Serving Those who Serve our Country
 
 
PSA Home |  CE  |  Customer Service  |  DCII  |  DISS  |  JPAS  |  SWFT 
 
 
Access Request
- JPAS Account
- PSSAR Form
 
 
Data Quality
- DQI 597 Slides
- DQI 597 Write-Up
- DQI 68982
 
 
FAQ
- JPAS DCS FAQs
- JPAS Data Correction Checklist
- JPAS General FAQs
- JPAS PKI FAQs
- PKI Technical Guide
 
 
General Information
- Account Manager Policy
- Contact Center Encryption
- Scan/Upload Documentation
- Signature Pages (Scan/Upload)
- Tips for e-QIP Submissions
 
 
Points of Contact
- Contact Customer Service
- DoD Approved PKI Providers
 
 
Updates and Archives
-  Archived Announcments
- Newsletter
 
 

Current JPAS Status: GREEN

Key:

GREEN   : JPAS is fully functional and is not experiencing any issues.

YELLOW: JPAS is experiencing functionality issues as a partial or reports outage.

RED        : JPAS is down and users will not have access to the application.

 

Last Updated: 09 September 2019

 

Upcoming Outage Information (All times are in ET):

·          JPAS 5.8.4.0 Release – 5 Oct 2019

 

ATTENTION! JPAS 5.8.4.0 Release: The JPAS 5.8.4.0 release (scheduled for deployment on 5 Oct 2019) includes validation of user-entered data.  With this change, users will notice a few differences for certain scenarios.

 

·         Data entered in text fields (non-date, non-numeric fields) that contain special characters (any character that is not on your keyboard) will now cause a validation error. The user will receive a standard JPAS Message box/dialog when this occurs. After clicking on the OK button of the Message box, the user returned to the screen and given a chance to reenter the data.  The text field will be blank and text must be re-entered.  Previously, JPAS just stripped off the erroneous characters without notifying the user that the data was changed.

 

·         Data entered in text fields (non-date, non-numeric fields) that contain more than 4,000 characters will now receive a validation error. The text will be removed, just like in the above scenario.

 

 

ATTENTION! APPEALS ACTIONS: Please ensure that ALL appeals actions are recorded in DISS and JPAS.

 

ATTENTION! DISS & JPAS Users: DISS Users are required to maintain access to JPAS.  For additional information, please see the DISS Fielding Plan.

 

REMINDER!  JPAS URL Change:  EFFECTIVE IMMEDIATELY, login to JPAS using ONLY the "JPAS Login" button located to the left or at https://jpaspki.dmdc.osd.mil/JPAS/JPASDisclosure


REMINDER! Eligibility Determinations:

The Customer Contact Center (CCC) has seen an increased call volume concerning eligibility determination descriptions.  As a reminder, please note that a full list of eligibility determinations is available at the following link: https://www.dss.mil/ma/tw/dvd/vroc/eligibility/

Correction of Questionable PID Dates & Eligibility

As JPAS continues to transition to DISS and in an ongoing effort to enhance data quality, JPAS will perform a Data Quality Initiative (DQI) to correct misaligned Birth or Death Dates as compared to Eligibility Dates in the system. If one of your subjects is impacted by this DQI, you will receive a notification in the system requesting the subject’s record be corrected within 30 days. Upon receipt of a notification on this matter, please work with the appropriate personnel center or CAF to perform the necessary updates.

ATTENTION!
Industry Tier 5 Reinvestigations (T5R)
Effective December 7, 2017, the Defense Security Service (DSS) has requested for Industry to submit all Tier 5 Reinvestigations (T5R) whose investigation close date is six years or older. However, “caveat T5Rs” should continue to be submitted at the five year mark (only those cases requiring expedition).

PSSAR Form Submissions:
Users requesting access to JPAS should only fill out and submit the PSSAR version (DD Form 2962, NOV 2015) found at
http://www.esd.whs.mil/Portals/54/Documents/DD/forms/dd/dd2962.pdf

Please ensure you are using the correct PSSAR version for the system(s) of which you are requesting access.  Incorrect form submissions will be denied.  The DISS PSSAR is currently not allowed for JPAS.


