Contents I. Mission/Purpose... 3 II. Scope and Compliance... 4 III.

More information

Rural School Sub-Teacher Application Instructions and Information

Rural School Sub-Teacher Application Instructions and Information Rural School Sub-Teacher Application Instructions and Information Please complete all pages of the application. Furnishing information on the application is mandatory. An application must be picked up

More information

Attachment 2. Protected Information Practices and Procedures (PIPP) [SEE ATTACHED]

Attachment 2. Protected Information Practices and Procedures (PIPP) [SEE ATTACHED] Attachment 2 Protected Information Practices and Procedures (PIPP) [SEE ATTACHED] LaGuardia Airport CTB Replacement Project Part I - Instructions to Proposers Exhibit B-6 1 INTRODUCTION...1 2 PROTECTED

More information

Telekom Austria Group Standard Data Processing Agreement

Telekom Austria Group Standard Data Processing Agreement Telekom Austria Group Standard Data Processing Agreement This Agreement is entered into by and between: I. [TAG Company NAME], a company duly established and existing under the laws of [COUNTRY] with its

More information

AIA Australia Limited

AIA Australia Limited AIA Australia Limited Privacy policies & procedures May 2010 The Power of We AIA.COM.AU AIA Australia Limited Privacy policies & procedures Contents Purpose 3 Policy 3 National Privacy Principles Policy

More information

ARRANGEMENT OF SECTIONS PART I PRELIMINARY

ARRANGEMENT OF SECTIONS PART I PRELIMINARY No. 9 of 2011. Electronic Transactions Saint Christopher Act, 2011. and Nevis. ARRANGEMENT OF SECTIONS Section 1. Short title. 2. Interpretation. 3. Exclusions. 4. Variation of Terms. PART I PRELIMINARY

More information

WEAPONS CARRY LICENSE APPLICATION CHEROKEE COUNTY

WEAPONS CARRY LICENSE APPLICATION CHEROKEE COUNTY WEAPONS CARRY LICENSE APPLICATION NEW APPLICANT If you have never had a Georgia Weapons Carry License or your License has been expired more than 30 days, the following MUST BE PROVIDED: CHEROKEE COUNTY

More information

NEVADA REVISED STATUTES. Title 59 - ELECTRONIC RECORDS AND TRANSACTIONS CHAPTER 719 ELECTRONIC TRANSACTIONS (UNIFORM ACT)

NEVADA REVISED STATUTES. Title 59 - ELECTRONIC RECORDS AND TRANSACTIONS CHAPTER 719 ELECTRONIC TRANSACTIONS (UNIFORM ACT) NEVADA REVISED STATUTES Title 59 - ELECTRONIC RECORDS AND TRANSACTIONS CHAPTER 719 ELECTRONIC TRANSACTIONS (UNIFORM ACT) NRS 719.010 NRS 719.020 NRS 719.030 NRS 719.040 NRS 719.050 NRS 719.060 NRS 719.070

More information

DEPARTMENT OF DEFENSE BILLING CODE

DEPARTMENT OF DEFENSE BILLING CODE This document is scheduled to be published in the Federal Register on 03/10/2015 and available online at http://federalregister.gov/a/2015-05374, and on FDsys.gov DEPARTMENT OF DEFENSE BILLING CODE 5001-06

More information

LAW OF THE REPUBLIC OF ARMENIA ON PROTECTION OF PERSONAL DATA CHAPTER 1 GENERAL PROVISIONS

LAW OF THE REPUBLIC OF ARMENIA ON PROTECTION OF PERSONAL DATA CHAPTER 1 GENERAL PROVISIONS LAW OF THE REPUBLIC OF ARMENIA ON PROTECTION OF PERSONAL DATA CHAPTER 1 GENERAL PROVISIONS Article 1. Subject matter of the Law 1. This Law shall regulate the procedure and conditions for processing personal

