Current JPAS Status: GREEN
GREEN : JPAS is fully functional and is not experiencing any
YELLOW: JPAS is experiencing functionality issues as
a partial or reports outage.
RED : JPAS is down and users will not have access to the
Last Updated: 16 January 2020
ATTENTION! Updated IPAC/OPAC Code Impacts: On January 19, 2020, JPAS implements new Agency
Locator Codes (ALCs) to be used for Investigation Request billing since
designated pseudo Intra-Governmental Payment and Collection (IPAC) codes,
also known as Office of Procurement and Contracts (OPAC) codes, will no
longer be accepted after January 31, 2020.
JPAS User Impacts:
submitting Investigation Requests will observe additional IPAC/OPAC codes
available to choose from, as well as a change to the default IPAC/OPAC code
31, 2020, IPAC/OPAC codes determined to be obsolete will be removed from JPAS
and so will no longer be available for use.
Character Impacts in JPAS: Please
refrain from cutting and pasting directly from Microsoft (MS) Word (or any MS
product) into JPAS text fields. MS
Word automatically converts certain characters on your keyboard to MS
specific characters that are not valid in JPAS and results in users receiving
The most frequently used invalid characters
are the MS Word 'curly' quote, ellipsis and dash characters. If it is imperative to copy and paste directly
from MS Word, first copy from the MS Word document and paste into Notepad (or
any non MS product). Then modify pasted text as follows:
- change all MS Word left/right double quotes (curly “ ”) into regular
double quotes (")
- change all MS Word left/right single quote (curly ‘ ’) into regular
single quotes (')
- change all MS Word ellipsis (…) into three regular periods (...)
- change all MS Word dashes (–) into a regular hyphen (-)
- change all MS Word tabs into spaces.
all needed changes complete, copy from Notepad and paste into the targeted
JPAS text field.
ATTENTION! JPAS Users: Users may receive an error of "SITE NOT
SECURE" or "SITES TLS SETTINGS ARE OUT OF DATE" when trying to
access JPAS. In order to fix the issue please go to https://public.cyber.mil/pki-pke/pkipke-document-library/
and then go to
page 5 and run the "INSTALLROOT 5.5 NIPR 64-BIT
WINDOWS INSTALLER." If blocked by your system administrator, please get
in contact with your IT department for assistance.
ATTENTION! APPEALS ACTIONS: Please ensure that ALL appeals actions
are recorded in DISS and JPAS.
ATTENTION! DISS & JPAS Users:
DISS Users are required
to maintain access to JPAS. For
additional information, please see the DISS Fielding Plan.
REMINDER! JPAS URL
Change: EFFECTIVE IMMEDIATELY, login to JPAS using ONLY
the "JPAS Login" button
located to the left or at https://jpaspki.dmdc.osd.mil/JPAS/JPASDisclosure
REMINDER! Eligibility Determinations:
The Customer Contact Center (CCC) has seen
an increased call volume concerning eligibility determination
descriptions. As a reminder, please
note that a full list of eligibility determinations is available at the
following link: https://www.dcsa.mil/mc/pv/fso/interim_clearances/
Correction of Questionable PID Dates & Eligibility
As JPAS continues to transition to DISS and in
an ongoing effort to enhance data quality, JPAS will perform a Data Quality
Initiative (DQI) to correct misaligned Birth or Death Dates as compared to
Eligibility Dates in the system. If one of your subjects is impacted by this
DQI, you will receive a notification in the system requesting the subject’s
record be corrected within 30 days. Upon receipt of a notification on this
matter, please work with the appropriate personnel center or CAF to perform
the necessary updates.
ATTENTION! Industry Tier 5 Reinvestigations (T5R)
Effective December 7, 2017, the Defense Security Service (DSS) has
requested for Industry to submit all Tier 5 Reinvestigations (T5R) whose
investigation close date is six years or older. However, “caveat T5Rs” should
continue to be submitted at the five year mark (only those cases requiring
PSSAR Form Submissions: Users requesting access to JPAS should only
fill out and submit the PSSAR version (DD Form 2962, NOV 2015) found at http://www.esd.whs.mil/Portals/54/Documents/DD/forms/dd/dd2962.pdf
Please ensure you are using the correct PSSAR version for the system(s) of
which you are requesting access.
Incorrect form submissions will be denied. The DISS PSSAR is currently not
allowed for JPAS.
or Using Test/Fake SSN’s or Records is Strictly Prohibited:
DMDC regularly audits JPAS to ensure the
system meets standards of accuracy as required by the DoD Privacy Program,
DoD 5400.11-R. DMDC and JPAS Account
Management policies prohibit users from entering or using false or inaccurate
information including, entering test, fake or “dummy” personal information
into the DoD personnel security system of records. Please do not enter test or fake
SSN’s/records into the system for any purpose.
USD(I) Memorandum: Personnel
Security Clearances in Industry
On December 7, 2016 the Undersecretary of Defense for Intelligence
signed a memorandum reminding DoD Components that personnel security
clearances do not expire. Individuals with current eligibility in JPAS should
not be denied access based on an out-of-scope investigation. When the system
of record shows current adverse information, but eligibility is still valid,
access may continue. The memorandum is provided here for your ease of reference.