REMINDER!  Inserting or Using Test/Fake SSN’s or Records is Strictly Prohibited:

DMDC regularly audits JPAS to ensure the system meets standards of accuracy as required by the DoD Privacy Program, DoD 5400.11-R.  DMDC and JPAS Account Management policies prohibit users from entering or using false or inaccurate information including, entering test, fake or “dummy” personal information into the DoD personnel security system of records.  Please do not enter test or fake SSN’s/records into the system for any purpose.

USD(I) Memorandum: Personnel Security Clearances in Industry
On December 7, 2016 the Undersecretary of Defense for Intelligence signed a memorandum reminding DoD Components that personnel security clearances do not expire. Individuals with current eligibility in JPAS should not be denied access based on an out-of-scope investigation. When the system of record shows current adverse information, but eligibility is still valid, access may continue. The memorandum is provided
here for your ease of reference.

ATTENTION!  CONTINUOUS EVALUATION ON DOD SUBJECTS:

Continuous Evaluation (CE) is defined in Executive Order (E.O.) 13488, as amended by E.O. 13764, "means a vetting process to review the background of an individual who has been determined to be eligible for access to classified information or to hold a sensitive position at any time during the period of eligibility. CE leverages a set of automated record checks and business rules to assist in the on-going assessment of an individual's continued eligibility. CE is intended to complement continuous vetting efforts."  "'Vetting' is the process by which covered individuals undergo investigation, evaluation, and adjudication of whether they are, and remain over time, suitable or fit for Federal employment, eligible to occupy a sensitive position, eligible for access to classified information, eligible to serve as a nonappropriated fund employee or a contractor, eligible to serve in the military, or authorized to be issued a Federal credential. Vetting includes all steps in the end-to-end process, including determining need (appropriate position designation), validating need (existence of a current investigation or adjudication), collecting background information via standard forms, investigative activity, adjudication, providing administrative due process or other procedural rights, and ongoing assessments to ensure that individuals continue to meet the applicable

standards for the position for which they were favorably adjudicated." “'Continuous vetting' means reviewing the background of a covered individual at any time to determine whether that individual continues to meet applicable requirements." 

 

The above includes the following definitions from EO 13764, which amended 13488:

 

"(q) 'Vetting' is the process by which covered individuals undergo investigation, evaluation, and adjudication of whether they are, and remain over time, suitable or fit for Federal employment, eligible to occupy a sensitive position, eligible for access to classified information, eligible to serve as a nonappropriated fund employee or a contractor, eligible to serve in the military, or authorized to be issued a Federal credential. Vetting includes all steps in the end-to-end process, including determining need (appropriate position designation), validating need (existence of a current investigation or adjudication), collecting background information via standard forms, investigative activity, adjudication, providing administrative due process or other procedural rights, and ongoing assessments to ensure that individuals continue to meet the applicable standards for the position for which they were favorably adjudicated."

 

"(f) 'Continuous vetting' means reviewing the background of a covered individual at any time to determine whether that individual continues to meet applicable requirements."

 

DoD is now conducting Continuous Evaluation (CE) checks on select populations.  This includes both Commercial (e.g., soft credit checks that do not impact your credit score) and Government data sources.  Subjects may receive notification from commercial data vendors that the DoD has pulled this information.  If such notification is received, this action may be part of the CE checks.

REMINDER!  Adverse Information/Incident Report (IR) Submissions in JPAS:
When submitting adverse information (i.e., an IR) in JPAS, please ensure each submission addresses AT LEAST the 5Ws (Who, What, When, Where, and Why)  when the information is unclassified.

For INDUSTRY:  As required by the National Industrial Security Program Operating Manual (NISPOM), section 1-302 a. Adverse Information: "Contractors shall report adverse information coming to their attention concerning any of their cleared employees.  Reports based on rumor or innuendo should not be made.  The subsequent termination of employment of an employee does not obviate the requirement to submit this report."  Therefore, incident reports should be FACT based only and not based on rumor or innuendo.