More information

TEMPLATE: DO NOT SEND TO NFA NATIONAL FUTURES ASSOCIATION

TEMPLATE: DO NOT SEND TO NFA NATIONAL FUTURES ASSOCIATION Instructions for Using the Exempt Foreign Firm Application Template This document is not an application form. Do not send this document to NFA. It is a template that you may use to assist in filing the

More information

JUDICIARY OF GUAM ELECTRONIC FILING RULES 1

JUDICIARY OF GUAM ELECTRONIC FILING RULES 1 1 1 Adopted by the Supreme Court of Guam pursuant to Promulgation Order No. 15-001-01 (Oct. 2, 2015). TABLE OF CONTENTS DIVISION I - AUTHORITY AND SCOPE Page EFR 1.1. Electronic Document Management System.

More information

EXHIBIT G PRIVACY AND INFORMATION SECURITY PROVISIONS

EXHIBIT G PRIVACY AND INFORMATION SECURITY PROVISIONS Page 1 of 24 EXHIBIT G PRIVACY AND INFORMATION SECURITY PROVISIONS This Exhibit G is intended to protect the privacy and security of specified Department information that Contractor may access, receive,

More information

Model Business Associate Agreement

Model Business Associate Agreement Model Business Associate Agreement Instructions: The Texas Health Services Authority (THSA) has developed a model BAA for use between providers (Covered Entities) and HIEs (Business Associates). The model

More information

Application for Airport AOA Identification Media

Application for Airport AOA Identification Media Initial Renewal Airport Security Badging Office 700 Catalina Drive, Suite 110 Daytona Beach, Florida 32114 (386)-248-8030 Application for Airport AOA Identification Media Last Name First Name Middle Name

More information

ACTION: Update and amend OPM/ GOVT 5, Recruiting, Examining, and Placement Records.

ACTION: Update and amend OPM/ GOVT 5, Recruiting, Examining, and Placement Records. This document is scheduled to be published in the Federal Register on 03/26/2014 and available online at http://federalregister.gov/a/2014-06593, and on FDsys.gov OFFICE OF PERSONNEL MANAGEMENT Privacy

More information

Privacy Act of 1974: A Basic Overview. Purpose of the Act. Congress goals. ASAP Conference: Arlington, VA Monday, July 27, 2015, 9:30-10:45am

Privacy Act of 1974: A Basic Overview. Purpose of the Act. Congress goals. ASAP Conference: Arlington, VA Monday, July 27, 2015, 9:30-10:45am Privacy Act of 1974: A Basic Overview 1 ASAP Conference: Arlington, VA Monday, July 27, 2015, 9:30-10:45am Presented by: Jonathan Cantor, Deputy CPO, Dep t of Homeland Security (DHS) Alex Tang, Attorney,

More information

GUIDELINE FOR PROTECTION OF PERSONAL INFORMATION

GUIDELINE FOR PROTECTION OF PERSONAL INFORMATION GUIDELINE FOR PROTECTION OF PERSONAL INFORMATION (February 9, 2005) (Purpose) Article 1 The purpose of the Guideline for Protection of Personal Information (hereinafter referred to as Guideline ) is to

More information

CHARLESTON COUNTY AVIATION AUTHORITY APPLICATION FOR AIRPORT AOA/PUBLIC AREA BADGE

CHARLESTON COUNTY AVIATION AUTHORITY APPLICATION FOR AIRPORT AOA/PUBLIC AREA BADGE SECURITY DEPARTMENT USE ONLY: FP STA CHARLESTON COUNTY AVIATION AUTHORITY APPLICATION FOR AIRPORT AOA/PUBLIC AREA BADGE Print or Type all Information SECTION I -- APPLICANT SSN: NAME (Last, First, Middle):

More information

OFFICIAL POLICY. Policy Statement

OFFICIAL POLICY. Policy Statement OFFICIAL POLICY 11.5.1 COLLEGE OF CHARLESTON POLICY ON UNIFORM ELECTRONIC TRANSACTIONS ACT 7/26/2016 Policy Statement It is the Policy of the College to use and accept Electronic Records and Electronic

