Download presentation
Published byMaximillian Wilkerson Modified over 9 years ago
1
Joint Personnel Adjudication System (JPAS) Overview
Welcome to the Power Point overview of the Joint Personnel Adjudication System (JPAS). The purpose of this presentation is to introduce the JPAS and its capabilities to Department of Defense personnel and contractors within the National Industrial Security Program.
2
Important This overview addresses information and instructions on the use of the Joint Personnel Adjudication System (JPAS). It is an instructional tool only and is not meant to dictate policy. Future enhancements will be announced on the JPAS website at When you go to the JPAS website be sure to use “https” and not “http.” The “S” designates that the website is secure.
3
JPAS The Department of Defense (DoD) system that uses the Web to connect security personnel around the world with a database managed by DoD Agency Central Adjudication Facilities (CAFs) Represents a major technological leap for DoD personnel security professionals worldwide
4
JPAS The DoD personnel security migration system:
Providing the virtual consolidation of the DoD CAFs For use by non-SCI security program managers, Special Security Officers, and DoD contractor security officers Uses a centralized database with centralized computer processing and application programs for standardized DoD personnel security processes
5
JPAS Provides "real-time" information regarding clearance, access and investigative status to authorized DoD security personnel and other interfacing organizations such as the: Defense Security Service Defense Manpower Data Center Defense Civilian Personnel Management System Office of Personnel Management Air Force Personnel Center
6
JPAS Comprised of two major sub systems:
the Joint Clearance and Access Verification System (JCAVS) the Joint Adjudication Management System (JAMS) JCAVS + JAMS = JPAS
7
JCAVS Provides ability to constantly update accesses and related information in real time Provides ability to constantly communicate with other information systems: DSS, OPM, DEERS, DCPMS, Bupers (USN), MCTFS (Marines) This is the subsystem of JPAS that the majority of this overview addresses. DSS: Defense Security Service OPM: Office of Personnel Management DEERS: Defense Enrollment Eligibility Reporting System DCPMS: Defense Civilian Personnel Management System Bupers (US Navy Payroll) (MCTFS) Marine Corps Total Force System
8
JAMS Provides DoD CAFs a single information system to assist in the adjudication process Standardizes core DoD Adjudication processes Used by Adjudicators to record eligibility determinations and command access decisions Promotes reciprocity between the DoD CAFs
9
Vocabulary PCL JPAS speaks in terms of eligibility and access instead of personnel security clearance The government continues to issue eligibility to an individual The security officer assigns the individual’s access level in JCAVS
10
Definitions Eligibility Access
the highest level of information which may be disclosed to a person based on the type of completed investigation CAF Responsibility Access the actual level of classified information to which a person is authorized disclosure Security Officer Responsibility For example: Based on the completion of a NACLC (National Agency Check with Local Area Checks and Credit), an individual is eligible for access to Secret information – “Secret Eligibility.” This person is assigned “Secret Access” only after the Security Officer determines that disclosure to Secret information is required in order for this person to perform on a bonafide classified contract.
11
JCAVS User Levels Total 12 Levels 9,11,12 are not yet defined
Level 10 = Visit Control Only Currently, there are a total of 12 user levels. Others will be added in the future. Levels 9,11,12 have not been defined to date. Level 10 is for Visit Control Only.
12
JCAVS Level 2 SCI security personnel at unified command, DoD agency, military department or major command/equivalent headquarters For industry - usually the Chief Security Officer at the corporate level, Special Security Officer (SSO or CSSO) Provides Read and Write Access Requires SSBI, with Director of Central Intelligence Directive (DCID 6/4) eligibility and access SCI = Sensitive Compartmented Information CSSO = Contractor Special Security Officer SSBI = Single Scope Background Investigation
13
JCAVS Level 3 SCI security personnel subordinate to Level 2 at a particular geographic location (installation, base, post, naval vessel or facility) Provides Read and Write Access Requires an SSBI with DCID eligibility and access
14
JCAVS Level 4 Non-SCI security personnel at unified command, DoD agency, military department or major command/equivalent headquarters For industry - Corporate FSOs (collateral) Provides Read and Write Access Requires a NACLC or ANACI NACLC = National Agency Check with Local Area Checks and Credit ANACI =Access National Agency Check with Written Inquiries
15
JCAVS Level 5 Non-SCI security personnel subordinate to Level 4 at a particular geographic location (installation, base, post, naval vessel) For Industry - Company FSOs / Managers (collateral) Provides Read and Write Access Requires a NACLC or ANACI
16
JCAVS Level 6 Unit security manager (additional duty) responsible for security functions as determined by responsible senior security official For industry - Unit Security Managers / Visitor Control Provides Read and Write Access Requires a NACLC or ANACI
17
JCAVS Level 7 Non-SCI entry control personnel / individuals who grant access to installations, buildings, etc. For industry - lobby receptionists, security entry point personnel (collateral) Provides Read Only Access Requires a NACLC or ANACI
18
JCAVS Level 8 SCI entry control personnel / individuals who grant access to Sensitive Compartmented Information Facility (SCIF) installations, buildings, etc. For industry - lobby receptionist, security entry point (SCI) Provides Read Only Access Requires an SSBI with DCID eligibility and access
19
JCAVS Level 10 Visitor management personnel
Has the same view of the JCAVS Person Summary as a JCAVS Level 7 User Receives Visit Notifications when their Security Management Office (SMO) is being notified of a visit May not be an Account Manager, create or delete an account at any level Requires a NACLC or ANACI
20
User Investigative Requirements
Levels 2, 3 and 8 – Current SSBI Levels 4 – 7 and 10 – NACLC with Credit* These are the investigative requirements for current JPAS user levels. NAC = National Agency Check EPSQ = Electronic Personnel Security Questionnaire *If projected user has a NAC without credit, a new EPSQ will be required with reason listed as “Requires access to JPAS.”
