1 Personnel Security 2007 Data Protection Seminar TMA Privacy Office HEALTH AFFAIRS TRICARE Management Activity.

Slides:



Advertisements
Similar presentations
The Legal Foundation TRICARE Management Activity HEALTH AFFAIRS 2009 Data Protection Seminar TMA Privacy Office.
Advertisements

PIV-I Issuing Procedures for Applicants (New Contractors) v1.1
Data Sharing Agreements TRICARE Management Activity HEALTH AFFAIRS 2009 Data Protection Seminar TMA Privacy Office.
2009 Data Protection Seminar
Annual Security Refresher Briefing Note: All classified markings contained within this presentation are for training purposes.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
Copyright Eastern PA EMS Council February 2003 Health Information Portability and Accountability Act It’s the law.
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Defense Security Service Facility Clearance Branch (FCB)
Health Insurance Portability Accountability Act of 1996 HIPAA for Researchers: IRB Related Issues HSC USC IRB.
Department of Health and Human Services Personal Identity Verification Training APPLICANT.
Copyright © 2008 Delmar Learning. All rights reserved. Chapter 4 Life Cycle of an Insurance Claim.
Clearance Processing Back To The Basics Presented By Mallory Howard
Florida Industrial Security Working Group (FISWG) SF86 Review Workshop Nannette Bell December 2012.
Section Four: Employee and Visitor Access Controls Note: All classified markings contained within this presentation are for training purposes only.
Joint Personnel Adjudication System (JPAS) Overview
PIV-I Issuing Procedures for Applicants (Current Contractors) v1.1.
Hong Kong Privacy Code on Human Resource Management
Federal Information Processing Standard (FIPS) 201, Personal Identity Verification for Federal Employees and Contractors Tim Polk May.
Civilian Recruitment in the 21 st Century : A USA Staffing® Briefing for Applicants Civilian Human Resources Agency.
SEMINAR NAIC/ASSAL/SVS REGULATION & SUPERVISION OF MARKET CONDUCT © 2014 National Association of Insurance Commissioners Complaint Handling.
PIV-I Issuing Procedures for Applicants (New Volunteers / Affiliates) v1.1.
HIPAA – Health Insurance Portability & Accountability Act and the Privacy Act MSgt Nechele M. Chambers Senior Enlisted Liaison TRICARE Area Office-Europe.
PIV-I Issuing Procedures for Applicants (New Employees) v1.1.
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
Network Centric Enterprise Public Trust Information and Navy Enterprise Resource Planning Presented to the Small Business and Industry Outreach Initiative.
United States Army Combined Arms Center Army Training Support Center Training Service Support Contract TITLE Task Order Kick-Off Information Briefing DAY,
Visit us at usacac.army.mil AMERICA’S ARMY OUR PROFESSION – STAND STRONG 1 U.S. Army Combined Arms Center Training United States Army Combined Arms Center.
Section Eight: Communication Security (COMSEC) Note: All classified markings contained within this presentation are for.
TELECARE CORP HIPAA AND THE AMENDMENT PROCESS Updated 11/17/09.
** Deckplate training for Navy Sailors **.  On Thursday, 9 July, the Office of Personnel Management (OPM) announced a cyber incident exposed the federal.
2009 CDBG/CHIP Recipients’ Workshop CDBG LABOR STANDARDS.
CONTRACTUAL FLOW DOWN OF DPAS PRIORITY RATINGS
ISP Preparation Series 1 – Chapter 6. NISPOM Chapter 6 – Visits & Meetings Section 1: Visits General (6-100)  When it is anticipated that classified.
HIPAA PRIVACY AND SECURITY AWARENESS.
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
ISP Preparation Series 3- Chapter 6. NISPOM Chapter 6- Visits and Meetings  General- anticipate discussion  Classified visits- minimum and.
Procedures on how to obtain TAAMS Access at the Tribal level.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
1 Defense Health Agency Privacy and Civil Liberties Office Data Sharing Program Overview Ms. Rita DeShields DHA Data Sharing Compliance Manager August.
PIV-I Issuing Procedures for Applicants (Current Employee) v1.1.
DEFENSE SECURITY SERVICE DSS Role in International Security.
Steven Burke Industrial Security Supervisor Lockheed Martin
Health Insurance Portability and Accountability Act (HIPAA) CCAC.
Non-Employee Identity System (NEIS) Adjudicator Training.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
1 Acquisitions IT Security, and the Suitability Investigations Process February 2005 Daniel Sands NCI/OM/ISCS
Rhonda Anderson, RHIA, President  …is a PROCESS, not a PROJECT 2.
Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
Privacy Act United States Army (Managerial Training)
Personnel Security Investigation Portal (PSIP): Update and Discussion
Office for Research Subjects (ORS) & Research Administration (ORA) In-Sync to Help Make your Research Happen Stephanie Gaudreau, Sr.Research Subjects Specialist,
2013 CDBG Recipients' Workshop CDBG Labor Standards.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
Information Protection The Personnel Security Program (PSP) & Supervisors’ Responsibilities Mr. Connolly.
Table of Contents. Lessons 1. Introduction to HIPAA Go Go 2. The Privacy Rule Go Go.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
What is HIPAA? Health Insurance Portability and Accountability Act of HIPAA is a major law primarily concentrating on the prolongation of health.
The Health Insurance Portability and Accountability Act (HIPAA) requires Plumas County to train all employees in covered departments about the County’s.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Derivative Classification Overview
Disability Services Agencies Briefing On HIPAA
AN OVERVIEW OF THE INDUSTRIAL SECURITY PROGRAM
HIPAA Overview.
The Health Insurance Portability and Accountability Act
Property Control Asset Forms
Presentation transcript:

