Home
        Bid 2 - State of West Virginia
         Contents
1.                                                       3  2 e Mio cc E 3  05 31 2013 MorphoTrust USA Confidential Page 2 of 3    EXEMPT INFORMATION    IT Firewall Policy PRC 00088 B 05    1 Ov    erview     The IT network  servers  and computers are the backbone of our corporate business  These must  be protected  The MorphoTrust USA firewall must be controlled and managed to ensure this  protection     2Polic y     Firewalls shall be put in place where ever there is access to the internet  Remote access  using approved IT software and methods may be granted to allow employees access to  critical systems within the MorphoTrust USA network     Hemote access to critical systems  if allowed  requires a two factor authorization method  such as password and biometric  finger or voice print  and or a token or digital certificate     Internal firewalls shall be used to protect critical data from internal intrusions     The firewall must be configured for state full packet filtering with all ports closed until  rules and filters have been applied     Firewall rules and Packet Filtering logging must be enabled to log all attempts associated  with rules and filters     Both internal and external firewalls shall include Intrusion Detection Systems to both  evaluate suspected intrusions and signal alarms     Attempted intrusion alarms automatically alert IT management who are responsible for  evaluating the attempt and escalating the alarm through the standard procedures   including notif
2.                                            4  7  Senes                        4  8  PAOD CTI A T                                                   5  05 01 2012 Confidential 2 of 8    EXEMPT INFORMATION    IT Security Policy PRC 001 12 A 03    1  Purpose    MorphoTrust USA is committed to providing a secure work environment that protects the  sensitive information that has been entrusted with us by our customers and enables our  employees the ability to carry out the mission of the company     2  Scope    The Corporate Security Policy is designed to manage the security risks that may be present in the  environment of MorphoTrust USA  The Corporate Security Policy serves as the overall security  program and references other MorphoTrust USA policies relating to security in various aspects of  MorphoTrust USA  The program is designed to assure identification of general and high security  risks in the area of IT  personnel  building access and the security of confidential information and  materials  The program is designed to minimize the risk of secure information or materials related  to MorphoTrust USA operations and to develop effective response procedures should a security  breach occur    This program is applicable to all facilities within MorphoTrust USA  Any IT equipment owned or  leased and operated by MorphoTrust USA are subject to this policy     3  Overview    Assessment  communication and training relating to the MorphoTrust USA Security Policies  including assessing
3.                        3   3 1 WV OPIS TION ct                                        3   3 2                                   Q                      O                   3  4 UPDATING VIRUS DEFINITIONS                                                                                                                                                                            4  5 MONITORING  Pee                                            4  8 22 2011 MorphoTrust USA Confidential Page 2 of 4    EXEMPT INFORMATION    IT Virus Protection PRC 00093 B 01    1Ov  erview         he principle concern of this computer virus protection policy is effective and efficient  prevention of network virus outbreaks and network security attacks involving computers  associated with MorphoTrust USA     2Polic              files downloaded to the MorphoTrust USA network potentially harbor computer viruses   Trojan horses  worms or other destructive programs and  therefore  all downloaded files must  be scanned for such viruses  Virus detection programs and practices shall be implemented  throughout the MorphoTrust USA environment    e Training must take place to ensure that all computer users know and understand safe  computing practices       IT administration will be held responsible for ensuring current software is on the network to  prevent the introduction or propagation of computer viruses    e Any activity with the intention to create and or distribute malicious software by means of the  Morpho
4.                  147  2  Out of State Applicants                                             152  3  Expedited Fingerprinting Service                      esee 153  4  Custom Engineering                        ates                             153  5  Agency Owned Livescan 5         153  6  Photo Capture  Production and Delivery of Identification Badges           153  Appendix G   Bid Bond                                                             eren nene 155  S SAFRAN Table of Contents    MorphoTrust USA    Executive Summary    No Risk Evolution of our Proven West  Virginia Solution to our Next Generation  Enrollment Software Platform    MorphoTrust currently serves the citizens  and agencies of West Virginia and we have  met your call to action     oignificant investment in our AFIS interface   customized User Agency workflow  and  program infrastructure allow us to  understand and meet your needs now and  in the future     We will expand and upgrade the current  network to incorporate innovative new  features of our Universal Enrollment  Platform  UEP      The West Virginia Department of  Administration  Purchasing Division seeks an  experienced vendor to serve the residents of  West Virginia by providing statewide electronic  Livescan fingerprinting services for state and  private agencies in conjunction with licensing   volunteering  employment responsibilities  or  any other required non criminal justice  fingerprinting purposes currently being  processed by or throug
5.                 3  2 PASSWORDS                            apti ducc oem M I PIE D MM        3   2 1                       P hc                          3  3   DUAL ACCESS  amp  BIOMETRIC ACCESS                                               3  4     WORKSTATION AND APPLICATION TIMEOUTS                                                      4                  ENCRYPTION                MEE iM cU MM MEME DERE I EMEND EE 4  67 ACCESS REVIEW c                                                            4  T    NETWORK  amp  SYSTEM ACCESS iari isnt              eden enn UK nananman 4  9  DISPOSAL OF                                                                  5  05 31 2013 MorphoTrust USA Confidential Page 2 of 5    EXEMPT INFORMATION    IT Information Security PRC 00089 B 06    1 Ov    erview    This policy provides the security measures to be used for all password protected  systems  applications and devices    The CIO is responsible for implementing password rules  Variances from this policy must  be approved by the CIO in writing    The CIO is responsible for maintaining the appropriate approval change documentation   This policy does not grant user rights    System rights are granted by the system administrator  Those system rights granted  beyond public rights are determined by employee activation  human resources    department  functional rights  and line management  user rights      words    Passwords are confidential information  Password security is enabled when user  pas
6.                13  4 6 1 MorphoTrust Facilities sicsisviisressiasevorsesnavessinissesssiobesseaioneteessasenievsaieiacsaunseatse 13  4 8 2 Customer Environments        2 ccccccccceccccecccecccececccccucaesenscseaeuensnsceeaenensceeecaenens 14  4 8 3 Third Party                                                      14  4 9   COMMUNICATION POLICY               ceseesen eee emen ennemi remet re rere serere serpere serere reser sereni 14  4 10 NETWORK MANAGEMENT POLIOCY                eese ene e enne nem eere remesese sese sisi sessi rese sarei ia 14  4 10 1 Network                                                                  14  4 10 2 Vulnerability                                         15  4 10 3 Penetration and Intrusion                                                          15  4 10 4 Networking                                                           16  4 10 5 Wireless               8                                                                                                                                               16  4 10 6  Publicly Accessible             5                            16  4 11 OPERATIONAL MANAGEMENT POLICY           cccsceccececccceccccececccecaccecueaecucaeceeaeeucacsecscauaeceuaecass 17  4 11 1 Segregation of Security                                                            17  4 11 2 Separation of Development  Test and Production Environments                17  4 11 3 Protection against Malicious                                      
7.            Fee Collection    Yes    and  Hemittance    Cardscan for Yes  non resident    applicants    Manual Yes    fingerprinting    Yes    Signature  capture    User agency No  Interfaces    Hesults  Management D  issemination       In total  our network currently services over 4 5 million customers annually at  over 1 200 digital Enrollment Centers across the United States     4 3 1        Vendor must have at least 3  three  successful statewide Applicant fingerprinting    networks of similar size and scope  equipment installation training projects are not  considered of similar scope  and provide references of such projects     We have provided successful statewide applicant fingerprint networks for the  states of Texas  Tennessee  and Massachusetts  Contact information  size and  scope of networks and other required information are noted in the following  Table 3 through Table 5     4 3 2 References must include projects where services such as call center  employment of live    scan operators  centralized data center  and fee collection were provided including   e Company name  address and telephone number     Contact person name  title  business address  phone number and email address      Annual fingerprint volume     Brief description of the services provided       List the agency or agencies using the network     Description of the technical solution including systems and applications installed     List of fingerprinting centers including the hours of availability  
8.         32   4 19 3 Enforcement and Violation Handling                                       32   5                          CINE 33  e ACRONYMS E                                             33  10 9 2013 MorphoTrust USA Confidential and Proprietary Page 3 of 37    EXEMPT INFORMATION    Cyber Security Plan PLN 00091 A 02    7 CONTACT INFORMATION                                                                                                                                                                                                   34  8 REVISION HISTORY              35  10 9 2013 MorphoTrust USA Confidential and Proprietary Page 4 of 37    EXEMPT INFORMATION    Cyber Security Plan PLN 00091 A 02    1 INTRODUCTION    MorphoTrust USA  Inc    MorphoTrust   operates under a Proxy Agreement and a National  Security Agreement  NSA  with the U S  Department of Defense  DoD  Defense Security Service   DSS  and U S  Government Agencies  USGA   respectively  As part of these agreements   MorphoTrust is required to generate  maintain  and operate under an Electronic Communications  Plan  ECP  and a Cyber Security Plan  CSP   This document is the CSP     MorphoTrust operates a highly connected network environment that is used by both company  information systems and customer production systems  Furthermore  the network can transmit  and store two types of sensitive data     1  Company confidential data  which includes company trade secrets  financial information   legal information 
9.         978 215 2400   Contact Phone Fax Number     April 24  2015   Date     Revised 6 8 2012    ADDENDUM ACKNOWLEDGEMENT FORM  SOLICITATION NO   CREP DPS1500000010    Instructions  Please acknowledge receipt of all addenda issued with this solicitation by completing this  addendum acknowledgment form  Check the box next to each addendum received and sign below   Failure to acknowledge addenda may result in bid disqualification     Acknowledgment  I hereby acknowledge receipt of the following addenda and have made the  necessary revisions to my proposal  plans and or specification  etc     Addendum Numbers Received    Check the box next to each addendum received      X  Addendum No  1     Addendum No  6   X  Addendum No  2    1 Addendum No  7      Addendum No 3     Addendum No  8      Addendum No 4     Addendum No 9    1 Addendum       5   1 Addendum No  10    1 understand that failure to confirm the receipt of addenda may be cause for rejection of this bid  I  further understand that that any verbal representation made or assumed to be made during any oral  discussion held between Vendor s representatives and any state personnel is not binding  Only the  information issued in writing and added to the specifications by an official addendum is binding     MorphoTrust USA  LLC                 May 8  2015    Date    NOTE  This addendum acknowledgement should be submitted with the bid to expedite document processing     Purchasing Divison State of West Virginia    2019 Washingto
10.         POL 00144 A 09    4  PII Data Examples    Personal Identifiable Information  PID is any information about an individual maintained by either a  customer and or MorphoTrust USA and includes     1 Any information that can be used to distinguish or trace an individual s identity such as                 Social Security Number    Date and Place of Birth     Mothers Maiden Name    Biometric records  2  Anyother information that is linked or linkable to an individual such as     Medical    Educational    Financial    Employment Information    PII can take the form of sample credentials  test data  and real data that relate to a real person  Devices  with potential content include employee laptops and personal mobile devices which may have been used  to access PII  Within the MorphoTrust USA organization  mast PII resides on the customers    networks     5  Data Security    In addition to the directions in this policy  the company takes additional extraordinary steps to protect our  client s citizen data with security features including     Background security and financial checks as a condition of employment    Security training upon hire and yearly refresher training    Two factor authentication such as password and fingerprint bio logon for more sensitive systems   shielding all systems behind firewalls  encryption and limiting access on a Need to Know basis   Network separation between the corporate network and the customer solutions network with  access control policies 
11.         RR EON ad 23  Ate  TECHNOLOGY SECURITY POLICY                         25  415  DATABASE SECURITY POLIG Y                                 25  4 16 SYSTEMS DEVELOPMENT AND MAINTENANCE                             26  4 16 1 Input Data Validation                                        26   4 16 2 Control of Internal            5    0                            26   4 16 8 Message Integrity and Protection                        csse 27   4 16 4 Service       Access                                                          27   4 16 5 Cryptographic                                                         27   4 16 6 Key                                                     28   4 16 7 Protection of Test System                                           28   4 16 8 System Setup and                                                29   4 16 9 Change Control                                                      29   AA     CUSTOMER SUPPORT POLICY        5 8  80                                              29  4 18   CUSTOMER ACCOMMODATION                                                               30  4 18 1 Acceptable Security Accommodations                      esses 30   4 18 2 Unacceptable Security Accommodations                             esses 31   4 18 8 Compliance Accommodations                   isses         31   4 19    COMPLIANCE                                                            32  CALME vcrc EET                32   4 192 COMPIACE                            ae
12.         to wit         My Commission expires           4      2021        AFFIX SEAL HERE NOTARY PUBLIC              avif  Revised 07 01 2012           YOUNG  AMY               Commission Expires  July 9  2021        Table of Contents                OL CODIGOS                              ix via aor HUN UE i  Executive SUMMaAY os ac as wre          ees 1  Vendor Response Sheet  Attachment                                                                5  Section 4  Subsection 4 3  Qualifications and                                                           5  Section 4  Subsection 4 4  Project and Goals                            esses 22  Mandatory Specification Checklist  Attachment B                                          87  Section 4  Subsection 4 5  Mandatory Requirements                                          97  Appendix A   MorphoTrust IT Security Policy and Personal Data Privacy                                                                 S 129  Appendix B     Preliminary Project Schedule                                                   131  Appendix C   Lists of Fingerprinting Centers in Referenced Programs    133  Appendix D   Letters of Reference                                     eeeeeeee eee 143  Appendix E   FBI                                                                                             145  Appendix F     Optional Features                                                  147  1  Universal Enrollment Platform  UEP  Enhancements Package 
13.       Telephone Number   MorphoTrust USA  LLC  296 Concord Road  Suite 300  Billerica  Massachusetts 01821  978 215 2400       FOR INFORMATION CONTACT THE BUYER    Tara Lyle   304  558 2544  tara l lyle Qwv gov    MK    signa wfe X Robert Eckel President and CEO FEIN   04 3320515     DATE April 24  2015    All        subject to all terms and conditions contained in this solicitation       Page  1 FORM ID   WV PRC CRFP 001    Purchasing Divison State of West Virginia    2019 Washington Street East  Post Office Box 50130 Request for Proposal              gt         Charleston  WV 25305 0130 31      Public Safety       Proc Folder  94136  Doc Description  Addendum No  2   Fingerprint CRFP for WV State Police    Proc Type  Central Master Agreement    Deteiiseued eb   2015 04 29   2015 05 13 CRFP 0612 DPS1500000010 3  13 30 00   SID RECEIVING LOCATION 5       BID CLERK   DEPARTMENT OF ADMINISTRATION   PURCHASING DIVISION   2019 WASHINGTON STE   CHARLESTON WV 29305  US            RE REX  Vendor Name  Address and Telephone Number     MorphoTrust USA  LLC   296 Concord Road  Suite 300  Billerica  Massachusetts 01821  978 215 2400       FOR INFORMATION CONTACT THE BUYER    Tara Lyle   304  558 2544  tara   lyle wv gov                Signature X Robert Eckel   FEIN   043320515 DATE May 8  2015    Ali offers subject to all terms and conditlons contalned In this solicitation    Page  1 FORM ID   WV PRC CRFP 001    RrQ No  CRFP 0612 DPS 1500000010    STATE OF WEST VIRGINIA  Purchasing Div
14.      096    Engineering Delivery  Field Services  Field Services  Field Services    PM  Deployment Mgr     Call Center    Call Center  Call Center    Finance Dept     Finance Dept     Sun 3 1 15  Wed 3 4 15  Thu 3 5 15  Fri 3 6 15    Thu 2 25 16  Thu 2 25 16    Thu 2 25 16  Thu 2 25 16    Fri 2 26 16  Fri 2 26 16  Thu 2 25 16  Thu 2 25 16    Thu 3 3 16    2015    g Engineering Deliv             Services      Field Services       2016          Deployment Mgr                Center          Center                 172 Modify Reporting Reconciliation for State if needed 096 Finance Dept  Thu 3 10 16  Procedure Acceptance   WVSP 096 WVSP Fri 3 25 16  174 PHASE 2 UEP WEBSITE  USER APPLICATION  AND RESULTS 0  Engineering Wed 10 21 15  DELIVERY DEVELOPMENT  175 UEP Website and User Application design and customer 096 PM Engineering WVSP Wed 10 21 15 PM Engineering  WVSP  review  Development as needed of UEP environment and website 096 Engineering Wed 10 28 15  177 WV Customer Review and Acceptance of UEP Website 0  PM WVSP Wed 3 2 16    and User Application solution                                              UEP Results Delivery design and customer review 096 PM Engineering WVSP Wed 10 21 15  Development as needed of UEP results delivery 096 Engineering Wed 10 28 15  180 WV Customer Review and Acceptance of UEP Results 096 PM WVSP Wed 3 2 16  Delivery solution  181 Launch of UEP Public Website 096 Engineering Fri 4 1 16    Engineering  182 PHASE 2 UEP GO LIVE Completed 096 Fri 4 1 1
15.      4  Data Handling and Transfer    The following rules govern the handling and transfer of sensitive information     Sensitive information must not be transferred by any method to persons who are not authorized  to access that information  Users must ensure that adequate security measures are in place at  each destination when sensitive data is transferred from one location to another    Sensitive data must be protected from unintended access by unauthorized users  Users must  guard against unauthorized viewing of such information which is displayed on the user s  computer screen  Users must not leave sensitive information unattended and accessible   Sensitive information must not be taken outside of the company unless the user is authorized to  do so  and only if encryption or other approved security precautions have been applied to protect  that information     10 23 2014 MorphoTrust USA Confidential 6    EXEMPT INFORMATION    Sensitive Data Handling and Storage Procedures PRC 00148 A 05    Sensitive data should not be transmitted through electronic messaging even to other authorized  users unless security methods  such as encryption  are employed    Physical protection from theft  loss  or damage must be utilized for mobile devices that can be  easily moved such as a PDA  thumb drive  or laptop    If sensitive data needs to be transported or transferred using removable or portable media   contact the CSO or ISO to obtain approval  The data must remain encrypted at all t
16.      MorphoTrust meets the requirements     4 4 8 3 The Vendor should describe in detail the call escalation procedure with the name  title   area of responsibility and phone number for each level starting with the state program    manager up to the top official in the company          significant issues should be reported directly to the Program Manager for the    West Virginia Applicant Fingerprinting Services program  Denny Wear  Mr     Wear s contact information is     Denny Wear   Director   Program Management  Office phone   217  547 2116   Cell phone   615  946 7947    dwear morphotrust com      SAFRAN Mandatory Specification Checklist    MorphoTrust USA  Attachment B     117    otate of West Virginia  Department of Administration  Purchasing Division    CRFP DPS1500000010  Applicant Fingerprinting Services  West Virginia State Police    In the unlikely event that a problem must be escalated  it should be reported to    Mr  Wear s supervisor  Kent Schmitt  Mr  Schmitt s contact information is     Kent Schmitt    Program Executive    Office Phone   202  688 4826  Cell Phone   615  347 4627    kschmitt morphoTrust com    In the unlikely event that a problem must be escalated  it should be reported to    Mr  Schmitt   s supervisor  Charles Carroll  Mr  Carroll   s contact information is     Charles Carroll    Senior Vice President    Office Phone   615  778 5752  Cell Phone   937  604 6595                   2 morphoTrust com    4 5 9 Project Management    a  The successfu
17.      he physical security of the remote location including using a laptop at any location other  than an employee s work station       he accessing mechanism  given the sensitivity of MorphoTrust s internal systems and  method of transmitting information  and  e Appropriate business continuity procedures including backing up critical information     Encryption requirements are described in the policy       PRC 00233 A Data Encryption Policy    4 12 7 Remote Access Control    The MorphoTrust policy on remote network access by approved users is in       PRC 00092 B  T Remote Access Policy    4 12 8 Segregation of Networks    For the different logical networks  the MorphoTrust IT Department should only allow connections  to be made between them when there 15 legitimate business reason as identified by MorphoTrust    10 9 2013 MorphoTrust USA Confidential and Proprietary Page 21 of 37    EXEMPT INFORMATION    Cyber Security Plan PLN 00091 A 02    Management  IT can use any and all of its technologies for implementing access control  between the logical networks  including using firewall rules  IP port VLAN routing rules  identity   based access controls  and requiring special jump boxes as a high level access bridge between  two networks  such as accessing individual customer            in the CSN     No connections originating in the CSN should be allowed to terminate in the Admin or  Engineering Networks     The general policies for governing the segregation between networks ar
18.     18  10 9 2013 MorphoTrust USA Confidential and Proprietary Page 2 of 37    EXEMPT INFORMATION    Cyber Security Plan PLN 00091 A 02    4 11 4 Software                                                              18   4 11 5 Information Backup                    esses esses sena nna nnns 18   4 12  ACCESS CONTROL PO                           se eue                   M      19  4 12 1 User Registration and                                                      19   4 12 2 Privileged Accounts Management                       esses 19   4 12 8 User Password                                                                  20   4 12 4 Service Account Management                    isses essen nares 20   4 12 5 Security Group                                                           20   4 12 6   Network Access Control                    esses sessanta 21   4 12 7 Remote Access Control                   essei             21   4 12 8 Segregation of Networks                  eise eise enne nhan nana arn nna 21   4 12 9 Operating System Access                                            22   4 12 10 Application Access Security Policy                              esses 23   4 12 11   Cloud                                                                                                                   23   4 12 12 Application Monitoring Systems                                 23   Z9  INFORMATION SECURITY POLICY                                       UR aU T HON                          
19.     How was the Incident Detected  User  Sysadmin  Help Desk  Communications  etc      Who detected the incident  Name    oignature    Time the incident was detected   Locations of affected system s      Date   Time Incident Handlers Arrived     Any comments   observations made by the person who detected the incident     Describe affected information system s    One System Per Page     05 01 2012 Confidential 6 of 8  EXEMPT INFORMATION    IT Security Policy PRC 001 12 A 03    Hardware Manufacturer Is affected system connected to the network   Y N    Serial Number of CPU  Corporate Property Number System Name     5 Type and version System IP Address    Service Pack level MAC Address  Disk capacity  If Known                        Is affected system connected to    modem       If yes  what is the phone number  Y N       Describe physical security of location of affected information system  locks  alarm systems   building access etc       Additional Comments     05 01 2012 Confidential 7 of 8  EXEMPT INFORMATION    IT Security Policy PRC 001 12 A 03    05 01 2012 Confidential 8 of 8  EXEMPT INFORMATION    IT Remote Access Policy PRC 00092 B 09    IT REMOTE         55 PoLICY    Document Number  PRC 00092 B  Hevision Level  09    Approval       John May James Kottas  Chief Information Officer Information Security Officer    This document contains confidential and proprietary information of MorphoTrust USA  No part of this  document may be reproduced  disclosed  distributed  or use
20.     Letter of recommendation    In Table 3 through Table 5  MorphoTrust has provided the required contact  information for three of our fingerprinting programs that are comparable to West    Vendor Response Sheet     Attachment A   amp  SAFRAN    MorphoTrust USA    12    otate of West Virginia CRFP DPS1500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    Virginia Applicant Fingerprinting Services including call center  employment of  live scan operators  centralized data center  and fee collection     In Appendix C we have provided a list of the Enrollment Centers for each of  these programs and in Appendix D we have provided letters of reference     Table 3  Texas Department of Public Safety    Company Texas Department of Public Safety   Company Address and 5805 North Lamar Blvd  Building G   Telephone Number Austin  TX 78752 4431  512 424 2000    Contact Person Mike Lesko  Chief     Crime Records Service    5805 North Lamar Blvd  Building G  Austin  TX 78752 4431  512 424 2524    mike lesko txdps state texas us    Annual Fingerprint Volume 800 000    Description of Services    In early 2006  MorphoTrust was chosen by the Texas Department of Public Safety to establish a  statewide fingerprinting network  Fingerprint Applicant Service of Texas  FAST   with locations throughout  the state to provide fingerprinting services to both urban and rural areas of the state  MorphoTrust was  recently awarded a new 
21.     TEST NINE    TEST ONE    TEST SEVEN    TEST SIX    TEST TEN    Physical Location    01 17 1985    06 21 1977    01 01 1954    01 01 1954    06 22 1977    01 01 1954    06 20 1977    01 01 1954    06 05 1952    WV DEPT OF EDUCATION  STEP BY STEP  INC    STATE REFERENCE CHECK    EMPLOYER    STEP BY STEP  INC    LOGAN MINGO AREA MENTAL  HEALTH    STATE REFERENCE CHECK    EMPLOYER    LOGAN MINGO AREA MENTAL  HEALTH    LOGAN MINGO AREA MENTAL  HEALTH    STEP BY STEP  INC    Figure 20  Results of Applicant Status Search    11 03 2011  05 06 2014    05 06 2014    05 06 2014    05 06 2014    05 06 2014    05 06 2014    05 06 2014    05 06 2014       The TCP and Web Portal systems are located in the secure Data Center of the  WVSP so WVSP maintains access control  The only MorphoTrust users with    access to these systems are the authorized support personnel that have been    cleared and approved by WVSP        SAFRAN    MorphorTrust USA    Vendor Response Sheet   Attachment A     63    otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    64    Security and Controls    The software and systems are FBI CJIS Security policy compliant in their access  control  logging  and encryption policies  User access  password policies   physical access  and other controls are under direct control of WVSP personnel     While MorphoTrust s network boundary houses all servers  data  and equipm
22.     West Virginia       Purchasing Division    The following documentation is an electronically   submitted vendor response to an advertised  solicitation from the West Virginia Purchasing  Bulletin within the Vendor Self Service portal at  WVOASIS gov  As part of the State of West  Virginia s procurement process  and to maintain the  transparency of the bid opening process  this  documentation submitted online is publicly posted  by the West Virginia Purchasing Division      WVPurchasing gov with any other vendor  responses to this solicitation submitted to the  Purchasing Division in hard copy format        Jump to  PRCUID 2             Home P Personalize       Accessibilty       App Help    About    Procurement Budgeting Accounts Receivable Accounts Payable                           Contact Default Values   Discount Document Information  Procurement Folder  94136 50 Doc Code  CRFP  Procurement Type  Central Master Agreement 50 Dept  0612  Vendor ID  000000100868   SO Doc ID  DPS1500000010  Legal Name  MORPHOTRUST USA Published Date  4 29 15  Close Date  5 13 15  Close Time  13 30    Response Date  05 12 2015    Status  Closed    Response Time  12 13 Solicitation Description  Addendum No  2   Fingerprint CRFP  for WV State Police    Total of Header Attachments  0    Total of All Attachments  0       State of West Virginia  Solicitation Response    Proc Folder   94136  Solicitation Description   Addendum No  2   Fingerprint CRFP for WV State Police    Proc Type   Central Mas
23.    4 16 Systems Development and Maintenance Policy    software applications are developed or acquired to provide efficient solutions to both  MorphoTrust business problems and customer identity management opportunities  These  applications can store  manipulate  retrieve and display information used to conduct MorphoTrust  business or customers    business  Both MorphoTrust and its customers will become dependent on  these applications  and it is essential the data processed by these applications be accurate  It is  also critical that the software that performs these activities be protected from unauthorized access  or tampering     To ensure that security is built into all MorphoTrust information systems  all security  requirements  including any need for rollback arrangements  must be identified as much as  possible during the requirements phase of a project and justified  agreed to and documented as  part of the overall business case for both a MorphoTrust information system and one that is built  to a customer s specifications     Controls in systems and applications can be incorporated in many places and serve a variety of  purposes  The specific control mechanisms should be documented at the application level      possible  the security measures that are implemented should be based on the threat and risk  assessments of the information being processed and cost benefit analysis     4 16 1 Input Data Validation    An application s input data must be validated to ensure it
24.    Attachment A   amp  SAFRAN    MorphoTrust USA    otate of West Virginia CRFP_DPS1500000010    Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    Our workstation solution also provides automatic  real time sequence checking   Figure 29  that verifies that the same hand was not scanned twice and compares  the 10 rolled fingerprint images to the four finger slap and the flat thumb images   using minutiae matching to verify the images are captured and stored correctly   This helps prevent any further processing of inaccurate image data based on  finger numbering  such as omitting or inadvertently substituting a fingerprint                    Comment          Figure 29  UEP Workstation Fingerprint Error Detection    During the ten print capture workflow  each fingerprint is captured twice   once as a rolled print and once  as a flat print  The workstation automatically detects when the rolled fingerprint does not match the  corresponding flat fingerprint and directs the Enrollment Agent to correct the mistake     Livescan Systems    At the start of the contract  MorphoTrust will continue to utilize our  TouchPrint    5100  TP 5100  system for the West Virginia network  Please see  Appendix E for our FBI letter stating that the TP   5100 15 FBI Appendix    certified for type 14 prints at  1000 dpi     The TP 5100  Figure 30  provides the image clarity  needed to prevent artifacts and capture important  friction ridge
25.    Authorized personnel only should access sensitive information    All employees  including contractors and their agents  working in or having access to  manufacturing facilities must be U S  Citizens who are no dual citizens    Authorization for access to sensitive data comes from Corporate Management  and is typically  made in conjunction with an acknowledgement or authorization from the requestor s department  head  supervisor  or other official authority    Staff  employees and contractors  that need to be issued network credentials to customer  systems must obtain it through the Security Department of MorphoTrust USA  The Security  Department shall track those individuals and inform the customers to remove accounts upon  departure of staff from that program and from the need to have credentials  Staff must be  background checked by MorphoTrust and refreshed annually if they have access to customer PII   Where access to sensitive data has been authorized  use of such data shall be limited to the  purpose required to perform MorphoTrust USA business    Users will respect the confidentiality and privacy of individuals whose records they access   observe ethical restrictions that apply to the information they access  and abide by applicable  laws and policies with respect to accessing  using  or disclosing information    Notification of a user s termination or removal of authorized access to sensitive information must  be conveyed immediately to the MorphoTrust USA IT group
26.    CON RAPSHEET         AFIS PIMGCERPRIMT SEARCH ADAIHIETERED       THE CRIMIMAL RECORDS SECTION        FAILED       v                Saree 4 Got Nest                                          pee    Pont                    FEH j                          irs                   Ce F11          Figure 18  View AFIS Responses  State and FBI    Authorized users can make status changes as    62    needed     Reporting Capabilities   Authorized Review Client users can access data through the Administrative Web  Portal  This allows users to generate ad hoc reports containing data for their  applicants  as well as export the data to an Excel spreadsheet     Figure 19 and Figure 20 show an example screen of an applicant status search    and search results using the Review Client tool     Vendor Response Sheet    SAFRAN   Attachment A     MorphoTrust USA    otate of West Virginia  Department of Administration  Purchasing Division    CRFP DPS1500000010  Applicant Fingerprinting Services  West Virginia State Police    Status Search    Social Security Number    last 4 or Complete      to    mm dd yyyy    sem        1H    Any Agency           Name  C Date Recetved  date printed     Submit Query    Name     Transaction Number   Date Range   Transaction Status   Agency Selection   Sort Results by        Figure 19  Applicant Status Search using Administrative Web Portal    Export to Excel  Expanded Export to Excel    Back to Search Form    TEST APPLICANT    TEST EIGHT    TEST FIVE    TEST  FOUR
27.    Phonc   800 645 2402   Fax   309 689 2036 RLI Insurance Company  www rlicorp com  Know      Men by These Presents     That this Power of Attomey is not valid or in effect unless attached to the bond which it authorizes executed  but may be detached by the  approving officer if desired     That RLI Insurance Company  an Illinois corporation  does hereby make  constitute and appoint        Dough       101    several        in the City of Chicago   State of Illinois its true and lawful Agent and Attomey in Fact  with full  power and authority hereby conferred  to sign  execute  acknowledge and deliver for and on its behalf as Surety  the following described  bond     Any and all bonds provided the bond penalty does not exceed Twenty Five Million Dollars   25 000 000 00      The acknowledgment and execution of such bond by the said Attomey in Fact shall be as binding upon this Company as if such bond had been  executed and acknowledged by the regularly elected officers of this Company     The RLI Insurance Company further certifies that the following is a true and exact copy of the Resolution adopted by the Board of Directors  of RLI Insurance Company  and now in force to wit           bonds  policies  undertakings  Powers of Attorney or other obligations of the corporation shall be executed in the corporate name of  the Company by the President  Secretary  any Assistant Secretary  Treasurer  or any Vice President  or by such other officers as the Board  of Directors may autho
28.    e Access to compilers  editors and other system utilities should be removed from  production systems when not required    e Logon procedures and environmental identification should be sufficiently unique for all  environments    e Whenever possible with production systems  controls should be in place to issue short   term access to development staff to correct problems with production systems  allowing  access only as necessary     Depending on the complexity of the system  performing development  QA testing or UAT testing  could cause serious problems to an existing production environment if separation of these  environments does not exist  The degree of separation between the production and UAT  environments should be considered by the Responsible Manager to ensure adequate protection  of the production environment     To the extent that it is practical  separation should also be implemented between engineering  development and QA test functions so that engineering changes are not introduced into the QA  testing area in a way which bypasses the above controls or configuration management  In  addition  each Responsible Manager should consider the use of a stable UAT environment  where the customer can test the system without changes being made to the system     10 9 2013 MorphoTrust USA Confidential and Proprietary Page 17 of 37    EXEMPT INFORMATION    Cyber Security Plan PLN 00091 A 02    When creating a new system and before it has been put into production  it is accep
29.    independent reports issued by the National   FROST 6 SULLIVAN Institute of Standards and Technology  NIST      North American Government Biometrics Company    2013 s  ic of the Year Award    We are proud to have been recognized by a 2013  Frost and Sullivan  Company of the Year Award      Frost  amp  Sullivan is in its 50th year in business with  COMPANY OF THE YEAR AWARD         global research organization of 1 800 analysts and    consultants who monitor more than 300 industries       and 250 000 companies   Key benchmarking criteria for the award include      Leadership in Customer Value     Grown Implementation Excellence       Degree of Innovation with Products and Technologies    NorthFace    World Class    Customer Service    We are honored to be a four time recipient of a NorthFace ScoreBoard Award   SM  for delivering    World Class    Customer Service from the Omega  Management Group Corp  The NorthFace ScoreBoard  NFSB  award is presented  annually to companies who  as rated solely by their own customers  achieved  excellence in customer satisfaction and loyalty during the prior calendar year     Staff Qualifications and Experience    Figure 1 shows our organization chart for the West Virginia Applicant  Fingerprinting Services program  Key icons designate MorphoTrust personnel  who are we consider to be critical to the success of this program     The personnel assigned to our West Virginia project team represent one of the  most experienced teams available  Sev
30.    subsection  ii      U S  and foreign citizen personally identifiable information data  i e   any  information which can be used to distinguish or trace an individual s identity     10 9 2013 MorphoTrust USA Confidential and Proprietary Page 7 of 37    EXEMPT INFORMATION    Cyber Security Plan PLN 00091 A 02    including but not limited to their name  social security number  biometric records   etc   alone  or when combined with other personal or identifying information  which is linked or linkable to a specific individual  such as date and place of birth   mother   s maiden name  etc      Other definitions from the Federal government  1  are considered equally applicable     Sensitive Information     Can be either Confidential Information or PII data     4 2 2 Network Classifications    The following terminology is used when specifying security policies based on the network  management     Managed Network   A network that is controlled by MorphoTrust  In this case  MorphoTrust  personnel have control over the necessary firewalls  routers and switches  and any other relevant  networking equipment     Unmanaged Network     A network that is not controlled by MorphoTrust  These networks  usually are customer networks  Typically  the firewalls  routers and switches within a customer s  environment are controlled by the customer and not MorphoTrust     4 2 3 System Classifications    Internal System     A MorphoTrust computing system  examples  workstations  servers   periphera
31.   Company Address        601 S  12th Street   Telephone Number TSA 25  10th Floor  Arlington  Virginia 20598  866 289 9673    Contact Person Gloria Uria  TSA Contracting Officer  601 5  12th Street  TSA 25  10th Floor  Arlington  Virginia 20598  571 227 2429  Email  gloria uria tsa dhs gov    Annual Fingerprint MorphoTrust established and maintains a nationwide network of more than   Volume 330 Enrollment Centers that provide biometric  photo  and data capture and  channeling for more than 1 5 million TSA background check and security  threat assessments per year     Description of Services   MorphoTrust provides a pre registration website and Customer Service Call Center  capture of  fingerprints  demographic data  photo and required documents  onsite fingerprinting sessions  channeling  for company owned equipment  customer reporting  card scan  and program management to ensure that  individuals seeking access to critical segments of the nation s transportation system  infrastructure  or  sensitive materials do not pose a threat to national security    MorphoTrust delivered this highly visible program ahead of schedule  without incident  and to the high  praise of those involved  We transitioned or opened 152 new centers for the TWIC applicant group in 14  weeks  140 locations for the HTAP applicant group in 24 weeks  ongoing   and added TSA Pre      to  other Universal Enrollment Services sites    The TSA Prev   program has received several awards  including an ACT IAC Ign
32.   Field Service Engineer 5 min 1 hour  dials in to perform further  troubleshooting  Equipment is replaced Next day start   Reschedule appointment   affected  of business applicants contacted to reschedule    Server Immediate trouble ticket 5 15 minutes  Downtime issued and resources   released to address issue   as        Priority    Website Immediate trouble ticket 5 15 minutes  disruption of issued and resources  service released to address issue   as        Priority  Communication   Immediate trouble ticket 5 15 minutes  lines disruption   issued and resources  of service released to address issue   as        Priority    CRFP DPS1500000010  Applicant Fingerprinting Services  West Virginia State Police    Wait time or reschedule appointment    No disruption to enrollment customers      records queued on Livescan for  submission when lines are re   established    Applicants cannot pre register online   but Enrollment Centers are operational  on a walk in basis and the Customer  Service Center is available to provide  directions to Enrollment Centers and  answer questions    No disruption to customers     records  queued on Livescan for submission  when lines are re established       We have provided additional detail in our response to requirement 4 4 8 2     C  Call Escalation List    Provide a call escalation procedure with the name  title  area of responsibility and phone number  for each level starting with the state program manager up to the top official in the company
33.   HOUSTON 8876 GULF FREEWAY  SUITE 220 HOURS VARY   HOUSTON 2424 WILCREST  SUITE 104 HOURS VARY   Houston 3262 S Loop W Mon   Fri 9 00   6 00  Sat  9 00   3 00  Notary  Services Tue   Sat   Houston 13135 Champions Dr  Ste 104 Mon   Fri 9 00 4 30  Sat  10 3   Houston 10039 Bissonnet St  Ste 112 Mon   Fri 8 00   3 00  Sat  8 00   2 00   Humble 20200 Eastway Village Drive M   F 8 30 4 00   HURST 500 GRAPEVINE HWY  SUITE 401 HOURS VARY   Irving 8925 Sterling St  Ste 255 Mon   Fri 9 00   4 30   JUSTIN 2001 TEXAN DRIVE M   F 9 4   JUSTIN 2001 TEXAN DRIVE T  amp  THUR 8 30 11 30   Katy 3815 N Fry Road    560 M   F 9 30 4 40   Kerrville 1886 Cypress Creek Rd Thu  amp  Fri 9 00   6 00   Killeen 4402 E Central Texas Expy Mon   Fri 9 00 4 30  Sat  11 00 3 00   Kingsville 505 N U S Hwy 77 Wed 10 00   12 00  amp  1 00    6 30   Kingwood 4311 Kingwood Dr Mon   Fri 8 30   4 00  Sat    Lake Jackson    145 Oyster Creek Dr  Ste 7A    10 30   1 00  Mon   Sat 10 20   7 30    Laredo 802 E Saunders  Ste B Mon   Fri 8 30   4 30  LEAGUE CITY 2425 E MAIN STREET M   F 8 4 30  Lewisville 543 Bennett Lane  Suite 109 M  W  F 9 00 5 00  T  Th  10 00 7 00  Longview 414 E Loop 281  Ste 15 Mon   Fri 9 00   3 00  s List of          Centers   SAFRAN    MorphoTrust USA             DPS1500000010  Applicant Fingerprinting Services  West Virginia State Police    otate of West Virginia  Department of Administration  Purchasing Division    Texas City Address Hours of Operation  Longview 414 E Loop 281  Ste 15 Mon   
34.   Maryland Pennsylvania     MorphoTrust is the exclusive fingerprint vendor in these states     MorphoTrust is the civil applicant portal to the state     MorphoTrust Federal AFIS Server Interfaces    Federal Bureau of Investigation IAFIS     Transportation Security Administration  TSA   Financial Industry Regulatory Authority  FINRA   American Bankers Association  ABA        4 4 4 3 The Vendor should describe in detail  with examples  their personnel  physical and  technical security controls and policies in place that demonstrates their ability to protect  the Applicant information     MorphoTrust s Commitment to Protecting Logical Access Security Controls  Personally Identifiable Information  PII     As a U S  Proxy Corporation  MorphoTrust MorphoTrust enforces strict authentication    adheres to stringent National Security Agency polices for enrollment workstations and any   NSA  and Proxy requirements  other software application that accesses   all aspects of system security  including those   governing the security of user accounts  No user can access the enrollment    network  infrastructure  and data  These policies  are evaluated and approved by the U S   Government security oversight committees that  monitor our compliance  software requires a password change at initial    workstation software application without first  logging in via a username and password  The    login and after a reset  In addition to  requiring users to change their password  we employ other me
35.   SAFRAN Appendix F ve    MorphoTrust USA Optional Features    otate of West Virginia CRFP     51500000010    Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police       John Doe          888  555 1212 008  01 01 1944 COL    gt  110794   Texas Lottery Commission   Bingo  OPS             as of 4 27 2015 UE ID  UZTX 114VHR  Only     27205              ORI  TXBINGOST    150    4 27 2015    4 27 2015    4 27 2015    4 27 2015    4 27 2015    4 27 2015    3 23 2015    TCN  00111020403  Destination  Texas Department of Public Safety                    Workstation Version  231 0129    AppServer Version  02 31 00 117    Method  Card  1111   Auth Number  ET135857  Amount   9 95    Email Receipt to Send  Void Refund    tno cara  1119  Auth Number      135857  Amount   9 95    Agent  VESDEV kmcbride  Document 1  Driver s License issued by a State or outlying possession of the U S     Figure 49  UEP Administrative Portal     Enrollment History    User Agencies and the State will have access to the history of any relevant transaction  Every  stakeholder will know what services have been provided and what the system status is     Should any problem be identified  an administrative user can quickly create a  support ticket from any page  As shown in Figure 47  tickets may be assigned  various purposes  queues  priorities  and statuses for easy sorting  management   and ultimate resolution     With this tool  User Agencies and the Stat
36.   Split oom External Tasks e          Inactive Summary p V Manual Summary Q       UU Progress  Date  Mon 5 11 15 Milestone    External Milestone   Manual Task LJ Start only L  Summary OV inactive Task Duration only c Finish only J       Page 4    Livescan Hardware                                o    Reserve necessary LiveScan equipment and    Workstations in inventory                       gt    e  NIN           gt       w          Ww            Training     gt    e  QJ   W                              Plan    m        o                     138 Schedule Train The Trainer  Schedule training session 0   for the FSEs to provide the EA training  139 Provide Train The Trainer  Train the FSEs to provide the 096  EA training  Roll Out   Deployment 096  141 Site List 0   142 Current Site Preparation Plan and Schedule 0   143 Designated Sites  Ship Updated User Guidesto 096  Sites  144 Designated Sites  Ship Furniture and Fixtures if 090  needed for a specific site  145 Designated Sites  Ship Signage and Branding 096  Material  146 Designated Sites  Ship Consumables 096  147 Designated Sites  Ship Workstations 096  148 Designated Sites  Ship the LiveScans 096  Designated Sites  Equipment Received 096  Designated Sites  Installation of Workstation 096  151 Designated Sites  EA Training for Updated 096  Equipment  152 Current Site Deployment 096  153 New Site Preparation Plan and Schedule 096  154 Ship Training Material to Identified Sites 096  Ship Furniture and Fixtures 096  Ship Sign
37.   Va  Code 8 23 2c 2  failure to maintain mandatory workers     compensation coverage  or failure to fully meet its obligations as a workers  compensation self insured employer  An  employer is not in employer default if it has entered into a repayment agreement with the Insurance Commissioner  and remains in compliance with the obligations under the repayment agreement      Related party  means a party  whether an individual  corporation  partnership  association  limited liability company  or any other form or business association or other entity whatsoever  related to any vendor by blood  marriage   ownership or contract through which the party has a relationship of ownership or other interest with the vendor so that  the party will actually or by effect receive or control a portion of the benefit  profit or other consideration from  performance of a vendor contract with the party receiving an amount that meets or exceed five percent of the total  contract amount     AFFIRMATION  By signing this form  the vendor s authorized signer affirms and acknowledges under penalty of  law for false swearing  W  Va  Code   61 5 3  that neither vendor nor any related party owe a debt as defined  above and that neither vendor nor any related party are in employer default as defined above  unless the debt or  employer default is permitted under the exception above     WITNESS THE FOLLOWING SIGNATURE            Authorized Signature        Q ee          LLL Date     State of Massachusetts 
38.   as shown in the preceding  Figure 15  From the TCP central server  the NIST submissions are sent to the  WVSP AFIS for processing     State and FBI Result Collection   Returned State and FBI AFIS results are delivered to the TCP via email  The TCP  automatically retrieves the results  opens the responses  and attaches the results  to the corresponding applicant record  Based upon the response  the TCP  performs the following steps     1  Updates the record status                            amp  SAFRAN Vendor Response Sheet           MorphoTrust USA  Attachment           otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    2  Based upon the transaction type submitted  auto generates email  notification to the authorized entity or the individual when no record is    found     Results Notification and Access    MorphoTrust s Review Client application  the front end user interface for the  TCP  includes the following functionality to ensure efficient processing of  applicants for West Virginia employing and licensing agencies     e Automated Adjudication Decisions   On average  80  of adjudication  decisions are made without human intervention  These decisions are  made based upon the criminal history responses received and the pre   specified adjudication criteria  typically  no indication of a criminal  record   The result is shorter turnaround times for responses to  emp
39.   ccce 3  2 2 EVENTS ARE LOGGED TO SERVER SYSTEM LOGS AS THEY                                                    3  2 3 REPORTING ISSUES INCIDENTS        scsccccccccecssssseceeeeeecessseneeeeeeeeecsseeaseeeeeeecesseeeaeeeeteeseeeesns 4  2 4                        zm TT 4  2 5 SOFTWARE SOLUTIONS vesescecnsdenssedeuescencsnadusadan endewsrdosteedaesnneuervadnenlenendeasilesweneinsscgudedancesionses 4  3 DOCUMENTA                                                                4  3 1                          4  3 2 DATADA                                       4  3 9 TOOLS AND APPLICATIONS                     Quir oot dine fas                    4  4 Lil cm                                            U 5  8 22 2011 MorphoTrust USA Confidential          2 of 5    EXEMPT INFORMATION    IT Managing Operations Policy PRC 00090 B 01    1Ov                This document covers areas addressed by IT Operations  job monitoring  issue logging  incident  notification  backup monitoring  and media handling     e The Network Administrator monitors exceptions with jobs and system exception notices  for Linux and Windows servers         headministrator also monitors the backup storage manager for backup process  exceptions and tape mounts     Table 1 IT center locations    MorphoTrust USA HQ Billerica  MA       2 1 Monitoring of event logs  amp  server health    2 Policies    e Server operating systems  Linux and Windows  log events to their system logs which         collected for administrator r
40.   technologies  802 11x wireless network security features on the equipment must be available and  implemented from the beginning of the deployment  All wireless networks must be secured by  the MorphoTrust IT Department     Access to systems that hold sensitive information or the transmission of sensitive information via  a wireless network is not permitted unless appropriate and adequate measures have been  implemented and approved by the CSO and CIO  Such measures must include authentication   authorization  strong encryption  access controls and logging     4 10 6 Publicly Accessible Websites    Because anything posted on a public web server is globally available and each web presence is a  potential connection path to the MorphoTrust network  care must be exercised in the deployment  of publicly accessible servers  There is also potential for an insecure server to be used or  exploited to assist in an unauthorized or illegal activity  such as an attack on internal MorphoTrust  systems or other web sites     10 9 2013 MorphoTrust USA Confidential and Proprietary Page 16 of 37    EXEMPT INFORMATION    Cyber Security Plan PLN 00091 A 02    Sensitive information must not be made available through a server that is available to a public   network without appropriate safeguards approved by the CSO and CIO  The ISO and designated  IT staff will ensure that user authentication  data confidentiality and integrity  access control  data  protection  logging and monitoring mechanisms
41.  2 25 16  Thu 2 25 16  Thu 2 25 16    Thu 2 25 16  Thu 2 25 16    Thu 2 25 16  Thu 2 25 16  Thu 2 25 16  Tue 3 1 16  Wed 3 2 16  Thu 3 3 16    Thu 2 25 16  Thu 2 25 16  Sun 3 1 15  Sun 3 1 15  Sun 3 1 15  Sun 3 1 15  Sun 3 1 15                  hd                     4                            g Training   g Business Services  g Business Services  g Business Services  s Engineering Delive    Inactive Milestone    Inactive Summary    Manual Task    Duration only    Page 5    P   v    Y y                          5              Start only    Finish only       L  J                                               n         Services  Jig Services         Business Services  Business Services    Business Services  Engineering Delivery  Engineering Delivery    ield Services    Rund  Deployment Mgr        Manual Summary Rollup s Deadline             Ship the LiveScans  Equipment Received 096  Installation of Workstation 096     gt    e                          162      Training Transitioning for internal certificatior 096  process  Monitor Performance and Service Quality 096  164 New Site Deployment  Detailed Schedule 096  provided in body of Bid Response  Call Center 096  166 Provide info and access to UEP for Call Center to 096  support  167 Provide training to Call Center for UEP interface 096  168 Integrate UEP into call system 096  169 Finance 0   170 Collect  amp  Identify Requirements for payment 096  process state FBI fees  Modify Process for Payment to State if needed  0     
42.  22 and Figure 23   which  will remain operational on contract award       Samples of the reports available with the upgrade to UEP  Figure 24  through Figure 28     The screen captures were sanitized to remove applicant data     West Virginia Program Statistics Report  January February March April            Jul August September October November December    Livescan 2000 2000 2000 3000 300 4000 4000 4000 3000 3000 2000  Cardscan   100 1000 1000 1000 100 1000 100 1000 1000 1000 1000  Transactions processed   72 hours   2500 2500 3000 3000 4000 4000 4000 3000 3000 2500    of Apps processed   72 hours       83  755 7596        80      80  B0  75  75  8356     Approval Time  hours  15  Fingerprinting to Letter  days         3  Fingerprinting to Letter  hours      72  AFIS Submit to Letter  hours  25  Letter P rinting  hours        30  ON Time  hours  27    January February March April        June      August September October November December    2000              e                            5 5         8      85 5       8    Figure 23  Monthly Annual Detail Report  Current Solution     Enrollment Center Activ Services       CWP Total 4 726 1 340 6 066    DCFS Total 33 162 11 370 44 532  DHH Total 155 798 59 614 215 412  WLF Total 113 423 35 196 148 619       Figure 24  Annual Report of Enrollment Center Activity by Service  UEP Solution     200 VendorResponseShet          cAEDAN        Attachment A     SAFRAN    MorphoTrust USA    otate of West Virginia CRFP_DPS1500000010    D
43.  Agents  more than 30 of whom are currently vetted and trained on  the program   3 6 Customer Service Representatives  three of whom are    Vendor Response Sheet      SAFRAN     27     Attachment     MorphoTrust USA    otate of West Virginia  Department of Administration  Purchasing Division    CRFP DPS1500000010  Applicant Fingerprinting Services  West Virginia State Police    currently on staff   and additional support personnel who are mostly on our staff    today     Descriptions of Past Projects    In Table 3 through Table 8  MorphoTrust has provided detailed descriptions of  six past projects we have successfully completed  including the location  project  manager name and contact information  type of project  and an overview of  MorphoTrust s approach to meeting the project goals and objectives     In addition  Table 2 provides a snapshot view of the six fingerprint networks we  currently provide in Texas  Tennessee  Massachusetts  New York  Michigan  and  for      TSA Universal Enrollment Services program  in comparison to the West  Virginia network  Our success with these projects demonstrates that we will  accomplish the goals of the West Virginia program  We encourage the evaluation  team for the State of West Virginia to speak with them to learn about our  successes and challenges in rolling out a hosted fingerprinting solution     Table 2  Examples of MorphoTrust Programs Similar to West Virginia    Attribute West  Virginia                    Network    New York 
44.  Berkeley Springs   ae Springs  WV 25411  Brandywine              WV 26802    Clarksburg  Ll WV 26330    Elkins Ultra Care Tuesday   Thursday  Home Health Agency LLC 10 00 am   12 00 pm  598 Harrison Ave 1 00 pm   5 00 pm  Elkins  WV 26241    Fairmont Marion County Senior Citizens Every other Monday  105 Maplewood Drive 10 00 am   1 00 pm  Fairmont  WV 26554 2 00 pm   4 00 pm         SAFRAN Vendor Response Sheet ae      MorphorTrust USA  Attachment A     otate of West Virginia  Department of Administration  Purchasing Division    West Virginia City Town    Hamlin    Huntington    Keyser    Kingwood    Marlinton    Martinsburg    Morgantown    New Cumberland    New Martinsville    Parkersburg    Point Pleasant    Location Address    Lincoln County  Opportunity Company  360 Main Street  Hamlin  WV 25523    Denning Industrial Park  4510 Terrace Ave  Huntington  WV 25705    MorphoTrust USA   196 North Tornado Way  Potomac Plaza   Suite 11   Keyser  WV 26726    Preston County   Senior Citizens  Inc   108 Senior Center Drive  Kingwood  WV 26537    Quality Drug Testing  4130 Hanging Rock Highway  Stollings  WV 25646    TBD  Marlinton  WV 24954    Martinsburg Shopping Plaza  615 Winchester Ave  Martinsburg  WV 25401    Pace Enterprise of WV Inc   889 Mylan Park Lane  Morgantown  WV 26501    Hancock County Senior Services  647 Gas Valley Road  New Cumberland  WV 26047    Wetzel County Committee on Aging  145 Paducah Drive  New Martinsville  WV 26155    SW Resources Inc   1024 7th Stre
45.  CSN or communicates with SIMS     3  Transmitting user or service authentication information  credentials  in clear text  i e    unencrypted  over unsecured networks  including the Internet     Under no circumstances can PII data be transmitted in clear text over any unsecured networks   including the Internet     4 18 3 Compliance Accommodations    If any new compliance issues are identified  they should be reported to the CSO and ISO and  then addressed as soon as possible  However  if an issue cannot be remedied because of  customer limitations  the Operations Manager should get a written release from the customer  explicitly allowing the lesser security in their environment   See Section 4 18 1 for more  information   A copy of the release should be forwarded to the CSO and ISO  The MorphoTrust  Legal Department can help with drafting the release     10 9 2013 MorphoTrust USA Confidential and Proprietary Page 31 of 37    EXEMPT INFORMATION    Cyber Security Plan PLN 00091 A 02    4 19 Compliance Policy    4 19 1 Monitoring    MorphoTrust reserves the right to monitor  inspect  and or search at any time all information  processing systems  Since MorphoTrust information technology equipment and networks are  provided for business purposes  MorphoTrust personnel should have no expectation of privacy in  the information stored in or sent through these information systems  MorphoTrust Management  additionally retains the right to remove from its information systems any unauth
46.  Justice Information Services Division    U S  Department of Justice       Federal Bureau of Investigation    Clarksburg  WV 26306    March 23  2010    Mr  Dan Maase   L 1 Identity Solutions  Inc   Biometrics Division   5705 West Old Shakopee Road  Suite 100   Bloomington  MN 55437 3107    Dear Mr  Maase     The Federal Bureau of Investigation  FBI  Criminal Justice Information Services  CJIS   Division has completed a review of the following test data     L 1 Identity TouchPrint 5300  TP 5300  tenprint palm and Identification Flats  Solutions  Inc  livescan device at 500 and 1000 ppi  without membrane       This review was conducted by representatives of the FBI and the MITRE Corporation s  image processing laboratory located in Bedford  Massachusetts  Based on the results of this review  the  FBI certifies that the equipment described above is in compliance with the following FBI CJIS Division s  Integrated Automated Fingerprint Identification System Image Quality Specifications  IQS      Appendix F Specifications    Please note  the certification process does not endorse one product over any other  product and only demonstrates that the product meets FBI standards  Continued acceptance of the images  created by an installed system  for retention in the FBI Master Fingerprint files  is contingent on the ability  of the product to meet the IQS over time  As equipment can degrade  the FBI recommends that your  company assist customers in the establishment of quality assurance
47.  Program  Manager Project    Facilities and Partners    WV Stakeholders  Business Services    Engineering Delivery  Engineering Delivery    Call Center  Training  Finance Dept   Field Services    Operations Agencies  PM WVSP   WVSP PM   PM    PM    WVSP PM    MorphoTrust  MorphoTrust    Project Summary  External Tasks  External Milestone    Inactive Task    Sun 3 1 15  Fri 4 3 15   Fri 4 3 15  Wed 5 13 15  Thu 5 14 15  Thu 5 28 15  Thu 6 11 15  Thu 6 25 15  Thu 6 25 15    Thu 6 25 15    Thu 6 25 15  Thu 7 2 15  Thu 7 9 15  Wed 7 1 15    Wed 7 1 15    Fri 7 31 15    Thu 6 25 15  Thu 6 25 15    Thu 6 25 15  Fri 6 26 15                  hd          Inactive Milestone    Inactive Summary  Manual Task    Duration only    Page 1                  5 13    MorphorTrust  NVSP    a VSP MorphoTrust    fi M Engineering       All Departments    i  Operations  Agencies  ug  PM WVSP   8 WVSP PM            e 7 31    orphoTrust  orphoTrust       Manual Summary Rollup s Deadline            V Manual Summary    LE Start only L       Finish only J                          WVSP Approval of all Locations and Hours Of Operation 0  WVSP PM Tue 6 30 15             L     ME       33 Secure Partner business   Agreement  amp  Vetting for New 0  Facilities and Partners Tue 7 7 15 Facilities and Partners  EB Sites i  Resource Allocations 096 Thu 6 25 15  Facilities 096 Tue 7 7 15   36 Determine Facility Status  Needs  and Requirements 0  Facilities and Partners Tue 7 7 15 Facilities and Partners  pe for add
48.  SAFRAN EXEMPT INFORMATION  MorphorTrust USA    otate of West Virginia CRFP DPS1500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    MorphoTrust IT Security Policy and Personal Data Privacy Policy  MorphoTrust has provided the following policies        MorphoTrust Privacy Policy POL 00144 A   Describes our policies for  safeguarding the private information of our customer s citizens  Personal  Data Privacy Policy         MorphoTrust USA Cyber Security Plan PLN 00091 A 02   Describes our  policies for ensuring the security and protection of the sensitive data and  the information systems that transmit or store the data from cyber attacks   IT Security Policy      In addition  we have provided the following relevant policies        Information Security Customer Data Access and Security Policy PRC   00174 A 07       IT Backup Recovery        00084    03      IT Change Management Procedure PRC 00085 B 05      IT Computer and System Use Procedures PRC 00110 A 10     IT Computers on Network PRC 00086 B 01       T Disaster Recovery PRC 00095 B 02      IT Electronic Communication Policy PRC 00113 A 02   e IT Firewall Policy PRC 00088 B 05   e IT Information Security PRC 00089 B 06   e IT Managing Operations PRC 00090 B 01   e IT Network Access Controls Procedures PRC 00091 B 02   e IT Physical IT Access Controls PRC 00091 B 01   e IT Remote Access PRC 00092 B 09      IT Security Policy PRC 00112 A 03      IT Sens
49.  State Regschon   Process State Reject as FBI Reject    8 27 2009 1214 19       8 27 2008 1214 19         State Reject   FBI Reject      State Card Sent State Name Search FBI Card Sent FBI Name Search           Figure 42  Administrative Queue Review     Reviewing Applicant Information    Results Status Screen    The Results Status Screen  Figure 43  presents the query responses for review  and allows for efficient processing of all transactions ready for adjudication  It  also provides control buttons and function keys to re send an individual query  or the full set of queries  for optional data sources beyond the state and FBI  AFIS      Response indicators are displayed at the bottom of the screen to indicate that  responses have been received and special highlighted indications when  responses indicate that they are not automatically determined by the system to  be    No Hit     The operator can examine the response text to make the proper  adjudication decision  The operator can also print all responses for a transaction  by clicking the Print Responses key or button     108 on Checklist   SAFRAN   Attachment B  MorphoTrust USA    otate of West Virginia CRFP DPS1500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police       I   1Mdess   Administrative Queue Review Client    Applicant Review Screen   TEST  TEST  ES 219i xj  UR Mon Setup Windows         ij x   Applicant Informabon   Notes   Documents Results S