21
How Does JPAS Implementation Affect Security Office Operations?
22
Security Officers PCL Must now speak JPAS
Remember Eligibility and Access replace Personnel Security Clearance Assigns the individual’s access level in JCAVS This terminology issue was addressed several slides ago but bears repeating. Remember: Eligibility: the highest level of information to which a person is authorized access (Responsibility of the CAF) Access: the level of classified disclosure which a person is granted (Responsibility of the Security Officer) PCL
23
+ + + Access Authorized Person Eligibility Need-to-Know
Historically, prior to releasing classified information, the possessor of that information had to verify the recipient’s security clearance and need-to-know identifying that individual as an authorized person. Since JPAS vocabulary doesn’t include the term “clearance,” an authorized person determination is now made based upon eligibility, access and NTK. The NTK is still determined by the person who discloses classified information. For Industry: Non contract related visits and international visits continue to follow the current NISPOM policies. JPAS does not address these two situations + Need-to-Know
24
Record Keeping JPAS automates core and CAF-unique functionality and provides "real-time" eligibility, access and investigative status to DoD and other interfacing organizations JCAVS will automatically record “eligibility” at the highest level commensurate with the level of investigation One cleared person = one JPAS record! Your inspection authority will continue to audit the records . . . Be sure that if you grant a TS, the person has the need for TS.
25
NOW Security Officers Can:
Grant access based on JPAS record of eligibility Upgrade level of access immediately Downgrade level of access immediately Terminate access immediately Record SF 312 execution (Once!) Send U.S. Visits In/Out-Process employees / verify eligibility Submit Incident (formally known as adverse information) reports online Actions that used to take days and sometimes weeks can be conducted instantly and in real time. Example: Subject has been investigated with an SSBI. If the Security Officer has assigned Secret access to him (or her) and he (or she) now needs to attend a TS level meeting, the access can be instantly upgraded for that meeting, provided that the facility is cleared at the higher level. Remember, anything reviewed or actions historically accomplished on paper, can now de done through JPAS.
26
System Access Requirements
Desktop configuration .com, .mil, .gov, .org, or .net address .net or .org addresses must identify their specific IP address to the JPAS helpdesk .edu is not authorized access to JPAS Before June 3, 2004 contractors with .org or .net or .edu addresses were denied JPAS access. .org and .net users must contact the JPAS helpdesk and provide specific IP addresses to the desk. These will be the only terminals that will be allowed access with a .org or .net suffix. Currently, only contractors with .edu addresses are denied access. There are no immediate plans to allow .edu addresses into the system.
27
Designation of Users Two Functional Categories
JCAVS Account Manager JCAVS User Account Level dependent on: Facility or command clearance level Requirement to SCI or non-SCI eligibility and access data Read/write access requirement The users’ responsibilities determine their level of JPAS access.
28
Account Manager Responsible for JPAS compliance
First line of assistance on-site – the organization’s “help desk” Creates a Security Management Office Inputs Security Officer’s name, e- mail, phone and fax numbers Establishes user accounts At an organization or facility, the account manager is typically the first line of assistance. In a sense, they serve as the helpdesk.
29
Account Manager Performs administrator functions such as:
Issuance of User ID and passwords Re-setting passwords Locking / un-locking user accounts Changing user account privileges Point of contact for system technical issues Single point of contact between command / facility and the JPAS Program Office
30
Account Manager Examples of accountable actions:
Identify who has been given JCAVS accounts and at what level Produce Access Request Forms for review Track JCAVS accounts that has been terminated, or where privileges have been suspended
31
Functional User Typically the Security Officer or designee
Uses the system on a regular basis to verify eligibility, investigations, send visit requests, maintain personnel security records, etc. The JCAVS user at a facility or organization (normally the Security Officer or designee) is the person utilizing the system on a regular basis. This is also the individual that normally sends out VALs/VARs and maintains other personnel security records. VAL = visitor authorization letter VAR = visitor authorization request
32
JPAS For additional questions, clarification and/or points of contact, please access the JPAS website: Or call the DoD Security Service Center: Before you call, you might want to check the JPAS Desktop Resource or the Frequently Asked Questions (FAQs) posted on the JPAS website. Numerous questions and answers are posted there and are updated routinely. Remember to add an “S” on the end of http.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.