Current JPAS Status: GREEN
GREEN : JPAS is fully functional and is not experiencing any
YELLOW: JPAS is experiencing functionality issues as
a partial or reports outage.
RED : JPAS is down and users will not have access to the application.
Last Updated: 17 July 2019
ATTENTION! 188.8.131.52 Release: With the JPAS
184.108.40.206 release on Saturday, 6 Apr, some users are experiencing issues when
using Internet Explorer (IE) as the browser to access JPAS. If a user receives errors within the JPAS
application, please follow these steps:
In IE, select Tools, Internet Options
On the General tab, select Delete under Browsing History. Make sure (at a
minimum) the Temporary Internet files and website files, Cookies and website
data is checked and then select the Delete button. Select the Apply button on
the General tab.
Staying on the General tab, select the Settings button (next to the Delete
button you selected above).On the Temporary Internet Files tab, select the
radio button for Every time I visit the webpage. Then select OK. Select the
Apply button on the General tab.
Close your browser.
Open a new browser and try JPAS again.
ATTENTION! DISS & JPAS Users:
DISS Users are
required to maintain access to JPAS.
For additional information, please see the DISS Fielding Plan.
ATTENTION! JPAS Server Certificate Update:
current DoD certificates for DMDC hosted applications are expiring April 1,
2019 and are being replaced with commercial (Entrust) certificates which
should be trusted by most devices without installing additional Certificate
Authorities. This should allow users
that did not (or could not because of computer security settings) load DoD
Root Certificate Authorities on their computer in the past to now no longer
receive the SSL warning about the certificate not being trusted.
certificates will be replaced by COB Friday, March 29. There should be no impact to end users.
ATTENTION! Missing Person Category:
As part of the annual data reconciliation
for the Congressional Reports, JPAS recently processed full interface files
received from the four Services and DCPDCS.
Because of the PID Hierarchy, which controls how records are updated
in JPAS, some of the data got 'stepped on' in JPAS. Essentially, these are cases where persons
having worked for one service and then later moved onto another service to
work in the same capacity/category, now reflect only the category separation
date for the former service. Instead,
JPAS should reflect the active category under the latter service. The subjects
impacted by this should notify their Personnel Center and have them
resend/reflow JPAS their data to be processed per usual in the next interface
run. Additionally, the JPAS Team has been actively reaching out to the
Personnel Centers to ask that they push in mass to JPAS via the normal interface
to resolve the issue.
REMINDER! JPAS URL
EFFECTIVE IMMEDIATELY, login to
JPAS using ONLY the "JPAS Login" button located
to the left or at https://jpaspki.dmdc.osd.mil/JPAS/JPASDisclosure. Do
NOT or the old "jpasapp" URL as it
will no longer be available. Please ensure to update any bookmarked links
REMINDER! Eligibility Determinations:
The Customer Contact Center (CCC) has seen
an increased call volume concerning eligibility determination
descriptions. As a reminder, please
note that a full list of eligibility determinations is available at the
ATTENTION! UPDATE ON INDUSTRY DISS JVS AUTO-PROVISIONING:
· DMDC is auto-provisioning one
Hierarchy Manager in the Security Management Office (SMO) within DISS with
the Account Manager and Security Officer role.
· The provisioned Hierarchy Manager will
be responsible for provisioning additional user roles to meet SMO mission, to
include adding additional Account Managers who are a parent and subordinate
· Many users have been auto-provisioned;
if so, were sent an e-mail to the e-mail address recorded in JPAS. If
you did NOT receive an e-mail with instructions for obtaining your username
and you are currently:
An Account Manager in JPAS **AND** 2)
on the Key Management Personnel (KMP) list for your SMO
Please do the following:
1. Update (or add if not one listed) your e-mail address in JPAS, then
2. Send an e-mail to firstname.lastname@example.org
with Subject: DISS JVS Industry Provisioning Request.
will verify you are on our list - so please do not send an e-mail if you do
not meet the criteria listed above.
you are an Account Manager in JPAS but not on the KMP please continue to
check your e-mail for guidance. Please do not submit PSSARs
directly to the DMDC CCC this will only delay getting you provisioned.