50.  This feature provides improved identity document authentication as compared  to the current process     We have provided additional information on document authentication can be  found in Section 4 4 6 1  with the B5000 reader shown in Figure 33    Biographic Data Review    When applicants arrive at the Enrollment Center for their fingerprint  appointment  any information provided during pre enrollment is pre loaded  onto the workstation  However  MorphoTrust employs a double check system to  ensure that applicants are providing truthful and accurate information  If any  data provided on the document does not match the information given  the  software requires the Enrollment Agent to resolve the conflict     Payment    As described in our response to 4 4 2 6  MorphoTrust will accept certified check   money order  or credit card as a form of payment     Release of Record Authorization Process    The Release of Record Authorization Process is accomplished by presenting a  waiver on the workstation and collecting the applicant s signature  shown in  Figure 12  using a Topaz signature pad       SAFRAN Vendor Response Sheet            MorphoTrust USA  Attachment A     otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    44    John S  Smith          Figure 12  Signature Capture    Collection of Digital Fingerprints    Our workstation software is a workflow driven application t
51.  Virginia     Furthermore  we propose a no risk upgrade our advanced technology Universal  Enrollment Platform  UEP  during the first year of the contract  Our response  details how UEP meets all mandatory requirements of the RFP while offering  many benefits for West Virginia agencies and applicants     4 5 1 Customer Service Center    The Vendor must provide a customer service center to serve as a single point of contact for all  Applicant needs  The service center must have the following capabilities     a  Call Center    Vendor must provide a toll free phone number for Applicants and or agencies to schedule   change or cancel appointments  provide demographic data  pay fees  request information and  track their transaction  The call center must be physically present within the continental United  States and be available from 9am to 5pm local time  Monday through Friday  The Vendor must  provide live operators to assist Applicants with appointment scheduling and other program  questions as needed     The Vendor must provide contact information for its current call center so that the State can verify  its existence and test its performance     The Vendor must provide statistics on the number of calls accepted by its call center annually     MorphoTrust meets the requirements     We operate a centralized  scalable Customer Service Center  CSC   which  currently serves the State of West Virginia and other statewide networks  The  CSC accepts over two million calls per year  i
52.  WVSP or        and the mailing  date for paper versions of the cards     Other available functions include resending fingerprint transactions to the WVSP  AFIS  reprinting results letter for a transaction  and printing applicant  information     Mandatory Specification Checklist    4  AFRAN  J       Attachment B     MorphoTrust USA    107    otate of West Virginia CRFP     51500000010                Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police     INkless Administrative Queue Review Client    Applicant Review Screen   TEST TEST  E               fh Msn Setup Windows        la      Applicant Infomation   Notes   Documents   Results Status   Applicant Selection       Nome Sex Race SSN            By                                   v   ware  gt    234234234 am _ Resend this tansaction to AFIS    Date of Bath     Place of Birth of Citizenship      Coke Eye Coke          Weight    19750311 fin US  BROWN     BROWN      507 140          Address Phone Number E Address    6406 LITTLE FLOCK RO 123 123 1234                EMalAdden     zl    SPENCER          47460  TwANSIES2GYAHOO COM    I d    N       Change to New Agency Recreate the Applicant Agency Response    Current            TEST AGENCY  ocs LCPA Foster Famdy Home   Persons With Access    Transacton Number State        Curent       TCR Previous FBI TCR   1969000219 100001 2506      Onginal Transaction Date Current Transaction Date Last Sent to AFIS Date Repeocess
53.  after award     MorphoTrust meets the requirements     Our Project Manager will deliver the required project and staffing plans to the  State within 45 days of award  The initial version of the project plan will be  refined in consultation with the State and all work tasks and deliverables will be  in place and fully operational within 90 days after award     d  The Vendor s Project Manager will be required to plan for and conduct status meetings on a  periodic and as needed basis to discuss current project activities and address questions  issues   and concerns  A written status report for high level executives will be required  The status report  submission frequency is required to be included in the communication plan  This status report is  required to include  at a minimum  a health indicator for budget  scope and schedule along with  reporting period accomplishments  issues and upcoming action items     MorphoTrust meets the requirements     Our Project Manager will conduct regular and as needed status meetings with  representatives of the State as a forum to discuss project activities and to address  any questions  issues or concerns about the program  As an element of these  meetings  he will prepare a written report that will address all applicable topics   including a health indicator for budget  scope and schedule  accomplishments   issues and action items as well as any additional features required by the State   The communication plan will include the frequency 
54.  and Human Resource  HR  records     2  Customer information  which often includes personally identifiable information  PII   which  is very valuable to identity thieves     lt is critical for the success of MorphoTrust as a company and as a proxy organization to protect  both types of sensitive data and make them secure throughout all MorphoTrust transactions  The  goal of this CSP is to provide the policy framework for MorphoTrust which will ensure the security  and protection of the sensitive data and the information systems that transmit or store the data  from cyber attacks     MorphoTrust has identified a set of possible threats from its main security vulnerability policy      SPC 00264 A Security Vulnerability Identification and Analysis    Common cyber threats include       Unauthorized access of confidential information or      data by MorphoTrust personnel   leading to theft of data  In this case  the attacker is likely to be at least somewhat  knowledgeable about the systems they are trying to infiltrate       Unauthorized access of confidential information or PII data by non MorphoTrust  personnel  In this case  the attacker is attempting to infiltrate MorphoTrust systems by  circumventing the security controls  processes  and procedures that MorphoTrust has in  place to prevent such infiltration  However  in the case of a breach  the policies  presented in this CSP can provide additional security to help mitigate this risk       Unauthorized access which is desig
55.  and equitable treatment of those agencies choosing to  purchase their own Livescan equipment  It includes a pass through of the State s  Standard Terms and Conditions as well as contract specific requirements  applicable to obtaining and submitting Livescan fingerprints for background  searches     6  Photo Capture Production and Delivery of Identification Badges    Many agencies need to produce a badge or identification card once an applicant  has been fully vetted  By adding photo capture services at the time of enrollment   MorphoTrust can deliver such a badge  We provide this service for school  districts in Florida and for Concealed Weapons Permits in South Carolina               SAFRAN Appendix F A    MorphoTrust USA Optional Features    otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    This page intentionally left blank     154 Appendix F    SAFRAN    Optional Features MorphoTrust USA    Appendix      Bid Bond  Copy     MorphoTrust has submitted our Bid Bond document with raised seal directly to  Tara Lyle  Buyer Supervisor  West Virginia Purchasing Division  as advised by  Ms  Lyle by telephone on May 5  2015     The following pages contain a copy of the Bid Bond        SAFRAN Appendix G 155                               USA                    otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasin
56.  and surge protectors  are used on the systems at all times  For systems that are transported  Enrollment  Agents use a specially manufactured heavy duty Pelican case  which provides a  protected environment for both the scanner and accompanying laptop computer     MorphoTrust is qualified to provide all maintenance for our Enrollment  Workstations without subcontracting with the manufacturer  therefore if the  Enrollment Agent encounters a problem they are unable to troubleshoot  our  Technical Help Desk is contacted  This Technical Help Desk employs trained   experienced technicians that provide technical support for Enrollment Agents in  the field as well as support for state agencies for issues such as web based  scheduling support  server issues  fingerprint transmissions  etc  We provide the  same high level of maintenance in support of each of our existing statewide  networks  A toll free phone number is provided for customer operational  support     In addition to the Technical Help Desk staff  MorphoTrust employs a team of  certified Field Service Engineers  FSEs  to support and maintain our equipment   The FSEs have the ability to access each system with secure remote access to  perform an array of diagnostic tests  Based on the remote diagnostic results  the  FSE will walk the Enrollment Agent through the steps required to correct the  error     If a service visit is required  an FSE will be dispatched to the location to field   service the device  FSEs carry spare
57.  are   Financial  R amp D  Human Resources  Manufacturing  Facilities  Security   Program Management  Sales  Marketing  Supply Chain  Federal Systems   Tier 3 Admins  and Information Technology     Functional Areas  of MorphoTrust  USA Data       Responsibilities    Area Responsibility        1 5                                 The President   Executive Vice  President    Responsible for sponsoring compliance to policy  Delegating access to non    public data to those eligible  see Data Custodians table      Responsible for Information Security policy  Security incidents are reported  to the CSO  Definition of training curriculum for data custodians  trustee and  users    Responsible for maintaining the performance of MorphoTrust USA  information technology computing resource hardware  amp  software  and the  MorphoTrust USA network infrastructure     Chief Security  Officer  CSO     Chief Information  Officer  CIO     Chief Privacy  amp   Information  Security Officer   CPO ISO     Responsible for compliance with Local  State  and Federal Privacy Laws   Additionally responsible for the Electronic Communications Policy  ECP  and  Cyber Security Plan  ECP  and investigating breaches of same     Manage non public information resources  ensure that access to data is  granted only as needed for legitimate purposes and within the terms  articulated in this policy  ensure that training and awareness of the terms of  this policy are provided  monitor compliance with this policy     
58.  are sufficient to protect the sensitive information     4 11 Operational Management Policy    MorphoTrust has a general operations management policy in      PRC 00090 B  7 Managing Operations Policy    4 11 1 Segregation of Security Duties    To reduce the risk of accidental or deliberate system misuse  separation of duties or areas of  responsibility must be implemented where practical     Whenever separation of duties is difficult to achieve  other compensating controls such as  monitoring of activities  audit trails and management supervision must be implemented  Ata  minimum  the audit of security must remain independent and segregated from the security  function     4 11 2 Separation of Development  Test and Production Environments    It is preferable to have engineering development environments  quality assurance  QA  test  environments  user acceptance testing  UAT  environments  and production environments to be  separated from one another  either logically or physically or both  Processes should be  documented and implemented to govern the transfer of software from the engineering  development environment on through QA and UAT testing and into the production environment   The following controls should be considered    e Development software and tools should be maintained on systems isolated from the  production environment  Development software should be contained on physically  separate machines or separate them by access controlled domains  VLANs  or  directories 
59.  as specified in requirement 4 3 2        Texas Department of Public Safety  e Tennessee Bureau of Investigations       Massachusetts Executive Office of Public Safety    D CJCNEGICUU                                                                                                                                        S     SAFRAN Appendix D m    MorphoTrust USA Letters of Reference    otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    This page intentionally left blank     144 Appendix D    SAFRAN    Letters of Reference MorphoTrust USA    TEXAS DEPARTMENT OF PUBLIC SAFETY    5805 N LAMAR BLVD    BOX 4087    AUSTIN  TEXAS 78773 0001  512 424 2000    www dps texas gov       STEVEN C  McCRAW COMMISSION  DIRECTOR A  CYNTHIA LEON  CHAIR  DAVID G  BAKER MANNY FLORES  ROBERT J  BODISCH  SR  FAITH JOHNSON  DEPUTY DIRECTORS STEVEN P  MACH  RANDY WATSON    April 16  2015    Tara Lyle   Department of Administration  Purchasing Division  2019 Washington Street East   Charleston  WV 25305 0130    RE  MorphoTrust USA Reference Letter  Dear Ms  Lyle     MorphoTrust USA has requested that I write you this letter of recommendation in reference to their work here in Texas as our sole  vendor providing statewide applicant fingerprinting and photo capture services     The contract for these services began in August of 2005 and required the vendor to establish a network of electronic finge
60.  capturing over 21  million fingerprint records  our system has demonstrated up time in excess of  99  and performed reliably with a high degree of customer satisfaction     MorphoTrust s risk management program is a customized capability based on  the National Institute of Standards and Technology  NIST  Special Publication  800 Series  The program we use is mission centric  focusing on the customer  delivery and mapping those capabilities to the supporting IT systems  Our  program examines both qualitative and quantitative aspects of risk management  at each step of the process  So  while the NIST publications were developed for  federal use  they have provide a solid foundation upon which MorphoTrust has  built a robust  thorough risk management capability     The risk identification aspect of the overall risk program uses threat sources as  the means by which specific risks may be identified  At its highest level  the risk  management program considers human  system  natural  and environmental  risks  Each of these four categories is then systematically analyzed with respect  to technical or non technical risks and intentional or unintentional actions     Human and system risks are concerned with actions taken by people or actions  taken by systems as a result of human action  Examples of human risks are social  engineering  theft  or device misconfiguration  System risks include viruses   worms  or even misbehaving devices  These risks are identified through the use  of 
61.  chosen as the statewide vendor for live scan fingerprint submissions to MA EOPSS in  2013  Program requirements include 30 fingerprinting centers across the state  supporting 100 000      200 000 applicants annually    online and telephonic appointment scheduling  capture of demographic data  livescan fingerprint images  and photo capture  card scanning services for transition to the network and out of state applicants   transaction processing and adjudication software  customized data interface protocols for major agencies   secure data center  and management of the network throughout the state     We provide the following services in association with our MA network        Bi lingual registration assistance by telephone to our Call Center    Secure online registration via secure website    Convenient Enrollment Centers equipped with Enrollment Workstations and Enrollment Agents   Livescan operators     Secure centralized Data Center  Customized agency system integration  Electronic connection to the state AFIS  Reporting   Fee collection   Results dissemination  pending        Participating Agencies Department of Early Education and Care  Department of Elementary and Secondary Education  Department of Children and Families      SAFRAN Vendor Response Sheet T    MorphorTrust USA  Attachment A     otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    Company Massachusetts 
62.  collects fees if applicants wished to pay at this time   and confirms proper documentation needed  The process is streamlined and  specifically designed so that even applicants with limited web skills can schedule    their appointments     Step 1 of 9  Enter Information   Required fields  Please enter your information below  letters  spaces  hyphens     and apostrophes     are allowed in name fields      Then click    Next    to continue or    Cancel    to exit       Legal Name must match exactly on all identification documents brought to enrollment     Remember the phone numbers and or email address provided below  as they will be used to retrieve  your information during your in person enrollment       Legal Name   First Name  Middle Name  or NMN if no middle name      Last Name Suffix    se          S E     Gender  Date of Birth  MM DD Y YY Y  Preferred Language     12 30 1972   English       Method of Contact  At least one method is required   Email    jsmith comcast net    Country Code Phone 1    United States   1          615 123 4567    Country Code Phone 2    United States   1   7      615 123 7645       Preferred Method of Contact    Email         Figure 4  Web Based Scheduling System    Using the 24x7x365 Pre Enrollment Website  Applicants can enter their demographic  information  search for a conveniently located Enrollment Center  schedule a fingerprint  appointment  and obtain directions  With our UEP solution  shown   the website is also   mobile and tablet fri
63.  company s or another organizations email system or unauthorized use of a  password mailbox       Broadcasting unsolicited personal views on social  political  religious or other non business  related matters    e Transmitting unsolicited commercial or advertising material       Undertaking deliberate activities that waste staff effort or networked resources    e Introducing any form of computer virus or malware into the corporate network     Note  The Company monitors all email  both inbound and outbound     Note  All email between MorphoTrust USA employees and Safran Morpho Affiliate employees is  logged and must not include confidential information or content of state federal local  contracts software databases or export control information     7  Internet Use    The use of MorphoTrust USA Internet resources for personal purposes is permissible as long as the  incremental cost of the usage is minimal  no MorphoTrust USA business activity is preempted by the  personal use  and the usage does not cause a hostile working environment or set a poor behavioral  example  Employees must not employ the Internet or other information systems in such a way that the  productivity of other employees is eroded     MorphoTrust USA is not responsible for the content that employees may encounter when they use the  Internet  If an employee inadvertently connects to a web site containing objectionable content  they must  promptly move to another site or terminate their session  These sites in
64.  decide the outcome  The board shall not be prevented from acting upon an item due to lack of  attendance by members   Dispositions   There are three possible outcomes for any Change proposal   o APPROVED  In this case  it shall be noted in the CCR Comments Field and action will be  assigned to update the baseline and a target implementation time defined   o ON HOLD  The change will be held until pending the completion of action items      REJECTED WITH COMMENTS  Comments are always required when a Change is  being recommended for disapproval  In this case  the minutes shall clearly state  REJECTED  and appended with the date and initials     Procedure for Emergency Changes    For changes that are deemed to be an emergency  the change must be approved by at least a  director appointee of IT or the CIO    Emergency Notification     In an emergency  the impacted systems should be brought back  online as soon as possible  Notification is made immediately to the IT Directors  CIO and  impacted users    End of Emergency Notification     When the emergency is over  notification is made immediately  to the IT Directors  CIO  and the impacted users that the emergency is over     Once the emergency is over  the person involved in the emergency completes the Change  Request Form   The Initiator must complete all fields in the appropriate CCR form prior to  submitting to their Manager or Lead for approval and CCB processing  The Manager or Lead  must approve all CCHs before CCB review  
65.  destruction  modification  or  unintended or inappropriate disclosure      Accountability and Auditing  MorphoTrust USA should be accountable for complying with these      principles  providing training to all employees and contractors who use PII  and auditing the actual    use of      to demonstrate compliance with these principles and all applicable privacy protection     requirements      10 08 2014 MorphoTrust USA Confidential 3             4     rrr            TTTETRZTFTJGGGGIIEFETTTFFRFIFIIGGIAITTETITIFTFFIFIITIFETIZZIZIITIGSGGIAGIITZqGGIGGIZIZGGUGGJJUGEJ gua ug rua    EXEMPT INFORMATION    https   secure compli com Content Instance ContentInstanceViewer aspx ContentId 3984    4 17 2015    Compli  Print   MorphoTrust   Privacy Policy Page 4 of 6    Privacy Policy POL 00144 A 09    3  MorphoTrust USA Privacy Policy      since MorphoTrust USA is routinely in possession of personal  Privacy Information  of the citizens of the  i jurisdictions we serve  we have a strict company wide Privacy Policy that covers the handling and     retention of private and personal information  This policy begins with the requirement that all MorphoTrust    USA employees submit to and pass    background check  and includes guidelines for the use and     handling of such information  Every MorphoTrust USA employee on our customers    project will meet     MorphoTrust USA s security and privacy criteria and adhere to our Privacy Policy  Violations of the     Privacy Policy will lead to discip
66.  detail  The high dynamic range sensor  results in maximum contrast and gray scales   bringing out the minutiae and pore detail in the  fingerprint image with virtually no distortion  which  makes the image ideal for latent print comparison            The patented optics ignores moisture  dirt and latent  Figure 30  TP 5100 Livescan System prints left behind on the platen  making it easier to             amp  SAFRAN Vendor Response Sheet 2       gt  MorphoTrust USA  Attachment A     otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    capture high quality images   consistently   regardless of the challenges faced   such as dry or sweaty fingers or an unclean platen     The TP 5100 is a completely sealed unit  making it impervious to dust and dirt  It  contains a single  large non coated platen and no moving parts  With fewer parts  to break and no need to replace platen coatings  the scanner is less costly to  maintain and more reliable than other Livescans     For the proposed updated UEP solution  both our TP 4100  Figure 31  and our  TP 5300  Figure 32  Livescan systems capture standard ten print fingerprint roll  and four  4  slap images  Both are of sturdy construction  and intuitive    operations make them a sound choice for high volume fingerprint capture use        Figure 31  TP 4100 Livescan System    Both devices are certified by the        as tested and  in com
67.  during the closing of the project  Accreditation and certification can be done at the end  of each phase of the project     MorphoTrust meets the requirements     Our Project Manager will be responsible for performing accreditation and    certification during the closing of the project     h  The Vendor s project Manager is expected to effectively and efficiently work under the direction  of the awarding agency while adhering to all governing policies  procedures and standards of  each     MorphoTrust meets the requirements     Our Project Manager has a long history of effective cooperation with  stakeholders and team members and we are confident that he will work well  with West Virginia Department of Administration  Purchasing Division and    WVSP        SAFRAN Mandatory Specification Checklist       MorphoTrust USA  Attachment B     otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    This page intentionally left blank     128   Attachment B  MorphoTrust USA    Appendix A     MorphoTrust IT  oecurity Policy and Personal Data  Privacy Policy    MorphoTrust considers our IT Security Policies and Personal Data Privacy  Policies to be exempt from public disclosure  Therefore  we have segregated  these policies from the rest of our proposal and submitted them in a separate  volume entitled  EXEMPT INFORMATION      The documents contained in MorphoTrust s Exempt Information
68.  e Anytime there is a change to the virus definition file these update should immediately be pushed to  all managed computers     Monitoring Update Logs    Logs created during virus updates to servers and workstations in the MorphoTrust USA network should  be reviewed for completion status  Any failed updates should be immediately followed up on and updated  virus definitions loaded to the failed component     6  Use of Company Equipment    When MorphoTrust USA supplies an employee or contractor with software  hardware  information and or  other materials to perform MorphoTrust USA business  the title and all rights and interests to these items  remains with MorphoTrust USA  In such instances  possession by an employee or contractor does not  convey ownership or any implication of ownership  All such items must be promptly returned to  MorphoTrust USA when an employee or contractor separates from the company  or when so requested  by their manager   Company owned laptops and portable devices along with demo equipment may be  removed from MorphoTrust USA facilities with the approval of Management  For company owned  desktops  workstations and servers  as well as any special equipment  written Management approval is  required     Hardware    In general  MorphoTrust USA computer and communication systems are intended to be used for  business purposes only  Occasional use of this equipment for personal items must be limited and must  not interfere with normal work productivity  b
69.  employees and contractors to resources on its Local  Area Network  This access can be achieved via dial up  DSL or high speed Internet connections  The  goal of this section is to outline how remote users can access the network data while still protecting that    data     Minimum Home Network Configuration    Personal network configurations used by employees who normally work from home must meet the  following minimum standards     Your Company issued computer comes with a built in firewall that is preconfigured on your  system and is set to block all inbound traffic from reaching your computer  This firewall must not  be turned off at any time    Wireless home networks should use at least WPA  Wi Fi Protected Access  security which  requires a reasonably strong password of at least 8 characters with a mixture of letters  numbers  and symbols  The use of MAC  Media Access Control  address filtering is strongly encouraged to  limit the allowed wireless devices to those in your home    If you purchase your own home networking devices like routers or wireless access points  it is  your responsibility to secure those devices  The default passwords that come with home  networking devices must be changed and cannot be empty  Please see Section 3  Passwords for  more information  The complexity of the passwords should follow these guidelines but they do not  need to be changed periodically  unless there is suspicion that it might have been compromised  or told to unauthorized perso
70.  have been identified  established and staffed in such a manner to meet the  availability requirement that all applicants will be fingerprinted within 10  business days of request     In our response to requirement 4 4 3 1  we described the proposed locations   Table 10 on page 35 lists the locations and hours of operations and the map in  Figure 7 shows the statewide distribution     Our current and proposed locations for Enrollment Centers provide geographic  coverage so that no applicant will have to travel more than a maximum of 35  miles  one way  from their place of home or work to access fingerprinting  services  An Enrollment Center is available in all of the major West Virginia  locations noted in the RFP  Charleston  Huntington  Martinsburg  Morgantown   Beckley  Elkins  Wheeling  Logan  Princeton and Parkersburg areas  In addition  to the locations required by the RFP  we propose additional Enrollment Centers  to fulfill the 35 mile travel requirement     Mandatory Specification Checklist  amp  SAFRAN   Attachment B     MorphoTrust USA    otate of West Virginia CRFP DPS1500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    We will work with all West Virginia agencies to fulfill their needs for Enrollment  Centers  within the requirements described above  All Enrollment Center Agents  will be subject to approval by the West Virginia State Police     MorphoTrust bears all communication  facility a
71.  have system administrator security access so that  they may install software and restart the server  Application administrators may not log a  server onto the domain  They must contact a domain administrator to do so    e Initial password assignment    o Domain Login  Initial passwords must be changed on first login via software  enforcement   o Network devices  Initial passwords are changed during device setup   o Firewall devices  Initial passwords are changed during device setup    8 Disposal of Equipment    e    computer equipment must be sent to IT to ensure that any sensitive information or  licensed software is physically destroyed  or securely over written  prior to disposal or re   use     05 31 2013 MorphoTrust USA Confidential Page 5 of 5  EXEMPT INFORMATION    IT Firewall Policy PRC 00088 B 05    IT FIREWALL POLICIES AND PROCEDURES    Document Number  PRC 00088 B    Revision Level  05    Approval    John May Robert Eckel    Chief Information Officer President       This document contains confidential and proprietary information of MorphoTrust USA  No part of this  document may be reproduced  disclosed  distributed  or used in any form by any means   graphic   electronic  or mechanical  including photocopying  recording  taping  or information storage or retrieval      without written permission of MorphoTrust USA     05 31 2013 MorphoTrust USA Confidential Page 1 of 3  EXEMPT INFORMATION    IT Firewall Policy PRC 00088 B 05    TABLE OF CONTENTS    1 OVERVIEW     
72.  in a UEP deployment in West Virginia  while maintaining your current system  to prevent downtime or disruption in  the State   s service     UEP offers the following benefits for West Virginia agencies and applicants     s SAFRAN Executive Summary 3    MorphorTrust USA    otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police       New Livescan enrollment workstations deployed to all Enrollment  Centers  which will reduce equipment downtime        Improved fingerprint quality  which will lower rejection rates        Simpler and more intuitive registration process  which will improve the  online experience and reduce calls to our Customer Service Center        Identity document authentication     e Automated internal transaction monitoring and auditing        Asuite of advanced site utilization monitoring and scheduling lead time  tools as optional enhancements to the UEP product        Out of State Electronic Fingerprinting in selected cities throughout       country  using local operating procedures and technology     UEP will secure the State of West Virginia s position as the leader in state  fingerprint enrollment technology with the latest solutions for data integrity   image and photo quality  interstate electronic submissions  and optional  enhanced features for automated delivery status and real time program metric  dashboards     We appreciate the opportunity to have
73.  is a key    component of NIST FISMA information security controls  and MorphoTrust    conducts information security awareness training for all employees who serve    our biometric enrollment customers  We work to mitigate the threat of social    engineering by requiring social engineering training for each employee when    they join the company  and annually thereafter  Additionally  we conduct    unannounced social engineering awareness exercises throughout each calendar    year for all biometric services employees  We also have strict annual security    awareness training requirements imposed upon us by the U S  Federal    Government as a result of our federal contracts     The security and integrity of our network solutions  including all components     data transmissions  and physical facilities are of the utmost importance to      SAFRAN Vendor Response Sheet  se 31    MorphoTrust USA     Attachment A     otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    32    MorphoTrust  We understand the critical importance of protecting all personal  and financial information of our customers  As such  we provide industry  standard security measures throughout our network solution to protect this  sensitive information and infrastructure     For example  all PII is encrypted while in transit and while at rest  Further  we  ensure that only those persons needing access to the 
74.  is correct and appropriate including the  detection of data input errors  The checks that are performed on the client side must also be  performed at the server to ensure data integrity and to prevent possible injection attacks  such as  SQL injection attacks   When setting up a system  checks should be made to verify and validate  parameter settings and any static data that the system needs to operate  Wherever possible   application software should help the user verify and correct data fields  characters  and validate  the completeness of data and check any range volume limits     4 16 2 Control of Internal Processing    Data that has been entered correctly can be corrupted by processing errors or through deliberate  acts  Checks and balances must be incorporated into systems to prevent or stop an incorrect  program from running  Application design must ensure that controls are implemented to minimize  the risk of processing failures leading to a loss of data or system integrity  Consider the use of  correction programs to recover from failures and access to add and delete functions to make  changes to application data and to ensure the correct processing of data     Separate OS level processes and services which perform the internal data processing should use  appropriate  and preferably unique  identities to allow for monitoring and logging purposes   Unique machine or device identification mechanisms should be used as well so any failures in  internal processing can be 
75.  level  or machine level  whichever is appropriate to the API and the overall intended  system architecture  Whenever appropriate  service oriented APIs should allow all API calls to be  logged  either by using normal OS level mechanisms or by using built in mechanisms  All service        methods should validate their data inputs and handle any problematic data formats or content  in a secure way to ensure that no malicious inputs are processed in error by the system     4 16 5 Cryptographic Controls    Encryption is an important security layer that is used to protect the confidentiality of information   Encryption is an effective tool in mitigating the threat of unauthorized access to data  However   there are other threats  such as a hacker gaining access to an authorized user account or  process  where more stringent controls and or the use of multiple encryption levels must be  considered     Based      a risk assessment  the required level of protection must take into account the length of  the cryptographic key employed  Cryptographic strength increases with longer key lengths   however so does processing time  In deciding what is best for the application  the benefits of    10 9 2013 MorphoTrust USA Confidential and Proprietary Page 27 of 37    EXEMPT INFORMATION    Cyber Security Plan PLN 00091 A 02    both stand alone and enterprise level encryption solutions should be considered  Attention must  also be given to the customer regulations  government regulations at th
76.  misuse     It is the responsibility of every MorphoTrust USA employee who accesses customer data and  information to secure and protect customer data     Many federal and state laws regulate the collection  handling and disclosure of customer data   including the Family Rights to Privacy Act  FERPA   the Health Insurance Portability and  Accountability Act  HIPAA   the Gramm Leach Bliley Act  the Federal Privacy Act of 1974  the  DHS Real ID Act  the MorphoTrust USA Proxy Agreement  the National Security Agreement the  NISPOM requirements  provincial  amp  state privacy regulations  Cyber Protect Laws  and other  jurisdictional laws     Exposure of confidential customer data through improper disclosure or security risk is a violation  of these laws  and can result in MorphoTrust USA incurring legal liability  financial liability  loss of  reputation  and loss of trust     1 1 Policy Statement  Access to customer data is granted by data custodians and trustees who are required to develop  and maintain clear and consistent procedures for access and use of the data  prevent  unauthorized access  and protect customer data  Items of information that are collected   maintained  and utilized by the MorphoTrust USA for the purpose of carrying out company  business may include customer data      Custodians    and    trustees    are considered    Policy Implementers  responsible for understanding  and following  but not making policy   All customer data is classified as    High Critic
77.  network of civil applicant fingerprinting services for the State of  Tennessee  Under this statewide single source solution  referred to as TAPS  MorphoTrust provides  fingerprinting services to more than 20 000 education professionals throughout the State of Tennessee  annually     We provide the following services in association with our TBI network   Bi lingual registration assistance by telephone to Call Center  Secure bilingual web registration and scheduling portal    Convenient statewide Enrollment Centers equipped with Enrollment Workstations  Livescan  equipment and Enrollment Agents  Livescan operators     Card Scan for out of state applicants  Customized agency system integration  Central data center   Electronic connection to the state AFIS  Reporting   Fee Collection and remittance  Customer account and billing services    In June 2011  MorphoTrust was re awarded the contract to operate TAPS program  Within 35 days of  contract award  MorphoTrust performed a successful end to end system test  secured 60 Enrollment  Center sites  and procured all Live Scan systems required for the program  The network was fully  operational seven weeks from contract execution with no interruption of services  We activated the  registration Call Center and website during the week before the August 1 deadline to enable applicants to  begin fingerprinting on August 1    Additional tasks performed by MorphoTrust included developing customized interfaces with major state  agencies to 
78.  of 37       EXEMPT INFORMATION    Cyber Security Plan PLN 00091 A 02     Revision   Date   Deseription       Author     02 11 27 2012   Updated Section 4 12 11 to include a clause James Kottas  that cloud environment can be considered as  long as their use does not cause MorphoTrust  to become non compliant with its NSA and  proxy agreements  or with state cyber laws  and regulations     02 12 17 2012   Updated Section 4 13 to allow for encrypted James Kottas  PII being transmitted via email    02 7 7 2013 Changed the CIO on the title page from James Kottas  Robert Stack to John May     7 7 2013 Added small editorial changes to make the  content more clear  Done throughout the  document  Updated the list of Acronyms in  Section 6     7 7 2013 Updated Section 4 10 2 to allow for the FSO  to designate another authority for authorizing  and approving vulnerability scans        James Kottas    James Kottas       02  02   02 7 7 2013 Updated Section 4 10 5 to suggest the use of   James Kottas  RADIUS authentication and access profiles    02 7 7 2013 Updated Section 4 12 3 to include the use of  two factor authentication whenever possible  and practical    02 7 7 2013 Updated Section 4 12 11 to allow for James Kottas  MorphoTrust hosted cloud environments    02 7 7 2013 Updated Section 4 13 to change the minimum   James Kottas  encryption level from AES 256 to AES 128    02   02   02   02   02    James Kottas       James Kottas    7 7 2013 Updated Section 4 13 to refer to the  Inf
79.  on the Admin and Engineering Networks  their relevant data  including  sensitive information  should be backed up according to the MorphoTrust policy       PRC 00084 B  7 Backup  amp  Recovery Policy    10 9 2013 MorphoTrust USA Confidential and Proprietary Page 18 of 37    EXEMPT INFORMATION    Cyber Security Plan PLN 00091 A 02    Similarly  the backups should be capable and useful in the case of a disaster and the sensitive  information needs to be recovered in a reasonable timeframe  MorphoTrust has a disaster  recovery policy in       PRC 00095 B  7 Disaster Recovery Policy    4 12 Access Control Policy    To preserve the properties of integrity  confidentiality and availability  MorphoTrust   s information  assets must be protected by logical and physical access control mechanisms commensurate with  the value  sensitivity  consequences of loss or compromise  legal requirements and ease of  recovery of these assets     Responsible Managers and other relevant information owners are responsible for determining  who should have access to protected resources within their purview  and what those access  privileges will be  read  write  update  etc    These access privileges will be granted in  accordance with the user s job responsibilities     For any type of device on the MorphoTrust network  if it has any accounts or access methods  with any default passwords  those passwords must be changed to be secure passwords that are  compliant with all applicable policies and guide
80.  otate of West Virginia CRFP DPS1500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    IdentoGO Center  4510 Terrace Avenue  Huntington  WV 25705 175    IdentoGO    By MorphoTrust USA    Date  08 11 2014 11 15 AM  Applicant  JOHN S  SMITH  UE ID  U11F 193H9F  Service  WV CONCEALED CARRY  Fee   9 95  Paid   9 95  Method  CARD  1111   Auth Number  123    Check the status of your service at   http   uenroll identogo com    Figure 13  Transaction Receipt    The receipts have been developed to ensure the format and data elements  included meet the needs of the State and the applicants  In other MorphoTrust  networks  additional data elements include fee paid amount  applicant type   agency  and facility number  Applicants often use these receipts for their own  records and or for submission to their agency for reimbursement or proof of  compliance     As an optional feature with UEP  an applicant may view the status of their  transaction online at any time  The online status includes the date of service   method of payment  payment amount  and the Transaction Control Number     4 4 3 5 The Vendor should describe in detail the time frame of transmitted results     Fingerprint records are transmitted from the Enrollment Center to the central  MorphoTrust process server in real time  For mobile sites or onsite fingerprinting  sessions that do not have an internet connection  records are transmitted within  24 hour
81.  potential risks relating to the secure operations of all MorphoTrust USA  facilities is key to reducing the potential loss of secure information and materials  Employees  need to be trained to recognize and report either potential or actual incidents to ensure timely  response     4  Organization and Responsibilities    The Chief Security Officer and the Vice President  Chief Information Officer  CIO  have the  corporate responsibilities for the security and privacy of the company  The CSO and CIO are to  be notified  via the completion of a Security Incident Report     Appendix A  of any incidents  relating to the activities or security incidents that relate to the operation of the Corporate Security  Policy     The CSO and CIO work in collaboration with each department manager to manage all aspects of  the Corporate Security Policy     Department managers must orient new personnel to the department and  as appropriate  to job  and task specific security procedures     Employees  contingent workers and contractors are responsible for learning and following all  MorphoTrust USA policies and departmental procedures for security  These policies can be found  on the Company SharePoint site as well as in Compli     The main governing documents that drive and define our information security and privacy access  controls are as follows    e Need to Know Policy PRC 00141      Privacy Policy PRC 00144      Communications Policy PRC 00123      Classification of Information and Materia
82.  program manager  Denny Wear  has been with MorphoTrust for over 15  years  most recently as Program Manager for Livescan fingerprinting service  programs  He has been instrumental in the successful deployment of large scale  statewide fingerprint networks including Massachusetts  the District of  Columbia  New York  and Indiana  as well major expansion of the Florida  statewide network and a fingerprint and identification badging solution for  Broward County  Florida School Board  the nation   s sixth largest school system     Mr  Wear has been Program Manager specifically for the West Virginia network  for more than two years  He will continue in his role  serving as the single point  of contact for the West Virginia State Police for MorphoTrust s performance in  support of the contract     During the implementation phase  Mr  Wear will facilitate the flow of  information from WVSP to the appropriate MorphoTrust workgroup and will    Vendor Response Sheet      SAFRAN  2     Attachment     MorphoTrust USA    otate of West Virginia CRFP DPS1500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    manage the delivery of all program components  He will host regular meetings  with WVSP and MorphoTrust personnel to ensure all matters are communicated  clearly and issues are addressed in a timely manner  He will be responsible for  day to day operations at all Enrollment Centers and will work with the  stakeholder
83.  programs and appropriate maintenance  schedules for your products     Please direct any questions regarding this certification to Mr  B  Scott Swann at   304  625 2477     Sincerely yours     hn 4       Jerome M  Perider  Deputy Assistant Director  Operations Branch  Criminal Justice Information Services Division    This page intentionally left blank     Appendix F     Optional Features    MorphoTrust proposes several innovative concepts and custom enhancements  that will provide additional services for applicants and establish the State of  West Virginia s leadership as a highly effective  efficient and automated  collector and provider of non criminal justice fingerprints     We have described each of these premium options on the following pages   Pricing for options is provided in our Cost Proposal     1  Universal Enrollment Platform  UEP  Enhancements Package   A  Administrative Support and Reporting Portal  B  Applicant Status Notification  C  Back up Print Capture for Poor Quality Prints  D  Address Verification  FULL PACKAGE OF UEP ENHANCEMENTS  Out of State Applicants  Expedited Fingerprinting Service    2   3   4  Custom Engineering Requests   5  Agency Owned Livescan Systems  6    Photo Capture  Production and Delivery of Identification Badges    1  Universal Enrollment Platform  UEP  Enhancements Package    The full package of optional enhancements to the UEP Platform may be  purchased for all applicants and agencies for an additional fee as listed in our  Cost P
84.  protection laws  as well as with applicable industry information     practices  Furthermore  we agree to comply with restrictions that information providers place on the data     If MorphoTrust USA has reason to believe that a client or an information provider is not in compliance    with these commitments  MorphoTrust USA will exercise its rights under the contract  which include  but  are not limited to  terminating that relationship     9  Education and Awareness      MorphoTrust USA is committed to privacy education  We have initiated a program to educate our clients     our employees and the industry           ongoing basis about the issues  guidelines and laws surrounding  individual consumer privacy issues  corresponding responsibilities and MorphoTrust USA  s privacy  policies and practices  MorphoTrust USA provides education and consultation to clients about privacy  compliance  and about the laws and industry quidelines that protect consumer privacy  MorphoTrust USA    provides advocates who speak at various events and emphasize the importance of responsible data     collection and use       Privacy and security are part of the culture at MorphoTrust USA  We provide information to      U S      employees about the importance of privacy and data security  We provide ongoing education about the     laws and accepted practices in which MorphoTrust USA conducts business  As changes in legislation         industry practices occur  special education may be provided to up
85.  resources  All non public  data must have an identified Data Custodian  Data Custodians support the  mission of customers and MorphoTrust USA and facilitate the conduct of  MorphoTrust USA business by ensuring that access to data is granted as needed  for legitimate purposes and within the terms articulated by policy to trained    Data Custodian    personnel     Each Data Custodian may designate one or more Data Trustees based on job  type to execute day to day custodial responsibilities  In practice  Data Trustees  are those persons primarily responsible for the accuracy  integrity  and privacy of    Data Trustee non public data      Access    nOminisustel  The Data Trustee for non customer data is the appropriate Department Head  The    Data Trustee for MorphoTrust USA enterprise wide corporate summary data is the  Chief Information Officer     Customer Owner of the secure citizen data     The functional administrative areas of MorphoTrust USA data are  Financial   R amp D  Human Resources  Manufacturing  Facilities  Security  Program Mgmt   Sales  Marketing  Supply Chain  Federal Systems  Tier 3 Admins  and Information  Technology     Functional Areas  of MorphoTrust  USA Data       3 2 Responsibilities    Area Responsibility    The President   Executive Vice  President    Responsible for sponsoring compliance to policy  Delegating access to non  public  data to those eligible  see Data Custodians table      Chief Security Responsible for Information Security policy  Secu
86.  rmation in this proposa lis protecte d from disc losure to th e public  because it is a proprietar y trade se cret or co nfidential com mercial or financial   information of MorphoTrust USA  LLC or its affiliates  individually and collectively      MorphoTrust USA  or  MorphorTrust       MorphoTrust has endeavored to identify each page of its proposal that contains any such  proprietary or confidential information with the legends  COMPANY CO NFIDENTIAL      Not for Public Disclosure  or    PROPRIETARY     or words of similar import  somewhere  on the relevant page or pages of its proposal  MorphoTrust   s proposal includes all  exhibits and appendices thereto  as well as all extrinsic documents and materials that  may be identified and incorporated therein by specific reference  MorphoTrust s  proprietary information typically includes  but is not limited to  information related to  proprietary security features and related designs  techniques and materials  formulas   manufacturing methods  business plans  pricing and other financial information   technology and product roadmaps  and customer lists and references  Subject to  applicable law  such proprietary or confidential information may not be disclosed   pursuant to freedom of information legislation or otherwise   reproduced in whole or in  part  or used for any purpose other than the recipients evaluation of this proposal   without the prior written consent of an executive officer or the General Counsel of  MorphoTru
87.  rtment of Administration  Purc hasing Division  2019 Washington Street East  Charleston  WV 25305 0130        FINGERPRINTING SERVICES    E E uas          Submitted by     Contact   MorphoTr ust USA  LLC Jo hn Olson  296 Concord Road  Suite 300 Principal Proposal Manager  Billerica  Massachusetts 01821 Telephon e  952 945 3307  WW w morphotrust com Fax  952 932 7181 Zo  Email   jolson morphotrust com     SAFRAN    MorphorTrust USA    Confidential Notice    Certain info rmation in this proposa lis protecte d from disc losure to th e public  because it is a proprietar y trade se cret or co nfidential com mercial or financial   information of MorphoTrust USA  LLC  or its affiliates  individually and collectively    MorphoTrust USA    or  MorphorTrust       MorphoTrust has endeavored to identify each page of its proposal that contains any such  proprietary or confidential information with the legends  COMPANY CO NFIDENTIAL      Not for Public Disclosure  or    PROPRIETARY     or words of similar import  somewhere  on the relevant page or pages of its proposal  MorphoTrust   s proposal includes all  exhibits and appendices thereto  as well as all extrinsic documents and materials that  may be identified and incorporated therein by specific reference  MorphoTrust s  proprietary information typically includes  but is not limited to  information related to  proprietary security features and related designs  techniques and materials  formulas   manufacturing methods  business plans  p
88.  served the State of West Virginia as a  trusted  proven  and reliable partner  We look forward to bringing you our latest  fingerprint services platform to deliver state of the art services to serve you in  the future     Our proposal response is organized as follows  in compliance with the RFP  instructions     Technical Proposal      Cover Letter with required forms    Vendor Response Sheet  Attachment A   o Section 4  Subsection 4 3  Qualifications and Experience  o Section 4  Subsection 4 4  Project and Goals    Mandatory Specification Checklist  Attachment B   o Section 4  Subsection 4 5  Mandatory Requirements  Cost Proposal   Enclosed in a separate sealed envelope in our submission  package    Exempt Information   Separate volume containing information to be exempt  from public disclosure    Bid Bond   Submitted directly  see Appendix G for copy     Executive Summary   SAFRAN    MorphoTrust USA    Vendor Response Sheet   Attachment A     Since 2011  MorphoTrust has provided fingerprinting services for more than  220 000 West Virginia applicants  We propose an experienced Program Manager  and project team for the West Virginia Applicant Fingerprinting Services  program  from a company with past performance in fingerprinting more than 21  million applicants over the past 20 years     Section 4  Subsection 4 3  Qualifications and Experience    4 3 Vendors will provide information regarding their firm  such as staff qualifications and experience  in completing similar pro
89.  service  Applix database access  and the ability to access  remote networks     12 Return to Normal Business    Returning to normal business is the goal of this disaster recovery approach  Senior management  has determined that at this time it is acceptable for this process to take up to five  5  business  days to accomplish     13 Plan updates    This is a living document and needs to be reviewed quarterly  Updates are to be made as  technology changes and the environment evolves  IT Management is responsible for informing  the IT staff of changes and keeping the document updated and publicly available to the IT staff     02 13 2012 MorphoTrust USA Confidential Page 10 of 10  EXEMPT INFORMATION    IT Policies   Computers on the Network PRC 00086 B 01    IT POLICIES  COMPUTERS ON THE NETWORK    Document Number  PRC 00086 B    Revision Level  01    Approval    Robert Stack Robert Eckel    Chief Information Officer President       This document contains confidential and proprietary information of MorphoTrust USA  No part of this  document may be reproduced  disclosed  distributed  or used in any form by any means   graphic   electronic  or mechanical  including photocopying  recording  taping  or information storage or retrieval      without written permission of MorphoTrust USA     Users are responsible for making sure that they have the current revision of this  document     8 22 2011 MorphoTrust USA Confidential Page 1 of 3  EXEMPT INFORMATION    IT Policies   Computers on 
90.  shot samples of each report listed above which have had any actual  Applicant data sanitized from view or replaced with fictitious data     MorphoTrust meets the requirements     We produce a variety of reports for our customers using any of the data elements  collected during the appointment scheduling process and encompassing any  date range  These reports are available in real time to the State via a secure  extranet reporting module  Authorized users can generate reports using a  number of parameters  such as date range  applicant type  status  employer and  name       reports available through the extranet module can be viewed  printed  or downloaded in a spreadsheet format     At a minimum  we will work with the State of West Virginia to develop monthly  and annual summary reports  monthly and annual detail reports  fee collection  and reconciliation reports and ad hoc reports  as needed     We have described our billing system and reports in our response to requirement  4 4 5 and have provided screen captures of Monthly   Annual Summary   Monthly  Annual Detail  and Fee Collection  Billing Reconciliation reports in  Figure 24 through Figure 28 on pages 68   70  The screen captures were sanitized  to remove applicant data     MorphoTrust will develop five additional reports as required  We leverage  Microsoft s SQL Server Reporting Services  SSRS  for report generation and  delivery services  The SSRS database server is deployed in a cluster  which  allows for continuo
91.  solution ensures the instrument  applicant credit card transactions   Our internal Billing Department ensures    superior customer service to thousands of  agency and employer billing accounts  to process with non sufficient funds or non     Applicants may pay at the Enrollment Centers    clears prior to allowing transmission of the  enrollment  limiting the potential for applicants    conforming instruments     Both agencies and employers can establish third party billing accounts and use  them to pay for applicants  MorphoTrust will invoice government agencies for  activity with Net 30 terms  In certain instances  employers can also receive  invoice terms pending approved credit application  Where billing accounts are  desired but invoicing terms cannot be provided  employers can pay for applicant  transactions with a valid credit card     In addition  we provide an easy  innovative way for employers and agencies to  pay fees on behalf of applicants  Agencies and employers will have the option of  distributing single use   Authorization Codes  to their applicants  which reduces  the potential of fraudulent activity  When provided by the applicant online or at  the Enrollment Center as a form of payment  these Authorization Codes generate  charges for the issuing agency or employer  Because each code is unique  the  agency or employer has confidence they are paying only for their applicants   Payment Authorization Codes issued to applicants by agencies or employers can  be 
92.  technical problems  Based on the remote diagnostic results  the agent will walk  the Enrollment Agent through the steps required to correct the error     If replacement equipment is required  the agent will order a replacement device  shipped out to the site as soon as possible  typically next day air   and a trained  person will install the new device  The Technical Help Desk is available to our  Enrollment Centers as    toll free phone number  MorphoTrust also maintains  critical spares in select high volume locations to ensure operational downtime is  minimized should a critical device fail like the CPU or the fingerprint scanner     Server Outages   To ensure system uptime  MorphoTrust has monitoring software in place that  continually monitors the availability of all major networking components under  the control of MorphoTrust such as switches  VPN connections  servers  and  firewalls  This monitoring software will notify the appropriate person the issue  will be addressed immediately     When issues arise that require additional assistance  our technical team is  available 24x7 to provide necessary support            server outage is considered critical and receives an immediate response and  active troubleshooting until resolved    The Vendor should describe in detail the call escalation procedure with the name  title   area of responsibility and phone number for each level starting with the state program  manager up to the top official in the company          signif
93.  the Executive Team  but not be limited in its response by having    to wait for someone  When the Executive Team is not available for immediate response  then the  CIO sets the priorities     5 Responsibilities    51 Authority and Authorization to Spend    The CIO is authorized to make decisions to get systems up and running  When the CIO executive  is unreachable  and critical systems are down  the CIO is pre authorized to make expenditures  related to system recovery  This includes immediate outside services  The CIO is the designated  Breach Manager     6 Decision Making    6 1 Access to Plan    This plan is available to all IT employees and resides on the IT department s SharePoint site     6 2 Access to Contacts    02 13 2012 MorphoTrust USA Confidential Page 8 of 10  EXEMPT INFORMATION    IT Disaster Recovery Policy PRC 00095 B 02    Emergency contact list and numbers are t maintained and accessible through the IT  Department s SharePoint site  This list also contains vendors  contacts  and numbers that can be  used during emergencies  This list is maintained and reviewed quarterly by IT Management     6 3 Salv aging    The CIO is authorized to decide what systems hardware can be salvaged and if not how to  properly dispose of destroyed equipment     7 Relocation of systems    The CIO is authorized to make decisions to get systems up and running  When the CIO s  executive is unreachable and critical systems are down  the CIO is pre authorized to make  expenditures rela
94.  the designated representative  of the state of West Virginia  He is responsible for the project management and  tracking the progress of each defined task  maintaining the project schedule   identifying any potential problem areas or risks  and communicating all of the  activity status with the State s Contract Manager and Agency Program  Managers     The project management follows the Project Management Institute  PMIG   industry standard process groups of Initiation  Planning  Execution  Monitoring  and Control  and Closing     MorphoTrust utilizes a baseline set of project management software tools that  are familiar to our customers  Microsoft Office 2010 and its suite of applications  are the standard means of monitoring  controlling  tracking and communication  of project tasks and deployments  Microsoft Word  Visio  Outlook  Excel   PowerPoint  and Project are the tools of choice  Any documents or deliverables  shared with the state of West Virginia can be converted to Microsoft Office 2007  or PDF files where needed     We have provided additional information about our Project Plan in our response  to requirement 4 5 9  b  and a preliminary project schedule in Appendix B     4 4 7 2 The Vendor should describe in detail the plan on how status updates will be provided on  the overall progression of the project at each phase of development     MorphoTrust realizes that the best planning is    Lowest Risk Transition to Improved based on effective communications  With thi
95.  the fingerprinting process  The format of the        is  shown in the ICD document in Appendix A     The live scan device must provide necessary data fields required to process the transaction  through the State s AFIS System  Unique data fields are required to be transmitted within the  NIST file and can be found in Appendix A  The Vendor will be required to contract with the State  AFIS Vendor for the development and testing of this interface     MorphoTrust meets the requirements   Interface with WVSP AFIS  As the current provider of fingerprinting      proposed 1000 dpi Livescan devices comply  services in West Virginia  MorphoTrust with the Interface Control Document provided in  has successfully engineered an    suf RFP Appendix A  The scanner meets National  interface between our fingerprinting    technology and the WVSP AFIS  We Institute of Standards and Technology  NIST   are fully compliant with the State s definitions including records Type 1  State   Type 2                    Gare    AOS           State   Type 8  Signature   and Type 14  flat and    compliant going forward     Furthermore  because MorphoTrak is a  sister company to MorphoTrust  we can slap only capture   work closely together to resolve any   issues that arise between our systems     rolled   The proposed devices feature 1000 ppi 4  4  2    While MorphoTrust proposes a 1000 dpi scanner as  required by the RFP  we also propose an alternative  500 dpi scanner  We have provided a detailed  equipmen
96.  the residents of West Virginia     MorphoTrust operates with the following infrastructure for West Virginia   e Direct knowledge of the West Virginia program from providing applicant  fingerprinting since 2011   e Executive management team and many key personnel with more than     decade of personal experience in fingerprinting services     e Project management team with experience implementing and operating  fingerprinting networks throughout the United States       24x x365 multi lingual Pre Enrollment Website that currently registers more  than two million applicants per year  including 55 000 West Virginia applicants    e 12 000 square foot U S  based multi lingual Customer Service Center that  currently accepts more than two million calls per year  including more than  50 000 calls from the West Virginia program    e Twenty two  22  Enrollment Centers located throughout West Virginia with  field proven livescan hardware and software and experienced Enrollment  Agents  Livescan operators     e Centralized Cardscan conversion center processing more than 125 000 paper  cards per year  including 20 000 from West Virginia applicants       Secure Data Center currently submitting approximately five million fingerprint  records per year to more than 20 state AFIS systems  including our interface  with the MorphoTrak AFIS systems in West Virginia    e Certified FBI Channeler and provider of 350 000 criminal history results   including delivery of more than 60 000 paper based res
97.  units to swap for disabled equipment if field   repair cannot be completed within an acceptable timeframe  In addition to  servicing the device  FSEs ensure that all mission critical equipment at the  location is fully operational prior to their departure     Approximately 8090 of trouble tickets are resolved in under half an hour  The  maximum time for fingerprinting center outage would entail the delivery of a  replacement scanner or computer no later than start of business the next  business day  Maximum outage applies to less than 190 of trouble tickets        SAFRAN Vendor Response Sheet         MorphorTrust USA  Attachment A     otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    82    MorphoTrust has monitoring software in place that continually monitors the  availability of all switches  VPN connections  servers  and firewalls  This  monitoring software will notify the appropriate person via email and page and  the issue will be addressed immediately  All network components are kept on a  current vendor support contract  each support contract requiring same day  response     When issues arise that require additional assistance  our technical team is  available 24x7 to provide necessary support  MorphoTrust will maintain an  ample quantity of spare parts and systems to ensure rapid replacement when  necessary     Minimal Disruption to Applicants    We minimize di
98.  us to make continual improvements   The latest upgrade to our system was an electronic waiver form that allowed us to eliminate the need to collect and store over  500 000 paper documents containing personal data  each year     Based on our experiences here in Texas  I would recommend MorphoTrust USA to the West Virginia State Police as a vendor for  similar services in your state  Please contact me if you have any additional questions regarding MorphoTrust USA   s performance in  support of our contract     Don Farris  Jr    Texas Department of Public Safety  5805 N  Lamar Blvd    Austin  TX 78765   512 424 2078  Donald farris dps texas gov    Sincerely             Don Fartis  Jr     Manager  Access  amp  Dissemination Bureau  Crime Records Service       EQUAL OPPORTUNITY EMPLOYER  COURTESY    SERVICE    PROTECTION       TENNESSEE BUREAU OF INVESTIGATION  901 R S  Gass Boulevard  Nashville  Tennessee 37216 2639   615  744 4000  Facsimile  615  744 4500    TDD  615  744 4001 MARK  GWYN  DIRECTOR       April 16  2015    Tara Lyle   Department of Administration  Purchasing Division  2019 Washington Street East   Charleston  WV 25305 0130    Tara       am writing you on behalf of our vendor MorphoTrust  We have been  doing business with them for the past four years and are currently exercising our  5 option to continue this partnership     They have been an excellent vendor and went beyond their contractual  requirements to appease potential customers  The transition from our p
99.  volume  contain highly sensitive security information and are not to be considered as  public documents or disclosed to the public     MorphoTrust has provided the following policies in our Exempt Information  volume        MorphoTrust Privacy Policy POL 00144 A   Describes our policies for  safeguarding the private information of our customer s citizens  Personal  Data Privacy Policy         MorphoTrust USA Cyber Security Plan PLN 00091 A 02   Describes our  policies for ensuring the security and protection of the sensitive data and  the information systems that transmit or store the data from cyber attacks   IT Security Policy      In addition  we have provided the following relevant policies        Information Security Customer Data Access and Security Policy PRC   00174 A 07         Appendix A         SAFRAN MorphoTrust IT Security Policy and 129  MorphoTrust USA Personal Data Privacy Policy    otate of West Virginia    CRFP     51500000010    Department of Administration Applicant Fingerprinting Services    Purchasing Division    130    West Virginia State Police    IT Change Management Procedure PRC 00085 B 05   IT Computer and System Use Procedures PRC 00110 A 10  IT Computers on Network PRC 00086 B 01   IT Disaster Recovery PRC 00095 B 02   IT Electronic Communication Policy PRC 00113 A 02   IT Firewall Policy PRC 00088 B 05   IT Information Security PRC 00089 B 06   IT Managing Operations PRC 00090 B 01   IT Network Access Controls Procedures PRC 00091 B 02  IT Phys
