E-certification Update Train-the-Trainer Workshop September 17-18, 2001 Schools & Libraries Division, USAC.

Slides:



Advertisements
Similar presentations
11/2/2013 2:02:38 AM 5864_ER_FED 1 Importing Certificates into Lotus Notes R6.
Advertisements

Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Slide 1 FastFacts Feature Presentation February 21, 2013 To dial in, use this phone number and participant code… Phone number: Participant.
Indiana Death Registration System (IDRS)
AmeriCorps is introducing a new online payment system for the processing of AmeriCorps forms
Determine Eligibility Chapter 4. Determine Eligibility 4-2 Objectives Search for Customer on database Enter application signed date and eligibility determination.
Form 486 Step-by-Step Receipt of Service Confirmation Train-the-Trainer Workshop September 17-18, 2001 Schools & Libraries Division, USAC.
Completing the California Dream Act Application 1 Event link: To see the presentation
1 SLIDE Insurance Company Regulation Division Insurance Market Regulation Division Medical Professional Liability Insurance Claim Reports Online Claim.
COMPLETING THE FREE APPLICATION FOR FEDERAL STUDENT AID (FAFSA) Presented by: Student Support Services and the Financial Aid Office at HCC 1.
6/2/ Online Group Enrollment. 6/2/ Introduction Thank you for choosing Online Enrollment! This presentation will walk you through the Online.
Page 1 of 14 To the Voltage Online Training Course Voltage encryption is used to protect sensitive and personal information sent via to external.
Welcome to Instructions and tips for the online application process 1 June 2012.
1.7.6.G1 © Family Economics & Financial Education –March 2008 – Financial Institutions – Online Banking – Slide 1 Funded by a grant from Take Charge America,
1 Welcome to JCCAA Data base presentation Click box to see the DEMO 1.JCCAA Web Site 2. Member Login 3. My Acount 4. School DBA The end.
20&27 May Agenda 1.Highlight the difference between system flow of e- Invoice and paper invoice – 15 minutes 2.Demonstrate the operation procedure.
- 1 - Defense Security Service Background: During the Fall of 2012 Defense Security Service will be integrating ISFD with the Identity Management (IdM)
EAuthentication Before accessing the Delphi eInvoicing System, you must be an authenticated user. This authentication process is called eAuthentication.
Welcome Core 40 & Honors Internet Update System CHIPS
Copyright © 2005 EFT Network, Inc. All Rights Reserved. Automated Recurring Payments Flexible Payment Solution.
Cryptography and Network Security
National Service Trust Automation Project Training Materials: Members and Alumni Corporation for National & Community Service (CNCS) National Service Trust.
Chapter 8 Web Security.
Free Application for Federal Student Aid (FAFSA) on the Web Preview.
California Integrated Water Quality System (CIWQS) and Electronic Self Monitoring Reports (eSMR) Presentation to California Dischargers.
FAFSA on the Web. Disclaimers This is a preview of the FAFSA on the Web (FOTW) site. The web site is subject to change and OMB approval.
Fran C. McKeown Higher Education Access Partner Fran C. McKeown Higher Education Access Partner
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Federal Student Aid Identification username and password – this is how students and parents will sign the FAFSA application. The FSA ID process replaced.
Form 470 Step-by-Step for Libraries E-Rate FY2014.
Universal Service Administrative Company Schools and Library Division Web Site Tour and Data Retrieval November 4,
1 MyLicense Log in/Register Login to the MyLicense application with an existing User Account. OR Create a new User Account with the Register link at the.
Session #23 Hands On NSLDS for Beginners Valerie Sherrer & Andrea Wise.
Week 25: Mon + Tues. (Watch video before taking survey) *Check to take Survey!!!
1 Walking through Federal Student Aid Web Sites NCASFAA/SCASFAA Fall Conference 2006 November 6-9, 2006 Asheville, NC.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
Types of Electronic Infection
2 Session 115 What’s New with FAFSA on the Web, the PIN, and FAA Access Online?
Electronic Signatures in the SFA Loan Programs Electronic P-Notes Presented by Jeff Baker & Kay Jacks.
© 2015 Universal Service Administrative Company. All rights reserved. Direct BEAR Payment Process E-rate Program Applicant Training Washington DC Tampa.
E-rate BEAR Form Lauren Abner Kentucky Department for Libraries and Archives.
Session Session 15 FAFSA on the Web - Onward and Upward!
USAC/Schools and Library Web Site Tour. Web Site Tour – Morning Edition… Navigation on the site – Instructions – Forms – Reference Area – Tools Later.
NYS Division of Homeland Security And Emergency Services (DHSES) E-Grants Tutorial Creating an Application for the EOC RFP To access DHSES E-Grants you.
Step by Step Instruction: How to Conduct Direct Certification using the State Match Method Released January 2014 “How to Conduct Direct Certification using.
Session 52-1 Session 52 E-Signature: Implications of the E-SIGN Legislation for Student Aid 1.
FAA Access to CPS Online for EDExpress Users - Hands-on Ginger Klock Eric Smith Session 5.
Creating and Using Your FSA ID: An Overview
Student Eligibility and The Application Process. BILL MACK.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Important Changes and Reminders for Fund Year 2016 E-rate Program Applicant Training November 2015.
Universal Service Administrative Company Schools and Library Division Web Site Tour & Data Retrieval Tool 1 Statewide ITV E-Rate Training Tuesday, November.
Student Eligibility and the Financial Aid Application Process.
How to Complete FAFSA (Free Application for Federal Student Aid)
How to Access and Redeem Cisco Certification Exam Discount Vouchers Step-by-Step Guide August 2013.
How to CORRECTLY Complete a TEASE Access Request Form.
Session 3 -2 Session 3 FAA Access to CPS Online – Designed for Efficiency.
1 FAA Access to CPS Online Hands-on Nina Colon Eric Smith Session 5.
FAFSA Completion Free Application for Federal Student Aid (FAFSA) on the Web Preview.
Setting and Upload Products
Invoicing 2016 E-rate Program Applicant Training
How to Apply for an NPI Instructions for Completing the National Provider Identifier (NPI) Online Application
Online Approvals Standard Department Transition Meeting
FAFSA on the Web Preview Presentation
Pooja programmer,cse department
FAFSA-Apply Today! Presented by McDaniel College.
Back to the New Basics Schools and Libraries Division
Electronic Payment Security Technologies
Presentation transcript:

