Physical Access Control Systems, or PACS, are systems that manage physical access into buildings and other control areas. For example, the system that is used to swipe your card to enter a secured room or that scans your credential before you enter a Federal building, is a PACS. Logical Access Control Systems, or LACS, are systems that manage network and computer access. For example, the system that allows you to insert your credential into your computer and provide a PIN to log in, is a LACS.
Views: 1462
Please remember that the USAccess program and the Department of Homeland Security (DHS) require us to accept two identity documents for applicant enrollment: one Primary and one Secondary.
Views: 1131
With the holidays upon us, the MSO would like to remind PIV card holders to be mindful of your agency security and privacy policies when traveling and working in public places.
Views: 1424
Access to USAccess requires that each Role Holder review and sign the USAccess Rules of Behavior. At a minimum, the USAccess Rules of Behavior include:
Views: 1294
When contacting the HSPD-12 Helpdesk (hspd12@gsa.gov), or when communicating with MSO staff individually, it is important to be cognizant of the type of information you are including in emails. Do not send sensitive applicant Personally Identifiable Information (PII) such as DOB or SSN via email. Usually, MSO staff can look up applicants with just their name. If there is any confusion regarding the applicant, MSO staff will contact you to clarify.
Views: 1482
Upholding high security standards at USAccess Credentialing Centers is critical to the integrity of the enrollments and activations that occur there, as well as the overall mission and security of the USAccess program. Role holders who operate out of a Credentialing Center should remember these important security requirements:
Views: 1340
Registrars, remember that you must always re-capture fingerprints, re-take the photo, and re-scan ID documents during a re-enrollment. Since Registrars do not have the ability to determine why a re-enrollment was requested, you must always re-do the entire enrollment process.
In most cases, in order to re-capture fingerprints, you must first clear the original fingerprints. You may do so by clicking the “Clear All” button in the Capture Window of the 10-print screen.
Views: 1346
The only time during enrollment that identity source documents with different names can be accepted is when both the primary and secondary documents are valid and not expired, and an official linking document is provided linking the two names.
A linking document must have both the former and current legal names on it, and it might include a marriage certificate, certified copy of birth certificate, or court record.
Views: 1139
When traveling with your agency assigned laptop, use extra caution to prevent theft. Laptops, when in sight, are very attractive targets. If you have to step away from your belongings in any public access locations such as an airport, make sure that you take your laptop and bag with you. The only exception is if you are traveling with someone you know and trust, and it is a good practice to remind them not to leave your laptop unattended as well. While going through a security or customs screening, also try to keep visual contact with your laptop if you are required to set it down.
Views: 1383
Issuing organizations are required to maintain a Chain-of-Trust from the time credentials are physically received, when they are transferred to the credential holder, and throughout the lifecycle until credential destruction.
Timely use of the Credential Inventory Tool (CIT) by Operators and Activators is required to ensure that the Chain-of-Trust is properly maintained throughout its lifecycle and that USAccess and your agency know the status and location of a credential.
Views: 1215