100. 0 North St  1st floor  Suite 101    Appendix C  List of Fingerprinting Centers    M  Tu  W 9 30 12 00  1 00 6 00   Th 9 30 12  1 00 7 00  F 9 30   12 00  1 00 4 30  Sa 9 00 2 00    M  Tu  We  F 9 00 12  1 00 6 00   Th 9 00 12  1 00 7 00  Sa 9 00   1 00    Mon  Tue  Wed  Fri 9 00 12  1 00   5 30  Thu 10 00 1 00  2 00 7  Sat   9 1    Tu We Fri 9 00 12 00  1 5 30  Th  10 00 1 00  2 00 7 00  Sa 10 00   3 00    M  Tu  W  F 9 00 4 30  Th 9 00   7 00  Sa 9 00 1 00        First day at this site 1 26 2015    M  amp  W 9 00 12 00  1 00 6 00    Tu  We  Fr 9 00 12 00 1 5 30  Th  10 00 12 00 1 00 7 00  Sa 8 00   2 00    M  Tu 8 00 6 00  W 8 00 7 00  Th  8 00 8 00 F 7 00 6 00 Sa 7 00   2 00   Mon   Fri 9 00 4 00  E o Sat  9 00   1 00   Mon Fri 9 00 1  1 30 7 00  Sat  10 00 2 00   M  Tu  We  Fri 8 00 5 00 Th 8 00   7 00 Sa 10 00 3 00   Wednesdays 9 30 12 00  1 00   3 00   M 11 00 4 00  Tu 9 00 12 00   1 00 7 00  W amp F 9 00 12 00  1 00   6 00 Sa 10 00 3 00   M  Tu  W     9 00 2 30  3 30 5 00   Th 9 00 2 30  3 30 7 00  Sa 11 00   3 00   Fridays 10 00 12 30  1 00 4 00    M  Tu  Th  F 10 00 12 00  1 00   5 00  W 10 00 12 00  1 00 7 00 Sa  10 00 2 00   Mon   Fri  9 00   4 00 Sat  9 00   11 00    141    otate of West Virginia CRFP     51500000010    Department of Administration Applicant Fingerprinting Services   Purchasing Division West Virginia State Police   Massachusetts City   Address Hours of Operation   Plymouth 385 Court Street Suite 305 306 Tu We 9 00 12 00  1 00 5 30  Th  10 00 1 00  
101. 1    4 Training     Users and administrators of the various systems will be trained in the appropriate use  and configuration of system implementation procedures  tools and applications as  appropriate for their job descriptions      Management will periodically review to ensure that appropriate training is available and  utilized     e Training will be made available for all new versions of existing applications and systems  as well as for the introduction of new systems     e New employees will be trained in the use and operations of all relevant systems and  applications     8 22 2011 MorphoTrust USA Confidential          5 of 5  EXEMPT INFORMATION    IT Information Security PRC 00089 B 06    IT INFORMATION SECURITY POLICY    Document Number  PRC 00089 B    Revision Level  06    Approval    Eric Ammon John May    IT Manager Chief Information Officer    Dennis Kallelis Hobert Eckel    Chief Security Officer President       This document contains confidential and proprietary information of MorphoTrust USA  No part of this  document may be reproduced  disclosed  distributed  or used in any form by any means   graphic   electronic  or mechanical  including photocopying  recording  taping  or information storage or retrieval      without written permission of MorphoTrust USA     05 31 2013 MorphoTrust USA Confidential Page 1 of 5  EXEMPT INFORMATION    IT Information Security PRC 00089 B 06    TABLE OF CONTENTS       OVERVIEW M                                                   
102. 1  This document is available at  http   www dtic mil whs directives corres pdf 54001 1p pdf  A training presentation  on PII for the DoD is available at    http   iase disa mil eta pii pii module pii module module htm     Also  NIST has a definition for      in SP 800 122  which is available at    http   csrc nist gov publications nistpubs 800 122 sp800 122 pdf      2    Secure server rooms can be operated either by MorphoTrust or at government sites  Refer    to http   csrc nist gov     ublications nistoubs 800 53 Rev3 sp800 53 rev3 final updated        errata 05 01 2010 pdf     6 ACRONYMS   ACL Access Control List   AES Advanced Encryption Standard   API Application Programming Interface   CEO Chief Executive Officer   CFO Chief Financial Officer   CIO Chief Information Officer   CM Configuration Management   CSN Customer Support  or Solutions  Network  CSO Chief Security Officer   CSP Cyber Security Plan   DL Driver s License   DOB Date of Birth   DoD Department of Defense   DSS Defense Security Service   10 9 2013 MorphoTrust USA Confidential and Proprietary    EXEMPT INFORMATION    Page 33 of 37    Cyber Security Plan    ECP  EIN  FCS  FSO  HR  IAAS  ISO  MAC  LAN  NASPO  NIST  NSA  OS  PAAS  PII  QA  RADIUS  SAAS  SIMS  SLA  SP  SQL  SSL  SSN  TLS  UAT  USGA  VLAN    Electronic Communications Plan   Electronic Identification Number   Factory Control Server   Facilities Security Officer   Human Resources   Infrastructure as a Service   Information Security Officer   Med
103. 1 10 A      Data Retention    The following rules govern the retention of sensitive data   e     backup media is labeled in accordance with the established MorphoTrust USA standard  At  minimum the label will contain  MorphoTrust USA     the date and the sequence number     Backup Monitoring  The following rules govern the monitoring of backed up data     e All daily backup sessions are monitored by IT staff each day to ensure there        no issues from  the backup the night before     10 23 2014 MorphoTrust USA Confidential 8  EXEMPT INFORMATION    Sensitive Data Handling and Storage Procedures PRC 00148 A 05    Exception Reporting    The following rules describe back up exception reporting   e Exception reporting must alert administrative staff when backups do not run as scheduled  fail  or  in any way not perform as planned      All backup failures are noted during the weekly review performed by the Manager of Operations   e IT performs test restores on a quarterly basis     Disaster Recovery    see MorphoTrust s Disaster Recovery Plan for more information   8  Destruction of Electronic Media    This section defines the rules governing the proper disposal of media containing electronic data     If a drive has classified information on it  it must be sanitized according to the procedures mandated by  DoD DSS  Information on these procedures can be found in the  nformation Spills and Cleanup Policy   PRC 00312 A     The disposal procedures used depend upon the type and inte
104. 2 00 7 00  Sa 8 00   2 00   Pocasset 50 Portside Drive  Unit F  Suite 2 Tue  Thu Fri  8 00 12 00 1 004 30   Wed  8 00 12 00  1 00 7 00   Salem 265 Essex St  M 9 00 5 00  Tu  We 11 00 7 00   Th 10 00 7 00  F 9 00 4 00  Sa  10 00 3 00   Southampton 12 College Highway Starting 12 17 2014 M F 9 00   12 30  1 00 5 00 e o Sa 9 00 2 00   Southbridge 100 Central Street Mon   Fri 8 40 3 30  Sat 8 20 2 00   Springfield 155 Brookdale Drive Mon 9 00 1 00  2 6 00  Tue  Fri  9 00 1 00   Springfield 372 Cooley St Tu  amp  We 9 12  1 6  Th 10 12  1 7   Fr 9 12  1 5  Sat 10 3   Taunton 71 Main Street Suite 2400 Thu 10 00 1 00  2 00 7 00  Fri  9 00 12 00  1 00 5 30  Sat 9 00   3 00   Tewksbury 1445 Main Street Tu  We  Fr 9 00 12 00 1 005 30   Th 10 00 12 00 1 00 7 00  Sa  10 00 3 00   Vineyard Haven 4 Pine Street Mon  Tue 3 00 6 00   Waltham 289 Moody St  Suite 112 new site starting 12 29 2014 M  Tu    9 00 12 00  1 00 5 30 W 10 00   1 00  2 00 7 00 Sa 9 00 3 00    West Yarmouth 572 Massachusetts Route 28 Unit 3E Mon  Wed  Fri  Sat  9 00 12 00   1 00 5 00   Westport 519 American Legion Hwy  Unit 3 M     9 00 12 00 1 00 5 00         We  Th 9 00 12 00 1 00 5 30  2nd  Sa 10 30 2 30   Worcester 490 Lincoln Street Unit 5 Tu  amp  W  9 00 12 1 00 5 30  Th  10 00 1 00 2 00 7 00  Sa 10 00   3 00   Appendix C     ie List of Fingerprinting Centers   SAFRAN    MorphoTrust USA    Appendix D   Letters of Reference    MorphoTrust has provided letters of reference from the following fingerprinting  programs 
105. 37 3107    Dear Mr  Maase     The Federal Bureau of Investigation  FBI  Criminal Justice Information Services  CJIS   Division has completed a review of the following test data     1 1 Identity TouchPrint 5100  TP 5100   incorporating the L 1 TP 5750 tenprint  Solutions  Inc  livescan device at 500 and 1000 ppi  without membrane       This review was conducted by representatives of the FBI and the MITRE Corporation s  image processing laboratory located in Bedford  Massachusetts  Based on the results of this review  the  FBI certifies that the equipment described above is in compliance with the following FBI CJIS Division s  Integrated Automated Fingerprint Identification System Image Quality Specifications  1  5      Appendix F Specifications    Please note  the certification process does not endorse one product over any other  product and only demonstrates that the product meets FBI standards  Continued acceptance of the images  created by an installed system  for retention in the FBI Master Fingerprint files  is contingent on the ability  of the product to meet the IQS over time  As equipment can degrade  the FBI recommends that your  company assist customers in the establishment of quality assurance programs and appropriate maintenance  schedules for your products     Please direct any questions regarding this certification to Mr  B  Scott Swann at   304  625 2477     Sincerely yours            On  Jerome M  Pender    Deputy Assistant Director  Operations Branch  Criminal
106. 4 Networking Devices    All networking devices must be approved by the MorphoTrust IT Department before they are  connected to the MorphoTrust network  Unapproved devices must not be connected to the  MorphoTrust network at any time     4 10 5 Wireless Networks    Advances in wireless technology and pervasive mobile devices create opportunities for new and  innovative business solutions  However  security risks  if not addressed correctly  could expose  information processing systems to a loss of service or a compromise of sensitive information     Wireless networking is a shared medium  Everything that is transmitted over the radio waves can  be intercepted if the interceptor is within the coverage area of the radio transmitters  This  represents a potential security issue with wireless Local Area Networks  LANs   The security  exposure is more evident if the wireless LANs are deployed or used in public areas  both in  MorphoTrust facilities  such as shared building areas  and in customers    environments     Authentication and strong encryption must be implemented to ensure that a wireless network or  access point cannot be exploited to disrupt sensitive information services or to gain unauthorized  access to sensitive information  When applicable and practical  suitable controls should be used  as well  such as Media Access Control  MAC  address restrictions or Remote Authentication Dial  In User Service  RADIUS  authentication with access profiles  When selecting wireless
107. 44 6 11 03 AM   Applicant JOHN S SMITH   Agency Concealed Handgun Licensing Bureau  Reason for Print Concealed Handgun License  TxGC 411 176   Auth Number 123ABC    Important A    YOU WILL BE REQUIRED TO BRING THE FOLLOWING DOCUMENTS TO YOUR ENROLLMENT      X             M    HQ to enrollment   1  Birth Certificate bearing an official seal  or certified copy  issued by a State  county     municipal authority  or outlying possession of the U S    2  Drivers License issued by a State  or outlying possession of the U S     Status as of 07 05 13     Pre Enrolled  You have successfully pre enrolled Please visit an enrollment center within one year to complete your enrollment    CONCEALED HANDGUN LICENSE ENROLL Appointment Details     Nashville  TN Appointment        Time  01 23 14 Q 12 15 PM CST 1 7 mi  15 Century        Note  Ample tractor trailer parking is avaliable In a lot and on the east side of Century Siva          500 at the dead end of the street  The Enroliment Center 5 located at 15 Century Siva  on       Nashville  TN 5th floor  in the office of MorphoTrust USA  Buliding Il is marked on the exterior stone sign     wih MorphoTrust USA  The inside lobby marquee lists the Enroliment Center n Suite 500     9                           tor Alens    Please provide 24 hours               when canceliing rescheduing an appointment  To reschedule an appointment  you must first cancel your existing appointment  Cancel Appointment  Home   About   FAQ   Contact Us                b
108. 5 Bakers Bridge Ave  Ste 105  695 Nashville Pike    431 E  Bernard Avenue  1824 Roane State Hwy    600 W Main St    43 Smith St  266 Grady Montgomery Drive  3101 Browns Mill Rd    Appendix C    List of Fingerprinting Centers    Mon   Fri 9 00   6 00 Sat 10 2  M F 9 12  amp  1 5 Sat 10 2  M F 8 12 amp 1 4    Mon   Thu 9 00   12 00  amp  1 00    4 00    Mon   Fri 9 00   6 00  Sat 11 00    3 00    Mon   Fri 8 30   4 30  Mon   Fri 10 00   6 00  Mon   Fri 7 30   5 00    Mon   Thu 8 00   4 30  Fri 8 00    3 30  Sat 9 00   11 00    Mon Fri 9 12 amp 1 5    Mon   Fri 9 00   6 30  Sat 10 00    3 30    M Th 8 30 4 00     8 30 3 00   Mon   Fri 9 00   12 00  amp  1 00   5 00  Mon   Fri 8 30   4 30   Mon   Fri 8 30   4 30    Tue  amp  Thu 8 30   11 00  amp  1 00    3 00    Mon   Fri 8 11  amp  1   6  Sat 9 00    1 00    Mon   Fri 9 00   6 20  Sat 9 00    1 00    Mon   Fri 9 00   6 00  Sat 9 00    2 00    Mon   Fri 10 00   5 00    Tue   Fri 9 30   5 30  Sat 10 30    3 00    Mon Fri 10 00 4 30    Mon   Fri 10 00   6 00  Sat 10 00    2 00    Mon  Tue  Thu  amp  Fri 10 00   12 00  amp   1 00   6 00  Sat 9 00   12 00    Fri 12 00   4 00  M F 8 30 11 00 amp 12 30 5 00    Mon   Fri 9 00   12 00  amp  1 00   5 00   Sat 10 00   2 00    139    otate of West Virginia CRFP     51500000010    Department of Administration Applicant Fingerprinting Services   Purchasing Division West Virginia State Police   Tennessee City   Address Hours of Operation   Kingsport 4128 Fort Henry Dr Mon   Fri 9 00   5 30  S
109. 6  183 ONGOING OPERATIONS AND MARKETING 090             8 3 15     184 Operational Management  Program reviews  Ongoing 0  PM Mon 8 3 15  Quarterly  185 Legislative affairs and new user agency meeting  Ongoing 0  PM Mon 1 11 16  Annually  Task EJ Project Summary v                Inactive Milestone    Manual Summary Rollup     Deadline    Project  West Virginia Applicant      Split iii External Tasks e          9 Inactive Summary P V Manual Summary quy     Progress  Date  Mon 5 11 15 Milestone   External Milestone    Manual Task LJ Start only L  Summary                        inactive Task Duration only c  Finish only J       Page 6    Appendix C     Lists of Fingerprinting  Centers in Referenced Programs    As specified in RFP requirement 4 3 2  MorphoTrust has provided a list of  Enrollment Centers  including the hours of availability  for the following    referenced programs      Texas Department of Public Safety  e Tennessee Bureau of Investigations       Massachusetts Executive Office of Public Safety    GS SAFRAN Appendix C    MorphoTrust USA List of Fingerprinting Centers    133    CRFP DPS1500000010  Applicant Fingerprinting Services  West Virginia State Police    otate of West Virginia  Department of Administration  Purchasing Division    MorphoTrust Enrollment Centers in Texas    ABILENE 500 CHESTNUT  SUITE 856 HOURS VARY  Abilene 441 S Treadway Blvd Mon   Fri 8 30   4 30  ALEDO 1008 BAILEY RANCH ROAD M   F 8 4 30  Allen 210 Central Expressway S  Ste 98 Mon   Sat Hou
110. 96 Engineering PM WVSP Mon 6 8 15 Engineering PM WVSP  review  112 Development as needed of current environment and 096 Engineering Mon 6 15 15 Engineering  website  113 WV Customer Review and Acceptance of Website and 096 PM WVSP Mon 7 27 15    PM WVSP  User Application solution  114 Results Delivery design and customer review 096 PM Engineering  WVSP Mon 6 8 15   ring  WVSP  115 Development as needed of current results delivery 096 Engineering Mon 6 15 15 gineering  116 WV Customer Review and Acceptance of Results Delivery 096 PM WVSP Mon 7 20 15 s  PM WVSP  solution  117 PHASE 1 Current  Contract Compliant Environment 096 Fri 7 31 15  GO LIVE Completed  118 Phase 2 UEP DESIGN  CUSTOMER REVIEW  AND 090 Thu 10 1 15               2                        119 MorphorTrust UEP Kickoff meeting with WV Stakeholders 0  PM WV Tue 9 1 15 PM WV Stakeholders  WVSP  Stakeholders  WVSP  120 WV UEP Design and Initial Development 0  PM  Engineering Tue 9 8 15 PM Engineering  121 WV Customer Review of UEP 0  PM WV Tue 10 6 15 M WV Stakeholders  WVSP  Stakeholders WVSP  122 WV Stakeholder Acceptance of UEP 096 WV Stakeholders  WVSP Wed 10 14 15  123 PHASE 2 UEP HARDWARE AND SOFTWARE 090 Thu 11 12 15         IMPLEMENTATION AND DEPLOYMENT       e  124 Phase 2 UEP Engineering Environment  90 120 Days 0  Engineering Wed 10 21 15 Engineering  Estimated         Task ES Project Summary V                M v Inactive Milestone    Manual Summary Rollup s Deadline  Project  West Virginia Applicant    
111. CJIS Security Policy required encryption standards  From there the data is stored  and then forwarded on to the State of West Virginia s AFIS system     Both our current solution and our proposed UEP system maintain adequate disk  capacity to store all fingerprints submissions in the event a communications  circuit is not operational  Once the circuit is available again  the system  automatically transmits its backlog of records  No records are deleted until the  State AFIS has confirmed receipt     We bring the experience of successfully interfacing to more than 20 State AFIS  systems  including 11 MorphoTrak AFIS systems  We currently submit  fingerprints to the state and federal AFIS systems shown in Table 12     n 500 pir Response Sheet       Q SAFRAN  52 SAFRAN   Attachment A     MorphoTrust USA    otate of West Virginia CRFP DPS1500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    Table 12  MorphoTrust s Current State and Federal AFIS Interfaces    MorphoTrust State AFIS Interfaces    Arkansas  MorphoTrak AFIS  Massachusetts  MorphoTrak AFIS  South Carolina   MorphoTrak AFIS   California Michigan Tennessee   MorphoTrak AFIS   Idaho Minnesota  MorphoTrak AFIS          5      Illinois New York   MorphoTrak AFIS  Utah   Indiana  Nevada   Virginia   Florida  MorphoTrak AFIS  Oklahoma   MorphoTrak AFIS  Washington State    Maine   MorphoTrak AFIS  Oregon  MorphoTrak AFIS  West Virginia   MorphoTrak AFIS 
112. CardPayment  CreditCardPayment  CreditCardPayment  CreditCardPayment  CroditCardPayment  CreditCardPayment  CreditCardPayment    CreditCardPayment    CreditCardPayment  CreditCardPayment    CreditCardPayment  CreditCardPayment    CreditCardPayment  CreditCardPayment    CreditCardPayment  CreditCardPaym    CRFP DPS1500000010  Applicant Fingerprinting Services  West Virginia State Police          End Oste   1 6 2015    Pay Gov Report    Friday    February 22  2015 to Friday  March 06  2015     Origin Location Name LocationID     UEID Service Date Program Service Reconcile Status Submission Date Remit Date eee Remit Amount Peep            reor Lec    ID Total Amt  Web UZZY16SV45 02 22 2015 DCFS Enroll Reconciled Success 2 22 2015 2 22 2015 2 22 2015  3250 1VTU6P 3250 Mastercard  Web UZZY16SS2H 02 22 2015 WLF Reconciled Success 2 22 2015 2 22 2015 2 22 2015  4475              4475 Mastercard  Wed UZZY 16STGS 02 22 2015          Enroll Reconciled Success 2 22 2015 2 22 2015 2 22 2015  3250 1VTS3J 3250 Visa  Web UZZY16SRZ1 02 22 2015 CwP Reconciled Success 2 22 2015 2 22 2015 2 22 2015 54475              4475 Discover  Web UZZY16SGK5 02 22 2015 DCFS Enroll Reconciled Success 2 22 2015 2722 2015 2 22 2015  3250 1VTTTH 3250 Mastercard  Workstation Abbeville  LA 8199 U2B54BNHN3 02 23 2015 CWP Enroll Reconciled Success 223015 2232015 2 23 2015  3775 1VUD7P 1718450 Visa  Workstation Alexandria  LA 1171 U3GQ4BN219 02 23 2015 CWP Enroll Reconciled Success 223015 223015 2232015  3775 t1VU3
113. Data Trustees Data trustees classify data in their functional areas  develop and maintain  clear and consistent procedures for access to MorphoTrust USA    Data Custodians       10 23 2014 MorphoTrust USA Confidential 5  EXEMPT INFORMATION    Sensitive Data Handling and Storage Procedures PRC 00148 A 05    administrative data  grant and revoke access  maintain an audit trail  i e    lists showing those granted access to administrative data  periodically review  access privileges to ensure that access is still warranted  remove access in a  timely manner for employees whose job responsibilities have changed   promote the security of the data in their subject areas  Ensure databases are    only installed on systems that are encrypted  in firewalled networks  on  systems with current operating system security patches  on systems with  virus protection  have default admin passwords removed  and have secure  strong passwords to systems        Owner of system secure data  Reviewer and final authority for granting  Customer    access rules to custodians and delegates     2  Data Collection    Authorized personnel should collect only the minimum necessary sensitive information required to  perform MorphoTrust USA business  Such personnel must ensure that all decisions regarding the  collection and use of sensitive data are in compliance with the law and with MorphoTrust USA policies  and procedures     3  Data Access    The following rules govern the access to sensitive information  
114. Depending on the Change type  CCRs are approved  as outlined in the Types of Changes chart above     CCR Pre Processing     For each        submitted  The responsible Manager s   Team Lead  and  CCB Chair will review the request and approve  reject  or send for review in the next CCB  meeting    Emergency Request Review     all new emergency requests will be reviewed weekly    Time Frame     All emergency CCRs must be completed within 2 days of the emergency   Procedure Violations     Failure to follow this process can potentially impact customer  satisfaction and puts MorphoTrust at risk  As such  all process violations  which include any  implementation of a change prior to CCB approval  will be reported to the Director of IT and the  CIO  At their discretion  consequences may include formal disciplinary action up to and including  termination of employment     10 23 2014 MorphoTrust USA Confidential 7    EXEMPT INFORMATION    IT Change Management Procedure PRC 00085 B 05    9  Definitions  TERM    Business Services    DEFINITION    An IT Service that directly supports a Business Process  as  opposed to an Infrastructure Service which is used internally by the       Change Control Board    IT Service Provider and is not usually visible to the Business   See Change Control Board    The addition  modification or removal of anything that could have an  effect on IT services  The Scope should include all IT Services and  underlying Configuration items     The Change Control Boa
115. Disaster Drill Training     Be prepared to respond     Regular audits of backups are performed  Quarterly staff review of the disaster plan must occur in  order to enable preparedness in time of crisis  Likewise  this plan must be updated as  technologies change and as systems alter     3 Post Disaster    A disaster is defined as any event  either natural or man made  that results in either a loss of  systems functions or integrity of the facility  including but not limited to     e Breach of IT systems resulting in the loss of power and or functionality  e Flooding  e Physical breaches resulting in the loss of perimeter integrity       Theft of secure data and or materials     3 1 Disaster Assessment and Response    At the moment of a crisis that affects IT  the CIO needs to make fast assessment and decisions   Key to the fast response is constant knowledge of the state of all IT components  Once an  evaluation assessment is complete actions must be taken to return the system to functional     Restoring the physical security of the facility must be of the highest priority  The designated  breach manager will work with the local police authorities to guard the facility from further  damages or breaches while waiting for the MorphoTrust USA contracted security firm personnel  to arrive on scene and assume responsibility for protecting the property     MorphoTrust USA has under contract a national security firm with the ability to deploy uniformed   armed guards to our faciliti
116. Executive Office of Public Safety    Description of Technical MorphoTrust Live Scan system   Solution MorphoTrust Store and Forward Server  Proprietary registration  back end and billing software  Secure connection to State MorphoTrak AFIS  Cisco Virtual Private Network encryption of data transfer circuits  Customized agency system integration and data sharing protocols  MorphoTrust iA thenticate document authentication system  Card scan system    List of Fingerprinting Centers Included in Appendix C   with hours of operation     Letter of Recommendation Included in Appendix D       433        Vendor must also submit at least 3  three  additional references that may be outside  the scope of this project but will demonstrate the Vendor s ability to implement and  complete projects comparable to the size and scope of this RFP     MorphoTrust has provided an additional three successful applicant fingerprint  networks for the states of New York and Michigan and the Transportation  Security Administration  Contact information  size and scope of networks and  other required information are noted below     Table 6  New York Department of Criminal Justice Services    Company New York Department of Criminal Justice Services  Company Address and NYS Division of Criminal Justice Services  Telephone Number 4 Tower Place   Albany  NY 12203 3764   518 457 5837    Contact Person Ann Sammons  Manager   Civil Identification Bureau  NYS Division of Criminal Justice Services  4 Tower Place  Alb
117. Fee Collection Billing Reconciliation  for State access only     MorphoTrust leverages Microsoft s SQL Server Reporting Services  SSRS  for  report generation and delivery services  The SSRS database server is deployed in  a cluster  which allows for continuous operation when any one node in the  cluster either fails or is taken offline for maintenance     The network and reporting tools currently in use in West Virginia will continue  to be in place upon contract award  Reports are based on information stored on  the Transaction Control Processor  already in place today within the WVSP Data  Center  Examples of current reports are included on the following pages     Reports are available in real time to the State via a secure extranet reporting  module  Approved contacts are provided a username and access to the secure  module     Authorized users can generate ad hoc reports using a number of parameters   such as date range  applicant type  status  employer and name  All reports  available through the extranet module can be viewed  printed or downloaded in  a spreadsheet format  Reports are also available through daily emails for  requesting agencies  Reports for applicants printed  transaction information  and  status are delivered to the approved contacts by email     Once our UEP solution is deployed  additional reporting capabilities will become  available  UEP delivers reporting capabilities proven to successfully meet the  needs of large state agencies and federal prog
118. Fees  Location  Last Name  UEID  Enrollment ID number   Service Date   amp   Authorization Code  unique one time use code   In addition  all billing accounts  customers will have access to MorphoTrust s Billing Account Portal for the  purpose of managing code distribution  verifying redemption  and reconciliation  reporting    MorphoTrust has proven processes that we currently follow to manage more    than 5 000 customer billing accounts in multiple fingerprinting programs     Q SAFRAN Mandatory Specification Checklist 115  MorphoTrust USA         State of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    4 5 8 Maintenance  a  Equipment and Software    Describe the maintenance levels that will be provided for each of the elements of the network   including how the State would request maintenance and what the Vendor will do to mitigate  disruption of service to the Applicants     MorphoTrust meets the requirements     MorphoTrust addresses maintenance of all systems at several levels  Enrollment  Agent  Technical Help Desk  and Field Service Engineering  The State may  initiate maintenance requests by calling our toll free Customer Service Center     Our Technical Help Desk employs trained  experienced technicians that provide  technical support for Enrollment Agents in the field as well as support for state  agencies for issues such as web based scheduling support  server issue
119. Fri 10 00   3 00  LUBBOCK 1628 19TH STREET PENDING  LUBBOCK 1500 BROADWAY  SUITE 1113 HOURS VARY  Lubbock 3417 73rd  Ste B2 Mon  amp  Fri 8 00   4 30  Tue    Thu 8 00   7 30  LUFKIN 101 COTTON SQUARE T Th9 11 30  Lufkin 515 S First St  Ste L Mon   Fri 8 00   5 00  MANSFIELD 1522 N WALNUT CREEK DRIVE M   F 9 4  McAllen 929 E Esperanza Ave  Ste 19 Mon   Fri 8 00   4 30  McKinney 1918 University Business Drive Suite 512 M THUR 9 6 FRI 9 5 SAT  9 2  MCKINNEY 1 DUVALL STREET M   F 8 00 4 00  MESQUITE 612 E  DAVIS T  amp  THUR 8 4  MIDLAND 3300 NORTH A STREET  BUILDING 4  SUITE 228 HOURS VARY  MIDLAND 615 W MISSOUHI M   F 8 30 11 30  New Braunfels 5990 FM 725 Tues   Sat 10 00 6 00  NEW BRAUNFELS 1404 IH 35 NORTH      F 8 30   4  Odessa 1560 W 1 20 Mon  Wed Fri 8 00 4 40   Tue  amp  Thur 8 00 5 20  Sat  8 20 11 20  Palestine 2908 West Oak Street Mon Fri 8 20 4 00  Pampa 1101 N Hobart St Mon  Wed  amp  Fri 8 30    4 30  Paris 420 N Collegiate Dr  Ste 100 Wed  amp  Fri 8 30   5 00  Pearland 2010 East Broadway M F8 5  Pittsburg 4845 NUS Hwy 271 Mon   Fri 9 00   3 00  PLANO 2608 AVENUE K M   S 10 8 30  Presidio 406 E O Reilly Mon   Fri 9 00   1 00  amp   2 00   5 00  RICHARDSON 100 N CENTRAL EXPRESSWAY  SUITE 350 PENDING  RICHARDSON 400 SOUTH GREENVILLE AVENUE         8 4  Richland Hills 6900 Boulevard 26  Ste A Mon   Fri 8 00   4 30  Rosenberg 1912 Avenue H Suite D M   F 9 00 5 30  Round Rock 555 Round Rock W Dr  Bldg E  Ste 224 Mon   Fri 8 20   4 30  ROYSE CITY 810 OLD GREENVILLE RD T
120. Kottas  Chief Privacy  amp   Chief Information Officer Information Security Officer    This document contains confidential and proprietary information of MorphoTrust USA  No part of this  document may be reproduced  disclosed  distributed  or used in any form by any means   graphic   electronic  or mechanical  including photocopying  recording  taping  or information storage or retrieval      without written permission of MorphoTrust USA     10 23 2014 MorphoTrust USA Confidential 1  EXEMPT INFORMATION    Sensitive Data Handling and Storage Procedures PRC 00148 A 05    Table of Contents  t  1499  0 eC  9 m THREE    3  Data Custodians and                                                                         3                     M                                                                   3  NES SHI AMOUNT DINER yep asectenanetc   saeaeeceeneccne  geeasacteumeebebereerehespeeecaee  4  Rolos        SOONG IOIM TTE IT TIO 5  FSS OOM SIMS RE T T T 5  2  Wate COMC GUO PME m 6  2 BUE    OSE e E        6  4  Data Handling and         5                                                                                                                                                                                  6  De OJO o Ez Cl a ar    A             7  6  Data Retention and Disposal                ccccccsssccccseseeeceeescecceeseeecseeeeceeuseeeseasecessaecesseuseeessageeessaueeesssgeeeeseas 7  7  Back Up of Data  Data Storage                      sssssssssissssssseeeeeee nen
121. MATION    Information Security  Customer Data Access and Security Policy PRC 00174 A 07    Need to Know Policy PRC 00141   Privacy Policy PRC 00144   Classification of Information and Materials Policy PRC 00121  Corporate IT Security Policy PRC 001 12   Employee Security Screening Policy PRC 00134   IT Information Security PRC 00089   IT Physical IT Access Controls PRC 00091   Liability Policy PRC 00140   Security Awareness Training Policy PRC 00152   Security Quick Reference PUB 00185    01 31 2012 Confidential 7 of 7    EXEMPT INFORMATION    IT Virus Protection PRC 00093 B 01    IT VIRUS PROTECTION POLICY    Document Number  PRC 00093 B    Revision Level  01    Approval    Robert Stack Robert Eckel    Chief Information Officer President       This document contains confidential and proprietary information of MorphoTrust USA  No part of this  document may be reproduced  disclosed  distributed  or used in any form by any means   graphic   electronic  or mechanical  including photocopying  recording  taping  or information storage or retrieval      without written permission of MorphoTrust USA     Users are responsible for making sure that they have the current revision of this  document     8 22 2011 MorphoTrust USA Confidential Page 1 of 4  EXEMPT INFORMATION    IT Virus Protection PRC 00093 B 01    TABLE OF CONTENTS    1 OVERVIEW d                                                                3  2 POLK  OE                         P HO  3  3 PROCEDURE  arera M              
122. MorphoTrust  equipment  All files will need to be securely deleted and the drive reformatted by IT first  Then the  drive will be able to be reused  To preserve any files on the drive  use the travel laptop to email  them to yourself first using httos  mail morphotrust com     e      source code files can be taken outside the country on any kind of portable device    e Do        connect your company devices to a Safran or Morpho affiliate network of any kind  wired  or wireless  using any method            sure that you only connect to known valid WiFi or wired connections  Refer to Section 5 for  more information  Do not use WiFi connections that are not secured  that is  they have no  password or passcode  or they use WEP for security    11  Encryption    Whenever sensitive data  Customer information  customer data  company confidential  and company  restricted data  is sent over a public computer network  Internet   encryption methods authorized by IT  must be used to protect it  All laptops or portable data storage devices must utilize  at a minimum  whole  disk encryption  to ensure that if the device is lost or stolen  no unauthorized access is possible     The use of physical security measures such as safes  locking furniture  hard drive locks  CPU locks and  locking office doors is recommended as a supplementary measure to protect sensitive data     10 23 2014 MorphoTrust USA Confidential 11  EXEMPT INFORMATION    IT Change Management Procedure PRC 00085 B 05    IT Ch
123. PO 1311726 Visa  Workstation Baker  LA 1069 UZZY16GNBH 02 23 2015          Enroll Reconciled Success 2 23 2015 2232015 2 2342015  3775 1VUDT7P 17184 50 Visa  Workstation Bastrop  LA 7028 U2JB4BNR7S 02232015 CWP Enroll Reconciled Success 2 23 2015 2252015 2 23 2015 53775 1VUE2E 1225725 Visa  Workstation Baton Rouge  LA 5023 UZZY 16QHSN 02 23 2015 CWP Enroll Reconciled Success 2 23 2015 2 23 2015 2 23 2015  3775 1VU593 1837351 American  xpress  Workstation Metairie  LA 1182 UZZY16SJ2V 02 23 2015 CWP Enroll Reconciled Success 2232015 2 23 2015 2 23 2015  3775 1VUTMO 16781 00  Visa  Workstation 5023 UZZY16QVQV 02 20 2015      Enroll  Reconciled Success 2 23 2015 2232015 2232015 537 75 1VU35H 853950 Mastercard  Baton Rouge  LA CWP  Workstation Morgan City  LA 5014 U1F84BN538 02 23 2015 DcFS Enroll Reconciled Success 2 25 2015 2 23 2015 2 23 2015  8075 1VU611 2014526 Visa  Workstation New Orleans  LA 7037 UZZY 16SJJH 02 23 2015          Enroll Reconciled Success 2 23 2015 2 23 2015 2 23 2015  3775 tVU6T1 20145 26             Workstation Pineville  LA 5031 UZZY16S627 02 20 2015        Enroll Reconciled Success 2 23 2015 2232015 2 23 2015  3775 1VU261 723776 Visa  Norkstatiog Alexandria       1124 LZ2 Y 16HRSK 02 2 15                Reconciled Success 2 23 2015 1215 22320 537 NT 1870226 Vi    Figure 28  Sample Report for Fee Collection and Billing Reconciliation  UEP Solution     4 4 6 Equipment    4 4 6 1 The Vendor should describe in detail how they will capture Applicant fingerpri
124. RFP requirement 4 5 2  MorphoTrust has provided letters from the Federal  Bureau of Investigation  FBI  Criminal Justice Information Services  CJIS   certifying that our TouchPrint 4100  TP 4100   TouchPrint 5100  TP 5100   and  TouchPrint 5300  TP 5300  Livescan devices have been tested and found to be in  compliance with the FBI CJIS Integrated Automated Fingerprint Identification  System Image Quality Specifications  IOS  Appendix F Specifications     Please note that the FBI certification letters are addressed to Identix  Inc  and  L  1 Identity Solutions  Inc  Both companies are original entities that are now    MorphoTrust USA  LLC      SAFRAN Appendix E      2 MorphoTrust USA FBI Certification    otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    This page intentionally left blank     146 Appendix E    SAFRAN    FBI Certification MorphotTrust USA    U S  Department of Justice    Federal Bureau of Investigation       Clarksburg  WV 26306    June 27  2006    Mr                      Identix  Inc    Suite 205   5600 Rowland Road  Minnetonka  MN 55343    Dear Mr  Maase     The Federal Bureau of Investigation  FBI  Criminal Justice Information Services  CJIS   Division has completed a review of the following test data     Submitting Vendor Equipment    Identix  Inc  TouchPrint 4100       4100  Livescan Fingerprint and Identification Flats  device at 500 ppi  with and w
125. Rs and Help  Desk support teams the knowledge  tools  resources and escalation  resolution  paths needed to provide accurate and high quality service to applicants the first  time  so that repeat visits are minimized and the customer experience is positive     Performance Evaluations         new hires also receive a 90 day performance evaluation  regardless of their  status as MorphoTrust employee  partner  or subcontractor  The evaluation  provides supervisors a formalized process to acknowledge accomplishments   address any learning curve issues  and discuss areas for improvement  Our team  remains engaged with all Enrollment Agents throughout their career at  MorphoTrust  offering retraining  performance incentives  career development  paths  professional development  and supplemental training  i e   management  training  PMP certification  etc       4 4 4 Provide automated results processing capability  security and billing system     4 4 4 1 The Vendor should describe in detail their plan to collect and house Applicant  fingerprint submissions including print images  signatures and demographic data  on a central server which should at a minimum include their archive retention  plan  submission storage format  unplanned outage procedures  re transmission  procedures and backup plan     MorphoTrust currently provides all results processing  security  and billing  systems for the State of West Virginia  Upon contract award  we will continue  utilizing the infrastructure in 
126. S   applicant experience  is    Security and Privacy Controls for Federal Citizen who  complemented by our EasyPath Information Systems and Organizations     undergoes a rigorous  results delivery solution that In addition  our UEP solution meets Federal background check  facilitates adjudication and Information Security Management Act of prior to employment   manages results delivery  2002  FISMA  standards     4 4 2  Provide a Customer Service Center to serve as a single point of contact     4 4 2 1 The Vendor should describe in detail their plan to provide a customer service  center and include the hours of operation  where the center will be located at and  the number of staff assigned  The plan should also detail the type of service the  center will provide to the Applicant upon calling     MorphoTrust operates a centralized  scalable Customer Seroice Center  CSC    which currently accepts over two million calls per year for numerous statewide  networks     including the State of West Virginia     We operate the CSC in two U S  cities  Springfield  IL and Des Moines  IA  to  minimize outages due to disaster  weather  or telecommunications issues  West  Virginia applicants and agencies are able to access the        conveniently from  anywhere in the United States via a single  toll free  program specific telephone  number            SAFRAN Vendor Response Sheet           MorphorTrust USA  Attachment A     otate of West Virginia CRFP     51500000010  Department of Administ
127. S POSITIONS IT AND EXECUTIVES AND                                                                 8  5                  NETT RI EU T m e 8  5 1 AUTHORITY AND AUTHORIZATION TO SPEND                                    nnne nnn nennen nnns 8  6 DECISION NY cm                                    v   8  6 1 PAC CESS TO FAN                                              8  6 2 ACCESO TO CONTACT sete sere a 8  6 3 ANV ACIN aE E E E E E 9  7 RELOCATION OF SYSTEMS                                                                                                                                                                                     9  8 RELOCATION OF                                                                      nnn nnn                         nsa nnn nnns 9  9 FINANCE PURCHASIN           iUas cuta ee 9  02 13 2012 MorphoTrust USA Confidential Page 2 of 10    EXEMPT INFORMATION    IT Disaster Recovery Policy PRC 00095 B 02    10 DEVELOPMENT LEER 9  11 CUSTOMER SUPPORT                          10  12 RETURN TO NORMAL                                                                                                                10  13 PLAN UPDATES      10  02 13 2012 MorphoTrust USA Confidential Page 3 of 10    EXEMPT INFORMATION    IT Disaster Recovery Policy PRC 00095 B 02    1Assump tions    MorphoTrust USA s main IT components reside at the Billerica Massachusetts USA facility  This  Disaster Recovery Plan defines the process for protecting and recovering the major IT  in
128. S Vendor       Creme Create             Cancel       Figure 47  UEP Administrative Portal    With the UEP Administrative portal  the State of West Virginia and West Virginia agencies will have  access to the same support and tracking system used by MorphoTrust Customer Service  Representatives to quickly find applicants and see the status of their enrollments     148                  F  amp  SAFRAN    Optional Features     M orphoTrust USA    otate of West Virginia CRFP DPS1500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    Authorized users can quickly search and find applicants related to their agency   Figure 48   Once an applicant is located  the admin user can view details about  the applicant s interactions with the MorphoTrust enrollment process                Select Applicant  DOB Phone 1 Phone 2 Email  04 01 1920 2566353333 2566353354 tparton morphotrust com  09 26 1972 6154275922 qQatest5Othinkmcs  com  t hn mee 02 04 1971 2565555555  New Applicant  NEW TICKET Do not include        in Ticket Notes   Program Purpose Queue   Priority Status    Figure 48  UEP Administrative Portal     Applicant Search    This complete step by step history of every enrollment  Figure 49  provides  details about when appointments were made  when services were provided  how  payment was made  when the record was submitted to the state  and when all  responses have been received                    RR   UC             
129. SA Confidential 5  EXEMPT INFORMATION    Computer and System Use Policy PRC 001 10 A 10    Virus Procedures for Production Servers     e Virus protection software that is centrally managed by IT shall be loaded on each production server  and stay a resident program to constantly monitor for viruses to prevent introduction to the network   Any exceptions must be approved by both the IT and Security Departments     Email Virus Procedures    e      email and attachments to email are scanned to prevent viruses from entering through the email  System     e      emails are filtered prior to entering the MorphoTrust USA network through a best practice email  filtering application  This application uses multiple anti virus engines and all anti virus signatures are  updated in real time     o The whitelist for the email filtering application should be reviewed at least once a year to  verify that each whitelist entry is still valid     e Reports are generated monthly to ensure compliance     Updating Virus Definitions                            USA IT shall configuration the virus protection application to regularly update its virus  definitions from the software vendor  This process should be monitored by way of log files  The  applications should be configured to send email alerts to the virus application administrator regarding  the status of the virus definition update  In the case of an unsuccessful update the administrator  should manually execute the virus definition update    
130. SO and ISO to see if there is some other ways to mitigate the risks  such as using a  dedicated machine on an isolated subnet within the corporate network to access the customer s  environment     4 18 Customer Accommodation Policy    Customer environments and their associated security policies  or lack thereof  form a very  diverse set of deployment scenarios for MorphoTrust products  services  and solutions  While  some customers are very conscientious about security and have various compliance processes  and procedures  other customers treat security considerations as lesser priorities  Indeed  some  customer legacy systems simply cannot support more modern security protocols and  conventions  Furthermore  some customers may not want the level of security that MorphoTrust  would use or recommend yet MorphoTrust is contractually responsible for and has control of the  security of the system  In these cases  it may be necessary to use a reduced security level   herein called a security accommodation  to allow the MorphoTrust system to work in the  customer s environment  according to the policy guidelines in the following subsections     The use of security accommodations should only be done as an exception and not as a normal  procedure     4 18 1  gt  Acceptable Security Accommodations    When a conflict is identified between the security policies in this CSP and the limitations imposed  by the customer s environment  the following procedure should be followed by the peopl
131. TSA  Universal  Enrollment    Services    Massa   chusetts    Tennessee                     Number       sites    65 000    2011    Present    Annual Volume    Contract  Period    800 000    2005    Present    Statewide  261 797  Fixed and    Mobile  12 weeks    225 000    2001 2006    2011   Present    Statewide  42 143  Fixed and    Mobile  6 weeks    150 000  2014     Present  Statewide  10 550  Fixed and    Mobile  16 weeks    300 000  2009     Present  Statewide  54 520  Fixed and    Mobile  16 weeks    150 000    2005   2010    2013   Present    Statewide  96 700  Fixed and    Mobile  9 weeks    1 5 million    2012   Present    Nationwide  3 8M    Fixed and  Mobile    12 months        12  weeks     AFIS Interface Yes Yes Yes Yes Yes Yes Yes    Geographic Statewide  Coverage   Square 24 230  mileage   Location Fixed and  strategy Mobile  Full 12 weeks  Operational   Capability   Central Server Yes   single   transmission   point    Pre enrollment Yes  Web site   Pre enrollment Yes   Call Center      SAFRAN    MorphorTrust USA    Yes    Yes    Yes    Yes    Yes    Yes    Vendor Response Sheet   Attachment A     Yes    Yes    Yes    Yes    Yes       Yes    11    otate of West Virginia  Department of Administration  Purchasing Division    Attribute West  Virginia                    Network    Texas Tennessee    Massa   chusetts    CRFP DPS1500000010  Applicant Fingerprinting Services  West Virginia State Police    New York TSA  Universal  Enrollment    Services             
132. Trust USA networks is strictly prohibited    e  MorphoTrust USA will employ virus management measures at appropriate ingress and  egress points of the company networks  MorphoTrust USA will implement virus control  procedures to ensure that all computer servers and workstations are protected against  viruses     3 Procedur        3 1 Work station    e     data and or program files must be scanned for viruses before installation to safeguard  MorphoTrust USA networks from infection  This includes shareware and freeware obtained  from electronic bulletin boards or on disk  diskette or CD ROM   custom developed software   and software received through business sources    e All data and program files that have been electronically transmitted to an MorphoTrust USA  computer from another location  internal or external  must be scanned for viruses immediately  after being received    e      computer media  diskette  CD  etc  is a potential source for a computer virus  Therefore   all media must be scanned for virus infection before it is used in a MorphoTrust USA  computer or network server    e Virus protection software shall be loaded on each desktop computer and server and stay     resident program to constantly monitor for viruses to prevent introduction to the network     3 2 Email    e      email and attachments to email are scanned to prevent viruses from entering through the  email system    e      emails are filtered prior to entering the MorphoTrust USA network through a b
133. UES  amp  THUR 8 30 2 00  San Angelo 917 S Abe St  Ste A 3 Mon   Fri 8 00   5 00  San Antonio 3859 E  Southcross Blvd  Suite H M   F 9 8 30   5 00  San Antonio 9258 Culebra Road Suite 101 Room 5 M F 9 20   5 20  SAN ANTONIO 6100 BANDERA ROAD  SUITE 407 HOURS VARY  S SAFRAN Appendix C       MorphoTrust USA List of Fingerprinting Centers    CRFP DPS1500000010  Applicant Fingerprinting Services  West Virginia State Police    otate of West Virginia  Department of Administration  Purchasing Division    SAN ANTONIO 10000 SAN PEDRO  SUITE 175 HOURS VARY   San Antonio 6800 Park Ten Blvd  Ste 108  N Bldg Mon   Fri 8 00   5 30   SAN ANTONIO 5617 GRISSOM ROAD HOURS VARY  PLEASE  SCHEDULE FOR APPT  AVAILABILITY   San Antonio 8750 Tesoro Dr  Rm 119 Mon   Fri 8 00   4 30   San Antonio 1314 Hines Ave Mon   Fri 8 00   4 30   San Marcos 915 Highway 80 M  W  F 8 30 4 30  T  Th  10 00 6 00   Seminole 101 SW eth St  Tue 8 00   12 00   Sherman 1413 Texoma Parkway M  W  F 8 20 12 00  1 00   4 30   Sonora 311 N Hwy 277 Wed 11 00   5 00   Spring 4405 Spring Cypress Road  Suite 112 M   F 8 20 4 30   Sugar Land 2245 Texas Drive Suite 190 Hours Vary   Temple 18 E Ave A M  W  Th 8 00 10 00  F  8 00 11 00   Terrell 804 E  Moore Ave  Suite A Mon   Thurs 10 00   6 00   Texarkana 3939 Summerhill Road M   Th 8 00 2 00  Fri 8 00   12 00   Texas City 3300 FM 1765 Mon   Fri 9 00   5 00   Tyler 1324 South Beckham  Suite 109 Mon   Fri 8 00 3 00   TYLER 909 ESE LOOP 323  SUITE 625 HOURS VARY   UValde 2801 E Main S
134. UZZYOOOBCS 04 14 2015 CwP Enroll Reconciled Success 4 14 2015 4 14 2015  04 14 2015  60 00 CreditCardPayment Web UZZYOO0ZA9 04 14 2015           Enroll Reconciled Success 4 14 2015 4 14 2015  04 14 2015  60 00 CreditCardPayment Web UZZYOOOKHS 04 14 2015 EMS Enroll Reconciled Success 4 14 2015 4 14 2015  04 14 2015  60 00 CreditCardPayment Web UZZYOOOPD3 04 14 2015 WVDE Enroll Reconciled Success 4 14 2015 4 14 2015  04 14 2015  67 00 CreditCardPayment Web UZZYO0034V 04 14 2015 EMS Enroll Reconciled Success 4 14 2015 4 14 2015  04 14 2015  67 00 CreditCardPayment Web UZZYOO08M2 04 14 2015 CWP Enroll Reconciled Success 4 14 2015 4 14 2015  04 14 2015  6000 CreditCardPayment Web UZZY00086H 04 14 2015           VCA            Reconciled Success 4 14 2015 4 14 2015  04 14 2015 S60 00 CreditCardPayment Web UZZY000X47 04 14 2015 NCPA                    Reconciled Success 4 14 2015 4 14 2015       Figure 46  Ad Hoc Search Capability    4 5 7 Billing  a  Fee Structure    The Vendor will be responsible for collecting the entire Applicant fingerprinting fee from either the  Applicant or the Applicant s sponsoring agency business  The fee is comprised of     State fee   20 00   State Authorized Central Abuse Fee  if applicable   10 00        fee   14 75   FBINCPA VCA Volunteer fee   13 50   NCPANCA State fee   10 00   Vendor Electronic Rolling Submission fee  TBD   Vendor Manual Rolling Fee  TBD   Vendor Card Conversion Submission Fee  TBD    Any invalid fees collected by the contractor  
135. WV 25705 1754   Note  Note  Tractor trailer parking is available 60 feet from the front door  Location 10 8310   9 View Map      Sign Up for Alerts       South Charleston  WV 36 0 mi      Parkersburg  WV 73 9 mi      Columbus  OH 119 7 m    gt  Highland Heights  KY 120 4 mi   E      Kes  Home   About  FAQ   Contact Us Vigo teint       Figure 10  Selecting an Appointment Location from the List of Enrollment Centers    The Pre Enrollment Website lists MorphoTrust   s fingerprint Enrollment Centers in West   Virginia by region or zip code  shows available appointments  provides directions  and   links to an online map  Applicants can book a fingerprinting appointment and cancel or  change a scheduled appointment without additional rescheduling cost       SAFRAN Vendor Response Sheet         MorphoTrust USA  Attachment A     otate of West Virginia CRFP     51500000010    Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    42    After the applicant has scheduled an appointment  a confirmation page  shown  in Figure 11  lists the appointment details and reminders to help the applicant  prepare for a successful visit to a fingerprinting Enrollment Center     IdentoGD    By MorphoTrust USA UniversalEnrollment    HOME ABOUT FAQ CONTACT US    Thank you for pre enrolling  Your transaction summary is below     Note  In person enrollment must be completed within one year of pre enrollment date     Service Details    Date  06 19
136. XEMPT INFORMATION    4 17 2015    Compli  Print   MorphoTrust   Privacy Policy Page 3 of 6       gt                  Privacy Policy POL 00144 A 08             E     1  Objectives     MorphoTrust USA understands the vital importance of safeguarding the private information of our      customers  citizens  Thus  privacy and security are an integral part of the culture at MorphoTrust USA     and our solutions for information management are built upon established best practices in secure  facilities  supply chain management  business process  credentials  data  and personnel management   We are absolutely committed to building and maintaining ethical relationships and to educating our  emplayees and clients on the importance of handling information in a secure and responsible manner                     EEA PTA         2  The Fair Information Practice Principles  FIPPs     In order to enhance privacy in the conduct of online transactions  Fair Information Practice Principles   FIPPs  must be universally and consistently adopted and applied in MorphoTrust USA  FIPPs are         widely accepted framework of defining principles to be used in the evaluation and consideration of     systems  processes  or programs that impact individual privacy  The Fair Information Practice Principles     are            Transparency  MorphoTrust USA should be transparent and provide notice to the     customer jurisdictions regarding collection  use  and maintenance of Personally Identifiable     Inform
137. ZZY000H62 04 14 2015 NCPA   Enroll Reconciled Success 4 14 2015 4 14 2015  04 14 2015  60 00 CreditCardPayment Web UZZYOOOMN4 04 14 2015 REAB Enroll Reconciled Success 4 14 2015 4 14 2015  04 14 2015  60 00 CreditCardPayment Web UZZYOO0D8X 04 14 2015 EMS Enroll Reconciled Success 4 14 2015 4 14 2015  04 14 2015  60 00 CreditCardPayment Web UZZYOO0VZA 04 14 2015 NCPA         Enroll Reconciled Success 4 14 2015 4 14 2015  04 14 2015  60 00 CreditCardPayment Web UZZYOO0PK3 04 14 2015 WVDE Enroll Reconciled Success 4 14 2015 4 14 2015  04 14 2015  60 00 CreditCardPayment Web UZZYO0ODA1G 04 14 2015 CWP Enroll Reconciled Success 4 14 2015 4 14 2015  04 14 2015  67 00 CreditCardPayment Web UZZYOO0J7R 04 14 2015 EMS Enroll Reconciled Success 4 14 2015 4 14 2015  04 14 2015  60 00 CouponPayment Web UZZYOO0F 34 04 14 2015 CWP Enroll Reconciled Success 4 14 2015 4 14 2015  04 14 2015  60 00 CreditCardPayment Web Uzzvoooa YS 04 14 2015 NCPA         Enroll Reconciled Success 4 14 2015 4 14 2015  04 14 2015  60 00 CreditCardPayment Web UZZY000853 04 14 2015 WVDE Enroll Reconciled Success 4 14 2015 4 14 2015  04 14 2015  60 00 CreditCardPayment Web UZZYOOOS3T 04 14 2015 EMS                               Success 4 14 2015 4 14 2015  04 14 2015  60 00 CreditCardPayment Web UZZYOOO64E 04 14 2015 EMS Enroll Reconciled Success 4 14 2015 4 14 2015  04 14 2015  60 00 CreditCardPayment Web UZZYO00PW7 04 14 2015 REAB Enroll Reconciled Success 4 14 2015 4 14 2015  04 14 2015  60 00 CouponPayment Web 
138. additional details of our plan for collecting fees from  applicants in our response to requirement 4 4 2 6     Payment Statistics    MorphoTrust  s UEP system provides payment statistics in real time or per    Payment Statistics Report    March 14  WV  Workstation  CreditCardPayment 3099 66   Visa 1745  MasterCard 942  Discover 145  American Express 267  CheckMOPayment 186 4   AuthCodePayment 1378 29   Web  CreditCardPayment 13 0   Visa 10  MasterCard 2    Discover 0  American Express 1    CheckMOPayment 2 096  N 4 678    Figure 38  Monthly Payment Statistics Report    scheduled report distribution  daily  monthly   or annually   Figure 38 is an example of a  monthly payment statistics report     Enrollment level itemized detail supporting  each value is also available for download in  CSV format     Appointment Scheduling    MorphoTrust will provide adequate  Enrollment Center locations and appointment  capacity to ensure that applicants have access  to locations and appointment slots so that  they can be fingerprinted within 10 business    days     As part of our Quality Assurance Surveillance  Plan  QASP   we routinely monitor    appointment availability  Our program management and regional operations  teams evaluate Enrollment Center capacity and utilization on a recurring  schedule to assess and remediate recurring issues related to appointment  availability     Mandatory Specification Checklist       AFRAN  2 m  Attachment B  21    MorphoTrust USA    otate of West Virgi
139. age  require notification to system users  An announcement of the  change will be sent out from the IT Service Desk to the affected parties at least seven  7  days  prior to the scheduled outage   CCB Meeting     When any change above a standard change is being scheduled  the IT Head of  Infrastructure Services  or alternate  shall schedule and chair the CCB  The following personnel   or their delegates with authority accountability to act on their behalf  are required to attend all  CCB s    o The Chair   o Director of Application Services  Applications Development Network Systems Security Help Desk Leads and the senior managers  representing these departments     10 23 2014 MorphoTrust USA Confidential 6    EXEMPT INFORMATION    IT Change Management Procedure PRC 00085 B 05    p     Initiators of all CCRs coming before a specific CCB meeting   Attendance of other IT personnel is optional  These meetings can be in person or by conference  calls   The initiating Manager or Team Lead will approve the CCR for review by the CCB   Every meeting will begin with a recap of any due or past due open actions from the last meeting   The CCB will then act on all outstanding CCRs  After this review is complete  each Change  initiator shall present a status summary for each newly submitted CCR  Concerns will be  discussed prior to CCB vote  Mandatory attendance CCB members are allowed one vote   Approve  Place on Hold  or Reject  In cases where agreement cannot be reached  the Chair will 
140. age and Branding Material 096  157 Ship Consumables 096  158 Ship Workstations 096  Task              Project  West Virginia Applicant F Split a     Date  Mon 5 11 15 Milestone e  Summary v             Enrollment Center Bill Of Material  BOM   Mobile BOM  Hardware and Consumables   Order additional Workstation Equipment  Workstation Received from Order   Prepare for shipping the Livescans   Prepare for shipping the Workstations    Identify the Training Coordinator    Update Training Material  User manual  Quick  Reference Guide  Training acknowledgement forms  Deliver Installation Guide    0   0     0   0   0   0   0   0   0   0     Site Development Schedule and Training of Staff            0     0     0        Engineering Delivery    Engineering Delivery  Engineering Delivery  Engineering Delivery  Engineering Delivery  Engineering Delivery  Engineering Delivery    Training  Training    Training    Training  Training    Training    Training  Business Services  Business Services    Business Services  Engineering Delivery  Engineering Delivery  Field Services   Field Services   Field Services    Deployment Mgr     Training   Business Services   Business Services   Business Services   Engineering Delivery  Project Summary  External Tasks    External Milestone    Inactive Task    Complete    Mon 1 4 16    Mon 1 4 16  Mon 1 4 16  Tue 1 5 16  Wed 1 6 16  Wed 2 17 16  Mon 2 22 16    Mon 1 4 16  Tue 1 5 16    Tue 1 12 16    Tue 1 26 16  Thu 1 28 16    Wed 2 17 16    Thu 2 25 16  Thu
141. ain  certifications     10  Responsibility    Every MorphoTrust USA employee whose job responsibilities include the maintenance of or use of  sensitive data is responsible for implementing and ensuring compliance with this policy and initiating  corrective action if needed  In implementing this policy  everyone is responsible for the following      Communicating this policy to personnel under their supervision   e Ensuring that appropriate security practices  consistent with the data handling requirements in  this policy  are used to protect personnel sensitive data   e Providing education and training in data management principles to employees under their  supervision     All users who are authorized to obtain data must ensure that it is protected to the extent required by law  or policy after they obtain it  All data users are expected to      Access personnel sensitive data only in their conduct of MorphoTrust USA business   e Request only the minimum necessary confidential sensitive information necessary to perform  MorphoTrust USA business   e Respect the confidentiality and privacy of individuals whose records they may access   e Observe any ethical restrictions that apply to data to which they have access   e Know and abide by applicable laws or policies with respect to access  use  or disclosure of  information     10 23 2014 MorphoTrust USA Confidential 11  EXEMPT INFORMATION    Sensitive Data Handling and Storage Procedures PRC 00148 A 05    11  Appendix A   Drillin
142. al  and must be consistently protected throughout its  life cycle  from its creation receipt to its destruction delivery  in a manner corresponding to its  sensitivity and or criticality regardless of where it resides  what form it takes  what technology is  used to handle it  and what purpose it serves  Access to non public data is considered on a  need  to know  basis   The  Director of Manufacturing   and  Tier 3 Lead   are all considered custodians of customer  data  with the authority to delegate access to data to eligible personnel and to their office staff as  they deem appropriate  The following pre requisitions are required for all custodians and  delegates       Successful Background checks      Data security Training   e Final review  amp  signoff by an authorized agent of the customer  Management  defined as the President  Executive Vice President  Senior Vice President  Vice  Presidents are considered  Policy Makers  and are typically not eligible for customer data access   Sensitive and regulated customer data includes but is not limited to  including Social Security  Numbers  credit debit card numbers  biometrics  biographic data  document numbers  application  data  and State drivers  license non drivers  identification numbers is to be considered non public  customer data  private      1 2 Reason for Policy    The purpose of this policy is to ensure the protection of the customer data from accidental or  intentional unauthorized access  damage  or disclosure 
143. aling Fri 6 26 15 ius Credentialing  pe Development Team     Vet New FSEs Trainers 096 Credentialing Mon 6 29 15   Credentialing  Vet New MorphoTrust WV Team members 096 Credentialing Fri 6 26 15   Credentialing  Vet New Call Center Resource Persons 096 Credentialing Fri 6 26 15 imd Credentialing  Vet New EAs Hired and at Partner sites 096 Credentialing Tue 7 7 15    Credentialing   58 PHASE 1 CURRENT ENVIRONMENT HARDWARE AND 090        5 11 15   SOFTWARE IMPLEMENTATION AND DEPLOYMENT FOR 5        EI  Phase 1 Current Engineering Environment 096 Engineering Mon 5 11 15 Engineering    60   Livescan Hardware 096 Wed 7 8 15     61 Reserve necessary                equipment and 096 Engineering Delivery Wed 7 8 15 Engineering Delivery   Workstations in inventory    Enrollment Center Bill Of Material  BOM  096 Engineering Delivery Wed 7 8 15   Engineering Delivery                                  Task ES Project Summary V                M   v Inactive Milestone    Manual Summary Rollup     Deadline    Date         5 11 15 Milestone v External Milestone    Manual Task LJ Start only L  Summary Ov inactive Task Duration only o  Finish only J    Page 2       Wed 7 8 15   Engineering Delivery  Thu 7 9 15 f Engineering Delivery  Fri 7 10 15         Engineering Delivery  Fri 7 24 15 Engineering Delivery  Fri 7 24 15 p Engineering Delivery  Tue 7 7 15     Tue 7 7 15             7 7 15   Training   Tue 7 7 15 ius  Training   Tue 7 21 15                  7 23 15    Training   Fri 7 24 15   Tr
144. allow data and reporting exchanges so that those agencies would also experience no  interruption to their workflow  We met with each state agency participating in the network prior to  go live   to discuss their specific network needs and previous pain points to ensure our network met the needs of  the agencies and their applicants  We developed an information sheet and application packet which        distributed to all user agencies providing information about the network changes and steps to setting up  an account with MorphoTrust  should they require this service  By the first week of service we had  established almost 140 escrow accounts for Tennessee user agencies and fingerprinted more than 3 500  applicants    Because of MorphoTrust s experience in deploying networks  we were able to accomplish a successful  transition within the extremely tight time frame required by TBI with no interruption of service to  applicants                SAFRAN Vendor Response Sheet i      MorphorTrust USA  Attachment A     otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    Company Tennessee Bureau of Investigations    Participating Agencies Sole Source Statewide Network     includes all State agencies required to  obtain fingerprint based background checks  including the Department of  Human Services  Department of Children   s Services  Department of  Mental Health  Department of Co
145. aming   Tue 6 30 15     Wed 7 1 15      Wed 7 1 15   Tue 7 7 15 Di Training   Wed 7 8 15   Business Services   Wed 7 8 15 Business Services   Wed 7 8 15   Business Services   Wed 7 8 15   Engineering Delivery  Wed 7 8 15    Engineering Delivery  Thu 7 9 15 7 9   Fri 7 10 15 ield Services   Mon 7 13 15    Field Services   Wed 7 1 15 Deployment Mgr   Mon 7 20 15 ax PM   Wed 7 15 15           Wed 7 15 15 g Training   Wed 7 15 15 g Business Services  Wed 7 15 15 g Business Services  Wed 7 15 15 g Business Services  Wed 7 15 15 j  Engineering Delivery  Wed 7 15 15   Engineering Delivery  Fri 7 17 15 7 17    diia Name 90  Complete  Mobile BOM  Hardware and Consumables  096 Engineering Delivery  Order additional Workstation Equipment 096 Engineering Delivery  Workstation Received from Order 096 Engineering Delivery    66   Prepare for shipping the Livescans 096 Engineering Delivery  Prepare for shipping the Workstations 096 Engineering Delivery    68   Training 0     69   Identify the Training Coordinator 096 Training  Site Development Schedule and Training of Staff            090 Training  Plan  Update Training Material  User manual  Quick 096 Training  Reference Guide  Training acknowledgement forms  Deliver Installation Guide 096 Training  Schedule Train The Trainer  Schedule training session 090 Training  for the FSEs to provide the EA training  Provide Train The Trainer  Train the FSEs to provide the 096 Training  EA training  Roll Out   Deployment 096  Site List 096  Current S
146. ance      SAFRAN Vendor Response Sheet          37    MorphorTrust USA  Attachment A     otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    ADA marked parking spaces for disabled individuals are available at a 1 8 ratio   i e   one handicapped parking space to every eight parking spaces     Enrollment Center Staffing    All of our Enrollment Centers are staffed by certified Enrollment Agents who are  fully trained to perform the duties as outlined in the RFP  We propose to support  the West Virginia program with 30 40 Enrollment Agents  more than 30 of whom  are already on staff and are fully vetted and trained     Unique to MorphoTrust are the security best practices and policies to which we  must adhere  MorphoTrust is one of a rare few companies governed by U S   Proxy and National Security Agreements and is mandated to follow the highest  standards of security to protect all personally identifiable information  We may  employ and subcontract with only U S  citizens who are thoroughly vetted and  have successfully passed a background check  drug test  financial review  and  security threat assessment     Certified Enrollment Agents managing the fingerprinting process in our  Enrollment Centers must now undergo special screening and training to ensure  maximum security  efficiency  and professionalism as we serve the American  public  MorphoTrust conducts these vettin
147. and firewall contralled connection rules     Refer to the Cell Phone and Mobile Device Use Policy  POL 00237 A  the Need To Know Policy POL   00141 A  and the IT Computer and System Use Procedure PRC 00110 A policies for more information  about access security     6  Confidentiality of Pll    MorphoTrust USA s methodology for ensuring the complete security and privacy of personal data is to  carefully control all aspects of the storage and transmittal of data  it is never stored on any media in an  unprotected or unencrypted format     Data is protected using standard encryption techniques as it moves between the server and the desktop   When data is transmitted to a MorphoTrust USA central issuance facility it is sent via an encrypted Virtual  Private Network  VPN      10 08 2014 MorphoTrust USA Confidential 5             1     ETITI IETT ITITI e EETILINE TT TITI      EE EEE EEL EEE EEE TE EEE EEE LE LEE ET TT LL TE LEE LE E T E T ET T rE                                    EXEMPT INFORMATION    https   secure compli com Content Instance ContentInstance Viewer aspx ContentId 3984    4 17 2015    Compli  Print   MorphoTrust   Privacy Policy Page 6 of 6    Privacy Policy POL 00144 A 09    7  Privacy Laws and Regulations      some of the services MorphoTrust USA provides to state and federal agencies are governed      laws      such as the Driver Privacy Protection Act  Fair Credit Reporting Act  Gramm Leach Bliley  and the USA     PATRIOT Act  In these and similar situations  M
148. ange Management Procedure    Document Number  PRC 00085 B  Revision Level  05    Approval    John May Robert Eckel  Chief Information Officer President    This document contains confidential and proprietary information of MorphoTrust USA  No part of this  document may be reproduced  disclosed  distributed  or used in any form by any means   graphic   electronic  or mechanical  including photocopying  recording  taping  or information storage or retrieval      without written permission of MorphoTrust USA     10 23 2014 MorphoTrust USA Confidential 1  EXEMPT INFORMATION    IT Change Management Procedure PRC 00085 B 05    Table of Contents                                                                  3      COD                     ve     A 3                                                    AM                         I 3  HEEL RR 3       VDSS Ol CAINS S arcos E              TINO QUU           4  6  Further Ghange Reqgulremelils suxccucren                            castes                                             6  7  Procedure for Non Emergency Changes           cccccccccsssseceeceseeeeeeeeeeeeeeeeeesaeeeeeeesseaeeceeessaaeeceeeesaaseeeeeeseaees 6  8  Procedure for Emergency Changes            cccsssssccccccseseceeecseesecececseeseceeseeeaeeeeesseaaeeeeessuaeeeeessaaeeeessssegseeees 7  EE    0002                                R 8  10 23 2014 MorphoTrust USA Confidential 2    EXEMPT INFORMATION    IT Change Management Procedure PRC 00085 B 05    1  Objectives    To defi