EVALUATION ON DOD SUBJECTS:
Continuous Evaluation (CE) is defined in
Executive Order (E.O.) 13488, as amended by E.O. 13764, "means a vetting
process to review the background of an individual who has been determined to
be eligible for access to classified information or to hold a sensitive
position at any time during the period of eligibility. CE leverages a set of
automated record checks and business rules to assist in the on-going
assessment of an individual's continued eligibility. CE is intended to
complement continuous vetting efforts."
"'Vetting' is the process by which covered individuals undergo
investigation, evaluation, and adjudication of whether they are, and remain
over time, suitable or fit for Federal employment, eligible to occupy a
sensitive position, eligible for access to classified information, eligible
to serve as a nonappropriated fund employee or a contractor, eligible to
serve in the military, or authorized to be issued a Federal credential.
Vetting includes all steps in the end-to-end process, including determining
need (appropriate position designation), validating need (existence of a
current investigation or adjudication), collecting background information via
standard forms, investigative activity, adjudication, providing
administrative due process or other procedural rights, and ongoing assessments
to ensure that individuals continue to meet the applicable
standards for the position for which they
were favorably adjudicated." “'Continuous vetting' means reviewing the
background of a covered individual at any time to determine whether that individual
continues to meet applicable requirements."
The above includes the following definitions
from EO 13764, which amended 13488:
"(q) 'Vetting' is the process by which
covered individuals undergo investigation, evaluation, and adjudication of
whether they are, and remain over time, suitable or fit for Federal
employment, eligible to occupy a sensitive position, eligible for access to
classified information, eligible to serve as a nonappropriated fund employee
or a contractor, eligible to serve in the military, or authorized to be
issued a Federal credential. Vetting includes all steps in the end-to-end
process, including determining need (appropriate position designation),
validating need (existence of a current investigation or adjudication), collecting
background information via standard forms, investigative activity,
adjudication, providing administrative due process or other procedural
rights, and ongoing assessments to ensure that individuals continue to meet
the applicable standards for the position for which they were favorably
"(f) 'Continuous vetting' means
reviewing the background of a covered individual at any time to determine
whether that individual continues to meet applicable requirements."
DoD is now conducting Continuous Evaluation
(CE) checks on select populations.
This includes both Commercial (e.g., soft credit checks that do not
impact your credit score) and Government data sources. Subjects may receive notification from
commercial data vendors that the DoD has pulled this information. If such notification is received, this
action may be part of the CE checks.
Information/Incident Report (IR) Submissions in JPAS:
When submitting adverse information (i.e., an IR) in JPAS, please ensure each
submission addresses AT LEAST the 5Ws (Who, What, When, Where, and Why) when the information is unclassified.
For INDUSTRY: As required by
the National Industrial Security Program Operating Manual (NISPOM), section
1-302 a. Adverse Information: "Contractors shall report adverse
information coming to their attention concerning any of their cleared
employees. Reports based on rumor or
innuendo should not be made. The
subsequent termination of employment of an employee does not obviate the
requirement to submit this report."
Therefore, incident reports should be FACT based only and not based on
rumor or innuendo.
Additionally, if a submission is marked as "Initial" or
"Follow-up," the SMO will need to submit a "Final" IR to
allow the DoD Consolidated Adjudication Facility (CAF) to adjudicate the
incident. Per DSS guidance, Industry
will need to submit all IRs as "Final."
Users are strictly prohibited from looking up their own record (i.e. through
PSM Net), or subjects of whom they have no need-to-know or authority.
account and/or login credential sharing of any kind is prohibited.
encrypt all email traffic containing
Personally Identifiable Information (PII) to the Contact Center, do NOT mark the message as “Private,”
as this will not protect the data and will prevent the Contact Center from
reading the email.
JPAS Account Management Policy Guide and General FAQ as DMDC is continuously
auditing accounts. Any account
user/certificate holder that is violating JPAS Account Policies or DoD
regulations will permanently lose their account.
by Step document that will give you instructions on how to update a subject’s
PII in JPAS or keep it from being overwritten. See the new JPAS Data Correction Checklist.
DMDC is serving those
who serve our country!
ACCOUNTS OR CERTIFICATES IS NOT ALLOWED
reminder, it is against DOD Regulations to share PKI certificates or allow an
individual to access another's JPAS account in any manner. In addition, JPAS accounts that are not
accessed frequently (45 days or less), or accounts of users that do not meet
the account requirements will be deleted per DOD Regulations. If an account
is required in the future, a new account will have to be established. If an account was just created and is no
longer there, the account may need to be recreated. Please see the JPAS New Account Procedures
in the Access Request section or the JPAS Account Manager Policy in the
General Information section for additional guidance.
U.S. Department of Defense is committed to making its electronic and
information technologies accessible to individuals with disabilities in
accordance with Section 508
of the Rehabilitation Act (29 U.S.C. § 794d), as amended in 1998. For
persons with disabilities experiencing difficulties accessing content on a
particular website, please email the DoD Section 508 mailbox: DoDSection508@osd.mil. In your
message, please indicate the nature of your accessibility problem, the
website address of the requested content, and your contact information so we
can address your issue. For more
information about Section 508, please visit the DoD Section 508 website.