More information

Weapons Carry License Application Cherokee County

Weapons Carry License Application Cherokee County Weapons Carry License Application Cherokee County NEW APPLICANT If you have never had a Georgia Weapons Carry License or your License has been expired more than 30 days, the following MUST BE PROVIDED:

More information

Data Processing Agreement. <<Health Service Provider>> The National Message Broker Service known as Healthlink

Data Processing Agreement. <<Health Service Provider>> The National Message Broker Service known as Healthlink Between And The National Message Broker Service known as Healthlink THIS AGREEMENT is dated and made between: (1) , which has its principle administrative

More information

Weapons Carry License Application Cherokee County

Weapons Carry License Application Cherokee County Weapons Carry License Application Cherokee County NEW APPLICANT If you have never had a Georgia Weapons Carry License or your License has been expired more than 30 days, the following MUST BE PROVIDED:

More information

APPLICATION FOR EMPLOYMENT

APPLICATION FOR EMPLOYMENT APPLICATION FOR EMPLOYMENT Frenchtown School District #40 P.O. Box 117 Frenchtown, Mt 59834 (406) 626-2600 Please type or print clearly using a dark pen. Name: Previous Name(s): Applications and supporting

More information

Condominium Management Regulatory Authority of Ontario Access and Privacy Policy

Condominium Management Regulatory Authority of Ontario Access and Privacy Policy Condominium Management Regulatory Authority of Ontario Access and Privacy Policy 1.0 Purpose and Scope The purpose of this Policy is to set out how the Condominium Management Regulatory Authority of Ontario

More information

C LASSIFIED E MPLOYMENT A PPLICATION

C LASSIFIED E MPLOYMENT A PPLICATION GARDIINER SCHOOL DISTRICT #7&4 510 Stone Street Gardiner, MT 59030 406.848.7563 406.848.0606 (FAX) http://gardiner.org C LASSIFIED E MPLOYMENT A PPLICATION Gardiner Public Schools is an equal opportunity

More information

ACT, Inc. ( ACT ) and Customer agree as follows: Effective Date: August 8, 2017

ACT, Inc. ( ACT ) and Customer agree as follows: Effective Date: August 8, 2017 By ordering ACT Tessera TM, you are requesting a license for the Services and agree to be bound by the following terms and conditions, including those additional terms and conditions and policies referenced

More information

RETS DATA ACCESS AGREEMENT

RETS DATA ACCESS AGREEMENT RETS DATA ACCESS AGREEMENT Smart MLS, Inc 860 North Main Street Ext. Wallingford, CT 06492 203-697-1006 203-697-1064 (fax) SmartMLS.com RETS Data Access Agreement rev.917 1 RETS DATA ACCESS AGREEMENT This

More information

THE SURVEILLANCE AND COMMUNITY SAFETY ORDINANCE

THE SURVEILLANCE AND COMMUNITY SAFETY ORDINANCE THE SURVEILLANCE AND COMMUNITY SAFETY ORDINANCE Whereas, the City Council finds it is essential to have an informed public debate as early as possible about decisions related to surveillance technology;

More information

UNCITRAL E-SIGN UETA COMPARISON 1

UNCITRAL E-SIGN UETA COMPARISON 1 UNCITRAL E-SIGN UETA COMPARISON 1 UNCITRAL E-SIGN UETA Article 1. Scope of application Article 1(1). Scope of application 1(1). This Convention applies to the use of electronic communications in connection

More information

... moves to amend H.F. No. 3959, the third engrossment, as follows:

... moves to amend H.F. No. 3959, the third engrossment, as follows: 1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8... moves to amend H.F. No. 3959, the third engrossment, as follows: Delete everything after the enacting clause and insert: "Section 1. Minnesota Statutes 2014, section

More information

AOM CHAPTER S 105. CJIS WorkStations. Table of Contents

AOM CHAPTER S 105. CJIS WorkStations. Table of Contents AOM CHAPTER S 105 CJIS WorkStations Table of Contents I. INTRODUCTORY DISCUSSION II. POLICY III. SYSTEM ACCESS IV. PROVISIONS V. CORI VI. INTERSTATE IDENTIFICATION INDEX VII. NCIC FILES POLICY COMPLIANCE