149. any  NY 12203 3764  518 457 3700    ann sammons dcjs state ny us    Annual Fingerprint Volume 300 000    Description of Services   MorphoTrust was chosen as the statewide vendor for live scan fingerprint submissions to NY DCJS   Program requirements include fingerprinting centers within 20 miles or 30 minutes of applicant s home or  work  online and telephonic appointment scheduling  capture of demographic data  livescan fingerprint  images and photo capture  card scanning services for transition to the network and out of state  applicants  transaction processing and adjudication software  customized data interface protocols for  major agencies  secure data center  and management of the network throughout the state    Because major agencies had independent processes in place for the processing of their large volumes of  applicants  MorphoTrust was required to do an in depth analysis of current procedures and work with       Vendor Response Sheet      SAFRAN     Attachment A  ir MorphoTrust USA       otate of West Virginia CRFP_DPS1500000010    Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police  Company New York Department of Criminal Justice Services    each agency individually to ensure that the new network provided uninterrupted service to both the  agencies and their applicants  Solutions included taking over current agency card scan processes that  cleared hard fingerprint card backlogs and allowed agencies to es
150. assessment  approval and outages time to implement and Business Sponsor  to existing services or Executive     gt  Changes will alter system requirements and create       10 23 2014 MorphoTrust USA Confidential 4  EXEMPT INFORMATION    IT Change Management Procedure PRC 00085 B 05    substantial new functionality or capability Notification to Impacted      Users  Large number of resources and substantial amount    of time required    Substantial estimated cost to the organization  often  large  capitalized projects    Emergency Unplanned changes requiring Required to  Approval by IT  immediate action Manager Director          Restore a Service Protect electronic records data  CIO  product or IT hardware  Notification to Impacted  Users       May also be required to meet an urgent business  need such as modifications necessary to meet a  regulatory requirement    Protect electronic records data  product or IT  hardware    May also be required to meet an urgent business  need such as modifications necessary to meet a  regulatory requirement  or to mitigate an urgent  security issue such as a malware threat or a spill of  sensitive information       Note  Only Significant changes require user acceptance as defined in the Software Development Life Cycle  SDLC      10 23 2014 MorphoTrust USA Confidential 5  EXEMPT INFORMATION    IT Change Management Procedure PRC 00085 B 05    6  Further Change Requirements    The following rules also apply to Changes           Any new additions o
151. at 10 00    2 00   Knoxville 7450 Chapman Hwy Mon  amp  Tue 10 00   5 00  Wed   Fri  1 00   6 00  Sat 10 00   2 00   Knoxville 6923 Maynardville Pike Mon   Fri 9 00   6 00  Sat 11 00    12 00  amp  1 00   2 00   Lawrenceburg 2362 Springer Rd Mon   Fri 8 00   12 00  amp  1 00   5 00   Lebanon 511 N Castle Heights Ave M F 9 12  amp  1 4   Lebanon 1037 W Main St  Ste A Mon   Fri 8 30   4 15   Lenoir City 312 W Broadway Mon   Fri 10 00   6 00  Sat 10 00    3 00   Maryville 2208 E Broadway Ave Mon   Fri 11 00   6 00  Sat 11 00    3 00   McKenzie 101 Wildcat Lane M F 8 3   Memphis 3385 Airways Blvd Suite 108 Mon   Fri 8 00   1 00   Memphis 1779 Kirby Parkway  1 Mon   Fri 9 00   5 30  Sat 10 30    3 30   Memphis 2770 Whitten Rd Mon   Fri 10 00   6 00  Sat 10 00    2 00   Memphis 2577 Poplar Ave Mon   Fri 9 00   5 00   Memphis 3463 Lamar Ave Tue   Fri 10 00   4 30  Sat 10 00    3 00   Memphis 160 S Hollywood St C 140 M   F 8 4 School Employees Only   Morristown 2812 W Andrew Johnson Hwy Mon   Fri 9 00   12 00  amp  1 00   3 30   Mt Juliet 11205 Lebanon Rd Mon  Tue  Thu  amp  Fri 10 00   5 00   Wed 10 00   7 00  Sat 10 00   1 00   Murfreesboro 1826 Ward Dr Suite 204 M F 9 12  amp  1 5   Nashville 2601 Bransford Ave Mon   Fri 8 00   12 30  amp  1 00   4 00   Nashville 1645 Murfreesboro Pike Mon   Fri 8 30   12 30  amp  1 00   5 00   Oakland 7740 Highway 64 Mon Sat 10 2  amp 3 5 40   Rogersville 3825 Hwy 66  Ste B Mon   Wed  amp  Fri 9 00   11 00  amp  1 00    3 00  Thu 9 00   11 00  am
152. at the end of the UAT period  Any PII data that is  under MorphoTrust control in a UAT environment must be protected in accordance with this CSP   subject to the requirements  limitations and constraints of the customer     4 16 8 System Setup and Installation    For systems which will be deployed into a customer   s environment  any systems that are destined  for production environments should be hardened sufficiently to allow the applications to perform  satisfactorily and to allow reasonable utilities and diagnostics to be run by designated personnel   either customer or MorphoTrust personnel  to investigate and solve issues that arise  This is to  reduce the chance that any malware that appears in the customer s environment will have  adverse effects on the operation and performance of the MorphoTrust supplied systems     The MorphoTrust policy on installation and security for a credentialing system is           PRC 00124 A MorphoTrust USA DL ID Installation Data  amp  Security Policy    4 16 9 Change Control Procedures    To minimize the possibility of corruption of information systems used within MorphoTrust or in a  customer s production environment  strict controls over changes to these information systems  must be implemented  Formal change control procedures for MorphoTrust business applications  and network configuration must be developed  implemented and enforced  They must ensure  that security and control procedures are not compromised  that support personnel ar
153. ation               Individual Participation  MorphoTrust USA should involve the customer jurisdiction in the     process of using Pll and  to the extent practicable  seek consent for the collection  use      dissemination  and maintenance of PII  MorphoTrust USA should also provide mechanisms for    appropriate access by customers jurisdictions for correction  and redress regarding use of PII     Purpose Specification  MorphoTrust USA should specifically articulate the authority that permits      the collection of Pll and specifically articulate the purpose or purposes for which the PII is    intended to be used       Data Minimization  MorphoTrust USA should only collect PII that is directly relevant and    necessary to accomplish the specified purpose s  of the contract work and only retain PII for as  long as is necessary to fulfill the specified contract purpose s       Use Limitation  MorphoTrust USA should use PII solely for the purpose s  specified in the     contract  Sharing Pll should be for a purpose compatible with the purpose for which the Pll was      collected      Data Quality and Integrity  MorphoTrust USA should  to the extent practicable  ensure that PII is  accurate  relevant  timely  and complete  In most cases the customer jurisdictions own the     accuracy of this data  and not MorphoTrust USA      Security  MorphoTrust USA should protect PII  in all media  through appropriate security  safeguards against risks such as loss  unauthorized access or use 
154. ation or a server could indicate a possible attack  so the cause of the loss  of functionality should be investigated immediately  Automated notification mechanisms should  be in place to notify the appropriate personnel when any such outage occurs       possible  security condition is detected  it must be reported to the CSO and ISO immediately     4 13 Information Security Policy    All active sensitive information must always be stored on a secure network or a customer secured  network  The policies governing the storage and handling of sensitive data are given in        PRC 00148 A Sensitive Data Handling and Storage Policy       PRC 00174 A Information Security  Customer Data Access and Security Policy    PII data should be protected with encryption according to the policy in   e  PRC 00233 A Data Encryption Policy    PII data must not be stored on removable media as stated in       PRC 00150 A Removable Media Policy    However  it is possible that customers may send or deliver PII data to MorphoTrust for analysis   evaluation  and diagnostic purposes  If the PII data is transmitted electronically to MorphoTrust in  an unprotected format  it should be moved to the MorphoTrust secure network  If the PII data is  transmitted to MorphoTrust via a customer email in the course of researching a customer issue     10 9 2013 MorphoTrust USA Confidential and Proprietary Page 23 of 37    EXEMPT INFORMATION    Cyber Security Plan PLN 00091 A 02    the PII data should be removed fro
155. backed by a traditional or prepaid credit card or be configured to allow  MorphoTrust to generate an invoice statement  MorphoTrust reserves      right  to deny requests from agencies and employers to have an invoice account based  on annually renewed MorphoTrust policy for extending credit     Table 9 summarizes the types of transactions currently provided by  MorphoTrust in West Virginia and proposed under the new UEP platform       SAFRAN Vendor Response Sheet            MorphoTrust USA  Attachment A     otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    Table 9  Forms of Payment    Transaction Type Current WV Platform UEP Platform  Online Payment by Applicant     e check e check   Not Recommended  Credit Card  V M D A  Credit Card  V M D A     Payment at Enrollment Personal check Personal check  Not Recommended  Center by Applicant Corporate Check Corporate Check    Money Order Money Order  Credit Card  V M D A     Private Agencies and Prepaid and or Credit Credit Billing Accounts  Credit Pending   Employers Billing Accounts Credit Card Backed Accounts    Governmental Agencies Credit Billing Accounts Credit Billing Accounts       4 4 3 Provide electronic fingerprint Capture Service Locations  sites      4 4 3 1 The Vendor should describe in detail their plan to provide electronic fingerprint  capture services for West Virginia  Included in the plan  the vendor shoul
156. built  into all tasks to offset unexpected delays  Within    include all the elements required by this RFP     MorphoTrust has successfully implemented   multiple statewide networks of similar size and  scope within the timeframe required by this RFP  Examples of several such  implementations are included in Table 2 on page 11  We have provided a  preliminary project schedule in Appendix B that outlines the steps we will  follow to achieve the program objectives     GS SAFRAN Mandatory Specification Checklist   MS  MorphorTrust USA  Attachment B     otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    Program Management Approach   Large scale  mission critical programs such as a statewide fingerprinting  network require a disciplined project management approach to balance service  delivery with risk mitigation  We provide the right management approach  a  carefully selected and experienced leadership team  and existing infrastructure to  achieve project objectives     Program management is a MorphoTrust core competency and we have used our  expertise to successfully implement 26 large scale applicant fingerprinting  networks  The objective of our program management plan is to provide a  structure that enables the lowest risk implementation of the network     We use the following Management Areas        Integration  amp  Scope Management   o Execute Configuration Managemen
157. c   electronic  or mechanical  including photocopying  recording  taping  or information storage or retrieval      without written permission of MorphoTrust USA Company     Users are responsible for making sure that they have the current revision of this  document     02 14 2012 MorphoTrust USA Confidential Page 1 of 5  EXEMPT INFORMATION    Electronic Communication Policy PRC 001 13 A 02    TABLE OF CONTENTS    1 PURPOSE t                          3  2 SCOPE sues Ei RIMIS Lc UNE 3  gb                                      3  3 1                                                                                 3  3 2 Lee c                                                    5  dao Mee A                                         5  02 14 2012 MorphoTrust USA Confidential Page 2 of 5    EXEMPT INFORMATION    Electronic Communication Policy PRC 001 13 A 02    1 Purpose    This policy establishes standards for the proper use of MorphoTrust provided electronic mail   email  services     2 Scope  This policy applies to      All electronic mail systems and services provided or owned by MorphoTrust USA       Transactional information associated with email records  such as email headers   summaries  addresses  and addressees  as well as the contents of those records          users of email services  including     Full and part time employees      Contractors authorized to use MorphoTrust USA owned equipment or network  resources           other users of MorphoTrust USA information technolog
158. can submission   Figure 37 illustrates the Cardscan conversion process     Our proven centralized Cardscan Center converts and digitally submits more  than 100 000 paper fingerprint cards annually in support of numerous statewide  networks as well as FBI Channels     Our card scanning service employs commercial off the shelf  COTS  Card  Scanning Workstations  which are PBI certified to the IAFIS IOS Appendix     Scanner Requirements     To improve the tracking and payment management for Cardscan submissions   MorphoTrust requires pre enrollment for all Cardscan submissions  During pre     Vendor Response Sheet oy SAFRAN  7     Attachment A  MorphoTrust USA    otate of West Virginia CRFP DPS1500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    enrollment  applicants are required to pay fees  which are non refundable  A  printed copy of the applicant s pre enrollment must be mailed with the Cardscan  submission     Fingerprint Fingerprint cards are received   cards submitted prepared  and scanned    Applicant registers  and submits payment    Data files combined with fingerprint image  files and transmitted to secure data center    Records transmitted  to channeling agent  Channeling  Agent       Figure 37  Cardscan Conversion Process    Paper fingerprint cards are converted and digitally submitted from our centralized Cardscan Center     The steps in the fingerprint Card Scan conversion process are as fol
159. cation and testing at the  following URL   https   wv l1enrollment com OpenNetworkPortal spring customer executionze1s1    We propose to upgrade during the first year of the contract to our secure UEP  Pre Enrollment Website  The UEP website simplifies the registration process and  makes it even more intuitive  improving the online experience for applicants     The simpler online registration process also reduces the volume of calls to our  Customer Service Center  thereby speeding the phone registration time  The  reduction in the registration processing time will directly affect the number of  calls that can be processed within a given period  Today  the average call wait  time in our West Virginia program is four minutes  compared to the wait times  of less than 30 seconds in our Universal Enrollment Services program  which  uses the UEP website  Customers of our TSA Universal Enrollment Services  program self register for appointments or walk in service at a rate of 9876     Our UEP web pre enrollment and scheduling solution is also phone and tablet  friendly  The UEP Pre Enrollment Website can be tested at the following URL     S SAFRAN Mandatory Specification Checklist 89  MorphoTrust USA           otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    https   universalenroll dhs gov    In our response to requirement 4 4 2 5 on page 32  we provided additional  instruc
160. certificate    Internal firewalls shall be used to protect critical data from internal intrusions    e        firewall must be configured for stateful packet filtering with all ports closed until rules and  filters have been applied    e Firewall rules and Packet Filtering logging must be enabled to log all attempts associated with  rules and filters    e Both internal and external firewalls shall include Intrusion Protection Systems and or Intrusion  Detection Systems to both evaluate suspected intrusions and signal alarms    e Attempted intrusion alarms automatically alert    management who are responsible for evaluating  the attempt and escalating the alarm through the standard procedures  including notifying the    CSO   e External firewalls shall be tested for security weaknesses on a quarterly basis  including ethical  hacking   10 23 2014 MorphoTrust USA Confidential 3    EXEMPT INFORMATION    IT Network Access Controls Procedures        00091    02    The firewall system administrator is responsible for implementing and documenting all rules and  filters    The initial configuration of the firewall and all changes must be approved by the Change Control  Board  CCB  led by the senior most operations manager and the CIO  in writing    Changes to the base firewall infrastructure must go through the MorphoTrust USA IT Change  Control Management Process    Any operational alterations to the existing firewall must be approved by the CCB and the CIO  in  writing    All secur
161. chasing Division West Virginia State Police    50    2 b  and the collection of digital prints and signatures     Figure 9 provides a high level overview of the enrollment process  including  appointment scheduling  collection of payment  verification of demographic  data  release of record authorization  and the collection of digital prints and  signatures  MorphoTrust will continue to provide these services that currently  are part of the West Virginia fingerprinting network     Appointment scheduled via  Customer Service Center or  Pre Enrollment Website    West Virginia Enrollment Center    _ Verif Verify Review applicant Capture Provide Create NIST  Q i       demographic       demographic  gt   signatureand m 2        record and  photo ID     receipt z  information  information fingerprints submit to AFIS       3  Verif Receive WVSP completes Criminal MorphoTrust packages or  West Virginia        um accept  Identification                    prints results  provides  H                 h     Applicant NIST md reject notice check  returns result to access or mails result letters     from WVSP MorphoTrust to Authorized Entity    Figure 9  Overview of the Enrollment Process    Table 11 provides a more detailed list of the steps in the appointment process   with additional description of the process on the following pages     Table 11  Steps in the Applicant Appointment Process    Appointment Applicant schedules appointment either online or by calling Customer Service  Schedul
162. chnology Control Plan    4 15 Database Security Policy    In many areas of MorphoTrust  sensitive information is stored in databases  usually within either  the MorphoTrust network or within the customer s environment  Many of these databases contain  large amounts of PII data  and so their security is paramount     All logins to databases in the following environments must use strong passwords that are given  only to MorphoTrust personnel with a legitimate need to know   e MorphoTrust databases with company sensitive information  such as HR  Finance  and  Accounting databases   or  e Deployed databases in customer UAT or production environments  or  e UAT or production databases with customer data in them that are hosted within  MorphoTrust or by MorphoTrust in a third party facility           MorphoTrust Help Desk databases with customer service request information  or     MorphoTrust Engineering development and testing databases with real  as opposed to  fake  PII data in them  or  e Internal MorphoTrust databases for storing intellectual property  documentation   configuration management information  and QA information  or any other type of  information used to create MorphoTrust products  programs  solutions  and services     Internal databases used for Engineering development and testing that contain fake PII data or  data from the MorphoTrust developers or testers can use shared strong passwords for ease of  development and testing  since the risk of PII data loss is l
163. ckup Recovery Policy   PRC 00084 B    All operating systems and applications are backed up on a daily basis   Incremental backups will be considered for development  QA  and pilot systems     IT shall follow the policies and procedures contained within the system  amp  database backup  amp   recovery guide     02 13 2012 MorphoTrust USA Confidential Page 5 of 10  EXEMPT INFORMATION    IT Disaster Recovery Policy PRC 00095 B 02    2 2 Onsite Storage    All daily system backups are kept on the Iron Mountain Turbo Restore Appliance  TRA  for a  period of one year     2 3 Offsite storage    Daily backups are uploaded to the Iron Mountain Cloud once complete  These off site backups  are retained for a period of seven  7  years      IT is the authorized contact with Iron Mountain to request backups older than one year      2 4 Retentio n    All backups are retained on site for one year  Uploaded backups are retained on      Iron  Mountain Cloud for a period of seven  7  years  Monitoring    Daily backup sessions are monitored by the IT staff to ensure that errors are resolved in as timely  a manner as possible  and that tape mounts are satisfied     IT uses the storage manager console to monitor backups and to administrate the backups should  they require intervention     Exception reporting occurs thru the storage manager console which alerts administrative staff  when backups do not run as scheduled  fail  or in any way not perform as planned     All exceptions to the backup sche
164. clude but are not limited to  sites  that contain sexually explicit  racist  sexist  violent or other potentially offensive material  Employees  should not intentionally connect to web sites that contain offensive material  this includes through a VPN  connection  while at work or at home or anywhere else using company equipment or systems     The ability to connect with a specific web site does not in itself imply that employees of MorphoTrust USA  are permitted to visit that site  MorphoTrust USA may  at its discretion  restrict or block access to web  sites as well as block the downloading of certain file types that are likely to cause network service  degradation  These types include graphic and music files     Note  Internet access from production networks is either forbidden or heavily controlled  by  design     Note  Corporate network access is disabled for all employees on a Leave of Absence     8  Privacy    Employees must have no expectation of privacy when using information systems at MorphoTrust USA  To  manage and enforce security as well as other policies  MorphoTrust USA may log  review  and otherwise  utilize information stored on or passed through its systems  This information includes but is not limited to  user activity such as telephone numbers dialed and web sites visited     10 23 2014 MorphoTrust USA Confidential 8  EXEMPT INFORMATION    Computer and System Use Policy PRC 001 10 A 10    9  Remote Access    The Company provides remote access for approved
165. component of MorphoTrust USA  As such  its access  shall be restricted to those individuals that have a need to work with the servers in the server  room  This is physical access control     2Polic y     Access to the Server Room is controlled               Server Room is a locked facility        The Server Room must have a keycard entry system that monitors and logs who has  accessed it and when       Daily server room access is restricted to IT department personnel       Only authorized individuals are allowed in the Server Room     3 Procedur e       Only authorized individuals are allowed in the Server Room     The CIO is the authorization agent       The CIO is the only one authorized to add an individual to the access key card list for the  Server Room  The CIO makes these requests to the key card agent       Contractors requiring access to the Server Room must be authorized by the CIO        Contractor s granted access shall be escorted by an IT department member  Unescorted  contractor access requires authorization by the CIO        The CIO will regularly review server room access logs     8 22 2011 MorphoTrust USA Confidential             of 3  EXEMPT INFORMATION    IT Network Access Controls Procedures PRC 00091 B 02    IT Network Access Controls Procedures    Document Number  PRC 00091 B  Revision Level  02    Approval    John May James Kottas  Chief Privacy  amp    Chief Information Officer Information Security Officer  This document contains confidential and prop
166. conduct a technical examination of the fingerprint images  to ensure a successful conversion into the electronic medium at 1000 ppi  Fingerprint images that  do not pass the Vendor s technical examination shall be returned to the Applicant with a request  for the bad prints to be re rolled  The criterion for defining an  acceptable  quality fingerprint will  be agreed upon by the Vendor and the State     The Vendor shall convert data  signature and acceptable flat and rolled  ink and roll  fingerprint  cards into an electronic medium whereby they may be transmitted electronically per the ICD  found in Appendix A  This conversion and electronic transmission to the State must occur within  48 hours of receipt by the Vendor     Following conversion  the Vendor shall document the transaction number of the electronic  submission on the manual card and store the electronic record of the card and record release  authorization on the State Central Repository     The Vendor must provide an example of where it has performed card scanning in an Applicant  fingerprinting network and statistics on the number of Applicants processed utilizing this  equipment     MorphoTrust meets the requirements     Fingerprint cards may be mailed to our central facility  where we digitize them  and submit them today at 1000 ppi to the State AFIS  in the same manner as a  Livescan submission  Our card scanning service employs commercial off the   shelf  COTS  Card Scanning Workstations  which are FBI cert
167. contract in Texas which extends our relationship until August  2021     Currently we fingerprint between 50 60 000 applicants each month and have almost 150 fingerprinting  centers operating currently throughout the state  We provide the following services in association with this  network        Bi lingual appointment scheduling by phone to Call Center or through secure website    Convenient Enrollment Centers equipped with Enrollment Workstations and Enrollment  Agents  Livescan operators     Card Scan for out of state applicants  Customized agency system integration  Centralized data center    Electronic connection to the state AFIS Reporting  Administrative Queue Review  Fee Collection    Customer account and billing services  Onsite fingerprinting for groups of 30 or more    Use of the MorphoTrust Administrative Queue Review product which consolidates all background check  results and allows staff to automatically disposition    no hit    records  has allowed Texas DPS to streamline  their backend process  Staff is able to print or send all dispositioned result letters with a single command   This allows for increased traffic of electronic submissions of civil applicant records with less need for  manual intervention by Texas DPS staff  making the most of limited staffing resources     Many of the State licensing agencies were not prepared to utilize the service without making significant  modifications to their internal processes  MorphoTrust worked closely with these i
168. ct Owner     Mr  Powers holds a Bachelor s of Science in Computer Science from the Georgia  Institute of Technology  Georgia Tech   His program references include the Texas  Department of Public Safety and      U S  Department of Homeland Security   Transportation Security Administration     David Bolme  PMP     Solutions Engineer    David Bolme will serve as Solutions Engineer  providing program oversight for  engineering efforts  ensuring that the State s needs are being met by our solution   and resolving any issues that may arise  He has more than 20 years of experience  in planning  implementing  and managing complex and integrated systems     Mr  Bolme has been with MorphoTrust for more than 10 years  He manages all of  MorphoTrust s state fingerprinting contracts and has led the implementation of  major MorphoTrust projects such as Tennessee  Indiana  Florida  South Carolina   Maryland and Nevada     Prior to MorphoTrust  Mr  Bolme was responsible for the development and  management of major information systems programs for the Tennessee Bureau  of Investigation  He holds a Bachelor s of Science in Computer Science from  Tennessee Technological University and Project Management Professional  PMP   certification  His program references include the Tennessee Bureau of  Investigation     Staffing Plan    In addition to the project personnel shown in our organization chart  Figure 1    MorphoTrust s proposed staffing for the West Virginia program includes 30 40  Enrollment
169. d  discuss site locations  ADA compliance measures  staffing related to site centers   receipt process for Applicants at site locations and the communication process to  site location     Enrollment Center Locations    MorphoTrust proposes to provide 27 public fingerprinting locations across West  Virginia  These locations have been selected to assure that no applicant will  have to travel more than 35 miles to utilize a MorphoTrust Enrollment Center        sites will be compliant with the federal Americans with Disabilities Act  requirements     The map in Figure 7 shows the geographical distribution of our proposed  Enrollment Center locations including the 22 operational locations we have in  West Virginia today  plus 5 new locations that would be deployed following  contract award     T Vendor Response Sheet    SAFRAN     Attachment A  MorphoTrust USA    otate of West Virginia CRFP DPS1500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police         3New Cumberland      50 miles       Existing      Berkeley Springs  6 Expansion   in    New    Figure 7  Distribution of Proposed Enrollment Centers in West Virginia    Table 10 lists the proposed Enrollment Centers in West Virginia     Table 10  Proposed Enrollment Centers in West Virginia    West Virginia City Town   Location Address Hours of Operation    Beckley On Site In Home Drug Testing Monday   Friday  351 Prosperity Road 9 30 am   4 30 pm   o WV 25801   
170. d  instructions  technical documentation  quality control information  etc     When any role becomes unfulfilled due to the loss of MorphoTrust personnel  the Manager of that  role assumes the responsibility for security and compliance until the role can be properly staffed  or reassigned  The titles of the responsible MorphoTrust personnel may not match the role   name  but their expected duties and or job description will include the responsibilities of the role     Finally  all MorphoTrust personnel are responsible for protecting the sensitive and confidential  information and resources to which they have access  and to report suspected security incidents  to their Manager  the CSO and the ISO     4 5 Information Policy    All information  regardless of the form or format  which is created  acquired or used in support of  MorphoTrust business activities  must be used only for MorphoTrust business  MorphoTrust  information is an asset and must be protected from its creation  through its useful life and to its  authorized disposal  It must be maintained in a secure  accurate  and reliable manner and be  readily available for authorized use     Information security management enables information to be shared while ensuring protection of  that information and its associated computer assets including the network over which the  information travels  MorphoTrust designated staff is responsible for ensuring that appropriate  physical  logical and procedural controls are in place o
171. d Agency  Program Managers     Mr  Wear is responsible for compiling a detailed project plan and maintaining it    through the full term of the project  We have provided a preliminary project    schedule in Appendix B     118    Mandatory Specification Checklist      SAFRAN   Attachment B    MorphoTrust USA    otate of West Virginia CRFP DPS1500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    Mr  Wear has more than 15 years of skills and experience developed through  involvement with numerous fingerprinting service programs  He has been  instrumental in the successful deployment of large scale statewide fingerprint  networks including Massachusetts  the District of Columbia  New York  and  Indiana  as well major expansion of the Florida statewide network and a  fingerprint and identification badging solution for Broward County  Florida  School Board  the nation s sixth largest school system     We have provided more information about his qualifications and the  qualifications of our proposed project team in our response to requirement 4 3     b  The project plan will be required to contain  at a minimum  the following components   stakeholder register  communication management  budget management  issue management   change management  risk management  and a detailed schedule that includes a detailed  description of the task  the type of resources need for the task  start date  end date and any task  depen
172. d drive is transferred from the custody  of its current owner  all electronic media must be sanitized per paragraph 1 above    e Disposal of damaged or inoperable hard drives  The owner must first attempt to overwrite the  hard drive in accordance with the procedures described above  If the hard drive cannot be  overwritten  the hard drive must be disassembled and mechanically damaged so that it is not  usable by a computer  You can physically destroy the hard drive by drilling holes in it or smashing  it  Please be careful and be sure to wear safety equipment  like goggles  See Appendix A for a  suggested method     Disposal of Failed Solid State Drives  SSDs     Failed SSDs are to be turned over to IT for proper destruction    e Failed SSDs that are still recognized by the operating system  Should be wiped with an approved  wiping utility  preferably using the wiping mechanism built into the drive  If the SSD is still under  warranty  IT will ship it back to the vendor for replacement    e Failed SSDs that are not recognized by the operating system  Will be physically destroyed   regardless of whether or not it is under warranty     10 23 2014 MorphoTrust USA Confidential 10  EXEMPT INFORMATION    Sensitive Data Handling and Storage Procedures PRC 00148 A 05    Disposal of Electronic Media Other Than Hard Drives    Transfer of electronic media other than hard drives within a department     e Before electronic media is transferred from the custody of its current owner  appro
173. d in any form by any means   graphic   electronic  or mechanical  including photocopying  recording  taping  or information storage or retrieval      without written permission of MorphoTrust     5 31 2013 MorphoTrust USA Confidential Page 1 of 6  EXEMPT INFORMATION    IT Remote Access Policy PRC 00092 B 09    Contents   1                          3  2 EMPLOYEE ACCESS                                                                                                                                                                                                                   3     MINIMUM HOME NETWORK                                                                       3  4    REMOTE                         9                                      e suas RES                              3  5    GENERAL ACCESS GUIDELINES       occi eis esee          4  6 INTERNATIONAL TRAVEL                       ee eeennnne nenne nennen      5  5 31 2013 MorphoTrust USA Confidential Page 2 of 6    EXEMPT INFORMATION    IT Remote Access Policy PRC 00092 B 09    1                     MorphoTrust USA provides remote access for employees and customers to resources on its  Local Area Network  This access can be achieved via dial up  DSL or high speed Internet  connections  The goal of this policy is to outline how employees can access the network data  while still protecting that data     2 Emplo yee Access                 employee access is automatically handled through the MorphoTrust USA VPN and 
174. d notice if the system  will be unavailable for maintenance     The MorphoTrust software delivery process minimizes downtime to the public   with an average uptime rate      99 390 in 2014  When an outage does need to  occur  the typical outage window is scheduled after 8 00 P M  CT and requires 15  minutes or less  During a planned outage  a message is presented to the user that  the system is down for maintenance with an estimated time to availability     We have provided additional detail about our Pre Enrollment Website in our  response to requirement 4 5 1  b        Vendor Response Sheet    SAFRAN     Attachment A  MorphoTrust USA    otate of West Virginia CRFP DPS1500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    4 4 2 3 The Vendor should describe in detail how they plan on ensuring Applicant  Appointments will be scheduled in a timely manner     MorphoTrust pays special attention to selecting Enrollment Center locations that  are in the right area for ease of access to major traffic arteries  access to public  transportation  where available   and in facilities with signage opportunities so  applicants can easily locate the Enrollment Center  We will provide statewide  coverage of Enrollment Center locations and appointment capacity so that all  applicants will be able to schedule their appointment in a timely manner     We propose to add five  5  new Enrollment Centers to our existing network o
175. d systems are often installed within a customer   s environment and thus may need to  conform to the standards imposed or mandated by the customer  This often is true for production  systems hosted by MorphoTrust  either internally or externally  for specific customers  In the  absence of any customer mandates  guidelines or requests  the CSP should be followed for those  deployments  If the customer cannot accept the level of security prescribed by the CSP  typically  because of required compatibility with legacy customer systems  the MorphoTrust Program  Manager or Product Manager for the project must get written permission from the customer to  approve a lesser level of security  However  the lesser security level can only be used to  accommodate the affected customer subsystems and not throughout all of the MorphoTrust  systems in the deployment for that customer     The CSP specifies a minimum level of security throughout all of its policies  Additional security  measures can be added on an as needed basis at the request of the appropriate subsystem  owner s   the customer  the MorphoTrust Legal Department  the Chief Security Officer  CSO   the  FSO  or any other governmental requirement or mandate     In addition  the CSP considers the CSO as the top level corporate officer for cyber security  issues  However  when dealing with proxy related cyber security issues  the CSO should consult  with the FSO for guidance and feedback     If any parts of the CSP which deal with 
176. d to store and transfer confidential records require  enhanced security protections and must be closely monitored    Personnel data cannot be stored on PCs or other systems in offices or laboratories  Personnel  data  including word documents  spreadsheets and Access databases  that is created on a PC or  similar system should be stored on a network drive hosted on an IT managed server and have  appropriate access control lists  ACLs  which limit access to only authorized individuals   Electronic media storing restricted sensitive data must be protected by password security  To the  extent possible  these devices must employ encryption methods    Physical records are to be securely stored in such a manner as to prohibit access by  unauthorized personnel  Such methods include locked storage cabinets and file rooms     6  Data Retention and Disposal    The following rules govern the retention and disposal of sensitive data     Retention of Records Containing Restricted and Sensitive data  A schedule describing the  records and the official retention period is to be created for each type of record created or  maintained by MorphoTrust USA  Please refer to the Data and Document Retention Policy POL   00296 A for the schedule    Archiving  Personnel records  including sensitive information records  which are not being used  for active MorphoTrust USA business  may be archived until retention requirements have been  met    otorage areas for inactive records must be physically secur
177. date our employees on the new     practices      At the time of initial employment and annually thereafter  all employees sign Privacy  Security      Confidentiality and Data Handling agreements stating they understand and agree to uphold MorphoTrust    USA s privacy and security policies as a condition of continued employment  This agreement also binds    employees handling certain sensitive information to further protections in the handling of that data  When  appropriate  MorphaTrust USA disciplines associates who violate our privacy policies    10 08 2014 MorphoTrust USA Confidential 6             4     BELOLDUOFGLTUUVTUULTURTULRTUPLTGLULULCLCRCRCRDRDLALCVURCA ROGA EVCLY LOT ROTUULOTUULTY LOT VTL          UU TGLTU TL EE ET EEE EEE EEE EEE ELE LEE EE TEED ETE ELLE LL LEE ETE TTL        ET TS LEE LET LTTE SL LE T Tr EE T    EXEMPT INFORMATION    https   secure compli com Content Instance ContentInstance Viewer aspx ContentId 3984    4 17 2015    Cyber Security Plan PLN 00091 A 02    MorphoTrust USA  Cyber Security Plan    Document Number  PLN 00091 A  Revision Level  02    Approval    Dennis Kallelis Robert Eckel  Chief Security Officer Chief Executive Officer       James Kottas John May  Information Security Officer Chief Information Officer    This document contains confidential and proprietary information of MorphoTrust USA  No part of this  document may be reproduced  disclosed  distributed  or used in any form by any means   graphic   electronic  or mechanical  includi
178. dencies  predecessors or successors   The Vendor s project manager will also be required  to develop a staffing plan  The Vendor s project manager will be required to submit an updated  work plan at a frequency that is agreed upon and is documented in the communication plan     MorphoTrust meets the requirements   Lowest Implementation Risk    As noted in our RFP response  we have  significant infrastructure and proven  processes in place that lower our specific to this RFP  we are confident of  implementation risk and reduce the timeline successfully implementing our proposed West  necessary to complete an implementation   For example  we will utilize our existing  Customer Service Centers  web scheduling  software  FBl certified Livescan hardware provided there are no significant delays during  and servers  secure Data Centers  and the contract execution process  In fact  our  reporting and tracking tools for this project   Based on the requirements of the RFP and  feedback obtained during implementation  meetings  we will tailor these assets to 45 days of contract award  we will deliver the  meet the needs of WVSP and User formal project plan and staffing plan  which will  Agencies   but none of these assets will  need to be developed from scratch     Based on our past experience and the detailed  project planning we have already completed    Virginia network in accordance with the RFP  requirement 90 days from contract award     implementation plan has sufficient cushion 
179. des access to our Administrative Web Portal  for agencies  the number of calls to the central records processing agency has  been greatly reduced     C SAFRAN Mandatory Specification Checklist 109  MorphorTrust USA           otate of West Virginia  Department of Administration    CRFP DPS1500000010  Applicant Fingerprinting Services    Purchasing Division West Virginia State Police       Name        Social Security Number last 4 or Complete   Transaction Number    Date Range    Transaction Status  Any Status   Agency Selection  Any Agency    Sort Results by     Name     Date Received  date printed     Submit Query       Figure 44  Administrative Web Portal     Applicant Search    Access for users is limited to data for their own agency only     Back to Search Form    Name   TEST TEST  TEST TEST  TEST TEST  TEST TEST  TEST TEST  TEST TEST  TEST TEST  TEST TEST    TEST TEST    DOB   09 19 1977  09 19 1977  09 19 1977  09 19 1977  09 19 1977    09 19 1977    09 19 1977    09 19 1977    09 19 1977    Agency   ISP Firearms Section  ISP Firearms Section  ISP Firearms Section  ISP Firearms Section  ISP Firearms Section  ISP Firearms Section  ISP Firearms Section  ISP Firearms Section    ISP Firearms Section    Received   09 15 2009  09 16 2009  09 16 2009  09 16 2009  09 16 2009  09 16 2009  09 16 2009  09 16 2009    09 16 2009       Figure 45  Administrative Web Portal     Applicant Search Results    The web portal provides only information about the transaction status and applican
180. difications are made to the software   system or application then the test data must be protected and controlled during the entire useful  life  This protection mechanism is essential to ensuring a valid and controlled simulation with  predictable outcomes     If a customer provides or transfers production data to MorphoTrust for testing purposes or for  other purposes such as investigative analysis or algorithm training  this data must be treated as  PII data and protected with appropriate access controls on a secure network     Otherwise  production data may be used for QA testing only if the following controls are applied      The production data is treated as sensitive information  especially if it contains PII data   and is protected by access controls in the QA environment   e   the production data is stored in    QA database  the access protections on the database  are comparable to what is or would be used in the production environment       f      production data comes from a customer s environment or database  then    o        customer consents in writing or by email to MorphoTrust using the  production data for QA testing    o The production data is securely deleted when the QA testing is finished   However  the data may be retained if any additional QA testing  such as  regression testing  is expected to be done within a reasonable time and the  customer is aware of and agrees to  in writing or by email  this additional QA  testing with the production data       T
181. dule are automatically emailed to a mailbox monitored by the  Network Administrator     2 5 Auditing  All backup failures are recorded within the MorphoTrust USA Helpdesk application     2 6        toring    Data restores        managed using the same storage manager systems that are used for the  backups     2 7 Remote Access    The IT systems can be managed  if necessary  remotely via VPN login  In cases where the  building is not accessible and the IT facility is still up and running  the IT administrators can log in  and manage the systems  Likewise all users have remote web access to email and can VPN to  perform their daily task  including time cards and expense reports  This enables MorphoTrust  USA to continue operations at a distance     02 13 2012 MorphoTrust USA Confidential Page 6 of 10  EXEMPT INFORMATION    IT Disaster Recovery Policy PRC 00095 B 02    2 8 Recov  ery Services    If the Billerica facility is destroyed or inaccessible for a period of time  the systems can be rebuilt  from the Iron Mountain Cloud at MorphoTrust USA facility in Fort Wayne or at a restoration facility  with ample resources     2 9 Training for Disaster    IT and Management must know the plan s details  who is in charge of making IT decisions and  support IT staff and their actions taking place during recovery  Other department staff and  contract IT experts are required at this time and expenditure is assumed to be automatically pre   authorized in time of crisis     2 10 Continuous 
182. e  In testimony whereof  I have    hereunto set my hand and the seal of the RLI Insurance Company  this   day of          By                    Notary Public RLI Insurance Company     OFFICIAL SEAL     JACQUELINE M  BOCKLER             COMMISSION EXPIRES 01 14 18  gt         Vice President       1233339020212    A0058514    STATE OF ILLINOIS       COUNTY OF COOK  I  Adrienne C  Stevenson a Notary Public in and for said County do hereby  certify that __ Katherine J  Foreit Attorney in Fact  of these     RLI Insurance Company  an Illinois Corporation    who is personally known to me to be the same person whose name is subscribed to the  foregoing instrument appeared before me this day in person  and  acknowledged that they  signed  sealed  and delivered said instrument for and on behalf of     RLI Insurance Company  an Illinois Corporation    for the uses and purposes therein set forth     Given under my hand      notarial seal at my office in the City of Chicago in said County   this 7     dayof                                Notary Public              OFFICIAL SEAL  ADRIENNE C STEVENSON  NOTAPY            STATE OF ILLINOIS  MY COMMISSION EXPIRES DECEMBER 15  2015        MorphoTrust USA    The Identity Company  State of West Virginia    Department of Administration  Purchasing Division    EXEMPT INFORMATION    In Response to    CRFP DPS1500000010  West Virginia State Police  Applicant Fingerprinting Services    Submission Date   M ay 13  2015    Submitted via wvOASIS to   Depa
183. e  MorphoTrust Secu    MorphoTrust                   Transaction Protocol    Overview  Store and  Forward A     lt e E         ASA 5520  PUB       VPN  ee x    Red Indicates encrypted  Transmission      Transmission Ports and  Encryption standards MySQL  need to be specified by MorphoTrust PC  Sate Police Review Client    Figure 40  Solution Overview including Results Processing    MorphoTrust   s automated results processing solution will return results as specified in Appendix A of the  RFP  All transactions submitted from Livescan devices will be processed at a Central Transaction Switch     Automated Results Processing    As described in our response to requirement 4 4 4 4  MorphoTrust has already  provided West Virginia with a robust solution for automated result processing   We will continue to provide a single source of result delivery and secure  automated method of processing and reporting these transaction results     Our solution uses a combination of automated transaction processing software   consolidated administrative result review and letter processing  and a secure  user review website for query only users  The results processing hardware and  software will remain under the physical control and security of the State     The solution reduces disposition workloads      80  or more by       Automatically dispositioning and reporting results that have       indication of a criminal record    Mandatory Specification Checklist    104 SAFRAN   Attachment B    gt  Mo
184. e  This includes  how to electronically transfer and receive demographic information   transfer fingerprints to the secure Data Center  and perform all system  maintenance and system utility functions  Training is conducted on the  identification of pattern type  delta s   core  and determining the overall  quality of the fingerprint    Technical support overview of diagnostic functions     Field training   The Enrollment Agent trainee will be placed with an  experienced Enrollment Agent who double checks the quality of each  fingerprint taken  and instructs the trainee on how to capture fingerprints  most efficiently and effectively  Enrollment Agents will fingerprint many  test applicants prior to completing the on site training program     Best practice customer service  attitude  dealing with difficult people   escalation processes  MorphoTrust customer service policies     Security and Confidentiality  data  personal information  MorphoTrust  security protocols     Program specifics  Agency information  Applicant types  required forms  and information  assisting applicants in obtaining necessary information     Vendor Response Sheet                      MorphoTrust USA     Attachment A  47    otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police       MorphoTrust Corporate and Enrollment Services general information   who to contact  web links        Review of company po
185. e  etc     e Letter formatting aligns the applicant name and mailing address to  appear in the envelope window      Electronic image of the result letter is retained in the database for future  review and reprinting    User Access Controls    Review Client users are assigned permissions so they can only perform the  activities for which they are authorized  For example  only designated Review  Client users can assign a final disposition or redact results  while other Review  Client users can add notes or attachments to an applicant record     State Access to Data via Administrative Queue Review    The Administrative Queue Review Client presents a single source for operator  review of all transaction result and applicant information and permits the  authorized user to adjudicate the results of transactions  This function is  accessible to multiple simultaneous users that have a proper login name and  password  The Client accesses the Database Server for all transaction data and  status     Transaction and user information is accessed by an authorized user through the  Applicant Selection Screen  a single screen with several options for searching   The demographic data and all returned query responses are presented when an  Operator selects a transaction to review and process  The demographic data is  displayed on the Applicant Information Screen and the WVSP and FBI response  data is displayed in the Query Response Screen     The following pages provide an overview of the proc
186. e Board of Education  SBEC  was given a mandate to comply with requirements  to obtain a fingerprint based background check on every certified teacher throughout the state   approximately 400 000  within 4 years from passage of the legislation  We worked closely with SBEC to  develop a plan  The Blitz  to conduct on site fingerprinting sessions for more than 1 200 Independent  School Districts at more than 8 000 campuses in a manner that would satisfy all of their requirements in  their timeframe  Out of these planning sessions  we expanded the responsibilities of one of our major  minority subcontractors with extensive fingerprinting experience  MRi  to hire    Blitz Teams    which would  work within a geographical region to visit each campus according to schedules developed each quarter  by MorphoTrust and SBEC personnel  Schedules are developed to take into consideration holiday and  testing dates and were refined with local and District specific or campus considerations  As an added    convenience  certified teachers were also able to use our established Enrollment Centers to complete  their fingerprinting requirements if they were unavailable during the time MorphoTrust Blitz Teams visited  their campus     MorphoTrust provides fingerprinting for applicants at the TxDPS Headquarters office in Austin  TX  having  taken over this service from TxDPS staff  freeing them for other duties     Participating Agencies Sole Source Statewide Network     includes all State agencies 
187. e Federal State Local  levels as appropriate  and national restrictions  e g   export controls  that may apply to the use of  cryptographic techniques  particularly in different parts of the world     The MorphoTrust policy      data encryption is in       PRC 00233 A Data Encryption Policy    4 16 6 Key Management    A secured environment must be established to protect the cryptographic keys used to encrypt  and decrypt information  Keys must be securely distributed and stored  Access to these keys  must be restricted to only  a  those individuals who have a business need to access the keys and   b  any special service accounts that require the keys to encrypt or decrypt the information   Compromise of a cryptographic key would cause all information encrypted with that key to be  considered as unencrypted information     The MorphoTrust policy on key management is in   e  PRC 00233 A Data Encryption Policy    4 16 7 Protection of Test System Data    For the QA test environment  QA test data is intended to test the expected behavior of software   systems and applications  QA test data is developed to test a comprehensive set of conditions  and outcomes  including exception processing and error conditions to demonstrate accurate  processing and handling of information and the stability of the software  system or application     Once test data is developed  it must be protected and controlled for the life of the testing  In  those cases where QA test data is reused  whenever mo
188. e Police    Select Address      Verified Addresses    f 1  123 Main Street  Baton Rouge  LA 70812    Entered Address  unverified     C 1  123 Man Street  Baton Rouge  LA 70812    Figure 50  Address Verification    This verification process ensures that the address data captured is accurate  valid  and  free of typos     FULL PACKAGE OF UEP ENHANCEMENTS    While the aforementioned UEP Enhancements can be purchased individually   MorphoTrust also offers this suite of enhancements for a single additional fee  when enabled for the entire applicant population  This price is inclusive of any  and all new UEP enhancements to be developed at a later date     This package includes   A  Support and Reporting Portal  B  Applicant Status Notification  C  Back up Print Capture for Poor Quality Prints    D  Address Verification    2  Out of State Applicants    152    MorphoTrust can provide services for out of state applicants wishing to submit  electronic fingerprints  Out of state electronic fingerprinting will initially be  located in selected major cities throughout the country  Over time  as more states  purchase the UEP platform  our nationwide network of over 1 200 Enrollment  Centers will be enabled to allow West Virginia electronic Livescan submissions  from every state  essentially eliminating the need for out of state Cardscan  submissions  Local operating procedures and technology will be utilized at these  Enrollment Centers     Appendix F      SAFRAN    Optional Features   M 
189. e State of  Michigan  This statewide single source solution includes secure bilingual web registration and scheduling  portal  Call Center  statewide Enrollment Centers equipped with Livescan equipment and Enrollment  Agents  fee collection remittance  central data center  and AFIS interface    In 2013  MorphoTrust was re awarded the contract to operate the statewide applicant fingerprinting  network  Within 9 weeks of contract award  MorphoTrust completed necessary updates and expansion  efforts to perform for the new contract  There was no interruption of services to applicants        Participating Agencies Long Term Care  Licensed Healthcare Professionals  Schools  Adoption Foster Care  Concealed Carry    Description of Technical MorphoTrust Live Scan system   Solution MorphoTrust Store and Forward Server  Proprietary registration  back end and billing software  Secure connection to State MorphoTrak AFIS  Cisco Virtual Private Network encryption of data transfer circuits  Customized agency system integration and data sharing protocols  MorphoTrust iA thenticate document authentication system  Card scan system       m Vendor Response Sheet    SAFRANI     Attachment A  MorphoTrust USA    otate of West Virginia CRFP DPS1500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    Table 8  Transportation Security Administration  TSA  Universal Enrollment Services    Company Transportation Security Administration  
190. e Universal Enrollment  Platform  UEP  implementation project by piloting the UEP solution in an  Enrollment Center  The purpose of the pilot will be to test the integration  between UEP and the state s systems and to gather feedback on the enrollment  process from West Virginia State Police and related agencies  This pilot approach  will allow us to quickly discover any changes to the existing process  while  making the project real and concrete for all stakeholders  including the many    agencies     During this pilot phase  we will also establish and test our ongoing project  communication plan  We will hold regular project status meetings and establish  project tracking artifacts such as issue tracking lists     MorphoTrust will adapt our approach based on any lessons learned during the  pilot phase  and apply those learnings to subsequent phases     Development Timeline and Rollout Plan    Since MorphoTrust currently operates the existing West Virginia applicant   processing network  we will approach the new functionality required in this RFP  incrementally  while not disrupting current operational activities     With a phased approach  we can deliver value quickly  demonstrate new  capabilities within weeks of being awarded this contract  roll out additional  features each month until full operational compliance is met  adapt to  stakeholder feedback  and minimize operational risk to applicants     As such  MorphoTrust will roll out the UEP functionality in phases  Duri
191. e and environmentally controlled to  protect the records from unauthorized access and damage or loss from temperature fluctuations   fire  water damage  pests  and other hazards     10 23 2014 MorphoTrust USA Confidential 7    EXEMPT INFORMATION    Sensitive Data Handling and Storage Procedures PRC 00148 A 05        he contents of true  Shadow  records should be destroyed after it has been determined that they  contain only duplicates of records maintained elsewhere  and do not contain any original  materials    e Off site storage facilities or locations for sensitive records must be approved by the IT  Security   and Legal Departments    e Record Disposal  The proper destruction of information is essential to creating a credible records  management program  Records containing restricted sensitive data shall only be destroyed in the  ordinary course of business  no records that are currently involved in  or have open  investigations  audits  legal holds  or litigation pending shall be destroyed or otherwise discarded     o      primary records of any type belonging to MorphoTrust USA may be destroyed until  they have met retention requirements established by MorphoTrust USA policies and  public records law    o When retention requirements have been met  records must be either immediately  destroyed or placed in secure locations as described in this section for controlled  destruction later    o        authorized methods of destruction for non electronic records are burning wh
192. e date of submission  A Backup copy of the database will be written to an  external location on the WVSP network daily     The archive may be used for the subsequent transmission of archived data for statutory re   licensing issues  The archive may also be used for the re transmission of any unsuccessful  transmission     The Vendor must develop a re transmission procedure with individual user agencies to ensure  that the correct records are submitted for re transmission and that the accompanying  demographic data is correct     A Network share on this server will be created so that the Staff of the WVSP and Vendor may  exchange sensitive data in a secure manner     An administrator account will be provided to the WVSP for audit purposes on the server     The Vendor must disclose its annual volume of Applicant fingerprint transactions processed  through existing central servers     MorphoTrust meets the requirements     Our current Central Server meets these RFP requirements and our UEP solution  will continue to meet the requirements  We currently produce a database backup  on the WVSP network daily and we propose to continue this process under the  new contract for fingerprinting services     Additionally  a network share on the TCP server is currently available  which the  WVSP staff and MorphoTrust use to exchange sensitive data in a secure manner   WVSP has an administrator account on the TCP and Web Portal server with full  access to all data  logs  and other system con
193. e first with   00110101    followed by  11001010   then  10010111    Sanitization is not complete until the  three overwrite passes and a verification pass are completed  The facility s Disk Duplicator is to  be used for this purpose utilizing the DOD wipe function     e Other Systems  Systems  media  or devices not covered above must be sanitized using the  recommended tools provided by the manufacturer or other procedures outlined in this policy     Definitions    Degaussing is the process of decreasing or eliminating a magnetic field and is the primary method used  by MorphoTrust to destroy electronic media  See Physical Sanitization for more information     Drilling is a method of destroying electronic media by drilling holes through the device  See Appendix A  for more information     10 23 2014 MorphoTrust USA Confidential 9  EXEMPT INFORMATION    Sensitive Data Handling and Storage Procedures PRC 00148 A 05    Destruction of electronic media is the process of physically damaging a medium so that it is not usable  by any device that may normally be used to read electronic information on the media such as a computer   tape reader  audio or video player     Clearing data such as formatting or deleting information removes information from storage media in a  manner that renders it unreadable unless special utility software or techniques are used to recover the  cleared data  Because the clearing process does not prevent data from being recovered by technical  means  it is 
194. e given  access only to those parts of a system necessary to perform their jobs  and that formal  agreement and approval processes for changes are implemented     In addition  access to source code libraries for business applications and customer applications  must be controlled to ensure that only authorized individuals have access to these libraries and  that access is logged to ensure all activity can be monitored     The MorphoTrust policy on change management is in       PRC 00085 B  7 Change Management Policy  amp  Procedure    4 17 Customer Support Policy    The preferred way for supporting our systems in the customer s environment is having a site to   site VPN between our CSN and the customer network  This arrangement offers the most control  and flexibility for managing the security of the access to the customer s environment  such as who  has access  what ports and or protocols are available  being able to cut off access for someone   and so forth  It has the disadvantage of being more burdensome on the MorphoTrust support    10 9 2013 MorphoTrust USA Confidential and Proprietary Page 29 of 37    EXEMPT INFORMATION    Cyber Security Plan PLN 00091 A 02    personnel because they have to connect through another machine or two to get to the desired  machines in the customer   s environment  However  with the existing NSA in effect  it is  preferable and desirable to have stronger security management controls over easy and  convenient access for MorphoTrust support per
195. e in       PRC 00089 B  7 Information Security Policy      PRC 00088 B  7 Firewall Policies and Procedures    Any specific network segregation policy for compliance with the Proxy Agreement and the NSA is  covered in       PLN 00090 A MorphoTrust USA Electronic Communications           4 12 9 Operating System Access Control    Access to local administrative OS level user accounts is a special type of privilege that must be  guarded carefully  Unauthorized access could lead to a significant breach of security  including a  loss of operational functionality as well as a leakage of sensitive information  These accounts  could be the system s Administrator account  or root or its equivalent  or special user accounts  that have local administrative privileges and are intended for use with maintaining or updating  MorphoTrust applications     Computing servers are usually involved in processing sensitive information in a variety of ways   For example  they can be functioning as web servers  file servers  application servers  workflow  servers  database servers  communication servers  and so on  For most if not all of these  functions  the servers are handling or storing sensitive information  and thus they should be  protected more from any potential break in attack or spread of attacks     On server machines in production environments or customer environments  the passwords for  local administrative accounts should be different for every machine  Non built in Administrator  accoun
196. e in the  highlighted roles     1  The Responsible Manager discusses with the customer the possible security  accommodations that could allow the MorphoTrust system to operate with the customer s  limitations  If a candidate security accommodation is in the list of unacceptable security  accommodations  see Section 4 18 2   it cannot be used without the written permission  from both the CSO and ISO  Otherwise  the Systems Engineer ensures that each    10 9 2013 MorphoTrust USA Confidential and Proprietary Page 30 of 37    EXEMPT INFORMATION    Cyber Security Plan PLN 00091 A 02    candidate security accommodation is at least reasonable by modern security practices   Furthermore  the Systems Engineer identifies the security risk s  introduced or exposed  for each candidate security accommodation under consideration  If there is any doubt   the Systems Engineer should discuss the candidate security accommodation with the  ISO to see if there are any other options that might be possible     2  From the set of reasonable candidate security accommodations  the Responsible  Manager  the Systems Engineer  and the customer come to a mutual agreement on the  security accommodation that will be implemented  Either the ISO or the CSO must  approve of the security accommodation before it can be implemented  For security  accommodations that could affect compliance with the Proxy Agreement  the FSO must  approve as well     3  The Responsible Manager asks the MorphoTrust Legal Department 
197. e of West Virginia can observe  transactional details  collaborate on any issue  maintain a single historic record of  all issues  avoid redirecting the applicant  and provide superior customer  support     B  Applicant Status Notification    At any time  an applicant may review the status of their submission by either  contacting our Call Center or utilizing secure features on our public website   Currently  this status is limited to alerting the user to whether or not their record  has been submitted to the State of West Virginia and if that record has been  rejected due to bad prints     MorphoTrust proposes optional additional status details for the applicant   including        Whether their FBI background check is complete  Appendix F   SAFRAN    Optional Features MorphoTrust USA    otate of West Virginia CRFP_DPS1500000010    Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police     Whether their state background check is complete     Whether the results are in the agency s hands for adjudication    MorphoTrust will provide this detailed status information for the applicant  through our secure public website  and will also proactively notify the applicant  via their preferred contact method when their request reaches a final state     C  Back up Print Capture for Poor Quality Prints    When digitally collecting fingerprints  MorphoTrust s workstation software will  automatically compute quality scores for each fin
198. e of a unique Authorization Code     Likewise  non governmental entities will have the option of placing a credit card  on file  which will be charged at the time of transaction whenever an  Authorization Code is utilized  This reduces the opportunity for fraud via use of  shared universal billing account numbers and eliminates the need for employers  to maintain a pre paid balance     The Customer Service Center provides assistance in utilizing authorization  codes     No enrollment is invoiced to a credit billing account until the applicant  transmission is successful  All invoices are accompanied by a detail of activity  inclusive of Payment Date  Fees  Location  Last Name  UEID  Enrollment ID  number   Service Date   amp  Authorization Code  unique one time use code   Figure    21 shows an example of the billing details for all invoicing activity        Payment  RecevecOme Fees PaymentType   PaymentOrign   locatonName location Name Lag vec servceOate ram     Servce Ag thon zation          Accou           2 26 2018 5 30 00 CouponPayment Workstation Keyser 8016 armstead     U1464F260G 2 26 2015 WN Enro 11111136455172815 SAMPLECO  2 2 26 2015 5 50 00 CouponPayment Workstation                 9088 Quais 012482725 2 26 2015      Enro 11111136355128N91 SAMPLECO  3 2 26 2018   50 00 CouponPayment Workstation Huntington 8289 James 02854825644 2 26 2015 Enro 111111364551456K SAMPLECO    2 26 2015 5 30 00 CouponPaymen Workstation Martinsburg 9023 Haywood 017545    5  1 2 26 2015 En