1 Personnel Security 2007 Data Protection Seminar TMA Privacy Office HEALTH AFFAIRS TRICARE Management Activity

2 Personnel Security Purpose  This presentation will provide an overview of the TRICARE Management Activity (TMA) office role in personnel security

3 Personnel Security Objectives  Upon completion of this lesson, you will be able to: Understand TMA Privacy Office’s personnel security Be familiar with current policies and procedures for TMA personnel security Identify common misconceptions with respect to personnel security background investigations

4 Personnel Security Mission and Objective  Mission Ensure policies and procedures against inappropriate use and disclosure of sensitive information are upheld by contractors who have access to information systems containing Protected Health Information (PHI) and Privacy Act information on Department of Defense (DoD) Information Technology (IT) Systems  Objective Provide guidance and consultation to ensure all TMA contractor employees with access to DoD IT Systems are:  Trustworthy  Reliable  Of unquestionable allegiance to the United States

5 Personnel Security What is Personnel Security?  Personnel Security refers to the practices, technologies, and/or services used to ensure personnel security safeguards are applied specifically to: Contractors on TRICARE contracts IT systems Background checks and trustworthiness determination Granting or withdrawing system access privileges – Common Access Card (CAC)  Misconception TMA Privacy Office Personnel Security pertains to military and government civilian personnel

6 Personnel Security The Information and System Lifecycle Start: Personnel Security Phase 1 Initiation Phase 2 Acquisition/ Development Phase 3 Implementation Phase 4 Operations/ Maintenance Phase 5 Disposition Complete: Personnel Security When to address Personnel Security?

7 Personnel Security Why Personnel Security?  Consider the purpose of Personnel Security safeguards The most common perpetrators of significant computer crime are those with legitimate access  Knowingly  Unknowingly Managing personnel with privileged access is critical  Recertification  Change in level access

8 USDI Guidance (DoD R) OPM ISN TMA Privacy Office JPAS MCSC employees NPC employees ISN JPAS ISN JPAS DISCO DOHA SF85P Difficult cases Completed cases JPAS Unacceptable Cases Denials Personnel Security Workflow

9 Personnel Security ADP Determination Levels  Applicable levels of trustworthiness determinations for public trust positions: ADP/IT-I ─ Critical Sensitive Position ADP/IT-II ─ Non-critical Sensitive Position ADP/IT-III ─ Non-critical Non-Sensitive Position Note: ADP/IT-III are no longer authorized on DoD systems ADP is the language formerly used for information systems

10 Personnel Security Positions of Trust vs. Security Clearances (1 of 2)  Positions of Trust- SF 85 (paper)  SF 85P and FD 258 (fingerprint card) completed and mailed to OPM  Office of Personnel Management (OPM) screens, schedules, or rejects questionnaire  Investigation Schedule Notice (ISN)

11 Personnel Security Positions of Trust vs. Security Clearances (2 of 2)  ISN’s entered into MHS database and copy sent to contracting company  Investigation level and schedule date entered into JPAS  Interim access granted upon ISN receipt

12 Personnel Security SF 86 Security Clearance  Submitted electronically via eQIP to Defense Security System (DSS)  Interim secret access granted normally within 48 hours  OPM schedules National Agency Check with Local Law and Credit Check (NACLC) investigation  Posted in JPAS

13 Personnel Security Common Access Card Process  Facilities Security Officer (FSO) prepares DD1172 and sends to TMA Privacy Office  TMA Privacy Office verifies background investigation type NACLC required  Sends DD1172 to TMA Security Office  TMA Security notifies company FSO to have personnel complete Contracting Verification System (CVS) application  TMA Security notifies FSO when CVS application has been accepted and to have employee proceed to a RAPIDS location for CAC issuance

14 Personnel Security Application Requirement: ADP/IT-I  A written request for approval must be submitted to the TMA Privacy Officer prior to submitting the application to OPM  The Letter of Request must include: Thorough job description which justifies the need for the ADP/IT-I Trustworthiness Determination Contact information for the Security Officer or other appropriate executive Signature, at a minimum, by the company Security Officer or other appropriate executive

15 Personnel Security Interim Access  New TRICARE contractor employees who are U.S. citizens may be granted interim access upon receipt of notification of a scheduled investigation by OPM  Misconception: Prior language implied access granted after submission of the SF 85P and fingerprint cards to the OPM

16 Personnel Security Non-U.S. Citizen Access  Non-United State Citizens are not being adjudicated for any trustworthiness position by any government agency for TRICARE contracts  SF 85P’s will not be submitted on Non-United States citizen contractor employees

17 Personnel Security Open Issues  Communication between contracting companies and TMA Privacy Office (i.e. New submittals, Denial acknowledgement and Termination notification)  Sharing of billing and accounting data – can constitute fraud against the government  Procedures for obtaining CAC and access to HA/TMA Network

18 Personnel Security Presentation Summary  You should now be able to: Understand TMA Privacy Office’s personnel security Be familiar with current policies and procedures TMA personnel security Identify common misconceptions with respect to personnel security background investigations

19 Personnel Security Resources (1 of 4)  DoD R, “Personnel Security Program (January 1987),”  Privacy Act of 1974  Health Insurance Portability and Accountability Act (HIPAA) of 1996  DoD R, “DoD Health Information Privacy Regulation, January 2003”

20 Personnel Security Resources (2 of 4)  DoD M, “National Industrial Security Program Operating Manual” (NISPOM), January 1995 (Change 2, May 1, 2000)  DoD , “Information Assurance, (October 24, 2002)  security.cfm security.cfm  Questions:

21 Personnel Security Resources (3 of 4)

22 Personnel Security Resources (4 of 4)

23 Please fill out your critique Thanks! TRICARE Management Activity HEALTH AFFAIRS