We will contact you. Please continue to monitor this site/application
Correction of Questionable PID Dates & Eligibility
As JPAS continues to transition to DISS and
in an ongoing effort to enhance data quality, JPAS will perform a Data
Quality Initiative (DQI) to correct misaligned Birth or Death Dates as
compared to Eligibility Dates in the system. If one of your subjects is
impacted by this DQI, you will receive a notification in the system requesting
the subject’s record be corrected within 30 days. Upon receipt of a
notification on this matter, please work with the appropriate personnel
center or CAF to perform the necessary updates.
ATTENTION! Industry Tier 5 Reinvestigations (T5R)
Effective December 7, 2017, the Defense Security Service (DSS) has
requested for Industry to submit all Tier 5 Reinvestigations (T5R) whose
investigation close date is six years or older. However, “caveat T5Rs” should
continue to be submitted at the five year mark (only those cases requiring
PSSAR Form Submissions
Users requesting access to JPAS, SWFT, and
DCII should only fill out and submit the PSSAR version (DD Form 2962, NOV
2015) found at http://www.esd.whs.mil/Portals/54/Documents/DD/forms/dd/dd2962.pdf
Please ensure you are using the correct PSSAR version for the system(s) of
which you are requesting access.
Incorrect form submissions will be denied. The DISS PSSAR is currently not
allowed for JPAS, SWFT, or DCII.
or Using Test/Fake SSN’s or Records is Strictly Prohibited:
DMDC regularly audits JPAS to ensure the
system meets standards of accuracy as required by the DoD Privacy Program, DoD
5400.11-R. DMDC and JPAS Account
Management policies prohibit users from entering or using false or inaccurate
information including, entering test, fake or “dummy” personal information
into the DoD personnel security system of records. Please do not enter test or fake
SSN’s/records into the system for any purpose.
USD(I) Memorandum: Personnel Security
Clearances in Industry
On December 7, 2016 the Undersecretary of Defense for Intelligence signed
a memorandum reminding DoD Components that personnel security clearances do
not expire. Individuals with current eligibility in JPAS should not be denied
access based on an out-of-scope investigation. When the system of record
shows current adverse information, but eligibility is still valid, access may
continue. The memorandum is provided here for your ease of reference.
EVALUATION ON DOD SUBJECTS:
Continuous Evaluation (CE) is defined in
Executive Order (E.O.) 13488, as amended by E.O. 13764, "means a vetting
process to review the background of an individual who has been determined to
be eligible for access to classified information or to hold a sensitive
position at any time during the period of eligibility. CE leverages a set of
automated record checks and business rules to assist in the on-going
assessment of an individual's continued eligibility. CE is intended to complement
continuous vetting efforts."
"'Vetting' is the process by which covered individuals undergo
investigation, evaluation, and adjudication of whether they are, and remain
over time, suitable or fit for Federal employment, eligible to occupy a
sensitive position, eligible for access to classified information, eligible
to serve as a nonappropriated fund employee or a
contractor, eligible to serve in the military, or authorized to be issued a
Federal credential. Vetting includes all steps in the end-to-end process,
including determining need (appropriate position designation), validating
need (existence of a current investigation or adjudication), collecting
background information via standard forms, investigative activity,
adjudication, providing administrative due process or other procedural
rights, and ongoing assessments to ensure that individuals continue to meet
standards for the position for which they were favorably adjudicated."
“'Continuous vetting' means reviewing the background of a covered individual
at any time to determine whether that individual continues to meet applicable
The above includes the following definitions
from EO 13764, which amended 13488:
"(q) 'Vetting' is the process by which
covered individuals undergo investigation, evaluation, and adjudication of
whether they are, and remain over time, suitable or fit for Federal
employment, eligible to occupy a sensitive position, eligible for access to
classified information, eligible to serve as a nonappropriated
fund employee or a contractor, eligible to serve in the military, or
authorized to be issued a Federal credential. Vetting includes all steps in
the end-to-end process, including determining need (appropriate position
designation), validating need (existence of a current investigation or
adjudication), collecting background information via standard forms,
investigative activity, adjudication, providing administrative due process or
other procedural rights, and ongoing assessments to ensure that individuals
continue to meet the applicable standards for the position for which they
were favorably adjudicated."
"(f) 'Continuous vetting' means
reviewing the background of a covered individual at any time to determine
whether that individual continues to meet applicable requirements."