199. e with VESDA early warning systems  These configurations  ensure that fires may be suppressed without damage to the equipment  The  sprinkler systems are only used if the gas based systems prove ineffective during  a fire event  The sprinkler systems are zoned to minimize water damage to  equipment should water be needed to suppress a fire  In addition  Class C fire  extinguishers are located throughout the facilities  Pre combustion  ion  and  combustion  smoke  detectors are located throughout the facilities  and are  powered by an electrical circuit that backed by the facility UPS  Fire detection   preparedness  response and evacuation drills are conducted at least annually  in  accordance with municipal fire department regulations  The local fire  department audits the facilities as required     Battery backups and diesel generators are in place to supply uninterrupted  power in the event of a utility power outage       SAFRAN Vendor Response Sheet        2 MorphoTrust USA  Attachment A     otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    56    Network Security    The UEP network is divided into zones for security and separation of concerns   Figure 14   Workstations  which are connected to the public internet at  Enrollment Centers across the nation  exist in an  Untrusted  network zone     Through a Virtual Private Network  VPN  tunnel  the workstations gain acc
200. e your laptop conforms to IT security practices  If you are unsure  please ask IT to check  it    e  f your laptop was not built by IT  you are out of compliance  Report it immediately to IT    e You should always use the secure VPN client issued by IT to remotely access the MorphoTrust  USA network    e  f you get a warning or error while trying to connect to the VPN remotely  you should disconnect  immediately because it is possible that an attack such as a man in the middle attack could be  active  This is true whether you are accessing over an unsecured network or accessing email via  a web browser  Disconnect from the unsecured network immediately and refrain from using any  network access at that point    10 23 2014 MorphoTrust USA Confidential 9    EXEMPT INFORMATION    Computer and System Use Policy PRC 001 10 A 10    Note     When accessing your MorphoTrust email account remotely using a web browser  periodically  check to make sure the connection uses  https  at all times  If the browser shows  http    disconnect immediately because it is likely that a man in the middle attack is active    If you don t have a cable lock for your laptop for your office  contact the IT Help Desk who will  provide one to you  Lock up your laptop when left in the office overnight  preferably using a laptop  lock    Check your laptop for      and remove any PII found  If available  use the whole disk encryption  software to shred it  For example  with PGP Whole Disk Encryption  the PGP D
201. ectronic submission     The Vendor may work with user agencies to provide convenient fingerprinting sites as long as  they meet the requirements above     MorphoTrust meets the requirements          SAFRAN Mandatory Specification Checklist 97  MorphoTrust USA  Attachment B     otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    98    Site Assessment and ADA Compliance    MorphoTrust requires all potential Enrollment Center locations to pass a  rigorous Readiness Assessment  which requires the Site Assessor to evaluate  over 50 qualities of the facility  including compliance with        laws       sites  are reviewed against the following ADA requirements               accessible entrances   o Doors have a minimum 32 inch width clearance    o External entrance is accessible directly from ground level  or  easily accessible via accessibility ramp if located above ground  level    o Internal entrance  if applicable  is accessible directly from ground  level  or easily accessible via elevator if located above or below  ground level    o Elevators if building is multiple levels  o Hallways have a minimum 36 inch width clearance       ADA marked parking spaces for disabled individuals at a 1 8 ratio  1       one handicapped parking space to every eight parking spaces     Enrollment Center Locations    MorphoTrust proposes 27 Enrollment Center locations in West Virginia  which 
202. ed by their manager and by the role in charge of the information systems for the  relevant network zone     MorphoTrust also has a privacy policy which provides the overall framework for dealing with  sensitive information       PRC 00144 A Privacy Policy    MorphoTrust will maintain appropriate processes and procedures for reasonable and timely  recovery of all information processing systems  applications  and data in a secure way  without  causing information to become corrupt  destroyed  or unavailable for an unreasonable amount of  time     Confidential information and PII data that is old  obsolete  invalid  or inaccurate should be deleted  or disposed of promptly and properly     MorphoTrust has an overarching policy for the protection of customer data       PRC 00174 A  nformation Security  Customer Data Access and Security Policy    MorphoTrust has its general IT security policies given in      PRC 00112 A  T Security Policy    When new projects or programs are started  the security considerations that should be  incorporated are described in       PRC 00111 A Project Security Policy    4 6 Organizational Security Policy    The ISO is the main authority for any questions or interpretation issues on the CSP  The CSO is  main authority for resolving any conflicts between the CSP and practical implementation or  customer issues  If any issues involve compliance risks with the Proxy Agreement or the NSA   the FSO must be consulted     If any security event or incident occ
203. ed in this policy       Senior Management members        not eligible for access to non   public information       The President  Executive Vice President and Vice Presidents are  authorized to delegate access to eligible personnel and to their office staff as  deemed appropriate by job type function and with appropriate justification   conditional upon successful training as outlined by the curriculum put forth  by the CSO    An individual who has responsibility for non public data resources  All non    public data must have an identified Data Custodian  Data Custodians   support the mission of customers and MorphoTrust USA and facilitate the  Data Custodian conduct of MorphoTrust USA business by ensuring that access to data is  granted as needed for legitimate purposes and within the terms articulated  by policy to trained personnel  Examples are Director of Manufacturing  Tier  3 Lead Administration and CSO   Each Data Custodian may designate one or more Data Trustees based on  job type to execute day to day custodial responsibilities  In practice  Data  Trustees are those persons primarily responsible for the accuracy  integrity   and privacy of non public data     Senior  Management    Data Trustee   Access    Administrator  The Data Trustee for non sensitive data is the appropriate Department    Head  The Data Trustee for MorphoTrust USA enterprise wide corporate  summary data is the Chief Information Officer   The functional administrative areas of MorphoTrust USA data
204. ed on equipment stored in Billerica  MA       Atthe end of the backup process  the information is uploaded offsite to the Iron Mountain  Cloud    e  he TRA has    web portal which provides IT personnel access to logs  etc    e        the purpose of this document all storage  internal or external  is referenced as  storage  Both internal and external storage are protected equally with hardware  RAID   and redundant hardware components that are capable of supporting enterprise class  operations       Storage is monitored by both administrators and operations  Monitoring is described in  T  Managing Operations Policy  PRC 00090 B     2Dat            55    e Authorized user s access data at the application layer and are bound by the security  controls active within the application  Application user access is described in the  application control documents    e  n some cases users have access to data      the directory level and have been  authorized to do so by the application business owner  Application user access is  described in the application control documents    e Remote data access and network security are described in the IT Remote Access and IT  Information Security documents     3 Dat    Retention               daily TRA backups are retained in Billerica for one year  after which it is purged        he up loaded copies residing on the Iron Mountain Cloud are retained for seven years   All backup media will be labeled in accordance with the established MorphoTrust USA  
205. edures  and escalation processes to mitigate the effects of a suspected breach        suspected breach occurs  both the CSO and FSO must be notified as soon as possible  The  CSO then will notify immediately the CEO and the GSC Chair  who will be responsible for  informing the DSS and the USGA as appropriate     4 9 Communication Policy    MorphoTrust has its main corporate communications policy in      PRC 00123 A Communications Policy    Furthermore  IT has a policy on electronic communications and email usage in       PRC 00113 A  7 Electronic Communication Policy   Email is saved and archived for logging  legal  and monitoring purposes  according to       PRC 00114 A E Mail Archiving and Retention Policy    4 10 Network Management Policy    4 10 1 Network Management    All MorphoTrust networks will implement appropriate security controls to ensure the integrity of  the data flowing across these networks  If there is a business need  additional measures to  ensure the confidentiality of the data shall also be implemented     The ISO will ensure that measures are in place to mitigate any new security risks created by  MorphoTrust systems programmatically accessing a third party network for special or dedicated  services     Where MorphoTrust has outsourced a server or application to a third party service  such as web  applications or Software as a Service  SAAS   the CSO or ISO or their designated staff must  perform or have performed periodic security reviews of the outsou
206. ee s responsibility to abide and adhere      all MorphoTrust USA established  policies and to control the means by which you have access to such data  Remember  your  laptop is a gateway to MorphoTrust USA s network  as well as to the  possible  customer  networks you have access to  The means of access  laptop  accounts  passwords  etc   should  be highly guarded    Do NOT       leave your laptop      mobile device unattended       Write down passwords  accounts  etc       Useunsecure public web access point   No Starbucks  Panera  McDonald s  Airports   Hotels Lobbies  etc   These are public WiFi access points that do not require a  password or passcode    e Leave your laptop in open view in a vehicle     e Store customer data on your laptop     e Send customer PII via email        Common sense and best practices when transporting your laptop  Always lock it in your  car trunk and do not leave it unattended     e When travelling    o Obtain a loaner USB cellular modem from IT for secure wireless access  If one of  these devices is unavailable  only use your laptop with a wire connection  from  your hotel room  for example  rather than over a public  unsecured wireless  network  Refer to Section 6 if you are travelling outside the country    o Keep your laptop locked up when it is not in use        Access the CSN Customer environments only using a secure  dedicated VPN  connection     e Follow IT Policies for full disk encryption  PGP      As a general rule  negligent action
207. efit  should be performed to determine the most appropriate method of implementation     If certificates are used as a protection mechanism  either for transport encryption or message  encryption  self signed certificates must not be used in production environments  unless required  by the customer  Production certificates can be obtained either through the customer  or  commercial certificate authorities such as Verisign or GoDaddy  or MorphoTrust can create its  own private certificate authority for issues its own certificates  MorphoTrust issued certificates  should only be used on private or closed networks that do not have any access      the Internet  If  MorphoTrust establishes its own private certificate authority  all certificates created for a particular  program  project  or product should be based on a private intermediate certificate authority which  is tied to the private root certificate authority  The MorphoTrust IT Department would be  responsible for the security of the root certificate for the private certificate authority     4 16 4 Service API Access Controls    oeveral MorphoTrust systems  especially those intended for sale or customer use  provide an  application programming interface  API  by which other programs and services can gain access  to perform the desired functions  For service oriented APIs  suitable identification controls should  be used to ensure that the callers of the API are legitimate  either at the user level  the process or  service
208. en team members listed on our  organizational chart have more than eight years of direct Livescan services  industry experience     Our Executive Advisory Board  identified in the organizational chart  will meet  regularly during the contract period to assure a smooth deployment  monitor    Vendor Response Sheet    SAFRAN   Attachment A  2 MorphoTrust USA    otate of West Virginia  Department of Administration  Purchasing Division    CRFP DPS1500000010  Applicant Fingerprinting Services  West Virginia State Police    performance  and encourage program improvements throughout the life of the  contract     v    Kent Schmitt  Program Executive  Certified PMP    EXECUTIVE ADVISORY BOARD    Bob Eckel     President and CEO      Charles R  Carroll      Senior VP Enrollment Services    Chris Brown      VP Strategy  Identity Services        Denny Wear Patrick Kelly   Sr  Director of Sales    Program Director   PMP pending     n    y Casey Mayfield     Senior Director  Deployment and  Support Services    Will Faiella  Director  Call Center Operations    Edward DeSimone  Enrollment Center  Regional Manager    Blake Moore  Senior Manager  Financial Operations    Matt Baldree  Chief Engineer          Blake Carter  Deployment  Manager    Angela Oddone  Employee Services    Tom Pasche  Senior Mgr   Technical Support    Technical Help  Desk    CA  Doug Powers     UEP Engineering    f 22  t David Bolme     Solutions Engineer  Training Manager  LEGEND  Shirlyna Sexson    Customer Service  Cent
209. endly     After the applicant has scheduled an appointment  a confirmation page lists the  appointment details and provides reminders to help the applicant prepare for a  successful visit to an Enrollment Center  The page displays the address of the  Enrollment Center  along with a link that the applicant can click to view    map    and directions  Figure 5        SAFRAN Vendor Response Sheet   Attachment A  2     MorphorTrust USA    otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    Driving directions          12 min A  ey 3          im vie East St   11 min without traffic   Show traffic 5 5 miles Great Brook _ y  Farm State Parke 4   Carlisle          Take East St  Treble Cove Rd and      4 S to Stag Dr in    Billerica  Continue on Stag Dr to Concord Rd        Turnright onto Concord Rd    Drive to your destination    296 Concord Rd       Figure 5  Linking to a Map and Directions to an Enrollment Center from the Pre Enrollment  Website  The secure Pre Enrollment Website is available 24 hours a day  7 days a week   and 365 days a year with the exception of emergency outages or scheduled  maintenance  The UEP website is also mobile and tablet friendly     A new capability that is offered as part of the UEP upgrade includes the ability  for MorphoTrust Administrators to display messages on the website for critical  information that impacts usage as well as provide advance
210. ent  necessary to collect the biometric and biographic data  this data must still be sent  to the State s AFIS  Data sent to  and retrieved from  the State will be transmitted  over a secure Virtual Private Network  VPN  tunnel     To maintain compliance with CJIT ITS v5 3  MorphoTrust uses physical  separation of system boundaries for systems that process Criminal History  Record Information  CHRI  versus those systems that only transmit the PII  needed to initiate the search  To minimize audit  and thus  applicant  costs   MorphoTrust installs the Adjudication  Redaction  and Rap Sheet processing  software within the State s boundary  which is already subject to FBI CJIS  security controls and audits     Figure 14 on page 57 shows that all prints are captured in the field and  transmitted to the central server over a secure Virtual Private Network  VPN    Prints  along with the demographic data  are transmitted to the Transaction  Control Processor  TCP   located within the State s boundary     The TCP tracks all prints submitted to the State s AFIS from MorphoTrust  and  forwards the requests to the AFIS  Responses from the AFIS are returned to the  TCP  where they can be accessed and processed via multiple channels  including     e The Review Client   used to view applicant details  add notes  and redact  results       The Agency portal   used by User Agencies to retrieve results and  adjudicate their clients       Email server   used to notify agency contacts and or appl
211. ential Page 3 of 5  EXEMPT INFORMATION    Electronic Communication Policy PRC 001 13 A 02    All emails between MorphoTrust USA employees and Safran Morpho employees are  automatically logged and stored by the server     Faxes between MorphoTrust USA employees and Safran Morpho employees is  prohibited     Unacceptable Behavior    Use of company communications systems to set up personal business  send chain  letters  promote political causes or outside organizations  or any other non job related  solicitations     Forwarding of company messages to external sources whether they are company  confidential or not     Distributing  disseminating  or storing images  text or materials that might be considered  indecent  pornographic  obscene or illegal     Distributing  disseminating  or storing images  text or materials that might be  discriminatory  offensive or abusive  in that the context is a personal attack  sexist or  racist  or might be considered as harassment    External internet hosted services that do not offer any business value or pose an  excessive risk  For example  some services are allowed  ex  LinkedIn  others are not  allowed  ex  Facebook  Twitter  MySpace  during normal working hours    Accessing copyrighted information in a way that violates the copyright  Also  the sending  or receiving of trade secrets  proprietary financial information  import export information   personal identifiable information  PII  or similar materials without prior authorization     B
212. epartment of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    Enrollment Center A Location       84 50 134  89071 Baton Rouge  LA 1 098 360 1 458    8 8252 Alexandna  LA       Figure 25  Annual Report of Enrollment Center Activity by Location  UEP Solution     Enrollment Center Activ Services          CWP Total 1 290 2 533 2 303 863 6 989    DCSF Total           10 904 18 125  15 627 6 347  51 003     DHH Total           13 14 8 1 36  WLF Total   6 5 1 0 12  DOA Total     60 626 80 869 71 095 30 254 242 844  E ADA Total         38 270 61 631 53 937 20 868 174 706       Figure 26  Monthly Report of Enrollment Center Activity by Service  UEP Solution     Enrollment Center Activ Location       Figure 27  Monthly Report of Enrollment Center Activity by Location  UEP Solution     SAFRAN Vendor Response Sheet  MorphoTrust USA  Attachment A  oe           otate of West Virginia  Department of Administration  Purchasing Division    btart Date    Programs  CWP  DCFS  DHH  WLF            70    2 22 2015  BE o2   gt   un        m      All datos are in GMT    a    1            Universal  ENROLL    Pay Gov Report  from Sunday     Payment Amount T  Date           02 22 2015  67    02 22 2015  60  02 22 2015 567  02 22 2015  60 0   02 22 2015  67 0  02 23 2015 585 0  02 23 2015 585    02 23 2015 585    02 23 2015  85  02 23 2015  85 0   02 23 2015  85 0   02 20 2015 585 0  02 23 2015  67 00  02 23 2015 585         02 20 2015 585       Credit
213. equire the approval of the CIO  or their  designee  prior to implementation  The CCB subsequently reviews the emergency CCR at the  next meeting to ensure documentation was completed  the CCR process was followed  and to  identify any lessons learned that could prevent similar emergency CCRs in the future   Identification     Any employee identifying a need for a change can initiate a            Procedure for Non Emergency Changes    Complete the Online Change Request Form   The Initiator must complete all fields in the  appropriate CCR form prior to submitting to their Manager or Lead for approval and CCB  processing  The Manager      Lead must approve all CCRs before CCB review  Depending on the  Change type  CCRs are approved as outlined in the Types of Changes chart above   CCR Pre Processing     For each        submitted  The responsible Manager s   Team Lead  and  CCB Chair will review the request and approve  reject  or send for review as outlined in the Types  of Changes chart above   New Request Review   all new requests will be reviewed weekly by end of day Wednesday for  changes being made that next week  When a significant change is submitted  a CCB meeting is  scheduled and chaired by the Director of Infrastructure Services   Time Frame   In order to allow adequate time for review  CCR   s should be completed at least 2  days prior to the CCB   Notification   As a condition of CCB approval  all routine CCRs and scheduled maintenance  windows  which require an out
214. er  Service Representative are forwarded to the West Virginia Customer  Service Supervisor or our Technical Support Center for resolution     e Step Three   Problems that cannot be solved or addressed by the  Customer Service Supervisor or Technical Support will be forwarded to  the Operations Manager        Step Four   If a problem cannot be solved by the Operations Manager  the  issue will be escalated to the Project Manager  Denny Wear  Mr  Wear s  contact information is included above        Step Five   In the unlikely event that a problem must be escalated above  the Project Manager level  the Program Executive  Kent Schmitt  should  be contacted  Mr  Schmitt   s contact information is included above     e Step Six   In the unlikely event that a problem must be escalated above  the Program Executive level  the Senior Vice President  Charles Carroll   should be contacted  Mr  Carroll   s contact information is included above     S SAFRAN Mandatory Specification Checklist 125  MorphoTrust USA            otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    c  The Vendor s project manager is required to deliver the project plan and staffing plan within 45  days after the award  The Vendor s Project Manager will be responsible for the successful  completion of all work tasks and deliverables as defined within the project plan within another 45  days for a total of 90 days
215. er Manager    Mark Rooks  Director  Security  Systems Engineering    67   indicates Key Personnel    Asterisk       indicates more than  eight years of experience with         Sheri Wells  Livescan services programs    State CSR Manager    Orange   indicates West Virginia    based personnel Sheila Smith    CSR Supervisor       Figure 1  MorphoTrust   s Project Team for West Virginia Applicant Fingerprinting Services    The following brief biographies summarize the demonstrated experience of each  key project team member in providing West Virginia fingerprinting services     Kent Schmitt  PMP     West Virginia Account Executive    As Account Executive for the West Virginia Applicant Fingerprinting Services  program  Kent Schmitt will provide program oversight and hold ultimate  responsibility to make sure all contractual and programmatic requirements are  met  He will serve as liaison between the Program Manager and the  MorphoTrust Executive Advisory Board to ensure that all necessary resources  are provided to support the West Virginia contract  He will also serve as the  Executive Point of Contact for West Virginia executives           amp  SAFRAN    MorphoTrust USA               Vendor Response Sheet   Attachment A     otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    Mr  Schmitt is an experienced Program and Project Management professional  who has provided strateg
216. ere  authorized or shredding  The authorized methods of destruction for electronic records are  wiping or physical destruction of the electronic media and where possible are done by the  appropriate destruction standard of the time     7  Back Up of Data  Data Storage     All MorphoTrust systems are backed up on a daily basis using an IT approved backup mechanism  The  following rules apply    e  he daily backups are performed on IT equipment stored in primary MorphoTrust offices    e     backup attempts  both successful and unsuccessful  will be logged              the purpose of this document all storage  internal or external  is referenced as storage  Both  internal and external storage are protected equally with hardware  RAID  and redundant  hardware components that are capable of supporting enterprise class operations       Storage is monitored by both administrators and operations  Monitoring is described in IT  Managing Operations Policy  POL 00090 B      Data Access    The following rules govern access to sensitive data    e Authorized users access data at the application layer and are bound by the security controls  active within the application  Application user access is described in the application control  documents       in some cases users have access to data on the directory level and have been authorized to do  so by the application business owner    e Remote data access and network security are described in the  T Computer and System Use  Procedures  PRC 00
217. erification   Fingerprinting  Photo Capture  where            Save and Transmit   Confirmation and Receipt Printing     e Troubleshooting  Equipment Power  Missing Applicant Data  ia   Authenticate  where used   Input Forms  Fingerprinting  Photographs   Record Submission  Receipts     e Frequently Asked Questions    General MorphoTrust Operating Policies    e General Maintenance and Livescan manual                                         SAFRAN  48 SAFRAN   Attachment A     MorphoTrust USA    otate of West Virginia CRFP DPS1500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police      Best Practices  amp  Approved Supplies      Sample Information Form    Computer Based Training    In addition to the required hands on training delivery method and user manual   CSRs Help Desk and Enrollment Agents complete computer based training via  a tailored Learning Management System  LMS   The LMS is a secured platform  and can only be accessed by assigned usernames and passwords     LMS courses are designed to augment and enhance overall learning experience   Courses include job specific training and are used as prerequisite training  for  annual recertification of required courses  and as supplement retraining if the  need should arise  The LMS allows for tracking of each individuals student  record  test scores and completion status of required training     Our training programs are designed to give Enrollment Agents  CS
218. es in a matter of hours in the event of a disaster  either natural or man   made     02 13 2012 MorphoTrust USA Confidential Page 7 of 10  EXEMPT INFORMATION    IT Disaster Recovery Policy PRC 00095 B 02    3 2 Setting Priorities    The CIO is empowered to set and establish IT disaster and action priorities     IT Management is empowered to set recovery task priorities to get the business back up and  running  IT Management is responsible for informing the users  if possible  of that status of IT  infrastructure during disaster recovery     Priority always goes to getting the main business back up and running  This typically is the  corporate information sharing components like email  the web page  and VPN     Critical systems such as sales orders fulfillment  financial systems  and accounting are always  priority systems  Secondary Priority IT systems are the applications and servers for development  and marketing     4 Disabling non priority Services    Disaster response and recovery often includes the disabling of non priority IT services  This  includes shutting down services        to prevent the spread of a greater disaster   to protect corporate information   to utilize resources to bring backup downed systems  to reuse systems for higher priorities   to relocate systems          9 9    4 1 Key Jobs Positions IT and Executives and Departments  In disasters that are large enough to affect multiple groups or involve a long recovery time  IT  Management shall consult with
219. esktop has a PGP  Shred function to delete files securely    If your laptop or mobile device  regardless if it is either personal or corporate property  receives  classified information  it must be sanitized according to the  nformation Spills and Cleanup Policy   PRC 00312 A    No VPN connections can be made from MorphoTrust equipment or from the MorphoTrust  network into personal machines  or any other machines or devices that have not been approved  for access either by the MorphoTrust IT Department or Security Department  or by MorphoTrust s  Customers     Accessing the MorphoTrust USA email system through any means other than browsing to  Outlook Web Access via a personal mobile device grants IT the authority to wipe the  device in the case of loss or theft     DO s and Don ts    Don ts    Leave your laptop or mobile device unattended    Write down passwords  accounts  etc    Use unsecure public web access point   No Starbucks  Panera  McDonald s  Airports  Hotels  Lobbies  etc   These are public WiFi access points that do not require a password or passcode   Leave your laptop in open view in a vehicle    otore customer data on your laptop    oend customer PII via email     Use common sense and best practices when transporting your laptop  Always lock it in your car  trunk and do not leave it unattended    When travelling obtain a loaner USB cellular modem from IT for secure wireless access  If one of  these devices is unavailable  only use your laptop with a wire connec
220. ess for searching and  retrieving applicant information using the Administrative Queue Review Client   Figure 41 through Figure 43 are screen shots of the application     Applicant Selection    The applicant selection screen  shown in Figure 41  is used to search for  applicants and transactions using various search criterion and transaction status    Mandatory Specification Checklist      SAFRAN   Attachment B  MorphoTrust USA    otate of West Virginia  Department of Administration  Purchasing Division    CRFP DPS1500000010  Applicant Fingerprinting Services  West Virginia State Police    values  Authorized personnel can search for an individual applicant by fields  such as name      SSN  or they can generate a list of applicants by fields such as    date range  applicant type  or transaction status         INkless   Administrative Queue Review Client    Applicant Review Screen        Man Setup Windows         Applicant Information   Notes   Documents   Results Status Applicant Selection                                          Completion Status Sort B        Incomplete G AR        Transaction Number    Review Pending C            CR      cT 1     m              Reeced            et ooo                           gt          SSN  C Qual No Record   C Applicant type     E              Status   Transaction Number  State TON                  TEST TEST DCS LCPA Foster Family Home   Pers Closed 1969000219 L000012506 8 27 2009 12 14 19          TEST TEST Handgun Retired Law Enforce
221. ess to  a  Semi Trust  network zone  In this zone  requests for allowed services are  proxied through to the  Trust  network zone hosting the desired service  There  are multiple Trust Zones  properly partitioned for separation of concerns     Finally  a  Secure  network zone hosts all persistent storage of Personally  Identifiable Information  PII   Only the Trust Zone for the UEP application tier  has access to this Secure Zone     When information is exchanged between networks  it is always through an  encrypted channel     Vendor Response Sheet      SAFRAN   Attachment A  3 MorphoTrust USA    otate of West Virginia CRFP DPS1500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    Workstation    AntiVirus Updates         Disk Encryption  Management Management    Active Directory  amp     Certificates Windows Updates    UEP Application       VPN Tunnel       Workstation VPN Untrust     mL    Load  Balancer Active Directory Windows Update AV Management Disk Encryption Mgmt                       Virtual Server Virtual Server Virtual Server Virtual Server UEP Application Server  Partition       firewal                 UEP    464 Trust                                                                     UEP App Server       Virtual Machines Trust Secure    Firewall          Virtual Machines    Figure 14  UEP Workstation Network Topography    Multiple tiers of  Trust Zones  protect Personally Identifiable Informa
222. est practice  email filtering application  This application uses multiple anti virus engines and all anti virus  signatures are updated in real time    e Reports are generated monthly to ensure compliance     8 22 2011 MorphoTrust USA Confidential Page 3 of 4  EXEMPT INFORMATION    IT Virus Protection PRC 00093 B 01    4 Updating Virus Definitions    e MorphoTrust USA IT shall configuration the virus protection application to regularly update its  virus definitions from the software vendor  This process should be monitored by way of log  files  The applications should be configured to send email alerts to the virus application  administrator regarding the status of the virus definition update  In the case of an  unsuccessful update the administrator should manually execute the virus definition update    e Any time there is a change to the virus definition file these update should immediately be  pushed to all workstations and servers     5 Monitoring _       Logs created during virus updates to servers and workstations in the MorphoTrust USA  network should be reviewed for completion status  Any failed updates should be immediately  followed up on and updated virus definitions loaded to the failed component     8 22 2011 MorphoTrust USA Confidential Page 4 of 4  EXEMPT INFORMATION    Sensitive Data Handling and Storage Procedures PRC 00148 A 05    sensitive Data Handling and Storage  Procedures    Document Number  PRC 00148 A  Revision Level  05    Approval    John May James 
223. et  Parkersburg  WV 26101    Pleasant Valley Nursing  And Rehab Center   640 Sandhill Road   Point Pleasant  WV 25550    Princeton Community Connections Inc  215 South Walker Street  Princeton  WV 24740  36 Vendor Response Sheet     Attachment A     CRFP DPS1500000010  Applicant Fingerprinting Services  West Virginia State Police    Hours of Operation    Every other Monday  8 00 am   12 00 pm  12 30 pm   3 00 pm    Monday   Wednesday  9 00 am   12 00 pm  1 00 pm   5 00 pm    Thursday and Friday  9 00 am   1 00 pm  2 00 pm   5 00 pm    Every other Wednesday  9 00 am   12 00 pm  12 30 pm   4 00 pm    Monday   Friday  9 00 am   4 00 pm       TBD    Monday  Tuesday   Thursday  and Friday  9 00 am   5 00 pm  Wednesday   9 00 am   1 00 pm  2 00 pm   5 00 pm    Monday   Thursday  8 30 am   12 45 pm  2 00 pm   4 00 pm    Monday  Wednesday and Thursday  9 00 am   3 00 pm    Every other Monday  9 00 am   12 00 pm  1 00 pm   4 00 pm    Monday   Friday  8 30 am   12 00 pm  1 00 pm   3 30 pm  Every other Friday  9 00 am   12 00 pm  1 00 pm   4 00 pm       Monday  Wednesday  Friday  10 00 am   3 00 pm      SAFRAN    MorphoTrust USA    otate of West Virginia CRFP DPS1500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    West Virginia City Town   Location Address Hours of Operation    Ronceverte Mountain Heart Community Services Tuesday Thursday 12 00 pm     4 00  Inc  Workforce WV pm  25 Red Oak Shopping Center  Roncever
224. etrics  Biographic and demographic data  State Identification card numbers    Many federal and state laws regulate the collection  handling and disclosure of sensitive data  including  the Family Rights to Privacy Act  FERPA   the Health Insurance Portability and Accountability Act   HIPAA   the Gramm Leach Bliley Act  the Federal Privacy Act of 1974  the DHS Real ID Act  the  MorphoTrust USA Proxy Agreement  the National Security Agreement  the NISPOM requirements   provincial  amp  state privacy regulations  Cyber Protect Laws  and other jurisdictional laws     Exposure of sensitive data through improper disclosure or security failure is a violation of these laws and  can result in MorphoTrust USA incurring legal liability  financial liability  loss of reputation  and loss of  trust     Data Custodians and Trustees    Access to sensitive data is granted by data custodians and trustees who are required to develop and  maintain clear and consistent procedures for access and use of the data and prevent unauthorized  access     Custodians and Trustees are considered Policy Implementers responsible for understanding and  following  but not making policy     All sensitive data is classified as High Critical and must be consistently protected throughout its life cycle   from its creation receipt to its destruction delivery  in a manner corresponding to its sensitivity and or  criticality regardless of where it resides  what form it takes  what technology is used to handle it  and 
225. eview and event detection monitoring using ELM software   e Maintain a current network diagram of hard production cards   CSN     2 2 Events are logged to server system logs as they occur     e Network staff monitors the various consoles described in table 2 that report system errors  that require intervention     e Automated Error handling and paging will manage alerts for the administrators  Errors are  automatically filtered and notification sent depending on severity         f documentation exists  the operator may refer to the document to determine how to  react to the displayed error     Table 2  below  describes the monitoring activity and supporting systems for responding to errors     Table 2  Operations Monitoring    System application ee   Support system       Linux and Windows server ELM software Network administrators  health    8 22 2011 MorphoTrust USA Confidential          3 of 5  EXEMPT INFORMATION    IT Managing Operations Policy PRC 00090 B 01    2 3 Repor ting issues incidents             of primary contacts for each application or infrastructure team located at HQ is  maintained by the IT organization  The list is used to determine who to contact to  manage an issue that the network support staff person cannot handle          An escalation procedure exists so that if the network support staff fails to respond to  the problem  users escalate to the Head of the IT Department     2 4 Logging of issues    e All issues are logged by the Network Administrator a
226. f  fingerprinting locations in West Virginia for a total of 27 Enrollment Centers  throughout the state     We have provided a complete list of proposed locations and hours of operation  in Table 10 and a map of the statewide distribution in Figure 7  In addition  we  offer on site mobile fingerprinting services for groups of 25 or more  as we  described in our response to requirement 4 4 3 2     Our program management and regional operations teams will evaluate  Enrollment Center capacity and utilization on a recurring schedule to assess and  remediate recurring issues related to appointment availability  Figure 6 shows an  example of an Appointment Availability Report  which provides real time  information about Enrollment Center appointment availability and utilization   MorphoTrust uses this report to proactively address availability before issues  arise     If demand dictates  we will provide multiple Enrollment Centers or Enrollment  Centers with multiple workstations in high population areas to ensure timely  access to services            SAFRAN Vendor Response Sheet            MorphoTrust USA  Attachment A     otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division    rom  3 6 2015  ocations   Aberdeen  SD  8252   ACI NA         C  Fndjnot      To  4 20 2015 iu    Appointment Availability    E 1     U  Univers                          L Friday  March 06  2015 6 51 PM  Shows appointment availabili
227. ffice  contact the IT Help Desk who  will provide one to you  Lockup your laptop when left in the office overnight  preferably  using a laptop lock     e Check your laptop for      and remove any      found  Use the whole disk encryption  software to shred it  For example  with PGP Whole Disk Encryption  the PGP Desktop  has a PGP Shred function to delete files securely     6 Interna tional Travel    e You are not allowed to take any of the company s development software code or Subject  Contract Information  which includes PII  out of the country     e You are not allowed to take any export controlled information unless authorized for the  destination and end use by the Export Compliance Officer  Please see the Technology  Control Plan for additional information on export controls     e You are not allowed to VPN into the MorphoTrust network from outside of the country     e You are allowed to use https   mail l1id com  for email only  As stated above  make sure  the entire email session continues to use  https  and not  http   If when you first try to  connect to the mail server using this URL  you get a warning or error message regarding  a certificate  disconnect immediately as a man in the middle attack is active     e You may not take your company laptop out of the country  Instead get a travel laptop on  loan from IT by submitting a request via the Service Manager portal at htips   itsupport  and upon return to the office  return the travel laptop to IT for sterilizati
228. figuration information     We meet all State and FBI standards for archiving all fingerprint images   signature images  and demographic data in a non proprietary EFTS format        archived data remains the sole property of the State and is purged from the  database according to the required schedule     We maintain adequate disk storage for more than one month of fingerprint  submissions  In the event of a communications failure  submissions are sent to  the criminal records repository upon restoration of communication  without the  need to re fingerprint applicants       SAFRAN Mandatory Specification Checklist 95  MorphoTrust USA  Attachment B     otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    96    The following statistics demonstrate the annual volume of transactions  processed through our central servers in state and federal programs        More than five million fingerprint enrollments per year at more than  1 200 Enrollment Centers in 26 U S  states        More than one million TSA Pres   applicants per year      70 000 West Virginia applicants per year    In our response to requirement 4 4 4 1  we have provided additional details on  our plan for collecting and housing fingerprint submissions     f  Card Scan Conversion    User agencies  Applicants using manual  ink and roll  fingerprint cards will forward fingerprint  cards to the Vendor  The Vendor shall 
229. for submitting this report     e  During the execution of the project  the Vendor s project manager will be required to maintain  an issue log  risk log  change log  lessons learned  deliverable log  as well as the execution and  management of the project plan     MorphoTrust meets the requirements     Our Project Manager will maintain a log tracking all risks identified  changes  made and lessons learned  The log will also track the execution and management  of the project plan to ensure that all tasks are performed successfully in a timely  manner that meet all requirements of the project plan     f  The Vendor s project manager will be required to conduct a session for post review of the  project  The post review will contain at a minimum lessons learned  review of issues  review of  risks  and review of project team performance     MorphoTrust meets the requirements     Mandatory Specification Checklist     126  amp  SAFRAN   Attachment B  MorphoTrust USA    otate of West Virginia CRFP_DPS1500000010    Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    Our Project Manager will conduct a post review of the project that will contain at  a minimum lessons learned  a review of issues that arose throughout the course  of the project  the risks identified  and how the team performed the required    tasks     g  The Vendor s project manager will be required to ensure that accreditation and certification is  performed
230. frastructure components at MorphoTrust USA Billerica  It does not define the process for  individual departments     This plan defines the steps that are necessary before a disaster strikes  Being prepared is our  best action     The plan also defines the process for recovery after a disaster strikes and the goal of getting back  to normal business  Knowing what to do is our best protection     This plan does not discuss disasters that do not hurt the facility  such as snow storms  Normal  business today allows for the employees to work at a distance via email  the web  their home  computers  and VPN  This document only addresses recovery of the IT components  not of the  human resource issues of personnel outside of IT     This plan covers the case of the Billerica Center being damaged or non operational  This  assumes that the backup location in Fort Wayne  is still operational and can be utilized in the  recovery process     Depending on the level of disaster  power outage to complete destruction   data and application  loses shall range from minimal to substantial  Some data may not be recoverable depending on  the level of the disaster and the time since the last back ups were moved off site  Hence a  disaster is a loss of time  information  money  and opportunity  The time to recover directly affects  all of these items     Individual departments are responsible for ensuring that their data and applications are part of the  IT facility  Unauthorized systems must not exi
231. g  or information storage or retrieval      without written permission of MorphoTrust USA     Users are responsible for making sure that they have the current revision of this  document     02 13 2012 MorphoTrust USA Confidential Page 1 of 10  EXEMPT INFORMATION    IT Disaster Recovery Policy PRC 00095 B 02    TABLE OF CONTENTS    1 ASSUMPTIONS iiem RURNNAEU SENA MELIA MIN DU NANI                                    UN TMIM KIM SEIN SEINE 4  2 PRE DISASTER PROCEDURES 2                                         5  2 1 zd                                                 5  2 2 Sugerir                                6  2 3 OFFSHTESTORAGE                          6  2 4                            P 6  2 5 ncm                                                   6  2 6              CNET U                                       m 6  2 7 REMOTE    OESO RR          6  2 8 HECOVERYASERVICES                                                                   SEN RM ENDS 7  2 9 TRAINING FOR DISASTER                                                                 Un PRU RUN 7  2 10   CONTINUOUS DISASTER DRILL TRAINING     BE PREPARED TO RESPOND                                7  3 POSF                eem 7  3 1 DISASTER ASSESSMENT AND RESPONSE        ssssccssssceessseeeesseecesseeccesseecesseececsaeeceseeeeesaeeeenes 7  3 2 SET GRO ccc                            8  4 DISABLING NON PRIORITY                                                                 e nnn nnn nnn nnn n anna ananas 8  4 1 KEY JOB
232. g Division West Virginia State Police    This page intentionally left blank     156 Appendix G    SAFRAN    Bid Bond MorphoTrust USA                 Dept  of Admin Purchasing Div     REQ P O   BID BOND    KNOW ALL MEN BY THESE PRESENTS  That we  the undersigned  _ MorphoTrust USA  LLC  of 296 Concord Road  Suite 300   Billerica  MA 01821   as Principal         RLI Insurance Company       9025 North Lindbergh Dr  Peoria  IL 61615      corporation organized and existing under the laws of the State of           5 with its principal office in the City of Peoria  IL   as Surety  are held and firmly bound unto the State  of West Virginia  as Obligee  in the penal sum of  Five Percent of Amount Bid      5  of Amount Bid     for the payment of which     well and truly to be made  we jointly and severally bind ourselves  our heirs  administrators  executors  successors and assigns     The Condition of the above obligation is such that whereas the Principal has submitted to the Purchasing Section of the    Department of Administration a certain bid or proposal  attached hereto and made a part hereof  to enter into a contract in writing for  Solicitation Number  CRFP 0612 DPS1500000010       West Virginia State Police  Applicant Fingerprinting Services       NOW THEREFORE    a  If said bid shall be rejected  or   b  if said bid shall be accepted and the Principal shall enter into a contract in accordance with the bid or proposal    attached hereto and shall furnish any other bonds and i
233. g Pattern to Destroy a Hard Disk       Hard Disk Drill Pattern    1 4  to 3 8   holes       Note  The intent of this drill pattern is to   e Destroy the drive s read write head by having a rough surface at all radii as the disk spins  and  e Maximize the amount of instability when the disk spins at its rated speed     10 23 2014 MorphoTrust USA Confidential 12  EXEMPT INFORMATION    IT Security Policy PRC 001 12 A 03    IT Security    POLICY    Document Number  PRC 0001 12 A  Hevision Level  03    Approval    Dennis Kallelis Robert Stack  Chief Security Officer Chief Information Officer    This documentation contains confidential and proprietary business information of MorphoTrust  USA  This document  including copies of all or and part thereof  may not be released or  disclosed to persons other than MorphoTrust USA employees except as necessary for business  purposes of MorphoTrust USA under an appropriate confidentiality agreement     Users are responsible for making sure that they have the current revision of this document    05 01 2012 Confidential 1 of 8  EXEMPT INFORMATION    IT Security Policy PRC 001 12 A 03    TABLE OF CONTENTS  1  FOO SC T                                             3  2         mMNECMHT                                  3  3  SUM MK E                             3  4  Organization and                 0                                                                   3  5                                   Ex      cun    uU 4  6  PSG               X 
234. g processes in addition to State vetting  requirements  not in lieu of  ensuring that all Enrollment    identoGO Center Center personnel meet and exceed the high standards for    4510 Terrace Avenue  Huntington  WV 25705 175    IdentoGO Receipt Process    safety and security mandated for program employment     iii MorphoTrust will provide a printed receipt to each                                             met          Date  08 11 2014 11 15 AM    NEC e        Applicant  JOHN S  SMITH contain  at a minimum  the system unique identifier and       UE ID  U11F 193H9F  Service E date of service  Figure 8 shows a sample of the enrollment  ee   gt   Paid   9 95 1 1 1 1 1711                   receipt currently in use in the West Virginia program    Auth Number  123    Communication Process    Check the status of your service at   http   uenroll identogo com    During enrollment  every applicant is required to provide  MM either a telephone number or an email address  Applicants  Figure 8  Transaction Receipt who provide both will also select their preferred method of    contact     This method of contact is used to automatically deliver important notifications   such as a need to resubmit fingerprints  Applicants are also notified  automatically of an Enrollment Center closure due to inclement weather  if it  impacts a scheduled appointment                                         Q SAFRAN  38    SAFRAN   Attachment A  MorphoTrust USA    otate of West Virginia CRFP DPS1500000010  De
235. gate efficiently enable her to successfully  manage multiple areas of responsibility     Ms  Mayfield holds a B A  in Criminal Justice from the University of Illinois at  Springfield and an A A S  in Law Enforcement from the Lincoln Land  Community College  Her program references include    5  Department of  Homeland Security  Transportation Security Administration  New York Division  of Criminal Justice Services  Tennessee Bureau of Investigation  Department of  Administration  Indiana State Police   and Texas Department of Public Safety       SAFRAN Vendor Response Sheet  we 9    MorphorTrust USA  Attachment A     otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    Doug Powers     UEP Engineering    Doug Powers coordinates all product design and engineering activities for  MorphoTrust s Universal Enrollment Platform  He has          than 15 years of  experience in software and product engineering  with over eight years of  experience in engineering leadership     Mr  Powers began his career in identity and biometric solutions in 1999 with  ChoicePoint  and has worked with a number of government agencies including  the Federal Bureau of Investigation  the National Center for Missing and  Exploited Children  the Transportation Security Agency  and the New Jersey  State Police  He has been credentialed by the Agile Alliance as a Certified Scrum  Master and Certified Produ
236. ger  If the score for a fingerprint  is below an acceptable threshold  the software will direct the Enrollment Agent  to re collect the fingerprint  If the Enrollment Agent is unable to collect a  fingerprint that meets acceptable quality standards  the software will direct the  Enrollment Agent to collect two sets of fingerprints     MorphoTrust will always submit the best fingerprint record  However  if that  print is rejected by the FBI or the Department   s AFIS  MorphoTrust will  automatically submit the second best print without requiring the applicant to  revisit an Enrollment Center     D  Address Verification    MorphoTrust proposes optional address verification services to ensure that  mailing addresses collected are valid  This feature  Figure 50  ensures that the  street address  city  state  and zip code provided by an applicant is a valid  combination recognized by the United States Postal Service  When an invalid or  incomplete address is given  this service will attempt to    fill in the blanks    and  provide the user with suggested corrections  This service will ensure that when a  mailing address is required  the State of West Virginia will always receive clean  and verified data                                                                          SAFRAN Appendix F      2 MorphoTrust USA Optional Features    otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia Stat
237. gister and schedule appointments by calling MorphoTrust s  Customer Service Center or by scheduling directly through our secure Pre   Enrollment website  which safeguards the applicant s personal and financial  information using a Secure Socket Layer protocol  SSL  following industry  standards for encryption  Our single point Pre Enrollment Website provides  applicants and the public with general program information and instructions to  navigate them easily through the appointment process     The Pre Enrollment Website provides a list of Enrollment Centers that can be  easily searched by region or zip code  As shown in Figure 10  applicants will see  the hours of operation and appointments available at each West Virginia  Enrollment Center and will be able to scroll through the timeline to locate an  appointment that fits their calendar     IdentoGO    Enrollment Services                                      5       West Virginia Concealed Carry Pre enroll    Step 8 of 9  Select Appointment Location   Required fields    Enter a Postal Code  City or Airport Code to  Search  for a location to schedule your appointment  Use the     Select Options    dropdown to filter your search  After selecting a location  click    Next    to continue or    Cancel    to exit    Huntington  WV Q  Number of Results  5      Select the location row  Then click    Next    to continue     v Houston  TX 1 1 mi  IdentoGO Hours   4510 Terrace Avenue Monday   Friday  08 00 AM   05 00 PM    Huntington  
238. given risk is considered  The  outcome of the SLE and ARO calculation is an Annual Loss Expectancy  ALE    The ALE is the final output of the activities around quantifying impact  It  represents the cost associated with the realization or actualization of a given risk     As part of the on going security program  action plans are developed   maintained  updated  and reviewed  The plans and durations are based on  residual risk  Residual risk is calculated using the ALE and is the determination  of the amount of risk that remains when a risk is considered in the context of    existing counter measures  controls  and protections     For each risk  a determination is made whether to accept  mitigate  or transfer the  risk  MorphoTrust does not ignore risks or their associated residual risks  In  cases where the cost impact of the risk is less than the cost of mitigation  the risk  is noted to the risk program  reviewed by management  and monitored by the  information systems security officer  In cases where the cost impact of the risk is  greater than the cost of mitigation  MorphoTrust takes the necessary steps to  implement the mitigations such that the new risk profile is acceptable  Finally   MorphoTrust may elect to transfer risk within the parameters outlined by  contract  For example  MorphoTrust may elect to contract with a Call Center  provider who would be responsible for continuity planning relative to that  specific mission capability     Issue Management         sig
239. h  may end up residing somewhere on the Customer Network     10 9 2013 MorphoTrust USA Confidential and Proprietary Page 9 of 37    EXEMPT INFORMATION    Cyber Security Plan PLN 00091 A 02    However  customer environments are typically segmented so that the part of the  Customer Network that would receive the Company Confidential Information is  not same part of the network into which MorphoTrust deployed systems are  installed and operated  During normal delivery and operation of MorphoTrust  systems within a customer   s environment  no Company Confidential Information  should be transmitted or stored by those systems     4 4 Organizational and Functional Responsibilities    The following roles have the specified responsibilities for ensuring and maintaining compliance  with this CSP  Note that the role names may not correspond directly to the actual titles of  MorphoTrust personnel  However  the responsibilities outlined below will be assigned to the  appropriate individuals  regardless of their actual title     Furthermore  because of the diverse types of products  programs  solutions  and services offered  and supported by MorphoTrust  there can be multiple roles listed for a particular responsibility   However  for any particular information processing system or network  there should be one  person  the Primary Owner  who is both responsible and accountable for it  If appropriate or  necessary  a second person may be identified as a Secondary Owner  if the Primary Owne
240. h the State Central  Repository     MorphoTrust USA  LLC  MorphoTrust  submits  the enclosed response to this opportunity to  provide Applicant Fingerprint Services     A Trusted Partner in West Virginia    Since 2011  we have enjoyed a collaborative relationship with the State of West  Virginia and the agencies serviced by the program  Our joint success in growing  a program that serviced over 70 000 applicants in 2014 is due to much more than    simply collecting fingerprints     Together  West Virginia and MorphoTrust have deployed a fingerprinting    service that is critical for protecting the citizens in your communities  Our    commitment as a partner to you is rooted in our mission statement   To simplify     protect and secure the lives of American people   While our first priority is    safety  we also partner with agencies like you to deliver an innovative user    experience that simplifies the customer applicant process  In addition to the high  value we place on the end user experience  our solution places equal importance      SAFRAN    Executive Summary 1  MorphorTrust USA    otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    on supporting the agencies that must manage complex criminal history reporting  workflows     Since 2012  we have met with more than 50 major West Virginia agencies and we  have designed  developed  and deployed customized solutions f
241. hat require less cleaning  capture better ridge detail  and capture prints faster   However  we cannot make these devices available in West Virginia if 1000 dpi  resolution is required     Authentication of Identification Credentials    For the current solution  the Enrollment Agent reviews each applicant s valid  photo identification prior to the fingerprinting session  In accordance with state  guidelines  the Enrollment Agent ascertains to the best extent possible that the  person is being fingerprinted for the purpose intended and is the person shown  on the ID  Acceptable forms of personal identification must be current and valid  and will include driver licenses issued by any state  passport  military ID  and  photo identification card issued by a municipality  county or state in lieu of a  driver s license     With our UEP solution  the workstation software displays the list of acceptable  identification documents to the Enrollment Agent  While this list can be  configured specifically for West Virginia requirements  we recommend accepting  only photo IDs issued by a state  United States territory  or the federal  government     When presented with an identification document  the Enrollment Agent will do  their best to determine if the document is authentic and that the photo  reasonably matches the applicant  MorphoTrust   s Enrollment Agent training  program includes a dedicated section that details how to determine that the  offered ID is genuine and valid  Our Enro
242. hat walks both the  Enrollment Agent and the applicant through the fingerprint collection process   We recognize that image quality is the most important component of a  fingerprint collection system  The workstation software automatically calculates  the quality of fingerprint captures  giving real time feedback to the Enrollment  Agent  This fingerprint Quality Assurance process helps eliminate rejects due to  of image quality issues     As an optional feature  our administrative portal provides the ability for agency  personnel to investigate their customer s transactions  Transaction details that  may be viewed include service status  steps to fulfill service  and details of the  service including the ability to view captured biometrics and documents  This  level of detail provides forensic capabilities for the adjudicator for moderate to   high risk security customers     4 4 3 4 The Vendor should describe in detail their plan to provide a receipt to each  Applicant to verify successful completion of the fingerprinting service     MorphoTrust currently complies with this requirement        will continue to do  so upon contract award  We assign a unique ten character enrollment identifier  to each transaction  which will remain unique for the duration of the contract   We will continue to provide a receipt to each applicant at the conclusion of their  enrollment  Figure 13 shows a sample receipt     Vendor Response Sheet   SAFRAN     Attachment A        MorphoTrust USA   
243. he CSP is planned to be updated or changed  the MorphoTrust  management in charge of the system should perform a risk cost benefit tradeoff in conjunction  with the customer to determine if it is feasible and prudent to incorporate security updates at that  time  For any security improvements which are deferred or declined  both the customer and  MorphoTrust must fully understand and acknowledge the risks and potential costs of such a  decision  If any security updates are required for compliance with the Proxy Agreement and the  NSA  then the Facility Security Officer  FSO  and Information Security Officer  ISO  must be  consulted first so that MorphoTrust does not fail to remain compliant with the Proxy Agreement  and the NSA  The MorphoTrust FSO also functions as the Compliance Officer for the NSA     For information on how electronic communications coming into or leaving the MorphoTrust  environment  either by network or physically  for the purposes of compliance with the Proxy  Agreement and the NSA  see the ECP    e PLN 00090 A MorphoTrust USA Electronic Communications Plan    All MorphoTrust personnel are expected to comply with this CSP     3 SCOPE    The CSP applies to all MorphoTrust personnel  employees  contractors  temporary employees   etc   as well as MorphoTrust subsidiaries     The CSP applies to all MorphoTrust information processing systems  whether they are hosted  and maintained within MorphoTrust facilities or in secure third party facilities     Deploye
244. he ability to demographic  information  pay fees  retrieve directions to the fingerprinting centers  the  availability of the services and when will maintenance be performed     MorphoTrust   s proven web based registration system is a key component in  delivering excellent customer service to both applicants and the agencies that  employ or license them  Applicants can access the web site 24x7x365 to obtain  information  enter their demographic information  pay fees  locate an Enrollment  Center  schedule an appointment  and retrieve directions to the fingerprinting  center     At the beginning of the new contract period for the Applicant Fingerprinting  Services program  applicants will continue to utilize the registration system that  has been in place in 2011 and which complies with all the requirements of this  RFP     During the first year of the contract  we will transition to our new UEP Pre   Enrollment Website  Our UEP software has smart logic that allows applicants to    Vendor Response Sheet   SAFRAN  7     Attachment A  MorphoTrust USA             DPS1500000010  Applicant Fingerprinting Services  West Virginia State Police    otate of West Virginia  Department of Administration  Purchasing Division    pre enroll  beginning with entering the required demographic information   Figure 4   In a step by step process  the applicant searches the list of Enrollment  Centers and hours of operation to find a convenient fingerprinting location   selects an open appointment 
245. he production data is stored on a secure network with ACLs and preferably encrypted     As much as possible  any restrictions or intended use for customer data  production or otherwise   should be documented and maintained in a suitably protected manner by the manager whose    10 9 2013 MorphoTrust USA Confidential and Proprietary Page 28 of 37    EXEMPT INFORMATION    Cyber Security Plan PLN 00091 A 02    group received the data  Historically  many customers have provided test data  production or  otherwise  to MorphoTrust for various intended purposes for a number of years  Unfortunately   with changes in MorphoTrust personnel over time  it is possible that the intended use of this data  may have become lost or misplaced  If the documentation for the intended use of a customer s  data is no longer available or cannot be found  then the data should only be used in a way that  could ultimately benefit that particular customer in some way  This usage can include QA testing   regression testing  debugging problems  investigative analysis  and training new or existing  algorithms  Typically  the benefit to the customer will come in the form of new software releases  or improved configuration parameter settings for better accuracy or performance     For the UAT environment  it is possible that production data will be loaded into the UAT systems   either to simulate production conditions or in preparation for the UAT environment to be  transitioned into the production environment 
246. he proper security in place to meet the  current CJIS Security Policy  This server will show the current status of all transactions in  the system     e Allow the State direct access to the information contained in the database for each  transaction  including Applicant information  transaction tracking information  transaction  status  and all results data via client software provided to the State for use as a part of  the Applicant fingerprinting solution  Access from this software must be controlled by  User id and password  Authorized users must be allowed to change transaction status   reprint results and perform follow up inquires to appropriate data sources to complete  tasks necessary to adjudicate the transaction  All necessary configuration information  including agency and ORI information must be table driven and able to be updated by the  otate     MorphoTrust meets the requirements     We have successfully implemented automated results processing and reporting  functions in West Virginia  Our solution is already proven and fully operational  in the WVSP environment  so the State of West Virginia can be confident of  continued service with no disruption     Figure 40 provides a solution overview including the central results server     S SAFRAN Mandatory Specification Checklist 103  MorphoTrust USA       otate of West Virginia CRFP     51500000010          Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Polic
247. his central results server     By continuing to use the centralized results server  aka Transaction Control  Processor           already installed in the WVSP Data Center  MorphoTrust will  continue to receive  store  process  and deliver results with no interruption of  service  This solution already operates under WVSP oversight and is compliant  with FBI CJIS Security Policies     Figure 15 provides a solution overview including the central results server  We  have provided additional detail about our Results Processor in our response to    requirement 4 5 4          VenderRespnseSheet    SAFRAN  58 SAFRAN   Attachment A  D MorphoTrust USA    otate of West Virginia CRFP_DPS1500000010          Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police  MorphoTrust Secu    MorphoTrust 2      5             Transaction Protocol    Overview  Store and  Forward A               REN  ASA 5520  PUB       standards  need to be specified by Morpho MySQL   en            Review Client   Figure 15  Overview of MorphoTrust Technical Solution    This solution already operates under WVSP oversight  using a central results server located in the WVSP  Data Center  and is compliant with FBI CJIS Security Policies     Data Storage   NIST submissions received from the MorphoTrust Central Server  including  information such as fingerprints  digital signature  and other status information   are stored on the Transaction Control Processor        
248. i e   bad checks  credit cards  etc   resulting in non   payment are the sole responsibility of the Vendor    MorphoTrust meets the requirements     MorphoTrust will collect the appropriate fee for each applicant either from the  applicants themselves or from the sponsoring agency  where applicable  We will    Mandatory Specification Checklist     114 SAFRAN   Attachment B  2 MorphoTrust USA    otate of West Virginia CRFP DPS1500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    be responsible for any monies resulting from bad checks or credit cards  Checks  will be remotely deposited on the day of service but will be subject to a hold of  up to five days to ensure valid payment prior to record submission     b  Reconciliation    The Vendor and the State shall reconcile billing on a monthly basis       billing reconciliation shall  be based upon the successful transmission of an Applicant fingerprint transaction from the  contractor to the State  The State will bill the contractor for Applicants fingerprinted at all sites on  a monthly basis  The Vendor shall make payment to the State for all applicable State and Federal  fees within 30 days of receipt of the bill unless a discrepancy is noted  If the Vendor detects a  discrepancy  the State must be notified within five  5  days     MorphoTrust meets the requirements     We will adhere to the reconciliation process established by the State to ensure  that 