More information

ST. CLOUD REGIONAL AIRPORT FINGERPRINTING AND BADGE APPLICATION

ST. CLOUD REGIONAL AIRPORT FINGERPRINTING AND BADGE APPLICATION St. Cloud Regional Airport 1550 45 th Avenue Southeast, Suite #1 NEW St. Cloud, MN 56304-9535 (320) 255-7292 RENEWAL www.stcloudairport.com SECTION 1 - APPLICANT INFORMATION (Full Legal Name) BADGE # ST.

More information

CHARLESTON COUNTY AVIATION AUTHORITY APPLICATION FOR AIRPORT AOA/PUBLIC AREA BADGE

CHARLESTON COUNTY AVIATION AUTHORITY APPLICATION FOR AIRPORT AOA/PUBLIC AREA BADGE STA APPROVAL CHARLESTON COUNTY AVIATION AUTHORITY APPLICATION FOR AIRPORT AOA/PUBLIC AREA BADGE Print or Type all Information SECTION I -- APPLICANT SSN: NAME (Last, First, Middle): HOME ADDRESS (Street,

More information

PROTECTION OF PERSONAL INFORMATION ACT NO. 4 OF 2013

PROTECTION OF PERSONAL INFORMATION ACT NO. 4 OF 2013 PROTECTION OF PERSONAL INFORMATION ACT NO. 4 OF 2013 [ASSENTED TO 19 NOVEMBER, 2013] [DATE OF COMMENCEMENT TO BE PROCLAIMED] (Unless otherwise indicated) (The English text signed by the President) This

More information

for fingerprint submitting agencies and contractors Prepared by the National Crime Prevention and Privacy Compact Council

for fingerprint submitting agencies and contractors Prepared by the National Crime Prevention and Privacy Compact Council for fingerprint submitting agencies and contractors Prepared by the National Crime Prevention and Privacy Compact Council The National Crime Prevention and Privacy Compact Council (Compact Council) is

More information

THE STATE OF NEW HAMPSHIRE SUPREME COURT OF NEW HAMPSHIRE ORDER

THE STATE OF NEW HAMPSHIRE SUPREME COURT OF NEW HAMPSHIRE ORDER THE STATE OF NEW HAMPSHIRE SUPREME COURT OF NEW HAMPSHIRE ORDER Pursuant to Part II, Article 73-a of the New Hampshire Constitution and Supreme Court Rule 51, the Supreme Court of New Hampshire adopts

More information

THE GENERAL ASSEMBLY OF PENNSYLVANIA HOUSE BILL

THE GENERAL ASSEMBLY OF PENNSYLVANIA HOUSE BILL PRIOR PRINTER'S NO. PRINTER'S NO. THE GENERAL ASSEMBLY OF PENNSYLVANIA HOUSE BILL No. 1 Session of 01 INTRODUCED BY ELLIS, IRVIN, RABB, MILNE, PICKETT, BAKER, DAVIS, QUIGLEY, BOBACK, CHARLTON, O'NEILL,

More information

Application for Airport SIDA Identification Media. / / Company Name Company Phone Job Title

Application for Airport SIDA Identification Media. / / Company Name Company Phone Job Title Initial Renewal Airport Security Badging Office 700 Catalina Drive, Suite 110 Daytona Beach, Florida 32114 (386)-248-8030 Application for Airport SIDA Identification Media Last Name First Name Middle Name

More information

Subscriber Registration Agreement. Signing up is as easy as 1, 2, 3...

Subscriber Registration Agreement. Signing up is as easy as 1, 2, 3... Subscriber Registration Agreement You must be a registered user to access certain e-government services through Alabama Interactive. Alabama Interactive, Inc 100 North Union Street Suite 630 Montgomery,

More information

ST. CLOUD REGIONAL AIRPORT FINGERPRINTING AND BADGE APPLICATION

ST. CLOUD REGIONAL AIRPORT FINGERPRINTING AND BADGE APPLICATION St. Cloud Regional Airport 1550 45 th Avenue Southeast, Suite #1 NEW St. Cloud, MN 56304-9535 (320) 255-7292 RENEWAL www.stcloudairport.com SECTION 1 - APPLICANT INFORMATION (Full Legal Name) BADGE # ST.