DoD is now conducting Continuous Evaluation
(CE) checks on select populations.
This includes both Commercial (e.g., soft credit checks that do not
impact your credit score) and Government data sources. Subjects may receive notification from
commercial data vendors that the DoD has pulled this information. If such notification is received, this
action may be part of the CE checks.
Information/Incident Report (IR) Submissions in JPAS:
When submitting adverse information (i.e., an IR) in JPAS, please ensure each
submission addresses AT LEAST the 5Ws (Who, What, When, Where, and Why) when the information is unclassified.
For INDUSTRY: As required by
the National Industrial Security Program Operating Manual (NISPOM), section
1-302 a. Adverse Information: "Contractors shall report adverse
information coming to their attention concerning any of their cleared
employees. Reports based on rumor or
innuendo should not be made. The
subsequent termination of employment of an employee does not obviate the
requirement to submit this report."
Therefore, incident reports should be FACT based only and not based on
rumor or innuendo.
Additionally, if a submission is marked as "Initial" or
"Follow-up," the SMO will need to submit a "Final" IR to
allow the DoD Consolidated Adjudication Facility (CAF) to adjudicate the
incident. Per DSS guidance, Industry
will need to submit all IRs as "Final."
Users are strictly prohibited from looking up their own record (i.e. through
PSM Net), or subjects of whom they have no need-to-know or authority.
account and/or login credential sharing of any kind is prohibited.
encrypt all email traffic containing
Personally Identifiable Information (PII) to the Contact Center, do NOT mark the message as
“Private,” as this will not protect the data and will prevent the Contact
Center from reading the email.
JPAS Account Management Policy Guide and General FAQ as DMDC is continuously
auditing accounts. Any account
user/certificate holder that is violating JPAS Account Policies or DoD regulations will permanently lose their account.
by Step document that will give you instructions on how to update a subject’s
PII in JPAS or keep it from being overwritten. See the new JPAS Data Correction Checklist.
Outage Information (All times are in ET):
DMDC is serving those
who serve our country!
ACCOUNTS OR CERTIFICATES IS NOT ALLOWED
reminder, it is against DOD Regulations to share PKI certificates or allow an
individual to access another's JPAS account in any manner. In addition, JPAS accounts that are not
accessed frequently (45 days or less), or accounts of users that do not meet
the account requirements will be deleted per DOD Regulations. If an account
is required in the future, a new account will have to be established. If an account was just created and is no
longer there, the account may need to be recreated. Please see the JPAS New Account Procedures
in the Access Request section or the JPAS Account Manager Policy in the
General Information section for additional guidance.
U.S. Department of Defense is committed to making its electronic and
information technologies accessible to individuals with disabilities in
accordance with Section 508
of the Rehabilitation Act (29 U.S.C. § 794d), as amended in 1998. For
persons with disabilities experiencing difficulties accessing content on a
particular website, please email the DoD Section 508 mailbox: DoDSection508@osd.mil. In your
message, please indicate the nature of your accessibility problem, the
website address of the requested content, and your contact information so we
can address your issue. For more
information about Section 508, please visit the DoD Section 508 website.
FOR OFFICIAL USE ONLY (FOUO)
accordance with DOD Regulations and the Privacy Act of 1974, you must
safeguard personnel information retrieved through this system. DOD Regulations are: 5 USC 301 -
Departmental Regulations, DoD 5200.1-R - The Information Security Program,
Title 5, United States Code, Section 552a Public Law 93-579 (Privacy Act of
1974), DOD Directive 5400.07 - The Freedom of Information Act (FOIA) Program,
DODD 5400.11-R - DOD Privacy Program, and DTM-04-009 Security Classification
PRIVACY ACT STATEMENT
AUTHORITY: DoD 5200.2-R,
Department of Defense Personnel Security Program Regulation; E.O. 12829,
National Industrial Security Program; the JPAS Account Management Policy; and
E.O. 9397, as amended.
PRINCIPAL PURPOSE(S): To provide a
common, comprehensive medium to record, document, and identify personnel
security actions within the Department including submitting adverse
information, verification of security clearance status, requesting
investigations, and supporting Continuous Evaluation activities.
ROUTINE USE(S): The blanket routine uses found at http://dpcld.defense.gov/Privacy/SORNsIndex/Blanket-Routine-Uses/ may apply.