249. ia Access Control   Local Area Network   North American Security Products Organization  National Institute of Standards and Technology  National Security Agreement   Operating System   Platform as a Service   Personally Identifiable Information   Quality Assurance   Remote Authentication Dial In User Service  Software as a Service   Secure Inventory Management System  service Level Agreement   Special Publication   Structured Query Language   Secure Sockets Layer   Social Security Number   Transport Layer Security   User Acceptance Testing   U S  Government Agencies    Virtual Local Area Network    7 CONTACT INFORMATION    PLN 00091 A 02    Questions concerning this CSP or its accompanying policies may be directed to the MorphoTrust  Information Security Officer  ISO      Dr  James Kottas  ISO  MorphoTrust USA  Inc    296 Concord Road  Suite 300  Billerica  MA 01821   Phone  978 215 2613    jkottas Q morphotrust com    10 9 2013    MorphoTrust USA Confidential and Proprietary    EXEMPT INFORMATION    Page 34 of 37    Cyber Security Plan PLN 00091 A 02    Any failures to comply with the CSP or any of its accompanying policies must be reported to the  MorphoTrust Chief Security Officer  CSO      Dennis Kallelis  CSO  MorphoTrust USA  Inc    296 Concord Road  Suite 300  Billerica MA 01821   Phone  978 215 2572    dkallelis morphotrust com    8 REVISION HISTORY      Date   Description           Authors  2 10 2012   Initial draft to GSC  James Kottas  2 14 2012   Initial approved 
250. ic leadership and tactical management for multiple  federal Government contracts  He is a certified Project Management Professional           and holds a Bachelor of Science        in Mathematics from Pennsylvania  State University     As MorphoTrust   s Program Manager for TSA Universal Enrollment Services  he  has been responsible for contract performance and compliance as well as day to   day management of MorphoTrust  s Enrollment Services under the TSA  Universal Enrollment Services contract  Through his leadership  MorphoTrust  successfully transitioned the legacy Transportation Worker Identification  Credential  TWIC  and HazPrint Enrollment Center network to Universal  Enrollment Services     During 2013 and 2014  Mr  Schmitt led MorphoTrust s team to expand the  Universal Enrollment Services network to support the newly created TSA Pre        application program services  which recently received the ACT IAC Igniting  Innovation Dynamite Award for the Greatest Citizen Impact and the 2015  SAFRAN Innovation Award for Customer Satisfaction     Mr  Schmitt also manages MorphoTrust s Identity Services nationwide network  of 1 200 Enrollment Centers and program management team that serves  MorphoTrust s federal and state agency clients and their respective customers     Mr  Schmitt has been with MorphoTrust since 2012  His customer references  include the U S  Department of Homeland Security  Transportation Security  Administration     Denny Wear     Program Manager    Our
251. ical IT Access Controls PRC 00091 B 01   IT Remote Access PRC 00092 B 09   IT Security Policy PRC 00112 A 03   IT Sensitive Data Handling and Storage Procedures PRC 00148 A 05  IT Virus Protection PRC 00093 B 01   Removable Media Policy PRC 00150 A 01    Appendix A Z   MorphoTrust IT Security Policy and   SAFRAN  Personal Data Privacy Policy MorphoTrust USA    Appendix B   Preliminary Project  ochedule    MorphoTrust has provided our preliminary project schedule on the following    pages        SAFRAN Appendix B    MorphoTrust USA Preliminary Project Schedule    131    otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    This page intentionally left blank     132 Appendix B    SAFRAN    Preliminary Project Schedule MorphoTrust USA             1 West Virginia State Police  Applicant Fingerprinting Services 2     PROJECT INITIALIZATION 2296  RFP issue date 10096  Submission of RFP Proposal 100   Anticipated Oral Presentation 0   Anticipated Contract Award to Chosen Vendor 0   Contract Signing Completed 0   MorphotTrust Kickoff meeting with WV Stakeholders 096  MorphorTrust Internal Kickoff meeting 096    MorphoTrust Internal WBS Planning Status meetings   0   DATES TBD  Meetings Scheduled As Needed  Internal MorphoTrust Program Manager  Deployment 096  Manager  and Project Manager  Facilities and Partner Manager and team 096  RFP Requirements Review 090    MorphorTrust Inte
252. ically logged in the operations  center     A man trap area between the lobby and the Data Center floor requires two factor  authentication  electronic card key and PIN   Authorized individuals must hold  their valid electronic card key near another proximity reader and enter a valid  PIN to enter the man trap  Inside the man trap  a CCTV camera captures all  activity  All physical access attempts are logged via the electronic card key  reader in the facility operations center  Authorized individuals must then hold  their electronic card key near another proximity reader and provide their  biometric factor  If authorized  the exit door to the man trap will unlock and  allow access to the Data Center floor  A CCTV camera captures all individuals  entering the Data Center floor  CCTV cameras throughout the Data Center  capture the movement of visitors within the facility     Individuals with valid VARs but without electronic card keys must be escorted  from the lobby by a VAR holder with a card key to enter the Data Center floor        individuals accessing the cabinets containing enrollment systems must sign  into the MorphoTrust visitor log book     The facilities are equipped with gas based fire suppression systems and by dry   pipe sprinkler systems  Fire suppression systems in the Franklin  TN  Data  Center utilize Dual Action Dry Pipe and Halon 1301 Gas Fire Suppression  the  Richmond  VA  Data Center utilizes HFC 125 gas fire suppression and dual zone  pre action dry pip
253. icant issues should be reported directly to the Program Manager   Denny Wear  Mr  Wear s contact information is     Denny Wear   Director   Program Management   Office phone   217  547 2116   Cell phone   615  946 7947   dwear morphotrust com  In the unlikely event that a problem must be escalated  it should be reported to  Mr  Wear   s supervisor  Kent Schmitt  Mr  Schmitt   s contact information is     Kent Schmitt   Program Executive   Office Phone   202  688 4826  Cell Phone   615  347 4627    Vendor Response Sheet      SAFRAN   Attachment A  3 MorphoTrust USA    otate of West Virginia CRFP DPS1500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    kschmitt   morphoTrust com  In the unlikely event that a problem must be escalated  it should be reported to  Mr  Schmitt s supervisor  Charles Carroll  Mr  Carroll s contact information is     Charles Carroll   Senior Vice President   Office Phone   615  778 5752  Cell Phone   937  604 6595    ccarroll morphoTrust com    Issue Escalation    Most day to day operational issues would typically be escalated in the following  manner     e Step One   Most problems should be reported to our toll free Customer  Service Center which will be open 7 00 A M   4 00 P M  CST Monday  through Friday  All Customer Service Representatives assigned to this  program will have a thorough knowledge of the program     e Step Two   Problems that cannot be solved or addressed by a C
254. icants with the  status of a relevant transaction       Printer   used to print hard copy response notifications    4 4 5 Provide billing system and reports    4 4 5 1 The Vendor should describe in detail their plan to provide a billing system with  the public agencies and between the Vendor and the state  The plan should  detail the reconciliation process and escrow accounts establishments  the fee  structure and points of contact for discrepancies with billing issues     Vendor Response Sheet      SAFRAN   Attachment A  3 MorphoTrust USA    otate of West Virginia CRFP DPS1500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    Both agencies and employers in West Virginia currently have the option of  establishing billing accounts with MorphoTrust       policies and processes will  remain in effect for the new contract period     MorphoTrust maintains a Tennessee based Billing Department with 8 00 A M  to  5 00 P M  Central Standard Time support to assist with any invoice or billing  account inquiries  Applicants may contact the Customer Service Center for  assistance in account reconciliation  discrepancies  or usage questions     Once UEP is deployed  agencies will have additional options  An agency may  provide a specific one time use Authorization Code that the applicant is required  to use  Alternatively  agencies may allow all applicants processed under a  specific Service Code to be billed without us
255. identified by their process service identity and the machine identity     10 9 2013 MorphoTrust USA Confidential and Proprietary Page 26 of 37    EXEMPT INFORMATION    Cyber Security Plan PLN 00091 A 02    4 16 3 Message Integrity and Protection    When important or sensitive information is to be transmitted electronically  it is necessary to  incorporate one or more mechanisms that will detect unauthorized changes to the content of a  transmitted electronic message  Message integrity must be considered for all applications where  there is a security requirement to protect the message or data content  An assessment of threats  and risks should be performed to determine if message integrity is required and to identify the  most appropriate method of implementation     Note that message integrity on its own will not protect against unauthorized disclosure of  sensitive information  Since MorphoTrust deals with sensitive information  including PII data  on  a regular basis  all transmissions of sensitive information across unmanaged networks or  between secure networks must use mechanisms to protect the data while it is in transit   Transmission solely within secure networks or customer secured networks does not require  encryption  but it is highly recommended  Transmission through unsecured networks requires  encryption  Both transport level and message level encryption mechanisms should be  considered and an analysis of the risk of data escape loss versus cost performance ben
256. ienced in delivering  FISMA compliant security programs     We include SA requirements from our  conceptual system design forward  Our Risk  Management Framework includes the full NIST  workflow consisting of the following processes   System Categorization  Selection of Security  Controls  Implementation of Security Controls   Assessment of Security Controls  System  Authorization  and Monitoring of Security  Controls     Security Awareness Training is a key component of NIST FISMA information    security controls  and MorphoTrust conducts information security awareness    training for all employees who serve our biometric enrollment customers  We    work to mitigate the threat of social engineering by requiring social engineering    training for each employee when they join the company  and annually thereafter     Additionally  we conduct unannounced social engineering awareness exercises    throughout each calendar year for all biometric services employees  We also have    strict annual security awareness training requirements imposed upon us by the    U S  Federal Government as a result of our federal contracts     The security and integrity of our network solutions  including all components     data transmissions  and physical facilities are of the utmost importance to    MorphoTrust  We understand the critical importance of protecting all personal    and financial information of our customers  As such  we provide industry    standard security measures throughout our netw
257. ient and how to make the  applicant s fingerprinting experience as pleasant as possible     4 5 4 Results Processor    In order to a  create a single source of result delivery and b  create a secure automated method  of processing and reporting these transaction results  the Vendors must provide the State with  Automated Results Processing capability     The results processor must be capable of processing the returned results as specified in the  example returns as found in Appendix A     In order to accomplish this functionality  all transactions submitted from livescan devices must be  processed at a Central Transaction Switch  This hardware and software solution  which will be  provided by the Vendor  but remain under the physical control and security of the State  serves as  the central point of receipt  return  and coordination of all transaction results for any fingerprint or  supporting name based transactions  The Central Transaction Switch must     e Utilize a database that records transactional data  search results  Applicant information   transaction configurations  and other information necessary for the proper tracking   execution  and result dissemination of all transactions and system function        Be easily customizable by the State    e      capable of programmatically creating and delivering results to authorized entities by  email or paper letter  or a combination of both  Provide a Web Server for electronic  access to the results over the Internet with t
258. ified Trainers use a pre defined Observed Behaviors Checklist to track the    S SAFRAN Mandatory Specification Checklist 101  MorphoTrust USA         otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    102    enrollment agent s competency and understanding of all written   policies  procedures  The checklist identifies on the job behaviors expected of all  personnel such as professional customer interaction  professionalism  policy and  procedure compliance  system navigation  capturing quality prints and mastery  of required skills     Training Curriculum    Our proven Training Program has been utilized to train over 3 500 Enrollment  Agents to date  We believe that training is critical to develop a fully qualified  Enrollment Agent capable of achieving a 9876 classifiability rate  dealing with the  general public  and handling equipment issues     Our training program consists of   e Hardware overview of the Livescan workstation        Software overview of the Livescan system  The Enrollment Agent must  become skilled in the operation of all Livescan software  This includes  how to electronically transfer and receive demographic information   transfer fingerprints to the secure Data Center  and perform all system  maintenance and system utility functions  Training is conducted on the  identification of pattern type  delta s   core  and determining the overall  quality 
259. ified specific program problem areas needing our  immediate and long term attention  The state requested immediate resolution of  three specific high priority items shown in Table 1  We have resolved all issues   both reported and observed     Table 1  West Virginia Program Improvements    Program Request Status on January 8  2013 Status Today    Reduce the average wait Average 6 78 days from Average 3 44 days  time from fingerprint capture capturing fingerprints to from capturing  to result issuance printing result letters fingerprints to printing  the result letters  Resolve billing issues  Inaccurate  untimely billing               routine  and  improve customer service  statements accurate billing  provide faster resolution of statements  issues  Executive Summary    SAFRAN    MorphoTrust USA    otate of West Virginia CRFP_DPS1500000010    Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police  Program Request Status on January 8  2013 Status Today  Improve Enrollment Center 12 Enrollment Centers 22 Enrollment Centers  coverage across the state of  West Virginia    Working through these challenges resulted in a number of benefits to program  stakeholders including     e Better communication with West Virginia State Police and the User  Agencies   e Improved responsiveness and customer service   e A better understanding of the needs of each agency   e Proof that we say what we do and do what we say          solid rela
260. ified to the  AFIS  IOS Appendix F Scanner Requirements     All incoming fingerprint cards are reviewed for completeness and quality prior  to processing for submission to the State  Any cards that do not meet the  minimum requirements  i e  all fingerprint images collected properly  unless  noted as AMP  all applicant demographic data  all pertinent agency and  submission information  are returned to the applicant with notations regarding  the missing data and instructions on what is needed  including any necessary re   rolls for bad prints  This process is in place today and will continue to be utilized     Mandatory Specification Checklist      SAFRAN   Attachment B  MorphoTrust USA    otate of West Virginia CRFP DPS1500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    Our proven centralized Cardscan Center converts and digitally submits more  than 100 000 paper fingerprint cards annually in support of numerous statewide  networks as well as FBI Channels  We provide Cardscan services for both state  and federal civil applicants and state criminal backlog conversion     Our Cardscan customers include        South Carolina Law Enforcement Division      Texas Department of Public Safety      Florida Department of Law Enforcement      New York Department of Criminal Justice Systems     Indiana State Police      Michigan State Police     Tennessee Bureau of Investigation      Oklahoma State Bureau of Invest
261. igation    We will convert and electronically transmit manual  ink and roll  fingerprint  cards to the State within 48 hours of receipt  in accordance with the Interface  Control Document provided in RFP Appendix A  and will document the  transaction number of the electronic submission     We have described our conversion process in our response to requirement  4 4 6 1  Figure 37 on page 77 illustrates the conversion process     4 5 3 Electronic Fingerprint Capture Service    a  Fingerprinting Sites  All fingerprinting sites must be ADA compliant     Fingerprinting sites must be established and staffed in such a manner as to ensure meeting the  10 business day scheduling requirement  No Applicant should have to travel more than a  maximum of 35 miles  one way  to access fingerprinting services  The Vendor will provide at a  minimum  mandatory site locations in the Charleston  Huntington  Martinsburg  Morgantown   Beckley  Elkins  Wheeling  Logan  Princeton and Parkersburg areas  Fingerprint sites must be  staffed by personnel that are approved by the West Virginia State Police     Communications  facility and any other expenses required to perform the fingerprinting services  as specified in this contract will be the responsibility of the Vendor     The Vendor shall provide a receipt in a format approved by the State to each Applicant as  evidence of successful completion of the fingerprinting  including the identifying State Control  Number assigned and submitted with the el
262. ill utilize this report to assess Enrollment Center utilization and  proactively remediate issues related to appointment availability   As an option  we offer Expedited Fingerprinting Service with premium same day  fingerprinting slots  We have described this service in Appendix F     Finally  MorphoTrust will maintain open lines of communication with WVSP  and User Agencies in order to respond to actual or anticipated volume increases     We have experience in expanding many of our existing statewide networks  for  example  in response to new legislation or to support new agencies joining the  network  During the current contract in West Virginia  we increased the number  of Enrollment Centers from 12 to 22 in order to provide a higher level of customer  service to the citizens of the state     Vendor Response Sheet    PH  Attachment A    SAFRAN    MorphoTrust USA    otate of West Virginia  Department of Administration  Purchasing Division    CRFP DPS1500000010  Applicant Fingerprinting Services  West Virginia State Police    4 4 2 4 The Vendor should describe in detail the security measures for protecting  Personal and financial information     MorphoTrust s current solution in West Virginia complies with all State and FBI    security measures     The scope of our information security program includes information systems and    technologies  personnel security  physical and environmental security for    facilities that house our information systems  and business process sec
263. imes and then  be removed from the media once the transportation or transferal is complete  Media with  hardware based encryption are strongly preferred over software based encryption methods     5  Storage of Sensitive Data    The following rules govern the storage of sensitive data     Physical protection must be employed for all devices storing sensitive data  This shall include  physical access controls that limit physical access and viewing  When not directly in use  office   lab  and suite doors must be locked and any easily transportable devices should be secured in  locked cabinets or drawers    Servers with sensitive data must be in locked server rooms with restricted access  This includes  static data and data at rest  Servers must have limited user access to those with a need to know   and be controlled by access and password policies  Servers must be protected by virus and  firewall policies    Users of laptop and other mobile computing devices need to be particularly vigilant and take  appropriate steps to ensure the physical security of mobile devices at all times  but particularly  when traveling or working away from MorphoTrust USA  All mobile devices must have full disk  encryption that is approved by IT    Sensitive information must not reside on laptops or other mobile media    Computing Services managed servers storing confidential information shall be regularly scanned  for vulnerabilities  patched  and backed up    oystems  hardware and software  designe
264. imize outages due to disaster  weather  or telecommunications issues  our  CSC has sufficient telephone system capacity to handle the estimated volume of  calls served by this contract     We have provided additional detail about our Customer Service Center in our  response to requirement 4 4 2 1     b  Web Scheduling    Vendor must provide a secure web site where Applicants and or agencies can schedule  change  or cancel appointments  provide demographic data  pay fees and retrieve directions to  fingerprinting centers  The web site must be available 24 hours a day  seven days a week with  minimal downtime for regular maintenance  All scheduled maintenance must be scheduled during  off peak times  All interaction with this web site that includes provision of personal or financial  information shall be encrypted using industry standard encryption algorithms such as Secure  Sockets Layer protocol  SSL      The Vendor must provide a link to its existing web scheduling application so that the State can  verify its existence and test its performance     The Vendor must provide statistics on the number of appointments scheduled via web based  application annually     MorphoTrust meets the requirements     We will continue to provide our secure web site that is already in use by West  Virginia applicants to schedule  change or cancel appointments  provide  demographic data  pay fees and retrieve directions to Enrollment Centers     The current website is currently active for verifi
265. in under the control of MorphoTrust and should not be  available to the third party backup provider    e  he encryption key must not be included in the backup or the archive  However   encoded references may be included if multiple encryption keys are used over time  such  as saying that a particular backup set uses encryption key  6             encryption of Microsoft Office Open XML format files like  docx and  xlsx uses AES 128 by  default  If stronger encryption is desired  a Windows registry setting needs to be updated to set  the default key length to 256 bits for AES 256    10 9 2013 MorphoTrust USA Confidential and Proprietary Page 24 of 37    EXEMPT INFORMATION    Cyber Security Plan PLN 00091 A 02    If a backup set or archive of sensitive data needs to be shipped from one MorphoTrust facility to  another MorphoTrust facility or a third party backup facility  the sensitive data must follow the  above conditions and be hand carried  if possible  Otherwise  a reputable shipping company that  can track its shipments should be used     If there is a leakage or spill of any sensitive information to unauthorized individuals  the  procedures for handling this case are in      PRC 00312 A  nformation Spills and Cleanup Policy    4 14 Technology Security Policy    For compliance with the ECP  MorphoTrust has the following technology control plan to prevent  unwanted leakage of technology assets outside of the company and the country       PLN 00088 A MorphoTrust USA  Inc  Te
266. include     New Livescan enrollment workstations   Deployed to all Enrollment  Centers  which will reduce equipment downtime     Highest quality fingerprint capture   More than 20 fingerprint quality  checks are performed at the workstation to ensure high quality  fingerprints are captured  These checks reduce rejection rates  which in  turn  reduce the chance that applicants will have to be re printed     User friendly registration process   Simplified  mobile and tablet friendly  registration website increases volume of applicant self registration     Nationwide network   Our Universal Enrollment solution allows  applicants from other states to submit their fingerprints from enrollment  locations other than those located in West Virginia  Local operating  procedures and technology will be used     Improved identity document authentication   Workstations will be  equipped with our proprietary document authentication software and  B5000 reader to analyze State or Federal government issued photo  identification documents for authenticity     Administrative Support and Reporting Portal   Stay connected with the  entire process using our optional support and reporting portal  With this  web based portal for state agencies  end users will never lose track of an  enrollment  an applicant s appointment status  or submission results  The  suite of portal features includes     o Ticketing for managing applicant support inquiries across  multiple teams     o Detailed transaction histo
267. information coming into or going out of MorphoTrust are  found to conflict with the ECP  the ECP shall prevail     10 9 2013 MorphoTrust USA Confidential and Proprietary Page 6 of 37    EXEMPT INFORMATION    Cyber Security Plan PLN 00091 A 02    4 CYBER SECURITY PLAN    4 1 Preface    The overall description of the CSP starts with defining a set of terms categorizing the types of  information that need to be protected  The distinction in the types of information will be important  for defining and describing the security policies     MorphoTrust uses a risk based management approach for making decisions on security policy  and actions  as discussed in      PRC 00149 A Risk Management           In addition  MorphoTrust has an overall security governance policy in      PRC 00173 A Security Governance Policy    A high level overview of the MorphoTrust s security philosophy  goals  and policies is in      PUB 00185 A Security Quick Reference    4 2 Definitions    4 2 1 Types of Information    The following definitions are used to describe the different types of information that need to be  protected within the MorphoTrust environment     Company Confidential Information     Any information that is both internal and confidential to  MorphoTrust  Examples of this type of information include  but are not limited to  finance  information  accounting information  Human Resource  HR  information  policy documents  marked as confidential  company owned intellectual property such as soft
268. information have it  and  when they do  that each access is controlled and logged appropriately     We have provided additional description of our approach to protecting personal  and financial information in our response to requirement 4 5 5  In addition  we  have provided our IT Security Policy and Personal Data Privacy Policy in  Appendix A     4 4 2 5 The Vendor should describe in detail how the state can verify the existing Web  scheduling and test its performance     MorphoTrust hosts an existing Pre Enrollment Website for West Virginia  fingerprinting services  The website is currently active for verification and testing  at the following URL   https   wv l1enrollment com OpenNetworkPortal spring customer executionze1s1    Our UEP web pre enrollment and scheduling solution can be tested at the  following URL     https   universalenroll dhs gov    The State can test both sites by completing a pre registration and scheduling an  appointment  Once the appointment is complete  we can provide the resulting  pre registration data and appointment information as proof of the accuracy and  successful scheduling  The State may access the sites and schedule as many test  scenarios as desired  The current systems are live today  and will continue to be  upon contract award     4 4 2 6 The Vendor will describe in detail their plan to collect fees from the Applicant and  Agencies  Included in the plan should be forms of payment online  at fingerprint  centers and prepaid accounts se
269. ing Center    Applicant can opt to pay fees by a variety of methods  Applicant receives appointment tracking number and confirmation information  If an email address is provided  appointment information is emailed to the  applicant along with a link to an online mapping of appointment location  In Person at Applicant s record is loaded on Livescan from the MorphoTrust Central Server  Enrollment Applicant s photo ID is authenticated    canter Applicant s ID is checked against the demographic data supplied at time of  appointment scheduling    Applicant is asked to verify all demographic information    Applicant is asked to review terms and conditions and provide signature through  signature pad device    Applicant is fingerprinted  Applicant pays fee if not paid at time of appointment scheduling    Applicant is provided with a receipt of the transaction  Receipt includes the  State Control Number  date  applicant type  amount paid and signature of  Enrollment Agent    After Records are transmitted in real time from fixed sites    Appointment Records are transmitted within 24 hours for mobile sites or onsite fingerprinting  sessions without an internet connection            VWendeRespnseSheet    SAFRAN  40    SAFRAN   Attachment A  MorphoTrust USA    otate of West Virginia CRFP DPS1500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    Process for Pre Enrollment and Appointment Scheduling    Applicants can re
270. ing the  schedule setup  including technical and space requirements for the site  sample  advanced communication and notifications to applicants  and expectations  during the on site visit     We have provided additional detail about our on site fingerprinting services in  our response to requirement 4 4 3 2     C  Applicant Appointment  1  Applicant Identification  The Applicant must present a valid form of photo ID at the time of fingerprinting  Acceptable forms    of photo identification are drivers licenses issued by any state  passport  photo identification card  issued by a municipality  county or state in lieu of a driver s license or a military ID     Q SAFRAN Mandatory Specification Checklist 99  MorphoTrust USA                otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    2  Collect payment where not paid at the time of appointment scheduling  if applicable     3  Verify Applicant demographic data     4  Provide the release for record check authorization  provide a copy of the challenge process for  the state and federal process as outlined in 28 CFR 50 12 b   and collect digital fingerprints and a  signature     5  The Vendor shall provide a receipt in a format approved by the State to each Applicant as  evidence of successful completion of the fingerprinting  including the identifying State Control  Number assigned and submitted with the electronic trans
271. inquiry unless the Applicant requests an  appointment beyond the 10 days     The customer service center must  at a minimum  provide scheduling of appointments  answer  Applicant questions and provide directions  Merely registering Applicants does not meet the  requirements of this RFP     MorphoTrust meets the requirements     Applicant Fees    MorphoTrust will collect all applicant fees including State and FBI fees  through  multiple payment options  We agree to accept all required forms of payment  as  listed in Table 14  but we recommend that payment is rendered at the time of  processing as a best practice     Mandatory Specification Checklist     90  amp  SAFRAN   Attachment B  MorphoTrust USA    otate of West Virginia  Department of Administration  Purchasing Division    Table 14  Forms of Payment    CRFP DPS1500000010  Applicant Fingerprinting Services  West Virginia State Police    Transaction Type Current WV Platform UEP Platform    e check   Credit Card  V M D A   Personal check  Corporate Check  Money Order    Online Payment by Applicant    Payment at Enrollment  Center by Applicant    Private Agencies and  Employers    Prepaid and or Credit  Billing Accounts    Governmental Agencies Credit Billing Accounts    e check   Not Recommended   Credit Card  V M D A    Personal check  Not Recommended  Corporate Check   Money Order   Credit Card  V M D A    Credit Billing Accounts  Credit Pending   Credit Card Backed Accounts    Credit Billing Accounts    We have provided 
272. internal resources  risk meetings  internal security audits  previous risk  assessments  etc   and external resources  NIST SP 800 Series  FedCIRC  CERT   SANS  ISC2  etc    Some of the risk identification tools are used both internally  and externally  network scanners  penetration testing  configuration analysis  tools  etc       Natural risks relate to so called Acts of Nature  They include occurrences such as  floods  earthquakes  fires  pandemic flu  and the like  The identification of these  risks also requires internal and external analysis  Internally  MorphoTrust is able  to review previous exposures to natural risks and is prompted by our internal    Mandatory Specification Checklist      SAFRAN   Attachment B  MorphoTrust USA    otate of West Virginia CRFP DPS1500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    risk management program to review each of the most common natural risks   External analysis includes the usage of risk resources provided by local  state   and federal agencies  Examples of external resources are the Emergency  Management Agencies  National Oceanic and Atmospheric Administration  or  the United States Geological Survey     Environmental risk related to the facilities which support the business mission   Environmental risks are generally well known and readily identified  Examples  include loss of electricity  water main leak  failure of HVAC systems  and failure  of phy
273. ion must be given as to the identity of MorphoTrust background processes and  services and the security implications involved  In general  the MorphoTrust service account  identities should be distinguishable and unique to allow to monitoring  logging  and resource  tracking  The use of existing OS level service and network accounts is discouraged unless it is  required to make the system be functional and operational  However  customer policies and  Standards may require or forbid the use of service accounts  so suitable accommodations should  be made with security in mind     The service accounts should be considered as a form of privileged account because they provide  a means of controlling how an application works along with aspects of the security associated  with those applications     4 12 5 Security Group Management    A security group 15 a collection of user IDs or other security groups  It can be used to assign a  common set of privileges and access rights to a group of users  Requests to add a user to a  particular security group must be approved by the Responsible Manager or their designated  authorities     Security groups should be considered for use in MorphoTrust applications whenever multiple  users should be granted the same privileges  Similarly  nested security groups should be  considered whenever more privileged users should inherit the privilege levels of less privileged  users  When designing a structure of security groups  considerations for domain t
274. ion of a strategic nature shall only be distributed on a strictly  Need to Know  basis  All  personnel are instructed to perform a Need to Know test on all information before distributing or  sharing strategic information     7  Compliance    All MorphoTrust USA employees are required to review  sign off and comply with the Corporate  Security Policy  MorphoTrust USA retains the right to modify or change this policy at anytime  without notice  If changes are made  employees are expected to review  sign off and adhere to  the latest policy as provided by the Chief Security Officer  Adherence to the Corporate Security  Policy shall be a condition of employment and of continued employment with the Company   Actions or conduct not in accordance with this policy shall constitute grounds for disciplinary  action  including termination of employment     05 01 2012 Confidential 4 of 8  EXEMPT INFORMATION    IT Security Policy PRC 001 12 A 03    8  Appendix A    Incident Report on next page     05 01 2012 Confidential 5 of 8  EXEMPT INFORMATION    IT Security Policy PRC 001 12 A 03    security Incident Report    Contact List    Chief Information Officer  Chief Security Officer  President    The completed incident report must be sent to the above email addresses within 24hrs     Type of Incident  Denial of Service  Espionage  Hoax  Malicious code  Probe  Unauthorized access   Unauthorized use  Stolen Lost     Location of the Incident    Address   Building  Hoom  Additional Information 
275. irements in the future  WVSP can request  a Custom Engineering Change  see Attachment F  and MorphoTrust s technical  staff will adapt our solution to meet the new requirements for the systems  interface control specification     As detailed our response to requirement 4 5 3  d   we agree to maintain a ninety   eight percent  9876  classifiable rate for all Livescan fingerprint submissions  digitally collected by MorphoTrust and our partners     4 4 3 7 The Vendor should describe in detail their plan on fingerprint technician training  procedures and curriculum used     MorphoTrust s training programs are designed to give all personnel and support  teams the knowledge  tools  resources and escalation and or resolution paths  needed to provide accurate and high quality service to applicants the first time   so that repeat visits are minimized and the customer experience is positive     Enrollment Agent Certification Training         fingerprint technicians  referred to by MorphoTrust as Enrollment Agents   for the West Virginia Enrollment Centers  whether MorphoTrust employee   partner  or subcontractor  are required to complete an internal certification  process to ensure the Agent is competent to perform the job responsibilities   functional requirements of operating the equipment  and quality standards of  performance  Our professional certification process blends the use of a scripted  training manual with supervisory   trainer observation and Enrollment Agents  work demon
276. is  only allowed on company provided authorized configured equipment     No classified information shall be stored locally on these devices  and no Personal Identifiable  Information  PII  may be stored on these devices  as described in the  nformation Security  Customer Data Access and Security Policy PRC 001 74 A and the Security Governance Policy  PRC 00173 A     All devices  both MorphoTrust USA provided and personal  must be kept up to date with security  patches and utilize passwords or passcodes to access     Note  Accessing the MorphoTrust USA email system via a personal mobile device grants IT the  authority to wipe the device in the case of loss or theft     Use of these devices shall be subject to inspection by IT at IT s request     Cloud backup of mobile devices is not allowed  iPhone data being stored in the cloud  for  example      3 Minimum Home Network Configuration    Personal network configurations used by employees who normally work from home must meet  the following minimum standards     a  Your MorphoTrust USA issued computer comes with a built in firewall that is  preconfigured on your system and is set to block all inbound traffic from reaching your  computer  This firewall must not be turned off at any time     b  Wireless home networks should use at least WPA  Wi Fi Protected Access  security  which requires a reasonably strong password of at least 8 characters with a mixture of  letters  numbers and symbols  The use of MAC  Media Access Control  add
277. ision    PURCHASING AFFIDAVIT    MANDATE  Under W  Va  Code   5A 3 10a  no contract or renewal of any contract may be awarded by the state or any  of its political subdivisions to any vendor or prospective vendor when the vendor or prospective vendor or a related party  to the vendor or prospective vendor 15 a debtor and   1  the debt owed is an amount greater than one thousand dollars in  the aggregate  or  2  the debtor is in employer default     EXCEPTION  The prohibition listed above does not apply where a vendor has contested any tax administered pursuant to  chapter eleven of the W  Va  Code  workers  compensation premium  permit fee or environmental fee or assessment and  the matter has not become final or where the vendor has entered into a payment plan or agreement and the vendor is not  in default of any of the provisions of such plan or agreement     DEFINITIONS      Debt  means any assessment  premium  penalty  fine  tax or other amount of money owed to the state or any of its  political subdivisions because of a judgment  fine  permit violation  license assessment  defaulted workers   compensation premium  penalty or other assessment presently delinquent or due and required to be paid to the state  or any of its political subdivisions  including any interest or additional penalties accrued thereon      Employer default  means having an outstanding balance or liability to the old fund or to the uninsured employers   fund or being in policy default  as defined in W
278. ison of Persor Closed           E ducabon    State Board Licensing         Cetticatorn Receticahon EMS    State Relerence Check  State Reference Check  State Relecenice Check  State                    Check  State Relerence Check  State Relecence Check  State Reference Check  State Reterence Check  State Reterence Check   State Relecenice Check  State Reference Check     Applicant information   Notes   Documents   Resuts Status   Applicant Selection      Closed  Closed  Closed  Employe     Closed  Heath Care Reyected  Employer Closed  Schoots Closed      Employer    Employer    Other     Other      Employer    Other     Other  State Relecenice Check     State Relecenice Check     State Relerence Check         Administrative Queue Review Client    Applicant Review Screen   TEST APPLICANT       EMail Address   amsoumSwug                                  DPS1500000010  Applicant Fingerprinting Services  West Virginia State Police    11 3 2011 927 43 AM  11 18 2011 11 15 54 AM  12 7 2011 1045 59 AM  12 30 2011 3 32 55 PM  4 24 2012 9 14 38 AM  5 2 2012 10 58 00 AM  6 21 2012 1204 23 PM  8 28 2012 12 22 14 PM  10 2 2012 12 09 53 PM  5 6 2014 4 26 21 PM  5 6 2014 4 26 51 PM  5 6 2014 4 27 21 PM  5 6 2014 4 27 51 PM  5 6 2014 4 28 21 PM  5 6 2014 4 2851       5 6 2014 4 29 21 PM  5 6 2014 4 29 51 PM  5 6 2014 4 30 36 PM  5 6 2014 4 1 21 PM    8y  Facility Number    Name Sex Race SSN E   TEST APPUCANT  FEMALE     WHITE                     Bith Place of Bith o Citizenship      Color E
279. ite 100 9 00   5 00   Conroe 3205 West Davis Street  201B M   F 8 20 4 30   is List of Pastas Centers 5 SAFRAN    MorphoTrust USA    otate of West Virginia CRFP_DPS1500000010    Department of Administration Applicant Fingerprinting Services   Purchasing Division West Virginia State Police   Texas City Address Hours of Operation   Converse 2661 N Graytown Rd Mon   Fri 9 00   5 00   Coriscana 523 West 1st Avenue Mon   Fri 8 00   4 30   Corpus Christi 1620 South Padre Island Drive  Suite 175 M   F 8 30 2 00   CORPUS CHRISTI 4646 CORONA DRIVE  SUITE 175 HOURS VARY   Corpus Christi 3403 S Padre Island Dr  Ste 205 Mon   Thu 8 00   4 00  Fri  8 00   12 00   Corpus Christi 209 N Water St Mon   Fri 8 00   4 00   Dalhart 315 Rock Island Tue 10 00   3 00   Dallas 1140 Empire Central Dr  Suite 570 Mon   Fri 8 20   4 30   DALLAS 12801 N CENTRAL EXPRESSWAY  SUITE 820 HOURS VARY   Dallas 8035 E RL Thornton  Ste 116 Mon   Fri 8 00   5 00   DALLAS 3807 ROSS AVENUE M   F 8 4   Del Rio 295 FM 2523 Hamilton Ln Mon   Fri 8 30   4 00   DENTON 230 NORTH MAYHILL M      8 5   Edinburg 2616 W Freddy Gonzalez Dr Mon  Wed  amp  Fri 9 00    5 00  Sat 9 00   1 00   EL PASO 4110 RIO BRAVO  SUITE 222 HOURS VARY   El Paso 7500 Viscount  Ste C 79 Mon   Fri 8 00   6 00   Euless 418     Main St   Ste  114 Mon   Thurs 9 00   5 00  Fri Sat 9 00   1 00   FORNEY 600 S BOIS D  ARC     W  TH 9 45 12 15   Fort Worth 8240 West Freeway Tues 10 00 4 00  Wed  10 00 5 00  Thurs 10 00   7 00   Fort Worth 4500 Mercantile Pla
280. ite Preparation Plan and Schedule 096  Designated Sites  Ship Updated User Guides to 096 Training  Sites  Designated Sites  Ship Furniture and Fixtures if 090 Business Services  needed for a specific site  bd Designated Sites  Ship Signage and Branding 096 Business Services  Material  Designated Sites  Ship Consumables 096 Business Services  Designated Sites  Ship Workstations 096 Engineering Delivery  Designated Sites  Ship the LiveScans 096 Engineering Delivery  Designated Sites  Equipment Received 096 Field Services  Designated Sites  Installation of Workstation 096 Field Services       Designated Sites  EA Training for Updated 096 Field Services  Equipment  Current Site Deployment 096 Deployment Mgr   Current Site HOO expansion if necessary 096 PM    89   New Site Preparation Plan and Schedule 096    90   Ship Training Material to Identified Sites 096 Training  Ship Furniture and Fixtures 0  Business Services  Ship Signage and Branding Material 096 Business Services  Ship Consumables 096 Business Services  Ship Workstations 096 Engineering Delivery  Ship the LiveScans 096 Engineering Delivery    96   Equipment Received 096 Field Services  Task ES Project Summary  Project  West Virginia Applicant      Split wooo External Tasks  Date  Mon 5 11 15 Milestone v External Milestone  Summary      Inactive Task          T       4       2015       Inactive Milestone  Inactive Summary  Manual Task    Duration only    Page 3          2016                  Manual Summary Rollup s Dead
281. ithout membrane        This review was conducted by representatives of the FBI and the MITRE Corporation s  image processing laboratory located in Bedford  Massachusetts  Based on the results of this review  the  FBI certifies that the equipment described above is in compliance with the following FBI CJIS Division s  Integrated Automated Fingerprint Identification System Image Quality Specifications  108      Appendix F Specifications    Please note  the certification process does not endorse one product over any other  product and only demonstrates that the product meets FBI standards  Continued acceptance of the images  created by an installed system  for retention in the FBI Master Fingerprint files  is contingent on the  ability of the product to meet the IQS over time  As equipment can degrade  the FBI recommends that  your company assist customers in the establishment of quality assurance programs and appropriate  maintenance schedules for your products     Please direct any questions regarding this certification to Mr  Thomas E  Hopper  at     202  324 3506     Sincerely yours     Note    Kiat    Monte C  Strait   Deputy Assistant Director   Policy  Administrative and Liaison Branch  Criminal Justice Information Services Division    U S  Department of Justice    Federal Bureau of Investigation       Clarksburg  WV 26306    January 26  2010    Mr  Dan Maase   L 1 Identity Solutions  Inc   Biometrics Division   5705 West Old Shakopee Road  Suite 100   Bloomington  MN 554
282. iting Innovation  Dynamite Award for the Greatest Citizen Impact and the 2015 SAFRAN Innovation Award for Customer  Satisfaction     Participating Agencies Universal Enrollment Services includes the following TSA programs     e Hazardous Materials Endorsement Threat Assessment Program   HTAP     Transportation Worker Identification Credential  TWIC   Alien Flight Student Program  AFSP   TSA Prev       E Qip  Description of Technical Secure registration website  Solution Customer Service Call Center    Nationwide network of Enrollment Centers with trained Enrollment Agents   Livescan operators     Capture of fingerprints  demographic data  photo  and required documents  Onsite fingerprinting sessions   Channeling for company owned equipment   Customer reporting   Card scan   Centralized Data Center            SAFRAN Vendor Response Sheet  we 21    MorphoTrust USA  Attachment A     otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    Section 4  Subsection 4 4  Project and Goals    4 4 Project and Goals  The project goals and objectives are     4 4 1 Provide statewide electronic live scan fingerprinting services for non criminal justice  purposes     The Trusted Choice for West Virginia    MorphoTrust proposes to evolve our current West Virginia network to meet the  new requirements of this RFP  using the current infrastructure in place today to  ensure continuous service to
283. itional sites    Publish Furniture and Fixture Bill of Material  BOM  0  Facilities and Partners Wed 7 8 15   Facilities and Partners  Order Furniture and Fixtures needed from BOM 096 Facilities and Partners Thu 7 9 15   Facilities and Partners  Order Signage and Branding Material 096 Facilities and Partners Fri 7 10 15 i Facilities and Partners  Receive Furniture and Fixtures order 0  Facilities and Partners Fri 7 10 15    Facilities and Partners  Receive Signage and Branding Material 096 Facilities and Partners Mon 7 13 15   zum Facilities and Partners  Personnel 096 Thu 6 25 15     43 Finalize List of MorphoTrust WVSP Project 096 PM Thu 6 25 15                                        List Facilities and Partner Search Lead and Team 096 PM Thu 6 25 15     45 Assign MorphoTrust Internal Engineering 096 PM Thu 6 25 15  Ed Development Team     46 Assign Report Programmer Resource in Engineering 0  PM Thu 6 25 15  Ka Delivery    Assign the Team Lead for Finance 096 PM Thu 6 25 15    Assign the Team Lead for Call Center 096 PM Thu 6 25 15     49 Assign and Schedule Field Service Engineers 096 PM Thu 6 25 15        FSEs  Trainers for Deployment    Identify Secure Hire new Enrollment Agents  EAs  096 PM Tue 7 7 15 B PM  Vetting of all New Team Members 096 Thu 6 25 15                52 Vet all New MorphoTrust employees with a WV 096 Credentialing Thu 6 25 15    Credentialing  fingerprint based criminal background check        53 Vet New MorphotTrust Internal Engineering 096 Credenti
284. itive Data Handling and Storage Procedures PRC 00148 A 05  e IT Virus Protection PRC 00093 B 01   e Removable Media Policy PRC 00150 A 01    Sn O_O OO                 amp  SAFRAN EXEMPT INFORMATION 2  MorphorTrust USA    Compli  Print   MorphoTrust   Privacy Policy Page   of 6               Click here to print     lt  AFF      Printed       Joan Wotkowicz    Document Printed On  Friday  April 17  2015 1 48 19         MorphorTrust USA Reference  64899314 e7ce 4bfd be83 61d792444d09    MorphoTrust   Privacy Policy  CD398489V1    Privacy Policy POL 00144 A 09        UTILE Lira nu nua                             ESO ACE                                      LPA AOA               LIE LAE                                                                                                                                             LE                  Privacy Policy    LUE                   E  Lr LU Lr LES                 Document Number  POL 00144 A    Revision Level  09          Approval    Dennis Kallelis   Dr  James Kottas    Chief Security Officer   Chief Privacy  amp  Information Security      Officer       This document contains confidential and proprietary information af MorphoTrust USA       part of this  document may be reproduced  disclosed  distributed  or used in any form by any means     graphic   electronic  or mechanical  including photocopying  recording  taping  or information storage or retrieval      without written permission of MorphoTrust USA     10 08 2014 MorphoTr
285. ity changes to the firewall must be tracked by the IT Change Control System and all  security events shall be tracked in the security log    The firewall rules and filters shall be reviewed every quarter by the Manager of Operations and  rationalized against 1  service needs and 2  customer requirements     4  Connecting to the Network    The following rules apply to connecting computers and other devices to the IT network     Computers can only be attached to the network if they have virus protection    IT network wiring may not be modified or extended beyond the area of their intended use  This  applies to all network wiring  hardware  and data jacks    The network may not be used to provide Internet access to anyone outside of MorphoTrust USA  for any purposes other than those that are in direct support of the corporate mission    The IT network is a shared resource  Thus  network use or application use which inhibits or  interferes with the use of the network by others is not permitted   For example  applications which  use an unusually high portion of the bandwidth for extended periods of time  thus inhibiting the  use of the network by others  are not permitted     Equipment attached to the network must be CE certified and must conform to recognized network  standards    Equipment attached to the network must not be run in promiscuous mode  except by special  arrangement with IT    Equipment attached to the network may be monitored for security and network management  p
286. ive risks into High   Medium  and Low likelihood of occurrence  Each risk is then evaluated on the  basis of these buckets  Internal analysis includes reviews of system controls and  historical performance of the organization in maintaining mission capabilities   Externally  organizations like SANS  CERT  and FedCIRC provide technical data  regarding likelihoods  While all four risk categories are considered in the  qualitative analysis  human and system risks are most frequently represented in  the qualitative analysis     Potential impact data is quantified using a structured process that calculates  dollar impact of a threat source exploiting a vulnerability  This analysis is  concrete  which requires the conversion of qualitative data to a relative     S SAFRAN Mandatory Specification Checklist 123  MorphoTrust USA                 otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    124    numerically defined scale  Quantitative data sets are then normalized into this  same scale  Using internally derived dollar values  a Single Loss Expectancy   SLE  is determined  This SLE considers mission impact  e g   the ability for the  program to continue in the face of media scrutiny   business impact  e g   service  level requirements or contractual penalties   and system impact  e g   the cost to  replace hardware components      Once the SLE is determined  the ARO for the 
287. ivirus software  the standard MorphoTrust antivirus software must be  used     o Any other special cases must be reviewed and approved by both the IT and Security  Departments        Non Windows based computers should use antivirus software that is approved by IT whenever  possible     Virus Procedures for Workstations  Laptops Tablets  and Development Servers        All data and or program files must be scanned for viruses before installation to safeguard  MorphoTrust USA networks from infection  This includes shareware and freeware obtained from  electronic bulletin boards or on disk  diskette or CD ROM   custom developed software  and software  received through business sources     e All data and program files that have been electronically transmitted to a MorphoTrust USA computer  from another location  internal or external  must be scanned for viruses immediately after being  received     e All computer media  diskette  CD  etc   are potential sources for computer viruses  Therefore  all  media must be scanned for virus infection before it is used in a MorphoTrust USA computer or  network server     e Virus protection software that is centrally managed by IT shall be loaded on each desktop mobile  computer and development server  regardless if it is virtual or physical  and stay a resident program  to constantly monitor for viruses to prevent introduction to the network  Any exceptions must be  approved by both the IT and Security Departments     10 23 2014 MorphoTrust U
288. jects  references  copies of any staff certifications or degrees applicable  to this project  proposed staffing plan  descriptions of past projects completed entailing the  location of the project  project manager name and contact information  type of project  and what  the project goals and objectives where and how they were met     MorphoTrust Company Information    MorphoTrust is the industry s leading fingerprinting services company   currently operating 26 state and federal fingerprinting services programs  We  have fingerprinting Enrollment Centers in all 50 states and the District of  Columbia  strategically deployed to support the volumes and unique geographic  needs of each specific program     In addition to our state government programs  MorphoTrust s fingerprinting  services are used nationwide for the U S  Department of Homeland Security   Transportation Security Administration s  ISA  program     Notable Achievements  MorphoTrust has received several accolades for our performance  including         following recent awards       SAFRAN Vendor Response Sheet 5    MorphorTrust USA  Attachment A     otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    NIST Biometrics Performance  2013 North American Company of the    Year for Government Biometrics MorphoTrust s biometric solutions are regularly  MorphoTrust USA  LLC recognized for accuracy and performance by the
289. k level of the violation   Access authorization for user accounts involved in a compromise may be suspended during the  time when a suspected violation is under investigation  Automated violation reports generated by  the various security systems will be forwarded to the appropriate MorphoTrust Management  the  CSO  and the ISO for timely resolution  Any violations of security policies may be subject to  disciplinary or other appropriate action     10 9 2013 MorphoTrust USA Confidential and Proprietary Page 32 of 37    EXEMPT INFORMATION    Cyber Security Plan    5 REFERENCES     1  For example  the DoD definition for PII is     PLN 00091 A 02    E2 2  Personal Information  Information about an individual that identifies   links  relates  or is unique to  or describes him or her  e g   a social security  number  age  military rank  civilian grade  marital status  race  salary  home  or office phone numbers  other demographic  biometric  personnel  medical   and financial information  etc    Such information also is known as personally  identifiable information  e g   information which can be used to distinguish or    trace an individual s identity  such as his or her name  social security    number  date and place of birth  mother s maiden name  and biometric  records  including any other personal information which is linked or linkable    to a specified individual     This is from Department of Defense Directive 5400 11  May 8  2007  incorporating  Change 1  September 1  201
290. kets  Layer  SSL  is used during the login process  it must continue to be used throughout the duration  of the login session     4 12 11 Cloud Environments    Utility like computing environments like third party cloud infrastructure services  Infrastructure as  a Service       IAAS   cloud platform services  Platform as a Service  or PAAS   or cloud  application services  Software as a Service  or SAAS  can only be considered for MorphoTrust  use provided    e The security of the environment  applications  and any stored sensitive information can  be guaranteed to a very low level of risk  even from the third party cloud vendor itself   and       he intended marketplace and or customers are amenable to a cloud solution  possibly  with additional restrictions and conditions       The use of the environment does not cause MorphoTrust to become non compliant with  either its NSA and proxy agreements or state cyber laws and regulations     MorphoTrust can host its own cloud environment  provided the above conditions are met as well     4 12 12 Application Monitoring Systems    Wherever feasible  systems to monitor the status and health of the MorphoTrust applications   particularly in customer environments  the CSN  the Factory Network  and the Service Network   along with the health of the servers running the applications should be monitored at regular but  frequent intervals  especially before and during production periods  Any loss in service or the  availability of an applic
291. l Vendor is required to assign an experienced and skilled project manager to the  project  The Vendor s project manager will be responsible for the compilation of the project plan  and will be required to maintain the detailed plan through  the full term of the project or until such  time the Vendor has completed the contract obligation     Vendor must provide a project manager to act as the primary contact with the State     MorphoTrust Program Manager  Denny Wear    Denny Wear has been MorphoTrust s  Program Manager for the West Virginia  fingerprinting network for more than two  years     The State of West Virginia will benefit  from his knowledge of your fingerprinting  network and his relationship with the  West Virginia State Police  agencies  and  applicants as he continues to serve as  the primary point of contact for our  performance in support of this contract     MorphoTrust meets the requirements     Responsibility for MorphoTrust s project  management and plan resides with the Program  Manager  Denny Wear  Mr  Wear is empowered to  make decisions and commitments on behalf of  MorphoTrust and communicate those decisions and  commitments to the designated representative of  the state of West Virginia  He will be responsible for  the project management and tracking the progress  of each defined task  maintaining the project  schedule  identifying any potential problem areas or  risks  and communicating all of the activity status  with the State s Contract Manager an
292. l server configuration that will receive and process electronic  demographic  signature and fingerprint image information from the remote fingerprint capture  locations  This component must include a secure communication line from the central server to  the state network and equipment allowing for submission to the State s AFIS system for    Mandatory Specification Checklist  amp  SAFRAN   Attachment B     MorphoTrust USA    otate of West Virginia CRFP DPS1500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    transaction processing  This interface requirement is defined in the State ICD document     The Central Server must have adequate disk storage to retain a month s worth of fingerprint  submissions in the event a communications circuit is not operational  Upon restoration of  communication  the information must be sent to the criminal records repository without the need  to re fingerprint the Applicants     All fingerprint images  signature images  and demographic data shall be archived by the Vendor  and shall remain the sole property of the State  The fingerprint image  signature image  and  demographic data shall be stored in a non proprietary EFTS format  meeting all State and        standards  The Vendor shall store these existing fingerprint images and demographic data with  the ability to retrieve and transmit to the State  The database shall be purged of all transactions  after one year from th
293. lead  to substantial financial penalties and loss  of reputation to MorphoTrust USA     Public   Information   that can be Institutional   disclosed information that is  Definition without intended for use   violating an    within MorphoTrust   individual s USA   right to   privacy     Research detail or   results that are not   restricted data  SSNs  credit debit card numbers  drivers     management license numbers  biographic  biometrics   information  document data  state issued non drivers   Budget information     ID numbers  protected health information  private employee    Course  schedules   Data Examples   catalogs   brochures   maps           information    01 31 2012 Confidential 4 of 7    EXEMPT INFORMATION    Information Security  Customer Data Access and Security Policy PRC 00174 A 07    3  Roles    3 1 Definitions    The following definitions apply to terms used in this policy     Tem  et OOOO    The President  Executive Vice President  Vice Presidents  are designated as  Senior Management  e Senior Management members are not eligible for access to non public  information   The President  Executive Vice President and Vice Presidents are  authorized to delegate access to eligible personnel and to their office staff  as deemed appropriate by job type function and with appropriate  justification  conditional upon successful training as outlined by the  curriculum put forth by the CSO     Senior  Management    An individual who has responsibility for non public data
294. licies with each Enrollment Agent  Among other  topics  this includes instruction on quality standards  security procedures   emergency procedures  privacy policies  personal appearance   identification verification  state fingerprinting laws and requirements   how to interact professionally with the client and how to make the  applicant s fingerprinting experience as pleasant as possible     Training and Operations Manual   Our Enrollment Center policies and procedures address issues such as  Enrollment Agent training  security  identification verification and chain of  custody of records as recommended in the FBI Identity Verification Program  Guide  Each Enrollment Agent is provided a Training and Operations Manual  for use during their training and as an ongoing reference  This manual is a living  document containing general and network specific information which is updated  regularly as changes or additions are made to the network     Topics covered in the manual include     e Network Contact Numbers  Scheduling  amp  Customer Service  Operations  Management  Technical Troubleshooting and Assistance       Overview of MorphoTrust and the Program Network  e  MorphoTrust Security Policies and Procedures  e Applicant Registration  Appointment Scheduling    e  Program Specific Contractual Requirements  Acceptable Forms of ID   Photo Capture  Fingerprint Quality  Payment Processing  E Pay  Receipt  Generation     e Applicant Processing   State to End Workflow  Identification V
295. linary action  up to and including termination of employment     3 1 Guidelines for Use and Handling of Privacy Information      All Privacy Information related to work at MorphoTrust USA is owned by our customers and not by     MorphoTrust USA  This data must be treated with the utmost care and in a confidential manner  If a  MorphoTrust USA employee sees Privacy Information about someone he or she knows  the employee  must keep in mind this data is not the employee s to use  and that such information may not be used for  any purpose other than performing the work that is necessary to deliver the product or service for which  our customers has contracted  Furthermore  there is no end date  maturity date       expiration period for  which the confidential nature of Privacy Information must be maintained  Thus  the obligation ta safeguard  privacy does not expire  For an employee to remember this data until after the contract expires and then  use it would still be unethical     3 2 Mishandling or Misuse of Privacy Information    MorphoTrust USA personnel may not access or use Privacy Information for any purpose other than       performing the work necessary to deliver the product or service for which our customers have contracted   i Thus  any use of Privacy Information or monetary advantage is illegal  and any use of any use of Privacy    Information for any other advantage  for example  to re establish an old friendship  is unethical     3 3 Testing with Customer Data    Mo
296. line            Manual Summary  Start only L  Finish only J           Qtr 2  0     Installation of Workstation Field Services Mon 7 20 15      Field Services    EA Training Transitioning for internal certificatior 096 Field Services Tue 7 21 15 Field Services    m                     process  Monitor Performance and Service Quality 0  PM Thu 7 23 15    PM  New Site Deployment  Detailed Schedule 096 Deployment Mgr  Wed 7 15 15 ex Deployment Mgr   provided in body of Bid Response  Call Center 096 Tue 6 30 15  102 Provide info and training to Call Center to support 090 Call Center Mon 7 20 15 i  Call Center  Enrollment Centers and Mobiles  103 Expand call center staff if necessary to 096 Call Center Tue 6 30 15 Call Center  accommodate HOO  Integrate new sites into call system 096 Call Center Tue 7 21 15 ug Call Center  Finance 096 Tue 7 7 15  106 Collect  amp  Identify Requirements for payment 096 Finance Dept  Tue 7 7 15 igs Finance Dept     process state FBI fees                           Modify Process for Payment to State if needed     0     Finance Dept     Tue 7 14 15    Finance Dept                                                     108 Modify Reporting Reconciliation for State if needed 096 Finance Dept  Thu 7 16 15 us  Finance Dept   Procedure Acceptance   WVSP 096 WVSP Thu 7 23 15 uy WVSP  110 PHASE 1 CURRENT ENVIRONMENT WEBSITE  USER 090 Engineering Mon 6 8 15 v     APPLICATION  AND RESULTS DELIVERY DEVELOPMENT  111 Website and User Application design and customer 0
297. lines     4 12 1 User Registration and Management    A user management process shall be established and documented by the MorphoTrust Human  Resources        and IT Departments to outline and identify all functions of user management  to  include the generation  distribution  modification and deletion of user accounts for access to  resources  The purpose of this process is to ensure that only authorized individuals have access  to MorphoTrust applications  network resources  and information and that these users only have  access to the resources required for authorized purposes  The principle of Least Privilege always  should be followed  as described in        PRC 00141 A Need to Know Policy    The user management process should include the following sub processes as appropriate   Enrolling new users    Removing user IDs    Granting    privileged accounts    to a user    Removing    privileged accounts    from a user    Periodic reviewing    privileged accounts    of users    Periodic reviewing of users enrolled to any system  and   Assigning a new authentication token  e g   password reset processing      These sub processes are typically part of the HR Add Drop procedure for bringing on board    onboarding   a new MorphoTrust employee or contractor  or when a MorphoTrust individual  leaves the company   offboarding       The appropriate Responsible Manager or other authorized person will make requests for the  registration and granting of access rights for MorphoTrust per