E-certification Update Train-the-Trainer Workshop September 17-18, 2001 Schools & Libraries Division, USAC

September 17-18, The information on this slide is believed to be true and accurate as of September 4, E-cert will Enhance Online Filing uFor Year 4, SLD received 32, Cs and 32, paper certifications. uThese take time and money to process. uWith E-cert, applicant is sure cert is recorded in the system.

Schools & Libraries Division, USAC September 17-18, The information on this slide is believed to be true and accurate as of September 4, Basic Principles uSelf-certification is a cornerstone of program integrity; E-cert builds on that. uE-cert is consistent with Government Paperwork Elimination Act, the E-Sign Act, and state enactment of the Uniform Electronic Transactions Act. uE-cert will require User ID and PIN.

Schools & Libraries Division, USAC September 17-18, The information on this slide is believed to be true and accurate as of September 4, Basic Approach uApplicants will use PINs assigned to individuals who have hand-signed funded 471s or 486s that have been data entered. uThey will be used to sign forms. uCan be used to sign forms for multiple entities

Schools & Libraries Division, USAC September 17-18, The information on this slide is believed to be true and accurate as of September 4, How an Applicant Obtains a PIN uApply online on a secure web site starting from the SLD web site. uProvide name, date of birth, an address, a Form 471 or 486 # that person signed and an FRN from that form, and choose a User ID. uAffirm compliance with PIN usage requirements.

Schools & Libraries Division, USAC September 17-18, The information on this slide is believed to be true and accurate as of September 4, How an Applicant Obtains a PIN (contd) uIn doing so, applicant agrees using PIN is equivalent to handwritten signature, will keep PIN confidential, and will notify SLD if the PIN is lost or compromised. uSelect a mailing address from SLD database of eligible entities. uPIN is mailed to that address in a secure mailer.

Schools & Libraries Division, USAC September 17-18, The information on this slide is believed to be true and accurate as of September 4, Using a PIN uWhile filing a form online, when the applicant reaches the certification page, he or she will complete the certifications and type in name, title, and phone number, then choose to continue to a paper or electronic certification. uIf electronic, after checking information and printing the form, will see the certification page, and be asked to enter a User ID and PIN.

Schools & Libraries Division, USAC September 17-18, The information on this slide is believed to be true and accurate as of September 4, Using a PIN (contd) uThe individual using the PIN will also affirm: n that he or she represents the Block 1 entity and is authorized to make the certifications, and n that he or she understands that use of the PIN is equivalent to a handwritten signature and that, should the certifications prove to be untrue, he or she will be held to the same enforcement standards as someone who signs on paper.

Schools & Libraries Division, USAC September 17-18, The information on this slide is believed to be true and accurate as of September 4, Using a PIN (contd) uThe system will check for a match between User ID and PIN. uIf so, the application record will be updated to indicate a status of Certified, and a confirmation message will be displayed. uThe applicant will be encouraged to print the screen and file with the rest of the application.

Schools & Libraries Division, USAC September 17-18, The information on this slide is believed to be true and accurate as of September 4, Using a PIN (contd) uUser ID, PIN, and pertinent data from the form are captured, saving a "picture" of the data about which the applicant is certifying. uNo part of the application should be sent to SLD. uItem 21 attachments for Form 471 will still need to be submitted on paper to Kansas.

Schools & Libraries Division, USAC September 17-18, The information on this slide is believed to be true and accurate as of September 4, Other PIN Functionalities Applicants will be able to: uGet a reprint of the PIN, uHave a new PIN generated if the original is compromised, uHave the User ID ed again, and uDisable the PIN temporarily.

Schools & Libraries Division, USAC September 17-18, The information on this slide is believed to be true and accurate as of September 4, Order of Forms Online and with E-cert Capability u Services Requested u Services Ordered u Services Confirmed u Service Change u472 (BEAR) -- Applicant Invoice

Schools & Libraries Division, USAC September 17-18, The information on this slide is believed to be true and accurate as of September 4, Integrity of E-Cert Process uE-cert plan was developed by USACs subcontractor, NCS Pearson, which also developed and administers the Student Authentication Network for use with the Free Application for Federal Student Aid (FAFSA) and other Student Financial Aid programs.

Schools & Libraries Division, USAC September 17-18, The information on this slide is believed to be true and accurate as of September 4, Integrity of E-Cert Process uWeb security will be based on: n Firewalls capable of intrusion detection and active blocking n Regularly scheduled vulnerability scans, reporting, and updates of security holes n Certificate authorities (Secure Sockets Layer or SSL) n Server event log mining n Encryption of PINs, which can only be decrypted with a password located in code in combination with an encrypted site key located in a database