Additionally, if a submission is marked as "Initial" or "Follow-up," the SMO will need to submit a "Final" IR to allow the DoD Consolidated Adjudication Facility (CAF) to adjudicate the incident.  Per DSS guidance, Industry will need to submit all IRs as "Final."

Additional Reminders:

·         JPAS Users are strictly prohibited from looking up their own record (i.e. through PSM Net), or subjects of whom they have no need-to-know or authority.

·         JPAS account and/or login credential sharing of any kind is prohibited.

·         Please encrypt all email traffic containing Personally Identifiable Information (PII) to the Contact Center, do NOT mark the message as “Private,” as this will not protect the data and will prevent the Contact Center from reading the email.

·         Review JPAS Account Management Policy Guide and General FAQ as DMDC is continuously auditing accounts.  Any account user/certificate holder that is violating JPAS Account Policies or DoD regulations will permanently lose their account.

 

·         Step by Step document that will give you instructions on how to update a subject’s PII in JPAS or keep it from being overwritten.  See the new JPAS Data Correction Checklist.

 

 

DMDC is serving those who serve our country!

 

SHARING OF ACCOUNTS OR CERTIFICATES IS NOT ALLOWED

As a reminder, it is against DOD Regulations to share PKI certificates or allow an individual to access another's JPAS account in any manner.  In addition, JPAS accounts that are not accessed frequently (45 days or less), or accounts of users that do not meet the account requirements will be deleted per DOD Regulations. If an account is required in the future, a new account will have to be established.  If an account was just created and is no longer there, the account may need to be recreated.  Please see the JPAS New Account Procedures in the Access Request section or the JPAS Account Manager Policy in the General Information section for additional guidance.

 

ACCESSIBILITY/SECTION 508

The U.S. Department of Defense is committed to making its electronic and information technologies accessible to individuals with disabilities in accordance with Section 508 of the Rehabilitation Act (29 U.S.C. § 794d), as amended in 1998. For persons with disabilities experiencing difficulties accessing content on a particular website, please email the DoD Section 508 mailbox: DoDSection508@osd.mil. In your message, please indicate the nature of your accessibility problem, the website address of the requested content, and your contact information so we can address your issue.  For more information about Section 508, please visit the DoD Section 508 website.

 

FOR OFFICIAL USE ONLY (FOUO)

In accordance with DOD Regulations and the Privacy Act of 1974, you must safeguard personnel information retrieved through this system.  DOD Regulations are: 5 USC 301 - Departmental Regulations, DoD 5200.1-R - The Information Security Program, Title 5, United States Code, Section 552a Public Law 93-579 (Privacy Act of 1974), DOD Directive 5400.07 - The Freedom of Information Act (FOIA) Program, DODD 5400.11-R - DOD Privacy Program, and DTM-04-009 Security Classification Marking Instructions.

 

PRIVACY ACT STATEMENT
AUTHORITY: DoD 5200.2-R, Department of Defense Personnel Security Program Regulation; E.O. 12829, National Industrial Security Program; the JPAS Account Management Policy; and E.O. 9397, as amended.
PRINCIPAL PURPOSE(S): To
provide a common, comprehensive medium to record, document, and identify personnel security actions within the Department including submitting adverse information, verification of security clearance status, requesting investigations, and supporting Continuous Evaluation activities.  

ROUTINE USE(S): The blanket routine uses found at http://dpcld.defense.gov/Privacy/SORNsIndex/Blanket-Routine-Uses/ may apply.

 

OMB CONTROL NUMBER: 0704-0496
OMB EXPIRATION DATE: 07/31/2021
AGENCY DISCLOSURE NOTICE
The public reporting burden for this collection of information is estimated to average 20 minutes per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. You may send comments regarding this burden estimate or any other aspect of this collection. Address is provided in SoRN. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number.

 

 

 

 

 

 

 

 
Contact Help Desk | Privacy & Security Notice - Please read before accessing any information | This is a U.S. Government Computer System Notice