298. llment Agents will also use the  document to verify the biographic data provided during enrollment       SAFRAN Vendor Response Sheet         lt  MorphoTrust USA  Attachment A     otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police       Enrollment Agents will use the B5000 to examine state  or federal government issued photo IDs before    capturing an applicant s fingerprints  The B5000 is document  If the document is the    As an added security feature  MorphoTrust proposes our Identity Proofing  Solution  which leverages our industry leading iA thenticate   authentication  software and B5000 Document Reader   The B5000  shown in Figure 33  will  analyze state and federal government   issued photo identification documents  including driver licenses  government   issued ID cards  military IDs  or  Passports     The Enrollment Agent will scan the  document utilizing the B5000 Document  Reader  Our Identity Proofing Solution    Figure 33  MorphoTrust B5000 Document knows which document it is expecting  Authentication Reader    and will alert the Enrollment Agent if the  document authenticated is not the correct    certified under the SAFETY Act by the U S  Department expected document  then diagnostics will    74          be run against it ensuring it is valid     With the B5000  the Enrollment Agent lays the identification document on the  scanner platen  If the ID is a dri
299. lows     1  Applicant Pre Enrolls and Submits Payment   The applicant registers with  MorphoTrust using either our secure website or Call Center and pays for the  transaction  Because personal information is collected securely  the applicant  needs to enter only their full name  the Registration ID provided at the end of  the registration process  and payment confirmation number when submitting  the fingerprint card to MorphoTrust  This process limits the amount of  personal information being sent by mail  The applicant is provided  instructions for submitting fingerprint cards to the MorphoTrust Processing  Center     2  Fingerprint Cards Received   We receive FBI  FD 258  fingerprint cards from  applicants in accordance with instructions provided to applicants at time of  registration     3  Fingerprint Cards Reviewed and Prepared   A MorphoTrust staff member  opens each package  applies a barcode label to each card  reviews the card for  completeness and legibility of demographic data  and logs the record in  If  the applicant has not completed the registration process but has provided      SAFRAN Vendor Response Sheet 77    MorphorTrust USA  Attachment A     otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    78    contact information  the applicant is contacted and assisted with the  registration and payment process  and the card is put back into the  processing que
300. loying and licensing agencies and minimal effort by State of West  Virginia employees to process applicants        Redaction   One or more specific sections of text can be redacted before  results are delivered to an agency and or the applicant  Only non   redacted text is included in denial letters provided to the applicant  The  original  full  response is retained within the Review Client for future  reference and use by authorized state employees        Collaboration   Notes and attachments can be added to an applicant  record as necessary to provide the necessary support information for the  final adjudication decision        Disposition Assignment   Authorized personnel can assign a final  disposition  which triggers response generation  based upon their    permissions     Figure 16 through Figure 18 show screenshots from MorphoTrust s Review  Client application currently provided as part of our West Virginia solution     Vendor Response Sheet       60 SAFRAN   Attachment A     MorphoTrust USA    otate of West Virginia    Department of Administration    Purchasing Division                   EasyPath   Administrative Queue Review             Applicant Review Screen     Man Setup Windows           Applicant infcemation  Notes   Documents              Status Applicant Selection         Complebon Status  C incomplete  Review Pending  Research  C Rejected  C Not Ceested Record Found        eC                 EasyPath    TA Main Setup Windows Help       State Employment   Div
301. ls  software  applications  etc   that is located within a managed network and is used for  normal business activities  HR  finance  payroll  engineering  etc    Customers do not interact  with these systems     Deployed System     A MorphoTrust computing system  examples  workstations  servers   peripherals  software  applications  etc   that is installed and operating in an unmanaged  environment  Typically  deployed systems are contained within a customer s network  The  systems usually are operated by the customer  and they may be supported and maintained by  either the customer and or MorphoTrust personnel  The hardware may be owned by the  customer or MorphoTrust     Internally Hosted System   A MorphoTrust computing system that is operating within a  managed network within a MorphoTrust facility and is accessible from an unmanaged network  In  some cases  firewall rules are used to ensure that certain internally hosted systems are only  accessible from certain unmanaged networks     Externally Hosted System   A MorphoTrust computing system that is operating within a third   party s secure hosting environment and is running one or more MorphoTrust applications  The  hosting facility   s network is unmanaged but the MorphoTrust portion of the network is managed     MorphoTrust Controlled System     Refers to a system that is either an internal MorphoTrust  system  an internally hosted system  or an externally hosted system     Secure Network     A managed network that re
302. ls Policy PRC 00121    05 01 2012 Confidential 3 of 8  EXEMPT INFORMATION    IT Security Policy PRC 001 12 A 03    Corporate IT Security Policy PRC 00112  this document   Employee Security Screening Policy PRC 00134   IT Information Security PRC 00089   IT Physical IT Access Controls PRC 00091   Liability Policy PRC 00140   Security Awareness Training Policy PRC 00152  Security Quick Reference PUB 00185    Additional applicable policies exist at the facility level and can be added as needed     5  Security Events    A Security Event is any attempt to circumvent the security measures or systems protecting  MorphoTrust USA IT systems and or its facilities  All Security Events are to be logged using the  Security Incident Report  Appendix A   Security Events include  but are not limited to   e Unauthorized access to security sensitive data files      Unauthorized disclosure of user ID and passwords   especially to third party individuals  and organizations   e Unauthorized copying or transfer to a laptop or removable media   e Unauthorized removal of security sensitive data files from secure premises      Asuccessful or unsuccessful attempt to hack into a file server containing secure data  files   e Corruption of secure data files either by virus attack  user error or other causes      Unauthorized re classification of files and data from secure to non secure      Theft of a server  backup storage unit or Laptop containing security sensitive data     6  Need to Know    Informat
303. m the email before forwarding the email to other MorphoTrust  personnel  In this case  the PII data should be saved temporarily on a secured MorphoTrust  server and protected with ACLs  References to the network location with the      can be passed  around via email  When the issue has been resolved  the PII data should be deleted within a  week  If any email replies to the customer require the PII data for referencing purposes  only a  minimal or incomplete amount of PII that is uniquely identifiable by the customer should be  included in the email reply     Unencrypted PII data that is reported to the MorphoTrust Help Desk by customers in the course  of opening a service request ticket should not be stored in the ticket on a long term basis  Small  amounts of PII data should be stored in a secure data field while the ticket is open and then be  deleted when the ticket is closed  Large amounts of PII data should be stored on a secured  MorphoTrust server and protected with ACLs  References to the PII data can be included in the  ticket or in emails regarding the ticket  When the ticket is closed  the PII data associated with the  ticket should be deleted within a week     PII data can be emailed to a customer or within the MorphoTrust network provided     a   he      data remains encrypted at all times  The encryption level should be AES 128       better     b  The encryption password or key for the encrypted PII data is not transmitted with the  encrypted PII data  The pass
304. ment O LOCKED 1050000092 1000014672 9 15 2009 3 51 08          TEST TEST Handgun            Personal Protecbon Closed 1490000017 1000014827 9 16 2009 11 39 43          TEST TEST Handgun Retired Corrections Officer Closed 1490000016 1000014928 9 16 2009 11 40 28          TEST TEST Handgun Lifetime Hunting and Target Closed 1490000015 L00001 4830 3 16 2009 11 41 08 AM     TEST TEST Handgun Firearms Dealer Closed 1490000014 000014831 9 16 2009 11 41 53 AM     TEST TEST Handgun Four Yea Personal Protects Closed 1490000013 1000014832 9 16 2009 11 42 08          TEST TEST Handgun Retired Law Enforcement    Closed 1490000012 L000014833 9 16 2009 11 4258 AM     TEST TEST Handgun Lifetime Personal Protection Closed 1490000011 1000014835 9 16 2009 11 43 33 AM     TEST TEST Handgun Lifetime Hunting and Target Closed 1490000010 11000014835 9 16 2009 11 43 53          TESTER TEST Criminal Record Review Challenge      Record Found 1550000080 L000036719 3 15 2010 8 16 22             zl  Cancel F10            _ Save And Close F11       11 Records matched the            provided     Set Criteria  F9  Refresh List  F9       Figure 41  Administrative Queue Review     Searching Applicants for Review    Applicant Information    The Applicant Information screen  shown in Figure 42  allows authorized  personnel to review the information submitted as a part of the selected  applicant s transaction  Additional information on this screen includes the  history of a transaction that was rejected by     
305. mission     6  Records must be transmitted in a timely manner within 24 hours from collection     MorphoTrust meets the requirements     Table 15 summarizes the steps in the process for an applicant s visit to an  Enrollment Center  We have described the process in more detail in our response  to requirement 4 4 3 3 and illustrated the steps in Figure 9 on page 40     Table 15  Steps in the Applicant Appointment Process    Appointment  Scheduling    In Person at  Enrollment  Center    After  Appointment    100    Applicant schedules appointment either online or by calling Customer Service  Center    Applicant can opt to pay fees by a variety of methods   Applicant receives appointment tracking number and confirmation information  If an email address is provided  appointment information is emailed to the  applicant along with a link to an online mapping of appointment location  Applicant s record is loaded on Livescan from the MorphoTrust Central Server  Applicant s photo ID is authenticated    Applicant s ID is checked against the demographic data supplied at time of  appointment scheduling    Applicant is asked to verify all demographic information    Applicant is asked to review terms and conditions and provide signature through  signature pad device    Applicant is fingerprinted  Applicant pays fee if not paid at time of appointment scheduling    Applicant is provided with a receipt of the transaction  Receipt includes the  State Control Number  date  applicant type  amoun
306. mmerce and Insurance  Department of  Safety  Health Care  Department of Transportation  and Tennessee  Supreme Court   Description of Technical MorphoTrust Live Scan system   Solution MorphoTrust Store and Forward Server  Proprietary registration  back end and billing software  Secure connection to State MorphoTrak AFIS  Cisco Virtual Private Network encryption of data transfer circuits  Customized agency system integration and data sharing protocols  Photo capture system  Morpho Trust iA thenticate document authentication system  Card scan system    List of Fingerprinting Centers     Included in Appendix      with hours of operation     Letter of Recommendation Included in Appendix D         Vendor Response Sheet    SAFRAN     Attachment A  MorphoTrust USA    otate of West Virginia CRFP DPS1500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    Table 5  Massachusetts Executive Office of Public Safety    Company Massachusetts Executive Office of Public Safety  Company Address and One Ashburton Place  Room 2133  Telephone Number Boston  MA 02108   614 727 7775    Contact Person Curtis Wood  Undersecretary for Forensic Science and Technology  The Commonwealth of Massachusetts    Executive Office of Public Safety and Security  One Ashburton Place  Room 2133   Boston  MA 02108   614 727 7775  Ext 25512    Curtis  Wood state ma us    Annual Fingerprint Volume 150 000    Description of Services    MorphoTrust was
307. mobile locations     When accessing a MorphoTrust network remotely  identification and authentication of the entity  requesting access must be performed in such a manner as to not disclose the password or other  authentication information that could be intercepted and used by a third party     In the special case where servers  storage devices or other information technology equipment  has the capability to automatically connect to a third party vendor for processing services or to  report problems or suspected problems  the CSO  ISO  CIO and the Responsible Manager must  review any such connection and process to ensure that the connectivity does not compromise  MorphoTrust or other third party connections     Working from a remote location must be authorized by MorphoTrust Management and  appropriate arrangements made for this activity through written policy and procedure  to ensure  the work environment at the remote location provides adequate security for MorphoTrust data  and computing resources  Appropriate protection mechanisms commensurate with risk and  exposure must be in place to protect against theft of MorphoTrust equipment  unauthorized  disclosure of sensitive information  misuse of MorphoTrust equipment or unauthorized access to  the MorphoTrust internal network or other facilities by anyone  including family and friends  To  ensure the proper security controls are in place and all MorphoTrust security standards are  followed  the following must be considered  
308. monthly payments are remitted to the State within 30 days of the receipt of  the bill  If a discrepancy is noted during the reconciliation process  we will notify  the State within five  5  days     We have provided additional details about our billing system in our response to  requirement 4 4 5 1         Account Establishment and Funding    The Vendor must provide user agencies with the option to establish a customer account for  payment of user agency Applicants  fees  State Agency accounts must be in the form of billing  accounts where the agency is billed at the end of the month for all activity on their account for that  month  All other user agencies must be able to establish escrow accounts that allow their  Applicants to be charged against a balance maintained in the account and or be permitted to  establish credit accounts  If a user agency does not maintain a balance in their account  or fails to  maintain a current credit account  the Vendor may refuse to allow Applicants to be scheduled  against the account or to continue to offer the agency credit  Vendor may provide credit account  to non governmental agencies     MorphoTrust meets the requirements     We will provide monthly invoicing for state or local governmental agencies and  provide solutions for non governmental entities that will enable them to pay on  behalf of applicants via credit card backed accounts  Each agency with an  account will receive a monthly itemized statement that details Payment Date   
309. n Street East  Post Office Box 50130 Request for Proposal    Charleston  WV 25305 0130 31     Public Safety       Proc Folder  94136  Doc Description  Applicant Fingerprint Services    Proc Type  Central Master Agreement          Date Issued         2015 04 01 2015 04 28 CRFP 0612 DPS1500000010 1  13 30 00  BID RECEIVING LOCATION  o     hg ee 24   ren  BID CLERK  DEPARTMENT OF ADMINISTRATION  PURCHASING DIVISION  2019 WASHINGTON ST E  CHARLESTON WV 25305  US          eee        CES  Vendor Name  Address and Telephone Number   MorphoTrust USA  LLC    296 Concord Road  Suite 300  Billerica  Massachusetts 01821  978 215 2400    FOR INFORMATION CONTACT THE BUYER    Tara Lyle   304  558 2544  tara l lyle Qwv gov    Robert Eckel  Pr  cidept angoCE  2  Signature X                         04 3320515 pate April 24  2015         offers Subject to      terms and conditions cohtained in this solicitation       Page  1 FORM ID   WV PRC CRFP 001    Purchasing Divison State of West Virginia  Request for Proposal    Charleston  WV 25305 0130 31      Public Safety    2019 Washington Street East       Proc Folder  94136  Doc Description  Addendum No  1   Extend bid opening  Fingerprint CRFP    Proc Type  Central Master Agreement    Bate issued Version   2015 04 22 2015 05 07 CRFP 0612 DPS1500000010 2  13 30 00   BIDRECEMINGLOCATION           BID CLERK   DEPARTMENT OF ADMINISTRATION   PURCHASING DIVISION   2019 WASHINGTON ST E   CHARLESTON WV 29305    US                   Vendor Name  Address  
310. n for audit  purposes  By default  data is purged 365 days following the applicant s  enrollment  but the platform is easily configurable to purge applicant data  according to the retention policies of the State  For example  the system may be  configured to purge all of an applicant s data 180 days following their    enrollment     In accordance with CJIS policy  any Criminal History Record Information  CHRI   is purged 30 days after receipt     Submission Storage Format    UEP is fully EBTS v10 0 compliant and all submissions to the WVSP AFIS will be  in the EBTS format  MorphoTrust will use the existing Secure File Transfer  Protocol to transmit fingerprint records to the WVSP from our secure Data  Center     Vendor Response Sheet      SAFRAN   Attachment A  3 MorphoTrust USA    otate of West Virginia CRFP DPS1500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    Retransmission Procedure    UEP actively seeks an electronic acknowledgement for each submission  If no  acknowledgement is received within 24 hours  the record is automatically  queued for research and resolution     The procedure for resolving an unaccepted submission is as follows     1  If the record was rejected due to formatting issues      biographic issues      MorphoTrust Support Engineer will attempt to correct the record and  resubmit it     2  If no rejection response was received  a MorphoTrust Support Engineer  will attempt to res
311. n measures must be implemented to protect each facility from  unauthorized access  damage and interference     4 8 1 MorphorTrust Facilities    All MorphoTrust facilities have physical security  such as controlling access to the building and to  secure rooms within the building or facility  The CSO will perform periodic threat and risk analysis  to determine where additional physical security measures are necessary  and implement these  measures to mitigate the risks     MorphoTrust has several policies for protecting the physical and environmental aspects of its  facilities        PRC 00098 A Building Access  amp  Badging Policy       PRC 00136 A Security Events Planning Policy    secure server rooms within MorphoTrust facilities have their own security policy      PRC 00091 B Physical IT Access Controls Policy    Special consideration is given to MorphoTrust card production facilities to make them compliant  with NASPO security requirements      PRC 00147 A Building Access and Badging Policy for Production Facilities  e PRC 00133 A MorphoTrust USA Central Production Center Physical Security  and its associated policies  PRC 00121 x  PRC 00122 x  SPC 00255 x  where xis a  letter       SPC 00280 A MorphoTrust USA NASPO Production Centers Security    Information processing terminals on the corporate domain such as workstations must  automatically screen lock themselves after a fixed period of inactivity  as outlined in      PRC 00089 B  7 Information Security Policy    Users m
312. n the field and the central server technology stack      Attachment A  MorphoTrust USA    otate of West Virginia CRFP DPS1500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    4 4 8 2 The Vendor should describe in detail the expected response time for maintenance for  each element of the services infrastructure  i e  livescan failure  server downtime  web  site disruption of service  etc     MorphoTrust s uptime for Universal Enrollment was 99 3  in 2014     Table 13 summarizes the expected maintenance response activities and duration  for our current solution and UEP     Table 13  Maintenance Response Times    Infrastructure   Action Response Impact  Element Time    Live Scan Enrollment Agent conducts   5 15 minutes Wait time  Failure onsite troubleshooting  Field Service Engineer 5 min 1 hour Wait time or reschedule appointment  dials in to perform further  troubleshooting  Equipment is replaced Next day start   Reschedule appointment   affected  of business applicants contacted to reschedule    Server Immediate trouble ticket 5 15 minutes No disruption to enrollment customers  Downtime issued and resources     records queued on Livescan for  released to address issue submission when lines are re     as Top Priority established    Website Immediate trouble ticket 5 15 minutes Applicants cannot pre register online    disruption of issued and resources but Enrollment Centers are operational   service relea
313. n these assets to preserve the security  properties of confidentiality  integrity  availability and privacy of sensitive information     Individual accountability is the cornerstone of any security program  Without it  there can be no  security  Usernames or IDs must not be shared and must be unique enough to identify each  person individually  Furthermore  each person must treat their account passwords as confidential  information and not disclose them to anyone  In addition  each person must reasonably protect  against unauthorized activities     10 9 2013 MorphoTrust USA Confidential and Proprietary Page 11 of 37    EXEMPT INFORMATION    Cyber Security Plan PLN 00091 A 02    The use of built in user accounts  such as Administrator  that are shared among users  especially  privileged users  should be discouraged as much as possible  For practical reasons  though   specialized situations  such as the need to maintain large numbers of similar or identical  workstations by multiple people  may require the use of common user accounts  but these  accounts should not be built in accounts if possible  and their usage should be logged     Confidential information and PII data should only be made available on a Need To Know basis  according to      PRC 00141 A Need To Know Policy    Furthermore  MorphoTrust personnel shall only be given the minimum necessary privileges  often  called Least Privilege  to perform their normal business duties  Any increase in privileges must  be approv
314. nagement    o Provide open  fair  and competitive processes to deliver best value  to the WVSP program    o Manage contract commitments to closure  We complement our methodology and assets with our experience in delivering  superior Program Management services to our clients in time  on budget  and  with a high level of responsiveness to Stakeholder needs     Concept of Operations Document    As a component of our project management  we develop a Concept of  Operations  ConOps  document  which provides detailed information about how  contingencies will be dealt with  MorphoTrust proposes to support the business  continuity requirements using a hot standby  alternate Data Center  As part of  our internal information assurance program  a contingency plan is created to  address the specific mission needs and recovery requirements  The central  component of this contingency plan is a Concept of Operations  ConOps   document  This document describes roles and responsibilities  system  requirements  data requirements  and the overall process of detections  response   and recovery  The contingency plan is exercised in its entirety annually  and a  tabletop exercise is conducted biannually     The ConOps broadly addresses three areas of concern   management   operational  and technical        The management aspect of      ConOps defines several key individuals  charged with the execution of the plan  At a minimum  executive  management owner  contingency plan coordinator  damage asse
315. ncluding 50 000 calls from West  Virginia citizens  We welcome the State to verify its existence and test its  performance by calling the toll free number at 855 766 7746     The CSC offers an uninterrupted  proven single point of contact to speak with a  live operator  Our Customer Service Representatives  CSR  will assist the  applicant to provide demographic information to complete their registration   schedule  change  or cancel  an appointment  process payment  and ask  questions about the process  West Virginia applicants and agencies will be able  to access the CSC conveniently from anywhere in the United States via a single   toll free  program specific telephone number     Our knowledgeable  experienced  and multi lingual staff is available Monday  through Friday  7 00 A M    4 00 P M  Central Standard Time  9 00 A M  to 5 00  P M  West Virginia local time   The CSC currently employs more than 150 CSRs  including an established team of CSRs who currently serve the needs of West  Virginia applicants  In addition to the CSRs who are dedicated to this project  all  CSRs are cross trained so that they can be utilized during peak periods if needed     Mandatory Specification Checklist      SAFRAN   Attachment B  MorphoTrust USA    otate of West Virginia CRFP DPS1500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    Housed in multiple U S  cities  specifically Springfield  IL and Des Moines  IA   to min
316. nd other expenses related to       operation of the Enrollment Centers     Receipts    MorphoTrust provides a receipt to each customer upon completion of      in   person enrollment process that meets the RFP requirements including the State  Control Number  We have described the receipt in our response to requirement  4 4 3 4 and shown the proposed receipt in Figure 13     b  On site Fingerprinting Services    Vendor must provide on site fingerprinting services for groups of 25 or more Applicants  The  location must be at the convenience of the requesting agency  The Vendor must provide a point  of contact for agencies wishing to use this service  The service may be negotiated between the  Vendor and the requesting agency     MorphoTrust meets the requirements     We will provide on site mobile fingerprinting anywhere in the state for groups of  25 or more  Based on our experience with the demand for onsite services in other  states  we are initially planning to have three mobile fingerprinting units  throughout the state for the convenience of requesting agencies  although  additional resources can be added if the demand for mobile services supports an    expansion     MorphoTrust typically requests that such sessions be scheduled at least two  weeks in advance  We respond to all requests in a timely manner and work with  the requestor to identify the most convenient  available option for the on site  session  Full instructions and guidance are provided to the customers dur
317. nded disposition of the media  Electronic  media may be scheduled for reuse  repair  replacement  or removal from service for a variety of reasons  and disposed of in various ways as described in the following paragraphs       All electronic media must be properly sanitized before it is transferred from the custody of its  current owner  The proper sanitization method depends on the type of media and the intended  disposition of the media       Overwriting hard drives for sanitization  Overwriting is an approved method for sanitization of hard  disk storage media  Overwriting of data means replacing previously stored data on a drive or disk  with a random pattern of meaningless information  This effectively renders the data  unrecoverable  but the process must be correctly understood and carefully implemented     Overwriting consists of recording data onto magnetic media by writing a pattern of fluxes or pole  changes that represent binary ones  1  and zeroes  0   These patterns can then be read back  and interpreted as individual bits  8 of which are used to represent a byte or character  If the data  is properly overwritten with a pattern  e g    11111111  followed by  00000000   the magnetic  fluxes will be physically changed and the drives read write heads will only detect the new pattern  and the previous data will be effectively erased  To purge the hard drive requires overwriting with  a pattern  and then its complement  and finally with another pattern  e g   overwrit
318. ndividual agencies to  create customized systems that provided efficient services for the agencies involved as well as for the  applicant within the context of the network               SAFRAN Vendor Response Sheet         13    MorphorTrust USA  Attachment A     otate of West Virginia CRFP     51500000010    Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police  Company Texas Department of Public Safety    The State of Texas has an established E Pay system used to facilitate the collection of fees for services  provided by State agencies  MorphoTrust technical staff successfully integrated the MorphoTrust  components of the FAST program into the E Pay system  This allows applicants who must pay licensure  fees to pay for the fingerprinted fees at the same time in a secure web based environment  greatly  simplifying the process for the applicant and for agencies     We developed a customized web based solution for the Texas Board of Nursing  Department of Family  Protective Services  DFPS   Real Estate Commission  TREC  and State Board of Educator Certification   SBEC  which verifies that applicants scheduling appointments for fingerprinting have been approved by  the agency to complete the process  This solution saves time  money and frustration for the agencies and  applicants by ensuring that all required steps for certification or licensing are taken before the applicant is  fingerprinted     In 2007  the Texas Stat
319. ndividual s  right to  privacy     Definition    Course  schedules   DECES Curr Catalogs   brochures   maps        10 23 2014        Protection level of  data is set by the  owner or custodian    Employees  non   employees with a  business need to  know    Institutional  information that is  intended for use  within MorphoTrust  USA    Research detail or  results that are not  restricted data   management  information     Budget information     private employee    information    Restricted data  subject to federal   state  and other regulations  including  the  FERPA  PCI DSS  Gramm Leach   Bliley  HIPAA  Proxy Agreement  NSA   and or other legal requirements     Only those individuals with approved  access and signed non disclosure  forms     Information that MorphoTrust USA and  its employees have a legal  regulatory   or social obligation to protect   Unauthorized disclosure would violate  individual privacy rights    Highly regulated information   Unauthorized disclosure could subject  individuals to identity theft and could  lead to substantial financial penalties  and loss of reputation to MorphoTrust  USA     SSNs  credit debit card numbers   drivers  license numbers  biographic   biometrics  document data  state issued  non drivers  ID numbers  protected  health information        MorphoTrust USA Confidential  EXEMPT INFORMATION    Sensitive Data Handling and Storage Procedures PRC 00148 A 05    Roles and Responsibilities    The following definitions apply to terms us
320. ne a policy and procedures that  when implemented  protects the integrity of IT s business and  infrastructure systems and services and their underlying components  To ensure that changes to these  services are recorded  assessed  and implemented in a controlled manner with mitigated risk for  MorphoTrust USA     2  Scope    This procedure applies to the IT Change and Configuration Management processes for all production  business and infrastructure systems and services at all MorphoTrust sites globally  The procedures cover  the process by which service additions  modifications  or removals are requested  evaluated  approved   and implemented     3  Overview    IT Services may be comprised of one or more of the following components    e Software  including database    e Hardware  including environmental and electrical components   All changes to services or systems  state must be recorded  These records must be maintained and  archived until after annual audit review has been completed     Beyond IT management review  business stakeholders who depend on these services and systems must  also review and agree to all proposed changes prior to changes being implemented     4  Roles    The head of Infrastructure Services  typically a director within IT  serves as the chairperson for the  Change Control Board  CCB   The Chairperson is responsible for providing oversight for the  Configuration Management process and assuring process adherence     10 23 2014 MorphoTrust USA Confiden
321. ned to inhibit normal network or systems operations     Access to MorphoTrust deployed systems in a customer s environment is usually controlled by  the customer  In case of a breach on the customer s network  the CSP policies herein can help  mitigate any possible damage and loss of PII data     2 PURPOSE    The CSP defines the policies for protecting sensitive and confidential electronic data  information   and communication within the entire MorphoTrust environment  by externally hosted MorphoTrust  applications and services  and in deployed systems within customer environments     Security considerations cannot be an afterthought when designing and implementing systems   The goal of the CSP is to make sure that security considerations are factored into the design and  implementation of all systems that could be affected by a cyber attack     10 9 2013 MorphoTrust USA Confidential and Proprietary Page 5 of 37    EXEMPT INFORMATION    Cyber Security Plan PLN 00091 A 02    For existing systems that are in production  either for MorphoTrust s internal use or for providing  actual customer services  it is possible that those systems may not be fully compliant with all of  the policies in this CSP  It is understood that changes to those systems may incur unexpected  costs  both for the customer as well as MorphoTrust  and with potential downtime which could  seriously affect customer operations and services  When a subsystem that is suspected or at risk  of noncompliance with t
322. nen            naar nnn nnns 8  DANA AC CCS e                                        Unto      8           TC SOU ce serine E                               UY 8  BAC queue oL                                         8  EX CSO RODO INO BNET TM TREES 9                          TE 9  8  Destruction of Electronic Media                                                                                                                                                                          9                    m T CK                                    9  Disposalol Mard DIVOS TID EE 10  Disposal of Failed Solid State Drives  5505                                                     10  Disposal of Electronic Media Other Than Hard                                                                      11  9  Auditing and Certification                                          11  10  g 399  lnMc                                        E 11  11  Appendix A     Drilling Pattern to Destroy    Hard                    12  10 23 2014 MorphoTrust USA Confidential 2    EXEMPT INFORMATION    Sensitive Data Handling and Storage Procedures PRC 00148 A 05    1  Introduction    This policy describes the controls MorphoTrust USA  The Company  employs to protect the sensitive data  it collects  handles  and stores as part of its daily business operations  Sensitive data  for the purpose of  this policy  includes but is not limited to the following   e Social Security numbers  Credit debit card numbers  Biom
323. network through web browsing     4 11 4 Software Maintenance    Computing systems in all logical network types should keep their commercial software  installations current and update to date with patches  fixes  etc  This includes OS level updates  and fixes  such as from Microsoft Update   For computing systems in the Customer Network  if  the customer assumes the responsibility for the updates and fixes to non MorphoTrust  applications  the Responsible Manager should ensure that the updates will be done with a  reasonable frequency for the environment and understand the level of risk involved with making  these changes     Computing systems in all other logical network types should evaluate the fixes and updates to  see if they pose any risk to production systems  If so  the fixes and updates should be tested  separately before being deployed  If a particular fix or update poses an identifiable risk to  production  and if the systems are on a secure network  the fix and update can be deferred until  either the fix or the update has been tested fully  or reissued by the manufacturer so it is less  risky  or until there can be a sufficient break in production that it can be installed and tested safely  and  if necessary  backed out or reverted     4 11 5 Information Backup    Computing systems need their data  configuration  and any other important information backed  up to prevent data loss and make possible business continuity and disaster recovery     For computing systems
324. ng any method             sure that you only connect to known valid WiFi or wired connections  Refer to Section  5 for more information  Do not use WiFi connections that are not secured  that is  they  have no password or passcode     5 31 2013 MorphoTrust USA Confidential Page 6 of 6  EXEMPT INFORMATION    Physical IT Access Controls PRC 00091 B 01    PHYSICAL IT ACCESS CONTROLS POLICY    Document Number  PRC 00091 B    Revision Level  01    Approval    Robert Stack Robert Eckel    Chief Information Officer President       This document contains confidential and proprietary information of MorphoTrust USA  No part of this  document may be reproduced  disclosed  distributed  or used in any form by any means   graphic   electronic  or mechanical  including photocopying  recording  taping  or information storage or retrieval      without written permission of MorphoTrust USA     Users are responsible for making sure that they have the current revision of this  document     8 22 2011 MorphoTrust USA Confidential Page 1 of 3  EXEMPT INFORMATION    Physical IT Access Controls PRC 00091 B 01    TABLE OF CONTENTS    1                                                                                    3   EE e Moni                                           3  3 PROCEDURE                                    3  8 22 2011 MorphoTrust USA Confidential Page 2 of 3    EXEMPT INFORMATION    Physical IT Access Controls PRC 00091 B 01    1Ov  erview     The server room is a vital infrastructure 
325. ng each  phase  we will completely develop  test  deploy  and begin to utilize a new set of  functionality  MorphoTrust will not move onto a new phase until all  requirements have been successfully delivered in the current phase     A description of each phase and the work to be completed in each phase is listed  in Appendix B  along with tentative timelines     4 4 8 Maintenance    4 4 8 1 The Vendor should describe in detail the maintenance levels that will be provided for  each of the elements of the network  including how the State would request maintenance  and what the Vendor will do to mitigate disruption of service to the Applicant                                                    SAFRAN  80 SAFRAN   Attachment A  D MorphoTrust USA    otate of West Virginia CRFP DPS1500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    Levels of Maintenance    MorphoTrust addresses maintenance of all systems at several levels  Enrollment  Agent  Technical Help Desk  and Field Service Engineering  Most maintenance  requests are initiated through a call to our toll free Customer Service Center  and  may be escalated according to the Escalation Procedure described in our  response to requirement 4 4 8 3          Enrollment Agents are trained in basic maintenance and troubleshooting  techniques for the systems  The perform daily maintenance functions such as  calibrating the scanners and ensuring the platen is cleaned
326. ng photocopying  recording  taping  or information storage or retrieval      without written permission of MorphoTrust USA     10 9 2013 MorphoTrust USA Confidential and Proprietary Page 1 of 37    EXEMPT INFORMATION    Cyber Security Plan PLN 00091 A 02    TABLE OF CONTENTS  1 INTRODUCTION c                 5  2 PURPOSE                      e                                                                  5  3 SCOPE MR                                                    6  4 CYBER SECURITY PLAN           a                         7  4 1 mise T                                                                      7  4 2 BIS e              7  4 2 1 Types of                                                     enar nnn nnns nana 7  222 Network GlassiliCallOns                                                   eu Peg aep 8  4 2 8 System Classificalions                 eee         8  4 3 CYBER SYSTEM OVERVIEW ust osse iidem          ME PERDE cabiseaneasdaseudaanaieav  aaiginaeceddanewsebenncnene 9  44 ORGANIZATIONAL AND FUNCTIONAL RESPONSIBILITIES                       eee nnne 10  4 5 INFORMATION POLICY        cccececceccceccccececcececcececaccececuececsececuuceceeaesueceaesecuesuceusecseaeceuaeeeceesenes 11  4 6 ORGANIZATIONAL SECURITY POLICY                                      12  4 7 PERSONNEL SECURITY POLICY      cccccccceccccsccccscaccecssccesseccasacceccccccusancucsconcucescecuccccusecausasceces 12  4 8 PHYSICAL AND ENVIRONMENTAL SECURITY POLICY                              
327. nia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    Customer Service Center    MorphoTrust   s Customer Service Center acts as a central point of information  and assistance for applicants and User Agencies  In addition to providing  scheduling services for appointments  CSRs assist applicants with program  information  answer their questions about the process and status of their  background checks  and provide directions to sites     4 5 2 Equipment  Vendor will be required to capture Applicant fingerprints digitally   a  Live Scan Device    All live scan or card scan equipment used to support the Applicant Fingerprinting Service project  must be certified according to the FBI Image Quality Standards  IQS   Appendix    Standards   The Vendor must provide a copy of the       certification letter in their response     Live scan equipment must be able to build and submit records at 1000 ppi in compliance with the  state Interface Control Document  ICD   state National Institute of Standards and Technology   NIST  definitions including records Type 1  State   Type 2  State   Type 8  Signature   and Type  14  flat and rolled   This ICD document can be found in Appendix A     The live scan device must be capable of capturing 1000 ppi 4  4  2 slap only capture     The Livescan device will assign a transaction control number  TCN  which will be unique and  used to track all submissions throughout
328. nificant issues should be reported directly to the Program Manager   Denny Wear  Mr  Wear s contact information is     Denny Wear   Director   Program Management   Office phone   217  547 2116   Cell phone   615  946 7947   dwear morphotrust com  In the unlikely event that a problem must be escalated  it should be reported to  Mr  Wear   s supervisor  Kent Schmitt  Mr  Schmitt   s contact information is     Mandatory Specification Checklist      SAFRAN   Attachment B  MorphoTrust USA    otate of West Virginia CRFP DPS1500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    Kent Schmitt   Program Executive   Office Phone   202  688 4826   Cell Phone   615  347 4627   kschmitt morphoTrust com  In the unlikely event that a problem must be escalated  it should be reported to  Mr  Schmitt   s supervisor  Charles Carroll  Mr  Carroll   s contact information is     Charles Carroll   Senior Vice President   Office Phone   615  778 5752  Cell Phone   937  604 6595    ccarroll morphoTrust com    Most day to day operational issues would typically be escalated in the following  manner     e Step One   Most problems should be reported to our toll free Customer  Service Center which will be open 7 00 A M   4 00 P M  CST Monday  through Friday  All Customer Service Representatives assigned to this  program will have a thorough knowledge of the program     e Step Two   Problems that cannot be solved or addressed by a Custom
329. not an acceptable method of sanitizing media intended for disposal outside of MorphoTrust  USA or transported between facilities     Physical Sanitization  i e  Physical Destruction   If the recommended software methods listed above and  below are not able to remove the data  a computer will not boot  or the internal hard drive or drives are  not accessible  then physical destruction is required  Drives and diskettes that need to be destroyed must  be sent to Billerica via secure shipment for destruction  Send all devices to   Security Department   MorphoTrust USA  296 Concord Road  Suite 300   Billerica  MA 01821   Note  Physical destruction IS NOT DEFINED as throwing the medium in a trash can     Disposal of Hard Drives    The following rules govern the disposal of hard drives       Disposal of hard drives to other departments or outside MorphoTrust USA  Prior to disposal   operable hard drives must be overwritten in accordance with the procedures in section 8 of the  general policy above  The owner must be able to certify that the hard drive was properly  sanitized  Written certification should include the make  model  and serial number of the hard  drive and the date that the procedure was performed  Equipment designated for surplus or other  disposal must have a label affixed stating that the hard drive has been properly sanitized    e The label should be a high visibility color that is easily recognizable    e Transfer of hard drives within the corporation  Before a har
330. ns  or if you host a publicly accessible service over the Internet     Rules   e Remote employee access is automatically handled through the MorphoTrust USA VPN and is  only allowed on company provided authorized configured equipment    e No classified information shall be stored locally on these devices  and no Personal Identifiable  Information  PII  may be stored on these devices  as described in the Sensitive Data Handling  and Storage Policy PRC 00148 A and the Security Governance Policy        00173     unless  explicitly approved by the CSO or ISO   e     devices  both MorphoTrust USA provided and personal  must be kept up to date with security  patches and utilize passwords or passcodes to access    e While wired access  i e   via your laptop  is the preferred method of access to email and other  MorphoTrust USA systems  the use of mobile devices such as smart phones and iPads is  allowed so long as they conform to the Company s Cell Phone and Mobile Device Use Policy   PRC 00237 A        Use of mobile devices shall be subject to inspection by IT at IT s request    e Cloud backup of mobile devices is not allowed  For example  iPhone data is not allowed to be  stored or synchronized with Apple s iCloud service        tis each employee s responsibility to guard the means of access  laptop  accounts  passwords   etc   to the Company s systems    e Negligent actions      an employee s part that could breach PII by others are grounds for  immediate dismissal       Make sur
331. nsurance required by the bid or proposal  and shall in all other respects perform  the agreement created by the acceptance of said bid  then this obligation shall be null and void  otherwise this obligation shall remain in  full force and effect  It is expressly understood and agreed that the liability of the Surety for any and all claims hereunder shall  in no  event  exceed the penal amount of this obligation as herein stated     The Surety  for the value received  hereby stipulates and agrees that the obligations of said Surety and its bond shall be in no  way impaired or affected by any extension of the time within which the Obligee may accept such bid  and said Surety does hereby  waive notice of any such extension     WITNESS  the following signatures and seals of Principal and Surety  executed and sealed by a proper officer of Principal and       Surety  or by Principal individually if Principal is an individual  this 7th        of May  20 15  Principal Seal MorphoTrust USA  LLC     Name of Principal                 By           NN  Must be Presiddpt  Vice President  or  Duly Authorized Agent       Title     Surety Seal RLI Insurance Company     Name of Surety     Katherine J  Foreit  Attorney in Fact for Surety    Attorney in Fact  West Virginia License  2124095  IMPORTANT    Surety executing bonds must be licensed in West Virginia to transact surety insurance  must affix its seal  and  must attach a power of attorney with its seal affixed     RUD 5 POWER OF ATTORNEY 
332. nt 4 4 6 1     d  Digital Signatures    The Vendor is required to collect a digital signature from each Applicant at the time of  fingerprinting following the Applicant s review and acknowledgement of terms and conditions  related to the release of the Applicant s criminal record     The Vendor must provide an example of where it has used signature capture devices in an  Applicant fingerprint network and statistics on the number of Applicants processed utilizing this  equipment     MorphoTrust meets the requirements     After applicants complete the fingerprinting process  the Enrollment Agent  requests that they review the terms and conditions related to the release of their  criminal record  Applicants acknowledge by providing their signature on an  electronic signature pad  The signature is captured by the UEP workstation  software  Figure 39  and saved with the applicant s record     John S  Smith             T9        ete  Figure 39  Captured Signature    We currently provide signature capture devices in the West Virginia Enrollment  Centers  where we have provided fingerprinting services for more than 220 000  applicants     MorphoTrust also captures signatures for our TSA Pre    program  in which the  applicant is required to read a waiver provided by TSA and apply their signature  using an LED touchpad  We provide fingerprinting services for more than one  million TSA Pres  applicants per year     e  Central Server Store and Forward    The Vendor must provide a centra
333. nts digitally     Included in the plan  the Vendor should discuss the Livescan device  ID Authentication  plan  the manual fingerprint process  digital signatures  central server store and forward  configuration  and card scan conversions process     As the current provider of the West Virginia fingerprinting network   MorphoTrust will continue to operate all current and expanded sites with all  hardware  software  and processes remaining the same  This will ensure zero risk  to the network at contract start  allowing for services to continue for the  residents of West Virginia while the network is prepared for update  The update  to the Universal Enrollment Platform will be a collaborative effort by  MorphoTrust with the West Virginia State Police     Digital Fingerprint Capture   Both our current software solution and proposed UEP workstation software are  workflow driven applications that walk the Enrollment Agent and the applicant  through the fingerprint collection process  The workstation software  automatically calculates the quality of fingerprint captures  giving real time  feedback to the Enrollment Agent and helping to eliminate rejects due to image  quality issues     Fingerprint scanners are calibrated daily  as a part of the overall maintenance of  the equipment  In addition  our workstation software automatically detects dirt   residual oils  and other platen imperfections that would require cleaning and  recalibration of the scanner     Vendor Response Sheet  
334. o commit to developing a strong  long term partnership in delivering  high quality electronic fingerprinting services  building on an already successful program     This submittal letter is signed by Mr  Robert Eckel  who is authorized to legally bind  MorphoTrust to fulfill the performance and pricing commitments outlined in this proposal  In  addition  please send all notices relative to a contract to Mr  John Olson  email address     jolson morphotrust com     Thank you for your time and consideration     Sincerely         Robert Eckel  President and Chief Executive Officer    MorphoTrust USA  LLC      1 978 215 2400  296 Concord Road     Suite 300 F   1 978 215 2406  Billerica       01821 www morphotrust com    REQUEST FOR PROPOSAL   West Virginia State Police  Applicant Fingerprinting Services     By signing below    certify that   have reviewed this Request for Proposal in its entirety  understand       requirements  terms and conditions  and other information contained herein  that I am submitting this  proposal for review and consideration  that 1 am authorized by the bidder to execute this bid or any  documents related thereto on bidder s behalf  that I am authorized to bind the bidder in a contractual  relationship  and that  to the best of my knowledge  the bidder has properly registered with any State  agency that may require registration     MorphoTrust US   Company        A  LLC                           Representative Name  Title  Robert Eckel  President and   
335. oTrust adheres to a strict Training Plan to make sure all personnel  working on fingerprint programs are fully trained on standards of performance  and operational excellence  These training standards are applicable without bias  to MorphoTrust employees  partners  and subcontractors     Physical Security    Physical access control is provided by the Individual Authorization Request   VAR  process  Closed Circuit Television Cameras  CCTV  surveillance  man   traps  identity validation  cipher locks  access logs  and multi factor  authentication for physical access     Any person entering the Data Center is considered a visitor  This includes  MorphoTrust employees entering to access enrollment systems  If an individual  does not have an active electronic card key  the individual must be escorted by  an individual with a valid VAR and active electronic card key  If the visitor has a  valid VAR and electronic card key  they may enter the lobby by holding the  electronic card key near the proximity reader and then entering a valid Personal  Identification Number  PIN   This will unlock the door and allow the visitor into  the lobby  The Data Center utilizes          to record all individuals outside the    Vendor Response Sheet      SAFRAN   Attachment A  3 MorphoTrust USA    otate of West Virginia CRFP DPS1500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    door and inside the lobby       access is automat
336. ocess adherence  efficiency and  effectiveness     A database used to store Configuration Records throughout their  Lifecycle  The CMDB stores Attributes of     and Relationships with  other Cls     The role responsible for oversight across all regional change  managers and acts on and chairs the CCB for all changes that have  multi site impact  The Enterprise Change Manager governs the IT  Change  amp  Configuration Management program     An IT Service that is not directly used by the Business  but is  required by the IT Service Provider so they can provide Business  Services  For example Directory Services  naming services  or  communication services     Maior Chanae Any Change above a Standard Request that has a higher risk of  J 9 impact and affects    number of users that must be notified        MorphoTrust USA Confidential 8  EXEMPT INFORMATION    Removable Media Policy PRC 00150 A 01    REMOVABLE MEDIA POLICY    Document Number  PRC 00150 A    Revision Level  01    Approval    Dennis Kallelis Robert Eckel    Chief Security Officer President       This document contains confidential and proprietary information of MorphoTrust USA  No part of this  document may be reproduced  disclosed  distributed  or used in any form by any means   graphic   electronic  or mechanical  including photocopying  recording  taping  or information storage or retrieval      without written permission of MorphoTrust USA     Users are responsible for making sure that they have the current revisi
337. of the fingerprint       Technical support overview of diagnostic functions        Field training   The Enrollment Agent trainee will be placed with an  experienced Enrollment Agent who double checks the quality of each  fingerprint taken  and instructs the trainee on how to capture fingerprints  most efficiently and effectively  Enrollment Agents will fingerprint many  test applicants prior to completing the on site training program     e  Best practice customer service  attitude  dealing with difficult people   escalation processes  MorphoTrust customer service policies        Security and Confidentiality  data  personal information  MorphoTrust  security protocols        Program specifics  Agency information  Applicant types  required forms  and information  assisting applicants in obtaining necessary information        MorphoTrust Corporate and Enrollment Services general information   who to contact  web links        Review of company policies with each Enrollment Agent  Among other  topics  this includes instruction on quality standards  security procedures     Mandatory Specification Checklist      SAFRAN   Attachment B  MorphoTrust USA    otate of West Virginia CRFP DPS1500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    emergency procedures  privacy policies  personal appearance   identification verification  state fingerprinting laws and requirements   how to interact professionally with the cl
338. on  If you need  Microsoft Office installed on the travel laptop  let IT know  Do not transfer files from the  loaner travel laptop to company networks or systems after you have returned from your  trip  Any files that need to be retained should be emailed to yourself     5 31 2013 MorphoTrust USA Confidential Page 5 of 6  EXEMPT INFORMATION    IT Remote Access Policy PRC 00092 B 09    e You are allowed to take your company mobile phone on your trip  Notify IT at least a  week before you leave so that international calling can be enabled  Otherwise  you will  not be able to make or receive phone calls while traveling  Also  if the phone supports  wireless networking  WiFi   do not connect the phone to any wireless network while  traveling     e  fa portable USB drive is necessary for backup purposes  make sure it is an encrypted  drive with AES 256 encryption  This drive must not contain any Subject Contract  Information or PII while traveling  When you return from your trip  do not connect this  drive to any MorphoTrust equipment  All files will need to be securely deleted and the  drive reformatted by IT first  Then the drive will be able to be reused  To preserve any  files on the drive  use the travel laptop to email them to yourself first using    https   mail I1id com              source code files can be taken outside the country on any kind of portable device     e Do not connect your devices to a Safran or Morpho affiliate network of any kind  wired or  wireless  usi
339. on analysis and intrusion testing  Such analysis and testing will be used to  determine if    e An individual can make an unauthorized change to an application       Auser may access the application and cause it to perform unauthorized tasks    e An unauthorized individual may access  destroy or change any data         e An unauthorized individual may access the application and cause it to take actions   unintended by the application designer s      The output of the penetration testing and intrusion testing will be reviewed in a timely manner by  the CSO and ISO  and any vulnerability detected will be evaluated for risk and mitigated as  appropriate     10 9 2013 MorphoTrust USA Confidential and Proprietary Page 15 of 37    EXEMPT INFORMATION    Cyber Security Plan PLN 00091 A 02    The penetration and intrusion testing should include the CSN and the MorphoTrust systems  hosted at third party facilities     The tools used to perform the penetration testing will be updated to ensure that recently  discovered vulnerabilities are included in any testing     Only individuals authorized by the CSO are authorized to perform penetration testing  The CSO  must be notified when penetration testing will be performed  Any other attempts to perform such  penetration testing will be deemed an unauthorized access attempt     MorphoTrust currently contracts with a third party security company to perform ethical hacking on  its networks to try to identify potential security issues     4 10 
340. on contains confidential and proprietary business information of MorphoTrust  USA  This document  including copies of all or and part thereof  may not be released or  disclosed to persons other than MorphoTrust USA employees except as necessary for business  purposes of MorphoTrust USA under an appropriate confidentiality agreement     Users are responsible for making sure that they have the current revision of this document    01 31 2012 Confidential 1 of 7    EXEMPT INFORMATION    Information Security  Customer Data Access and Security Policy PRC 00174 A 07    Table of Contents    1                  Pe                                3  1 1 PORC ENE E T T UU Tm 3  1 2 missile Re M aee NE RT TET            3  1 3                     OF elle                                              4   2 BICIS iC AION Ol RIDE                                4   di                5  3 1 DEMON             5  3 2 sien                                                                       5   4  Dara CANS                        6   5           amp  Cerine aioi                     E o T To    6   6              T                                  6   7                    6   01 31 2012 Confidential 2 of 7    EXEMPT INFORMATION    Information Security  Customer Data Access and Security Policy PRC 00174 A 07    1  Policy Overview    This policy defines the data management environment and assigned roles and responsibilities for  protecting customer information from unauthorized access  disclosure  or
341. on of this  document     8 22 2011 MorphoTrust USA Confidential Page 1 of 4  EXEMPT INFORMATION    Removable Media Policy PRC 00150 A 01    TABLE OF CONTENTS    1 INTRODUC TON p                                          3   EE e Micd                                         3  3   UPDATING PRODUCTION                                                               nennen 3  8 22 2011 MorphoTrust USA Confidential Page 2 of 4    EXEMPT INFORMATION    Removable Media Policy PRC 00150 A 01    1 introduc tion    This policy outlines the steps to be taken to ensure control over the removal of sensitive media  and data from secure facilities by way of removable recording media  including but not limited to     e Disks   e Cassettes   e Hard drives   e CDs   e Flash drives  2Polic       All removable media on workstations within the Central Production facility will be disabled  except  for those employees who prepare       Backups     Software upgrades     Copy security logs for audit review  Such personnel responsible for the above are restricted to   e Managers or their approved designees  e Card System Engineers  e Manufacturing Engineers     Backup and update IT staff  The Chief Security Officer must approve the management personnel with the above permissions     Proper security will be maintained on all backup and update media  Refer to the MorphoTrust USA  IT Backup and Recovery Policy for more information     3 Updating Production Systems    Production equipment must be periodicall
342. ons  as outlined in 4 5 of Section Four  Project Specifications        May 11  2015  Date       Robert Eckel  CEO and President    Section 4  Subsection 4 5  Mandatory Requirements    4 5 The following mandatory requirements must be met by the Vendor as a part of the submitted  proposal  Failure on the part of the Vendor to meet any of the mandatory specifications shall  result in the disqualification of the proposal  The terms  must    will    shall    minimum    maximum   or  is are required  identify a mandatory item or factor  Decisions regarding  compliance with any mandatory requirements shall be at the sole discretion of the Purchasing  Division     MorphoTrust meets all requirements in Subsection 4 5   Mandatory Requirements   Where applicable  we have provided additional detail describing how our  solution meets the requirement            Applicant Fingerprinting Services solution is already in place in West  Virginia  allowing us to be up and running within weeks of contract award with  a system that meets all mandatory requirements of the RFP  Our response  details how we will tailor our existing infrastructure and proven processes to     um SAFRAN Mandatory Specification Checklist 87  MorphoTrust USA  Attachment B     otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    88    deliver new capabilities while providing continuous service to the residents of  West
343. or many of these  agencies  enabling efficient backend processing for criminal history management   These solutions include extensive reporting  status notifications via email   optional billing account services  and other features  With thousands of hours  invested by agencies and MorphoTrust in creating these solutions  it is critical  that any new system not disrupt the existing environment     Our significant investment in these customized solutions  our experienced  program management team  and the West Virginia infrastructure we have  already in place make MorphoTrust the clear choice for this procurement     Our Priorities are Quality of Service and Customer Support    In early 2013  the Select Committee on Public Employees Insurance Agency   PEIA  called our attention to a need for improvement and challenged us to bring  forward a plan to resolve and improve processes within the state  MorphoTrust  acknowledged these issues and our team embraced a call to action to make  immediate adjustments to the program  seizing the opportunity to build a level  of trust with both the West Virginia State Police and the agencies represented   The Select Committee asked for and received monthly written progress reports  detailing the program refinements that we implemented to deliver on our  promise of improvement     MorphoTrust has met the challenge and delivered on our promises     Through meetings with West Virginia state agencies  school systems  and the  State Police  we ident
344. orized material     4 19 2 Compliance    Compliance with this Policy is mandatory  Each user must understand his her role and  responsibilities regarding information security issues and protecting sensitive information  The  failure to comply with this or any other security policy that results in the compromise of sensitive  information  confidentiality  integrity  privacy  and or availability may result in appropriate  disciplinary action  up to and including termination  MorphoTrust will take every step necessary   including legal and administrative measures  to protect its assets and will rely on the CSO to  monitor compliance with policy matters     MorphoTrust will conduct a review of compliance with this policy at least annually  Areas where  compliance with the policy requirements is not met will be documented and a plan will be  developed to address the deficiencies  While a full review across all of MorphoTrust is  preferable  spot checks for compliance are also acceptable     MorphoTrust managers and supervisors will ensure that all security processes and procedures  within their areas of responsibility are followed  In addition  all MorphoTrust business units may  be subject to periodic reviews to ensure compliance with security policies and standards     4 19 3 Enforcement and Violation Handling    Any compromise or suspected compromise of this policy must be reported to the CSO and ISO  immediately  The security incident  or event  reports should indicate the ris
345. ork solution to protect this    sensitive information and infrastructure to ensure that only those persons    needing access to the information have it  and when they do  that each access is    controlled and logged appropriately          MorphoTrust staff and subcontractors assigned to or performing duties    related to this project will be submitted for approval by WVSP and we will    provide a signed nondisclosure agreement to the State     Mandatory Specification Checklist   Attachment B      amp  SAFRAN    MorphoTrust USA    otate of West Virginia CRFP DPS1500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    4 5 6 Reports    The Vendor will be required to develop a number a standard and ad hoc reports for use in  reconciliation and other program objectives  These reports must be available for the State and  User Agencies to access via a secure web site using a Vendor assigned user name and  password  The State will work with the Vendor to identify required data elements for each report   The Vendor will provide the database structure of the store and forward server     At a minimum  the Vendor will be required to produce the following reports   a  Monthly Annual Summary   b  Monthly Annual Detail       Fee                          Reconciliation  for State access only     d  Ad hoc Reports   5 free reports to be developed at the mutual agreement of Vendor and the  otate     Vendor must provide screen
346. orkstations will be  uploaded to the Data Center and processing will resume     If an outage does impact an Enrollment Center causing a closure  UEP has the  capability to automatically notify applicants via email and phone            SAFRAN Vendor Response Sheet 5i    MorphorTrust USA  Attachment A     otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    4 4 4 2 The Vendor should describe in detail their plan to connect their central collection server  to the state system in such a way that the information being transmitted is secure and  protected     MorphoTrust will continue to use our proven interface with the State of West  Virginia s network  hardware  and software environment  We currently interface  with the WVSP AFIS and have successfully sent approximately 220 000 NIST  submissions securely through this interface  We will continue to secure and  protect the information being transmitted under the new contract          enrollment workstations connect to MorphoTrust  s Data Center in Franklin   TN via a secure Virtual Private Network  VPN  tunnel  Immediately upon  completion of the enrollment  the fingerprints and demographic data are  transmitted to the back end systems via this secure tunnel  Our system then  packages and transmits an EBTS compliant record to the Transaction Control  Processor housed in the WVSP Data Center over another VPN tunnel  using FBI  
347. ormation Spills and Cleanup policy  PRC   00312 A    7 8 2013 Update Section 4 18 1 to require either ISO or  FSO approval for an acceptable security  accommodation    7 15 2013   Changed the FSO to be the more general  CSO throughout the document  Updated the  FSO signature on the title page to be the  CSO  Updated Section 3 to note that for  proxy related cyber issues  the CSO can  involve the FSO    9 24 2013   Updated Section 4 18 to clarify the conditions   James Kottas  under which a waiver could be required    10 9 2013   Made roles boldface throughout Section 4 to James Kottas  make them more consistent     10 9 2013 MorphoTrust USA Confidential and Proprietary Page 36 of 37    James Kottas    James Kottas       EXEMPT INFORMATION    Cyber Security Plan PLN 00091 A 02     Revision   Date   Deseription   Author s     02 10 9 2013   Updated Section 4 18 1 to clarify that any James Kottas  concerns about a security accommodation  from the Legal Department need to be  resolved before a waiver can be draft  If the  concerns cannot be resolved  then no waiver  will be possible        10 9 2013 MorphoTrust USA Confidential and Proprietary Page 37 of 37    EXEMPT INFORMATION    IT Backup  amp  Recovery Policy PRC 00084 B 03    IT BACKUP  amp  RECOVERY POLICY    Document Number  PRC 00084 B    Revision Level  03    Approval               Stack Robert Eckel    Chief Information Officer President       This document contains confidential and proprietary information of MorphoTrus