More information

General Conditions for Non-Construction Contracts Section I (With or without Maintenance Work)

General Conditions for Non-Construction Contracts Section I (With or without Maintenance Work) General Conditions for Non-Construction Contracts Section I (With or without Maintenance Work) U.S. Department of Housing and Urban Development Office of Public and Indian Housing Office of Labor Relations

More information

SAMPLE FORMS - CONTRACTS DATA REQUEST AND RELEASE PROCESS NON-DISCLOSURE AGREEMENT, Form (See Attached Form)

SAMPLE FORMS - CONTRACTS DATA REQUEST AND RELEASE PROCESS NON-DISCLOSURE AGREEMENT, Form (See Attached Form) SOUTHERN CALIFORNIA GAS COMPANY Revised CAL. P.U.C. SHEET NO. 51719-G LOS ANGELES, CALIFORNIA CANCELING Original CAL. P.U.C. SHEET NO. 50594-G SAMPLE FORMS - CONTRACTS DATA REQUEST AND RELEASE PROCESS

More information

WEBSITE USER AGREEMENT

WEBSITE USER AGREEMENT WEBSITE USER AGREEMENT The ProductWalk.com website ( Website ) is an online information website provided on behalf of The Home Depot ("THD") by Hartmann Project Team LLC ("HPT"), the Show Manager of The

More information

REQUEST FOR PROPOSAL for the SINGLE AUDIT OF THE STATE OF NEVADA

REQUEST FOR PROPOSAL for the SINGLE AUDIT OF THE STATE OF NEVADA LEGISLATIVE COUNSEL BUREAU AUDIT DIVISION REQUEST FOR PROPOSAL for the SINGLE AUDIT OF THE STATE OF NEVADA For the years ending JUNE 30, 2014, 2015, 2016 and 2017 RELEASE DATE: January 10, 2014 DUE DATE:

More information

ADMINISTRATIVE PROCEDURES FOR COMPLIANCE WITH THE ILLINOIS FREEDOM OF INFORMATION ACT TABLE OF CONTENTS SECTION 1. DEFINITIONS...

ADMINISTRATIVE PROCEDURES FOR COMPLIANCE WITH THE ILLINOIS FREEDOM OF INFORMATION ACT TABLE OF CONTENTS SECTION 1. DEFINITIONS... ADMINISTRATIVE PROCEDURES FOR COMPLIANCE WITH THE ILLINOIS FREEDOM OF INFORMATION ACT TABLE OF CONTENTS SECTION 1. DEFINITIONS... 1 SECTION 2. FOIA OFFICERS... 5 A. Designation of FOIA Officers... 5 B.

More information

Fragomen Privacy Notice

Fragomen Privacy Notice Effective Date: May 14, 2018 Fragomen Privacy Notice Fragomen, Del Rey, Bernsen & Loewy, LLP, Fragomen Global LLP, and our related affiliates and subsidiaries 1 (collectively, Fragomen or "we") want to

More information

PRIVACY IMPLICATIONS OF BIOMETRIC DATA. Kevin Nevias CISSP, CEH, CHFI, CISA, CISM, CRISC, CGEIT, CCNA, G /20/16

PRIVACY IMPLICATIONS OF BIOMETRIC DATA. Kevin Nevias CISSP, CEH, CHFI, CISA, CISM, CRISC, CGEIT, CCNA, G /20/16 PRIVACY IMPLICATIONS OF BIOMETRIC DATA Kevin Nevias CISSP, CEH, CHFI, CISA, CISM, CRISC, CGEIT, CCNA, G2700 09/20/16 What are the benefits of using Biometric Authentication? ATM Example: Fraud Prevention

More information