348. orphoTrust USA    otate of West Virginia CRFP DPS1500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    3  Expedited Fingerprinting Service    In order to quickly process applicants with special circumstances  such as VIPs   adoption placements  or hiring applicants  non certified education  private  security guards  etc   MorphoTrust will offer a limited number of premium  same day appointment slots for an additional fee  This process will be managed  to ensure that applicants with appointment reservations are served during their  appointed times     4  Custom Engineering Requests    Additional Time and Material services are available upon request at our  standard labor rates for custom engineering outside the scope of this RFP     5  Agency Owned Livescan Systems    MorphoTrust understands that some agencies prefer the opportunity to have  immediate same day printing in their own facility  Such agencies may purchase  Livescan equipment and capture fingerprints utilizing that equipment  allowing  the agency to process applicants on a schedule that meets their individual needs     Agencies wishing to purchase equipment and print their own applicants for  purposes authorized by statute regulation will be presented to the West Virginia  State Police for pre approval and must execute a user agreement  Memorandum  of Understanding  MOU   with MorphoTrust  The MOU is a standard user  agreement that ensures fair
349. orphoTrust USA will work closely with our customers to  ensure the processing we perform is in accordance with all the laws governing those activities     effective way to protect the privacy of the consumer  We fully support industry self regulation and actively  work with recognized trade associations and organizations in industry efforts to establish fair and  workable guidelines above and beyond current laws and regulations           In addition  MorphoTrust USA supports industry self regulatory efforts and believes such actions are               We also support legislation and regulatory efforts to introduce fair and workable guidelines that protect  the privacy of consumers  and actively work to ensure that such guidelines are consistent with and  complement established self regulatory measures  and that they enable the consumer to continue  receiving the benefits that appropriate information use  sophisticated marketing techniques and  transaction processing services provide       8  Ethical Relationships     MorphoTrust USA pledges to conduct our relationships with clients  vendors  business partners and other    information providers in an ethical and professional manner  In our client and supplier contracts      MorphoTrust USA includes a commitment that any data sent to us has been legally obtained for the uses    to which it will be put  Additionally  we require that our clients    subsequent use of any data received from     us will be in compliance with all data
350. orses  worms or other destructive programs and  therefore  all downloaded files must be scanned for  such viruses  Virus detection programs and practices shall be implemented throughout the  MorphoTrust USA environment     e Training must take place to ensure that all computer users know and understand safe computing  practices        IT administration will be held responsible for ensuring current software is on the network to prevent  the introduction or propagation of computer viruses     e Any activity with the intention to create and or distribute malicious software by means of the  MorphoTrust USA networks is strictly prohibited         MorphoTrust USA will employ virus management measures at appropriate ingress and egress points  of the company networks  MorphoTrust USA will implement virus control procedures to ensure that all  computer servers and workstations are protected against viruses     e     Windows based computers  including workstations  laptops  development servers  production  servers  and tablets that run Windows  and whether physical or virtual machines  must run a  managed client version of antivirus software that has been approved by IT  Allowable exceptions are     o lfa customer provides a customer owned Windows computer as part of a contract with  MorphoTrust  this computer can use the antivirus software as provided or installed by the  customer  This antivirus software must be well known and approved by IT  If the computer  does not contain any ant
351. osted on servers at our  UEP Data Center  These components include a public web portal  an application  server  and an administrative web portal     Our secure Data Center currently submits approximately five million fingerprint  records per year to more than 20 state AFIS systems  including 11 MorphoTrak  AFIS systems  We are certified FBI Channeler     4 4 7 Project Management    4 4 7 1 The Vendor will be required to utilize a formalized approach to project management     MorphoTrust fully understands the level of effort required to deliver and operate  the West Virginia program  Implementing the State s defined needs requires a  thorough understanding of the basic processes for scheduling and fingerprinting  applicants as well as the peripheral support required to ensure success  The  technical solution requires compliance with West Virginia State Police    Vendor Response Sheet  amp  SAFRAN   Attachment A  3 MorphoTrust USA    otate of West Virginia CRFP DPS1500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    requirements for the electronic acquisition  transmission  and storage of    fingerprint images and associated demographic data     Responsibility for MorphoTrust s contract administration and project  management plan resides with the Program Manager  Denny Wear  Mr  Wear is  empowered to make decisions and commitments on behalf of MorphoTrust and  communicate those decisions and commitments to
352. otrust com  for email only  As stated above  make sure  the entire email session continues to use  https  and not  http   If  when you first try to connect to  the mail server using this URL  you get a warning or error message regarding a certificate   disconnect immediately as a man in the middle attack could be active       You may not take your company laptop out of the country  Instead  get a travel laptop on loan  from IT by submitting a request via the Service Manager portal at httos  itsupport and upon return  to the office  return the travel laptop to IT for sterilization  If you need Microsoft Office installed on  the travel laptop  let IT know  Do not transfer files from the loaner travel laptop to company  networks or systems after you have returned from your trip  Any files that need to be retained  should be emailed to yourself       You are allowed to take your company mobile phone on your trip  Notify IT at least a week before  you leave so that international calling  roaming  can be enabled  Otherwise  you will not be able  to make or receive phone calls while traveling  Also  if the phone supports wireless networking   WiFi   do not connect the phone to any wireless network while traveling    e  fa portable USB drive is necessary for backup purposes  make sure it is an encrypted drive with  AES 256 encryption  This drive must not contain any Subject Contract Information or PII while  traveling  When you return from your trip  do not connect this drive to any 
353. overy    e      emails between MorphoTrust USA employees and Safran Morpho employees         automatically logged and stored by the server    e Faxes between MorphoTrust USA employees and Safran Morpho employees is prohibited     Unacceptable Behavior    Using Company communications systems  including email  for any illegal  immoral  indecent  or  objectionable purpose is unacceptable and grounds for dismissal  If you are in any doubt about the  appropriate use of email please check with your manager  Likewise  the following uses of Company  communications systems is unacceptable     10 23 2014 MorphoTrust USA Confidential 7  EXEMPT INFORMATION    Computer and System Use Policy PRC 001 10 A 10       To set up personal business  send chain letters  promote political causes or outside  organizations  or any other non job related solicitations    e Forwarding of company messages to external sources whether they are company confidential       not    e External internet hosted services that do not offer any business value or pose an excessive risk   For example  some services are allowed  ex  Linkedln  while others are not  ex  Facebook   Twitter  MySpace  during normal working hours       Accessing copyrighted information in a way that violates the copyright  Also  the sending or  receiving of trade secrets  proprietary financial information  import export information  personal  identifiable information  PII  or similar materials without prior authorization    e Breaking into the
354. ow  All such internal databases must  reside on a MorphoTrust managed network  All database logins must have strong passwords   including the database administration accounts     For any given customer  databases for engineering development and QA testing should use  different passwords whenever possible and practical  Production databases must use different  passwords from both the engineering development databases and the QA testing databases  If  possible  UAT databases should use different passwords than the production databases  subject  to the requirements  limitations and constraints of the customer  All UAT and production  databases across all customers should not have any passwords in common  unless the  passwords are set by the customers and by coincidence one or more passwords are the same     Database usernames may be the same across any databases as necessary or desired   Common usernames pose a low security risk and can make the management of the database  more efficient  reliable  and less prone to error     10 9 2013 MorphoTrust USA Confidential and Proprietary Page 25 of 37    EXEMPT INFORMATION    Cyber Security Plan PLN 00091 A 02    Application access to the various internal MorphoTrust databases may use application level user  management  authentication management  and authorization management to control access to  these databases  according to the level of risk associated with the information in those  databases  as determined by MorphoTrust Management  
355. p  2 00    3 00   Savannah 5 Main Street Mon   Fri 8 00   12 00  amp  1 00   3 00   Sevierville 1746 Newport Hwy M W 10 6 Thurs 11 7  amp  Fri 10 6   Shelbyville 113 W Depot St  113 Southside Square  Tue  amp  Thu 1 00   4 00  Wed 9 00    12 00   Springfield 408 N Willow St M F 10 12 amp  1 6 Sat 11 3   Tazewell 415 Straight Crk Rd  Ste 2 Mon   Fri 9 00   11 30  amp  1 30   4 00   Winchester 209 S Jefferson St Mon   Fri 10 00   2 00   140 Appendix     amp  SAFRAN    List of Fingerprinting Centers        MorphoTrust USA    otate of West Virginia    Department of Administration    Purchasing Division    CRFP DPS1500000010  Applicant Fingerprinting Services  West Virginia State Police    MorphoTrust Enrollment Centers in Massachusetts    Massachusetts City Hours of Operation    Billerica  Boston  Brockton  Dedham    Everett  Greenfield    Haverhill  Hingham    Leominster  Methuen  Milford  Nantucket    Natick  New Bedford    North Adams    North Attleboro  Pittsfield     lt     SAFRAN    MorphoTrust USA    296 Concord Road Suite 200A    5 Drydock Avenue Suite 2040  2nd floor     1285 Belmont St  Suite 10    515 Providence Highway Suite 102    930 Broadway  486 Main Street Suite B7    143 Essex St  Suite 205    160 Old Derby St   Suite 110    20 Main St Suite 2C  119 Swan Street   258 Main St   Suite 120  32 First Way    251 West Central St  Bldg  D Suite 35  Back of Bldg    978 Nash Hoad    3 5 Church Street  Library Lower Level  Rm            11 Robert Toner Blvd  Suite 5    16
356. partment of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    When an applicant prefers to be contacted by email  our systems notify them via  an automated email  When an applicant prefers to be contacted by phone  our  Interactive Voice Response  IVR  system will automatically call the applicant and  deliver the notification via a TTS message  In all cases  the applicant is given  instructions on how to contact our Customer Service Center should they have  follow up questions or concerns     4 4 3 2 The Vendor should describe in detail their plan to provide mobile on site  fingerprinting services for groups of 25 or more     MorphoTrust currently provides on site    Mobile Convenience mobile fingerprinting in West Virginia  We  On site services provide added convenience  and coverage for specific opportunities like  orientation workshops  hiring sessions for new  teachers  and other group gatherings  more  Based on our experience with the    will continue to provide this service  anywhere in the state for groups of 25 or    MorphoTrust has provided more than 150 demand for onsite services in West Virginia  mobile sessions in West Virginia since 2011  and other states  we are initially planning to  have three mobile fingerprinting units  throughout the state to support this effort  although additional resources can be  added if the demand for mobile services supports an expansion  MorphoTrust    typically requests that such se
357. passwords removed  and have secure  strong passwords to systems     Owner of system secure data  Reviewer and final authority for granting access rules  Customer    to custodians and delegates     4  Data Custodians    Example of Data Custodians are Director of Manufacutring  Tier 3 Lead Aministration and Chief  Security Officer     Data Trustees       5  Auditing  amp  Certification    MorphoTrust USA is certified to the American National Standards Institute   s North American  Security Products Organization standard ANSI NASPO SA 2008 as Security Class 1  NASPO  audits MorphoTrust USA yearly for compliance to the ANSI standard so that we can maintain  Security Class 11 Certification  MorphoTrust USA is active in the development of the new  International Standards Organization  ISO  s Security Standard 16215     All secure data rules must comply with these standards to achieve successful audit results and  maintain certifications     6  Compliance    Violations of this policy will result in appropriate disciplinary measures in accordance with policy   state and federal laws  All staff are encouraged to protect customer data and the companies  liability by reporting known problems with securing data  and are encouraged to seek continuous  technology improves in protecting database integrity     T  References    Please refer to the other Security Policies and Procedures for more details      Security Governance Policy PRC 00173    01 31 2012 Confidential 6 of 7    EXEMPT INFOR
358. phoTrust USA emails are scanned prior to delivery into the local mailbox by a third party  anti   virus anti spam hosted application  This automatic scanning does not apply to personal web mail from  outside entities such as Hotmail or Yahoo  This practice helps defend against new virus attacks that do  not yet have a definition created  If a user is unsure of whether or not an email attachment might be  infected  they must contact the IT Support Team  and do not forward the email itself as this could cause a  spreading of virus   Please reference the MorphoTrust USA Electronic Communications Plan PLN 00090   A for more details regarding the use of email     Principles    e Use of the email system constitutes consent to abide by all elements of this policy    e Employees must not open email attachments or click on links in emails unless they are from an  expected and trusted source    e Any electronic mail address or account assigned by MorphoTrust USA is the property of the  company and under management control of the CIO    e Email messages are the equivalent of letters sent on official letterhead  and must therefore be  written in a professional and courteous tone  If an email signature is being utilized  it must adhere  to the policies set forth by the MorphoTrust USA Marketing Department    e  MorphoTrust USA email is public communication and therefore  senders and receivers of email  can have no expectation of privacy and are subject to company inspection and legal disc
359. place that meets all RFP requirements        SAFRAN Vendor Response Sheet ao    MorphorTrust USA  Attachment A     otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    90    Collecting and Housing Fingerprint Submissions in UEP    In our UEP solution  MorphoTrust maintains an electronic record of every  service provided  This record may be used to track the status of an enrollment  that has started but not yet been fulfilled  It also serves as a record of past  services provided     For each record  MorphoTrust maintains  for the duration of the data retention  period  all transaction details including     e The complete demographic data of the applicant    The fingerprints of the applicant    e The date of their enrollment  the date the record was transmitted to       State  and the date the results were received      The location where they enrolled  e The identity of the Enrollment Agent who captured their fingerprints    e The service for which the applicant was printed  which includes       Reason for Print  agency  price and other configurable fields       The type of identity document provided by the applicant including the  document number  issuance date  and expiration date    e  Theapplicant s signature      The method of payment and the amount paid by the applicant    Archive Retention Plan    By default  UEP retains all applicant data and submission informatio
360. pliance with the FBI s Next Generation  Identification  NGI  initiatives and IAFIS Image  Quality Specifications  IOS   The review of the test  data was conducted by the FBI Criminal Justice  Information Services Division  Biometric Services  Section  as part of Biometric Center of Excellence   The Livescan system fully supports the EBTS  standard     Please see Appendix E for our FBI letters stating  that the TP 4100 is FBI Appendix F certified for  type 14 prints at 500 dpi and the TP 5300 is FBI  Appendix F certified for type 14 prints at 500 and  1000 dpi        Figure 32  TP 5300 Livescan System    The TP 4100 device captures prints at a resolution  500 dpi and is the standard device used on the Universal Enrollment Platform          VendrRespnseShet      SAFRAN  72 SAFRAN   Attachment A  2 MorphoTrust USA    otate of West Virginia CRFP DPS1500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    The TP 5300 device captures prints at 1000 dpi and is offered for compliance  with the 1000 dpi requirements of the            MorphoTrust will comply with the 1000 dpi requirement  either through use of  the current TP 5100 system or the proposed TP 5300 system  However  we  encourage WVSP to consider the TP 4100 device and accept 500 dpi fingerprints  as new  cutting edge fingerprint scanners are often first available in 500 dpi  resolution  MorphoTrust is actively evaluating new fingerprint capture devices  t
361. priate care  must be taken to ensure that no unauthorized person can access data by ordinary means   Electronic media such as floppy disks  rewritable CD ROMS  zip disks  videotapes  and  audiotapes should be reformatted if the media type allows it or erased if formatting is not  possible     Disposal of electronic media outside of MorphoTrust USA     All electronic media other than computer hard drives must be rendered unusable before leaving  MorphoTrust USA  Hard drives must be disposed of according to the policy governing them above     If the contents of a drive have been wiped using software  or the drive has been degaussed  a certified  commercial disposal system such as  Shred it  can be used for complete mechanical destruction of the  drive  However  a drive which still contains sensitive data on it must be degaussed first before a  commercial disposal system can be used     9  Auditing and Certification    MorphoTrust USA is certified to the American National Standards Institute s North American Security  Products Organization standard ANSI NASPO SA 2008 as Security Class    amp  1  NASPO audits  MorphoTrust USA yearly for compliance to the ANSI standard to maintain Security Class    amp  Il  Certification  MorphoTrust USA is active in the development of the new International Standards  Organization  ISO  s Management of Security Printing Processes Standard 14298     All secure data rules must comply with these standards to achieve successful audit results and maint
362. provides information about payment collection  refunds  issued  and fund remittance  Key financial reports include        Payments   shows details  date  amount  program  location  payment  method  etc   of payments collected during the time period specified by  the user       Refunds   shows details  including reason  for all refunds processed  within the time period specified by the user    Incident Support Reporting    Incident Support Reporting provides information about support tickets opened   by purpose or by agency  as well as average incident resolution time  Key  support reports include        Daily Status   shows several Key Performance Indicators  KPIs  used to  ensure overall health of the solution and the quality of service being  provided  KPIs include support issues by program  fingerprint rejection  rates  appointment availability  etc        Ticketing Statistics   shows a count of tickets by program as well as  average resolution times and the support inquiry purposes     Report Examples    Figure 22 through Figure 28 show screen captures of Monthly   Annual  Summary  Monthly  Annual Detail  and Fee Collection  Billing Reconciliation  reports  The screen captures include       SAFRAN Vendor Response Sheet            MorphoTrust USA  Attachment A     otate of West Virginia CRFP     51500000010    Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police       Sample reports from the current solution  Figure
363. puter and System Use Policy PRC 001 10 A 10    The following rules apply to the issuance and use of passwords     Note     Passwords are confidential information  Password security is enhanced when user passwords are  confidential among users and unknown to system administrators    Credentials cannot be exchanged between users    Users should not leave password information in the work area  e g  sticky notes  etc     System administrators must force the user to change the initial password immediately after the  initial user logon session    If an employee or third party is careless with password information  password changes should be  forced immediately    System administrators are responsible for monitoring  tracking  and following up on unsuccessful  logon attempts    System administrators are responsible for configuring the operating system environment  according to the password rules in this policy and are to provide training to users for password  changes and security  Such rules include     Password history enforced at 5 passwords   Maximum password age  60 days   Passwords are not stored using reversible encryption   The account lockout threshold is set to five  5  invalid logon attempts   The account lockout duration is set to 30 minutes  after which the account lockout  counter is reset   o 15          time out for windows screen lock    O O OOO    Super user passwords will be generated and provided to System Administrators upon approval  from the Director of IT Inf
364. r changes to any system or device managed by the IT organization such as  network  system hardware  storage  operating systems  databases  applications or  telecommunications equipment and software  shall adhere to the change management policy and  follow the change management procedures    Any changes to the power or environment affecting the data center must be communicated by  facilities personnel to the Head of IT  CIO  or their representative  No changes may occur until  the IT Infrastructure change management procedures are followed    All non emergency changes to occur within the IT environment must be documented  discussed   and pre approved by the CCB    The head of Infrastructure Services chairs the Change Control Board meeting and is accountable  for management of the meeting  S he acts as the  Enterprise Change Manager     Users who could possibly be affected by a system outage during maintenance shall be  proactively notified whenever possible    The CCB serves in an advisory role  The final decision for approval of change resides with the  Head of Infrastructure Services    All non emergency changes must be submitted to the IT Change Control system in advance of  review and follow the IT Change Control policy procedure    Emergency Change Control Requests  CCRs  result from a major security breach  a significant  outage impacting the business  or an outage impacting a significant number of employees  e g  a  site   and necessitate urgent action  Emergency CCRs r
365. r is  temporarily unavailable     At a high level  the roles and responsibilities of MorphoTrust are given in      PRC 00174 A  nformation Security  Customer Data Access and Security Policy    For internal MorphoTrust systems in the Admin Network and Engineering Network  the Chief  Information Officer  CIO  is responsible for making sure they are compliant with the CSP  For  the Factory Network and the CSN  the Tier 3 Support Administrator or the CIO is responsible  for its systems  The Services Manager or the CIO is responsible for the Services Network  In  the Customer Network  the responsibility for the systems may be some combination of the  customer and the MorphoTrust Program Manager  Product Manager  or Service Manager     For deploying systems into a customer s environment  the Program Manager  Product  Manager  or Service Manager  collectively  the  Responsible Manager   that is assigned to the  customer s contract or program is responsible for ensuring that a system to be deployed will be  compliant with this CSP  A Systems Engineer or a Product Designer is responsible for  ensuring the system design and architecture will be secure and compliant with this CSP  A  Development Engineer  a Quality Assurance Engineer  and a Delivery IT Engineer should  ensure that the software and systems they create  test  and configure will be secure and  compliant with this CSP  especially when deployed or installed into a customer s environment  A  Configuration Engineer should main
366. rams requiring applicant  fingerprint services  These robust self service reporting capabilities allow  authorized state personnel to access reports as needed to understand their  applicant activity     The solution provides significant reporting flexibility  including     Multiple report formats  including XML  CSV  PDF  and XLS  e Ability to specify the desired reporting date range  e Ability to specify the agency s  included in the report    Our standard reports include Operational Reports  Financial Reports  and  Incident Support Reports  Details for each type of report follow     Vendor Response Sheet  amp  SAFRAN   Attachment A   gt  MorphoTrust USA    otate of West Virginia CRFP DPS1500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    Operational Reporting    Operational Reporting includes applicant volume statistics by agency as well as  by location  Figure 24   with many operational reports available  Key operational  reports include        Services By Location   shows the number of applicants processed by  program as well as by location during the time period specified by the  user    e Submissions   shows average time between print capture and submission  to FBI as well as statistics on PBI fingerprint quality rejections by program    e Appointment Availability   shows  by location  the appointments  available and the appointments already scheduled    Financial Reporting    Financial Reporting 
367. rastructure  See the Passwords section for more information     Workstation Laptop administrator logon is created during the operating system install  A  password is specified by the system administrator during setup  The password does not expire so  that multiple system administrators may service the system  All local system passwords should  be the same and should conform to the guidelines noted above     Application administrators may have system administrator security access so that they  may install software and restart the server  Application administrators may not join a  server to the corporate domain  They must contact a domain administrator to do so     4  Dual Access and Biometric Access Controls    Certain computers containing secure material and processes may require the use of two or more  passwords  each known by a separate individual  and or fingerprint scans to access     The facilities manager and or the Chief Security Officer  in cooperation with the CIO  shall identify which  systems require such access     10 23 2014 MorphoTrust USA Confidential 4    EXEMPT INFORMATION    Computer and System Use Policy PRC 001 10 A 10    5  Virus Protection    This section describes the virus protection efforts the Company employs to prevent network virus  outbreaks and network security attacks involving computers associated with the Company  The following  rules apply     e All files downloaded to the MorphoTrust USA network potentially harbor computer viruses  Trojan  h
368. ration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police       26    Our knowledgeable and experienced Customer Service  Representatives will assist West Virginia applicants by answering  questions  scheduling appointments  processing payments  and more than 150 CSRs  including  providing directions to Enrollment Centers     The CSC offers an uninterrupted  proven single point of contact to speak with  Customer Service Representative  CSR  to register  schedule an appointment   process payment  and ask questions about the process  Our knowledgeable   experienced  and multi lingual staff is available Monday through Friday  7 00  A M    4 00 P M  Central  Standard Time  9 00 A M  to  5 00 P M  West Virginia local  time   If an Applicant calls  outside of the business hours   a recorded message directs  them to our secure Pre   Enrollment Website where    Figure 3  MorphoTrust Customer Service Call Center they can register 24  7  365     The CSC currently employs    a team of CSRs who are  dedicated to the needs of West  Virginia Applicants  In addition to the CSRs who are dedicated to this project  all  CSRs are cross trained so that they can be utilized during peak periods  if  needed     We have provided additional detail about our Customer Service Center in our  response to requirement 4 5 1  a      4 4 2 2 The Vendor should describe in detail their plan to provide web scheduling to the  Applicant and Agencies  Included in the plan should be t
369. rced environment to ensure the  security and availability of MorphoTrust s information and application     10 9 2013 MorphoTrust USA Confidential and Proprietary Page 14 of 37    EXEMPT INFORMATION    Cyber Security Plan PLN 00091 A 02    All connections to the MorphoTrust network must be authorized by the Responsible Manager   Connections to the Admin and Engineering Networks also require        approval  Connections to  the CSN require the approval of the ClO and the Tier 3 Support Administrator  Additions or  changes to network configurations must be reviewed and approved through the MorphoTrust  Change Control Board according to the policy       PRC 00085 B  7 Change Management Policy  amp  Procedure    Reasonable computer use on the MorphoTrust network is governed by   e PRC 00110 A  7 Computer and System Use Policy  e PRC 00086 B Computers on the Network    Similarly  MorphoTrust has a policy on cell phones and mobile devices such as tablets to protect  access to the network      PRC 00237 A Cell Phone and Mobile Devices Use Policy    MorphoTrust has a policy for remote access to its network       PRC 00092 B  T Remote Access Policy    4 10 2 Vulnerability Scanning    MorphoTrust systems that are accessible from outside the network must be periodically scanned  on a regular basis for vulnerabilities and weaknesses  Additional scans should be performed  when the systems have been updated in some manner  either with application changes or OS  configuration changes  For bo
370. rd is a group of Information Systems   Quality  and Business area representatives and  in certain cases   external Service providers that have expertise or an otherwise       Change Control Request   CCR  Form    Change Management    Change Type    Configuration       Configuration Manager    Configuration  Management Database  CMDB    Enterprise Change  Manager  ECM     Infrastructure Service    10 23 2014    vested interest in the change request under consideration     The form that identifies and initiates the Change process  filled out  by the Initiator     The process by which service additions  modifications  or removals  are requested  evaluated  approved  implemented  and reviewed   The change may be to the service itself or any supporting service or  component of the service     A repeatable way of dealing with a particular Category of Change  A  Change Type defines pre defined steps that will be followed for a  Change of this Category  Change Types may be very simple  with no  requirement for approval  e g  Password Reset  or may be very  complex with many steps that require management approval  e g   major software Release         A generic term  used to describe a group of Configuration Items        that work together to deliver an IT Service  or a recognizable part of  an IT Service  Configuration is also used to describe the parameter   settings for one or more Cls     Role responsible for providing oversight for the Configuration  management process  Assures pr
371. reaking into the company s or another organizations email system or unauthorized use  of a password mailbox     Broadcasting unsolicited personal views on social  political  religious or other non   business related matters    Transmitting unsolicited commercial or advertising material  Undertaking deliberate activities that waste staff effort or networked resources    Introducing any form of computer virus or malware into the corporate network    02 14 2012 MorphoTrust USA Confidential Page 4 of 5    EXEMPT INFORMATION    Electronic Communication Policy PRC 001 13 A 02    3 2M  onitoring    In order to ensure compliance with this policy  the company reserves the right to use monitoring  software in order to check upon the use and content of emails     3 3 Sanction s    Failure to comply with these guidelines will result in sanctions ranging from disciplinary  procedures such as verbal and written warnings  through to dismissal     02 14 2012 MorphoTrust USA Confidential Page 5 of 5  EXEMPT INFORMATION    IT Disaster Recovery Policy PRC 00095 B 02    IT DISASTER RECOVERY POLICY    Document Number  PRC 00095 B    Revision Level  02    Approval    Robert Stack Robert Eckel    Chief Information Officer President       This document contains confidential and proprietary information of MorphoTrust USA  No part of this  document may be reproduced  disclosed  distributed  or used in any form by any means   graphic   electronic  or mechanical  including photocopying  recording  tapin
372. required to  obtain fingerprint based background checks  such as Board of Nursing   Board of Pharmacy  Department of Insurance  Department of Family and  Protective Services  Real Estate Commission  and Board of Education   Description of Technical Upgrade from legacy technology to Universal Enrollment Platform  UEP   Solution MorphorTrust Live Scan system  MorphoTrust Store and Forward Server  Secure connection to State AFIS  Cisco Virtual Private Network encryption of data transfer circuits  Proprietary registration  back end and billing software  Customized agency system integration and data sharing protocols  Photo capture system  Card scan system       List of Fingerprinting Centers Included in Appendix C   with hours of operation     Letter of Recommendation Included in Appendix D       00                                         SAFRAN    SAFRAN   Attachment A  2 MorphoTrust USA    otate of West Virginia CRFP DPS1500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    Table 4  Tennessee Bureau of Investigation    Company Tennessee Bureau of Investigations  Company Address and 901 R S  Gass Blvd   Telephone Number Nashville  TN 37216   615 744 4000    Contact Person Brad Truitt    Assistant Director for Information Services  901 R S  Gass Blvd    Nashville  TN 37216   615 744 4008    brad truitt tn gov    Annual Fingerprint Volume 225 000    Description of Services    MorphoTrust provides a full service
373. ress filtering  is strongly encouraged to limit the allowed wireless devices to those in your home         Ifyou purchase your own home networking devices like routers or wireless access points   itis your responsibility to secure those devices  The default passwords that come with  home networking devices must be changed and cannot be empty  Please see the  T  Information Security PRC 00089 B policy for more information on passwords  The  complexity of the passwords should follow PRC 00089 B but they do not need to be  changed periodically  unless there is suspicion that it might have been compromised or  told to unauthorized persons     4 Remote Control Access  Hemote control access is only allowed with MorphoTrust named personnel  Exceptions to this    rule can be granted for trusted third party vendors  such as Cisco   under MorphoTrust USA IT  supervision for diagnostic purposes     5 31 2013 MorphoTrust USA Confidential Page 3 of 6  EXEMPT INFORMATION    IT Remote Access Policy PRC 00092 B 09    5 General Access Guidelines    Anyone who is not in one of the groups mentioned in the previous paragraph should only access  the external website  Webmail  for example      While wired access  1      via your laptop  is the preferred method of access to email and other  MorphoTrust USA systems  the use of mobile devices such as smart phones and iPads is  allowed so long as they conform to the Company s Cell Phone and Mobile Device Use Policy   PRC 00237 A      It is each employ
374. revious  vendor went well and they never missed a beat    can recommend them without  hesitation and know that West Virginia will enjoy the same professional service  that the citizens of Tennessee have received over the last four years     Respectfully     Edward B Jones  Deputy Director    EBJ kml       INTERNATIONALLY ACCREDITED SINCE 1994    The Commonwealth of Massachusetts  Executive Office of Public Safety and Security  One Ashburton Place  Room 2133    Boston  Massachusetts 02108  Tel   617  727 7775  TTY Tel   617  727 6618       Fax   617  727 4764  DANIEL BENNETT  CHARLES D  BAKER www mass gov eops Secretary    Governor    KARYN E  POLITO  Lt  Governor    April 21  2015    Tara Lyle   Department of Administration  Purchasing Division  2019 Washington Street East   Charleston  WV 25305 0130    Dear Ms  Lyle     The Executive Office of Public Safety and Security  EOPSS  has been asked to provide a reference letter for  MorphoTrust USA  LLC  MorphoTrust  which provides non criminal justice applicant fingerprint services for  the Statewide Applicant Fingerprint Identification Service  SAFIS  program in the Commonwealth of  Massachusetts     MorphoTrust was the successful bidder and was awarded a one year contract with EOPSS in 2013 with the  option to renew through a competitive bid process  MorphoTrust provides the following services in support of  the SAFIS program     e Appointment scheduling by phone and secure online registration website    e Enrollment centers th
375. ricing and other financial information   technology and product roadmaps  and customer lists and references  Subject to  applicable law  such proprietary or confidential information may not be disclosed   pursuant to freedom of information legislation or otherwise   reproduced in whole or in  part  or used for any purpose other than the recipients evaluation of this proposal   without the prior written consent of an executive officer or the General Counsel of  MorphoTrust USA  LLC     We understand that the Grand Total Contract Price is subject to Public Information  release  However  we deem all computation and supporting price information as  CONFIDENTIAL and not subject to Public Information release     EXEMPT INFORMATION    MorphoTrust considers all information in this volume to be exempt from  public disclosure  The documents contained in this volume contain highly  sensitive security information as are not to be considered as public documents  or disclosed to the public  Therefore  MorphoTrust has segregated this  information from the rest of our proposal     We base our claim for exemption on the following article from the West Virginia  Code Chapter 29B  Freedom of Information Act     ARTICLE 1  PUBLIC RECORDS  829B 1 4  Exemptions     a  The following categories of information are specifically  exempt from disclosure under the provisions of this article      14  Security or disaster recovery plans  risk assessments   tests or the results of those tests     AU m      
376. rietary information of MorphoTrust USA  No part of this  document may be reproduced  disclosed  distributed  or used in any form by any means   graphic     electronic  or mechanical  including photocopying  recording  taping  or information storage or retrieval      without written permission of MorphoTrust USA     10 23 2014 MorphoTrust USA Confidential 1  EXEMPT INFORMATION    IT Network Access Controls Procedures        00091    02    Table of Contents    O O e E 3       PSNT AOO AC Ce EET 3  Auc e E A E E E A EEEE 3  A  CONNECTING o the NetWOEIK     ornare ertt rs innn Upisi Laikai               4  Os AGa O      E           4  10 23 2014 MorphoTrust USA Confidential 2    EXEMPT INFORMATION    IT Network Access Controls Procedures        00091    02    1  Introduction    This document defines the controls governing access to the MorphoTrust USA  the Company   IT  network  both physical and electronic  Access is dealt with on three fronts    e Physical access to Server Rooms   e Firewall protection   e Connecting devices  The IT Network is a vital infrastructure component of the Company and is housed within dedicated Server  Hooms  Access to these rooms and the servers and computers held within it is restricted to those  individuals that have a need to work with this equipment     The IT network  servers  and computers are further protected from unauthorized usage  client generated  faults  bandwidth abuse  and virus intrusion by the Company Firewalls     Only authorized de
377. rinting Services  Purchasing Division West Virginia State Police    from the authentication event will be embedded into the applicant record so the  verification event details will persist for the life of the transaction     Manual Fingerprint Process    In the current solution as well as the proposed UEP solution  MorphoTrust offers  a universal    Print and Go    capability that allows any applicant to have a  physical FD 258 hard card produced from their fingerprints that were collected  electronically on our Livescan systems  All applicant data and fingerprints are  captured using the same software interfaces used for records that are submitted  electronically  However  a FD 258 hard card  Figure 34  is produced instead of  the electronic record  for the applicant to take with them from the Enrollment  Center     Card Details Louisiana   Concealed Handgun License EJ    Define Fields To Be Printed    LEAVE BLANK TYPE OR PRINT ALL INFORMATION IN BLACK LEAVE BLANK  NAM Fin ST NAME MIDOLE    APPLICANT mem         FD 258  REV  12 1007     SIGNATURE OF PERSON FINGERPRINTED    RESIDENCE OF PERSON FINGERPRINTES    CITIZENSHIP CTZ SFX MGT WGT HA R PLACE OF BIRTH POB  y SIGNATURE OF OFFICIAL TAKING FINGERPRINTS  YOURNO  OCA  LEAVE BLANK  FMPLOYER AND ADORESS    CLASS    ARMED FORCESNO  MNU   YNO  SOC  MNU    MISCELLANEOUS NO    REASON FINGERPRINTED      Back     identity Biographics Fingerprints Signature          Figure 34  FD 258 Fingerprint Hard Card    The hard card is printed 
378. rity incidents are reported to the  Officer  CSO  CSO  Definition of training curriculum for data custodians  trustee and users        01 31 2012 Confidential 5of7    EXEMPT INFORMATION    Information Security  Customer Data Access and Security Policy PRC 00174 A 07    Chief Responsible for maintaining the performance of MorphoTrust USA information  Information technology computing resource hardware  amp  software  and the MorphoTrust USA  Officer  CIO  network infrastructure     Manage non public information resources  ensure that access to data is granted only  Data as needed for legitimate purposes and within the terms articulated in this policy   Custodians ensure that training and awareness of the terms of this policy are provided  monitor  compliance with this policy     Data trustees classify data in their functional areas  develop and maintain clear and  consistent procedures for access to MorphoTrust USA administrative data  grant    and revoke access  maintain an audit trail  i e   lists showing those granted access to  administrative data  periodically review access privileges to ensure that access is still  warranted  remove access in a timely manner for employees whose job  responsibilities have changed  promote the security of the data in their subject areas   Ensure databases are only installed on systems that are encrypted  in firewalled  networks  on systems with current operating system security patches  on systems  with virus protection  have default admin 
379. rize  The President  any Vice President  Secretary  any Assistant Secretary  or the Treasurer may appoint  Attorneys in Fact or Agents who shall have authority to issue bonds  policies or undertakings in the name of the Company  The corporate  seal is not necessary for the validity of any bonds  policies  undertakings  Powers of Attorney or other obligations of the corporation  The  signature of any such officer and the corporate seal may be printed by facsimile      IN WITNESS WHEREOF       RLI Insurance Company has caused these presents to be executed by its  Vice President     with its  corporate seal affixed     13th 4 day of  February      2015               RLI Insurance Company  Se              3 3                      oom mag               SEAL  P       t   Vice President        pM    State of Illinois   ATE  SS  County of Peoria  CERTIFICATE   On this  3th day of _ February    2015                 me  a Notary Public  1  the undersigned officer of RLI Insurance Company  a stock  personally appeared   who being by me duly sworn  corporation of the State of Illinois  do hereby certify that the attached  acknowledged that he signed the above Power of Attorney as the aforesaid Power of Attorney is in full force and effect and is irrevocable  and  officer of the RLI Insurance Company and acknowledged said instrument to furthermore  that the Resolution of the Company as set forth in the    be the voluntary act and deed of said corporation  Power of Attorney  is now in forc
380. rk must not be run in promiscuous  mode  except by special arrangement with IT     Equipment attached to the network may be monitored for security and  network management purposes  and to verify its continued presence on  the network     Any computer that has been on an outside network must first be brought  to IT in order to allow for a complete virus Spyware scan prior to re     admittance of the computer back onto the MorphoTrust USA network     8 22 2011 MorphoTrust USA Confidential             of 3    EXEMPT INFORMATION    Computer and System Use Policy PRC 001 10 A 10    IT Computer and System Use Policy    Document Number  PRC 00110 A    Revision Level  10    Approval    John May Robert Eckel  Chief Information Officer President       This document contains confidential and proprietary information of MorphoTrust USA  No part of this  document may be reproduced  disclosed  distributed  or used in any form by any means     graphic   electronic  or mechanical  including photocopying  recording  taping  or information storage or retrieval      without written permission of MorphoTrust USA     10 23 2014 MorphoTrust USA Confidential 1  EXEMPT INFORMATION    Computer and System Use Policy PRC 001 10 A 10    Table of Contents    IEEE celle p                      3   E  Duelo ciis             3  D                                            eU etum E ERU ME 3  4  Dual Access and Biometric Access Controls             ccccceeccccsescceceeeeceeceeeceeceeeceeseesecesseaeceeseaeeees
381. rnal IT Hardware Procurement team 0     MorphorTrust Internal IT Registration System 096  WorkStation Development Team   MorphorTrust Internal IT Registration System Reporting 096  Development Team    Call Center Team 096   Training Team 090   Finance Team 096   Field Service Engineering and Deployment Team 096  Communications to Agencies  Status  Schedule  4496  Dependencies   Review Communication Plan with the Agencies 096    Prepare Notice and Information Packet for Agencies 0   Send Notice and Information Packet to State Agencies 096  Operational Toll Free number and Public Internet 100   Website within 30 days of award   Operational Toll Free number  Call Center Services  50   and Public Internet Website within appointment   scheduling capabilty within 60 days of award    27 All Current Enrollment Centers will remain operational 0   by July 31  2015   8 Facility Location Selection 0     Identify Confirm Site Locations  Address  and Point of 0   Contact for each site  Review of Current Active Enrollment Centers 0   Additional sites  Present Expansion of Site List to Meet 0   Requirements    w               NO N                       NIN  P  RP  PB m LA Pl RiP m LA   Gail ee a          tO                                Oo      Bl  wl     LA       Task     M    M       Project  West Virginia Applicant      Split    Date  Mon 5 11 15    Milestone                          Summary    WVSP   MorphoTrust  MorphoTrust   WVSP  WVSP MorphorTrust  PM Engineering       Departments   
382. rol 1111113 5155149    2 SAMPLECO    2 26 2015 5 50 00 CouponPayment Workstation Sutton 1307 Wes USN248YDR     2 26 2015 WV          11111136458117264 SAMPLE       6 2 26 2018 5 50 00 CouponPayment Workstation Charieson 9088      UIFF4B8YNOY 2 26 2015          11111136455163  2   SAMPLECO  7 2 26 2018 5 30 00 CouponPayment Workstation Huntington 8289 Cooper U2RRABYVTB     2 26 2015        1111113641551765 78 SAMPLECO  5 2 26 2015 5 30 00 CouponPayment Workstation Sutton 1307  Spews U2T3482135 2 26 2015         1111113 635517N N27 SAMPLECO  Figure 21  Invoicing Activity Report  At no additional cost  MorphoTrust offers a billing account administration portal  that allows billing account managers to establish accounts  distribute  authorization codes via email  verify redemption status  and run reports for the  purpose of reconciliation         amp  SAFRAN Vendor Response Sheet        MorphoTrust USA  Attachment     a    otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    66    4 4 5 2 The Vendor should describe in detail their plan on providing and developing standard and    ad hoc reports for use in reconciliation and other program objectives  The plan should  detail how the state and user agencies will access the reports  The Vendor will discuss  the server for this database and provide screen shot of these reports     Monthly  Annual Summary  Monthly  Annual Detail    
383. roposal       SAFRAN Appendix F      MorphoTrust USA Optional Features    otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    Alternatively  individual enhancements as described in A   F below may be  purchased on a case by case basis for the additional fees listed in our Cost  Proposal     A  Administrative Support and Reporting Portal   Our Call Center has a 360  applicant centric view that delivers important data  that leads to better system monitoring and increased customer satisfaction  Our  administrative portal is built specially for the enrollment industry  It combines  details such as applicant status  applicant notifications  appointments   biographics  and ticketing into one system accessible by MorphoTrust clients     With access to this portal  the State Police and User Agencies can stay connected  with the entire process  This portal includes        Detailed transaction history and status for a real time view of the process       Ticketing for managing applicant support inquiries  Figure 47  across  multiple teams       Images of biometrics captured  photos  fingerprints  identity documents   for research and forensics purposes       Management and statistical reports for operational and quality oversight    LLL TICKETING    Search                  DOB  Miu  utut ramat    DPS  RSD nragan  Us            CS nagan    Ticket  OVE MKT Noo 10    Creare         DP
384. roughout the Commonwealth equipped with enrollment workstations and staffed  with enrollment agents    e Card scan processing for out of state applicants    e Electronic connection to our state AFIS managed by the Massachusetts State Police  and   e Fee collection and remittance     In addition  EOPSS is currently working with MorphoTrust on the development and implementation of a web  based results system     EOPSS awarded our SAFIS contract to MorphoTrust with a short implementation timeline  In addition  the  Commonwealth of Massachusetts did not have an existing statewide non criminal justice fingerprint  background check program  MorphoTrust worked in partnership with EOPSS to stand up the statewide network  within agreed upon implementation timelines  EOPSS has been pleased with the services provided by    MorphoTrust and renewed their contract in September 2014 for an additional three years  MorphoTrust  continues to work with EOPSS on adding new user groups to the SAFIS program     I recommend MorphoTrust to the Department of Administration  Purchasing Division to provide non criminal  applicant fingerprint services within the State of West Virginia     If you have any questions  please feel free to contact me at your convenience by phone at 617 274 5512 or by    email at curtis  wood state ma us    sincerely     Td    Curtis M  Wood  Undersecretary for Forensic Science  amp  Technology  Secretariat Chief Information Officer    Appendix E         Certification    Per 
385. rphoTrust USA employees must not use their own biometrics  face  finger  iris  etc   and or signature to  mix and match with real demographics to create DL ID cards at test time or at any time  Employees  belonging to groups involved in card design  software development  testing  training and documentation   as well as Tier 3  must be especially vigilant during development  testing  UAT  training  and support to      ensure this policy is enforced     Please refer to the Secure Materials Disposal Procedure  PRC 00143 A  and the Secure Document  i Destruction Procedure  PRC 11336 A  for more information on the proper disposal of test materials     3 4 Obligation to Report Mishandling or Misuse of Privacy Information    If any MorphoTrust USA personnel become aware of any instance where there has been mishandling or  misuse of Privacy Information  or where there has been access to      use of the data for any purpose  other than performing the work that is necessary to deliver the product or service for which our customers    has contracted  that employee has an ethical responsibility to report such violations of this Privacy Policy    to the Chief Security Officer     10 08 2014 MorphoTrust USA Confidential 4    EXEMPT INFORMATION    https   secure compli com Content Instance ContentInstanceViewer aspx ContentId 3984    4 17 2015    Compli  Print   MorphoTrust   Privacy Policy Page 5 of 6    EA EETA PAPA EOROLECDONEUTON RUE TUTTO ROUTSOT OEC TE        TES POTERO    Privacy    
386. rphotTrust USA    otate of West Virginia CRFP DPS1500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police      Providing a single point of disposition processing from the user desktop   to efficiently process the remaining transactions for automated  disposition and reporting to User Agencies    Our fingerprint processing solution automates and streamlines the processing of  state and FBI criminal record results  Any record reporting    no record    or    all  clear  results from all data sources can be processed with no human  intervention  Results for all other records are consolidated into a combined result  record  allowing for more efficient processing by the authorized reviewing entity     Result Notification  Our result processing solution can provide the following additional functions       Send email notification of transaction completion to employing or  licensing agencies    e Allow for review and processing of transactions that may require or  allow adjudication by the authorized entity    e Provide for secure web access to applicant transaction status and data by  authorized entities    Notification types include       Applicant    Agency Notifications   result letters bearing the WVSP  letterhead are automatically generated for all approved applicants and  printed out for mailing  All result letters contain only the appropriate  results as necessary and permissible by State and       rules  Upon  
387. rprint and  photo capture stations throughout Texas in a pattern of sites within a 50 mile radius for 98  of the population  The vendor was also  required to provide phone and Internet appointment scheduling  fee collection through our State Comptroller   s ePay system and  customizations to integrate other State Agency customers into the program     With a state as geographically large and diverse as Texas  a primary concern was that our vendor be able to quickly establish their  network of offices to cover our population  MorphoTrust USA established the initial roster of locations within an acceptable time  frame and then continued to add additional services throughout the state  Our target of 80 locations in Texas has been expanded to  include additional public sites as well as devices that are for the use of a specific agency  The total number of locations has risen to  over 120 and so our customers are receiving quick access to services     In addition to the services MorphoTrust USA provides as required by our contract  they were instrumental in creating a program to  support adherence to Senate Bill SB 9  which required the fingerprinting of over 400 000 Texas educators  MorphoTrust USA  proposed a solution whereupon they would visit all 1 200 Independent School Districts within the timeframe required by the SB 9   This was truly a monumental task and was completed on schedule     MorphoTrust USA has proved to be a dependable partner in our program and have worked with
388. rs Vary  ALLEN 612 EAST BETHANY DRIVE M   F 8 30   4  Alpine 704 W Sul Ross Ave Tue 8 30   3 30  Amarillo 3501 5 Georgia St  Ste A Mon   Fri 8 00   5 00  AMARILLO 1616 KENTUCKY  SUITE C 305 HOURS VARY  Argyle 306 U S  377 North  Suite G 1 M THUR 9   Fri 9 30    4 30 SAT  10   4  Arlington 1601 E Lamar  Ste 118 A Mon   Fri 8 30   4 30  AUSTIN 1033 La Posada Drive Suite 360 Mon   Fri 8 20 4 30  AUSTIN 1701 DIRECTOR BLVD  SUITE 350 HOURS VARY  Austin 108 Denson Dr Mon   Fri 8 00   5 00  AUSTIN 1111 WEST 6TH STREET  BUILDING D  STE 130 HOURS VARY  Austin 1515 S Capital of Texas Hwy  Ste 114 Mon   Fri 8 20   4 30  AUSTIN 505 HUNTLAND EAST DR SUITE 330 HOURS VARY  Bay City 2113 Ave G  Ste A Mon   Fri 8 00   5 00  Baytown 4804 East Freeway Mon   Sat Hours Vary  Beaumont 3480 Fannin St  Ste F Mon   Fri 8 00   4 30  Beeville 1402 East Houston Street Pending  BELLAIRE 6800 WEST LOOP SOUTH  SUITE 405 HOURS VARY  Big Spring 1111 S Scurry St Mon   Fri 9 00   5 00  Brady 2200 S Bridge St Mon 11 30   3 30    BROWNSVILLE  BROWNSVILLE    7470 PADRE ISLAND HWY  SUITE 170  2477 East Price Road    Mon Fri 9 00 5 00  M F10 3    Brownwood 3003 Hwy 377 S Mon 9 20  4 30  Tue   Thu  9 20   5 00   Bryan 3131 E 29th St  Bldg F  Ste 105 Mon   Fri 8 20   4 30   Burleson 300 Boone Road  Suite A1 M   Th 9 00 4 30  Fri 9 00   3 30   CANYON  TX 3301 N 23RD STREET   Carrollton 1016 E Hebron Pkwy  Ste 175 Mon   Fri 9 00   3 00   Childress 3001 Ave F NW Tue 10 00   5 00   College Station 1055 Texas Avenue 5  Su
389. rust  relationships such as with one way and two way trusted domains must be included  In the  absence of guidance or requirements from either MorphoTrust or customer environments  the  structure of security groups should be as simple as possible to keep it maintainable and to  prevent security errors from being introduced  for example  by complex nesting  which could give  users more privileges than they should have     10 9 2013 MorphoTrust USA Confidential and Proprietary Page 20 of 37    EXEMPT INFORMATION    Cyber Security Plan PLN 00091 A 02    4 12 6 Network Access Control    Access to any internal MorphoTrust network must require all authorized users to authenticate  themselves through the use of an individually assigned user ID and one or more authentication  mechanisms  e g   password  token  smart card  etc  Network controls must be developed and  implemented that ensure that an authorized user can access only those network resources and  services necessary to perform their assigned job responsibilities     To maintain information security  MorphoTrust requires that individual accountability be  maintained at all times  including during remote access     Connections to any internal MorphoTrust network must be done in a secure manner to preserve  the integrity of the network  the data transmitted over that network  and the availability of the  network  Security mechanisms must be in place to control access to MorphoTrust systems and  networks remotely from fixed or 
390. ry and status for a real time view of the  process     o Images of biometrics captured  photos  fingerprints  identity  documents  for research and forensics purposes     Vendor Response Sheet      SAFRAN   Attachment A  MorphotTrust USA    otate of West Virginia CRFP DPS1500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    With these features and more  the portal provides an indispensable tool  for transparency that keeps state agencies  the State Police  and  MorphoTrust personnel constantly connected and up to date        Improved applicant status visibility   As an optional feature  applicants  can also check on the status of their submission via our secure public  website     Summary of Our Approach    MorphoTrust   s approach to this project is to continue serving West Virginia  with the current Enrollment Center network in use today  while expanding the  network and upgrading the technology over time to our Universal Enrollment  Platform            does                          stand out from our competitors        Delivery of both fingerprint Technology platform that meets the Governance by a   capture and background check highest security standards National Security  results The security controls that govern the Agreement   The Universal Enrollment Universal Enrollment Platform map directly Every MorphoTrust  Platform  which fully manages the to NIST Special Publication 800 53 v4 employee is a U 
391. s     The MorphoTrust central server transmits records as they are received into the  WVSP system  Any records that do have not a confirmed payment  such as a  check  may be held for up to five business days or until payment is confirmed as  valid     Criminal History Records are electronically forwarded in near real time  once  received from the WVSP and or the FBI  Results electronically delivered  if  allowed  will be available in near real time as soon as response is received from  the WVSP and or the FBI  When required  hard copies are printed on a daily           SAFRAN Vendor Response Sheet          MorphoTrust USA  Attachment        otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    basis for all available responses and placed in outgoing USPS mail for delivery   Access to hard copy results are subject to standard USPS mail delivery timelines     4 4 3 6 The Vendor should describe in detail their plan for electronic submission  acceptance requirements     As the current provider of fingerprinting services in West Virginia  MorphoTrust  fully understands and meets the requirements of the technology solution for  electronic submission into the WVSP system  Our technology component known  as EasyPath will remain in place with the new contract  therefore submissions  into WVSP will continue to support the State s requirements     Should WVSP adopt new interface requ
392. s   fingerprint transmissions  etc  In addition  we maintain a team of certified Field  Service Engineers  FSEs   who are dispatched if a service visit is required     We minimize disruption to customers  both state users and applicants  by  planning maintenance to ensure downtime windows are as small as possible  by  providing visibility into the planned maintenance schedule  and by robustly  communicating when emergency maintenance or system failures occur     If necessary  the State may escalate an issue according to our Issue Escalation  Procedure described on page 85     We have provided additional details about equipment and software maintenance  in our response to requirement 4 4 8 1 through 4 4 8 3     b  Response Time    Describe the expected response time for maintenance for each element of the services  infrastructure  i e  live scan failure  server downtime  web site disruption of service  etc     MorphoTrust meets the requirements     Table 16 summarizes the expected maintenance response activities and duration  for our current solution and UEP  Approximately 8076 of trouble tickets are  resolved in under half an hour     Mandatory Specification Checklist     116     SAFRAN   Attachment B  MorphoTrust USA    otate of West Virginia  Department of Administration  Purchasing Division    Table 16  Maintenance Response Times    Infrastructure   Action Response  Element Time    Live Scan Enrollment Agent conducts   5 15 minutes Wait time  Failure onsite troubleshooting
393. s and State representatives to resolve any issues or problems that  occur at Enrollment Centers in a timely manner     Mr  Wear holds a Bachelor s Degree in Accounting from Illinois College  His  program references include Massachusetts  West Virginia  and the District of  Columbia     Casey Mayfield     Deployment Director    As Deployment Director  Casey Mayfield will ensure that all tasks related to  successful deployment are achieved in a timely manner  She will coordinate with  all teams involved in deployment activity to ensure a unified program rollout     Ms  Mayfield has 16 years of experience managing fingerprinting services  networks  She oversees the deployment of all new civil applicant fingerprinting  programs for MorphoTrust and the ongoing management of more than 700  subcontractors for MorphoTrust state  federal  and commercial networks  nationwide     Under her leadership  her team is in contact with more than 7 000 applicants  each day and they routinely exceed customer service and other program  requirements in each program they support  Her group also provides support  services such as Cardscan and site support services     In total  Ms  Mayfield has more than 19 years of business management and  human resources experience  She has extensive supervisory and training  experience and has been instrumental in establishing effective policies and  procedures for the operation of each area under her responsibility  Her  organizational skills and ability to dele
394. s and applications will be  provided to the owner of each system       Areview of appropriateness will take place by the system owner with adjustments being  made immediately       Access requests are to come from the employee s manager to IT     7 Network  amp  System Access    e Network and System accounts are created by a security administrator after receiving an  approved request from human resources  The user account s access is specified in the  request and access is approved granted per the specifications  An initial password is  issued which automatically prompts the user to change the password on their first login  attempt  Password structure  expiration  and reuse limitations are described below     System  Application Length Characters Expiration    Interval    Systems  Min      8 Alpha  60 days 5  numeric      Max      minimum 1  oystem numeric  Determined       Applications  Min      8 Alpha  60 days  numeric      Max      minimum 1  Application numeric  Determined    05 31 2013 MorphoTrust USA Confidential Page 4 of 5  EXEMPT INFORMATION    IT Information Security PRC 00089 B 06    e  Workstation Laptop administrator logon is created during the operating system install  A  password is specified by the system administrator during setup  The password does not  expire so that multiple system administrators may service the system  All local system  passwords should be the same and should conform to the guidelines noted above    e Note  application administrators may
395. s in  Fingerprinting Services for West Virginia mind  our Program Manager will continue to be  Applicants      MAP the primary point of contact from contract  MorphoTrust will use existing infrastructure     current key processes  and existing project negotiations through the life of the program  He    staff in West Virginia for the program  will maintain regular communications with West  We are in the best position of any vendor to Virginia s designated counterpart  ranging from  accomplish all implementation tasks without routine in person and telephone contact to    an interruption in services      regularly scheduled status meetings and other    communication     The Program Manager will present a Preliminary Project Plan at the initial kick   off meeting  We follow a structured procedure for the review and updating of      SAFRAN Vendor Response Sheet          MorphoTrust USA  Attachment A     otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    the Program Management Plan  To ensure success  a complete Work Breakdown  Structure  WBS  for the Contract Management will be presented to and signed   off by West Virginia  This WBS defines the deliverables dates for all components  and tasks  providing a step by step process to move from contract award to the  implementation of Full Operational Capability  FOC      Shortly after contract award  MorphoTrust will initiate th
396. s on an employee s part that could breach PII by others are  grounds for immediate dismissal     5 31 2013 MorphoTrust USA Confidential Page 4 of 6  EXEMPT INFORMATION    IT Remote Access Policy PRC 00092 B 09    The policies that employees have agreed to are located at hitp   www compli com   the company  SharePoint site  Access   and should be reviewed periodically  If you have any questions  please  feel free to ask the Chief Security Officer  Always err on the side of caution                 sure your laptop conforms to IT security practices  If you are unsure  please ask IT  to check it     e  f your laptop was not built by IT  you are out of compliance  Report it immediately to IT     e You should always use the secure VPN client issued by IT to remotely access the  MorphoTrust USA network     e  f you get a warning or error while trying to connect to the VPN remotely  you should  disconnect immediately because a man in the middle attack is active  This is true  whether you are accessing over an unsecured network or accessing email via a web  browser  Disconnect from the unsecured network immediately and refrain from using any  network access at that point        When accessing your MorphoTrust email account remotely using a web browser   periodically check to make sure the connection uses  https  at all times  If the browser  shows  http   disconnect immediately because a man in the middle attack is active     e  f you don t have a cable lock for your laptop for your o
397. s per the Change Management  Policy  A report of issues logged is created at the end of each day and emailed to the IT  staff    e Issues are categorized based on severity and the severe issues are discussed with the  CIO    2 5 Soft ware Solutions    e Monitoring software  What s Up  has been deployed and is configured to immediately  send email alerts to the appropriate personnel upon detection of high risk events such as  virus detection and denial of service activities    e Security administrators will take appropriate action to mitigate disruption due to these  events     3 Docume  ntation    3 1 Net work    e A topology of the network environment has been created to diagram the configuration  of the MorphoTrust USA network        he documentation is updated promptly to reflect any changes that occur within the  environment     3 2 Databa se    e Full documentation for any database within the environment will be maintained  This  documentation will include data structures  data dictionary  and configuration  information    e This documentation will be updated promptly upon any changes made to the  database     3 3 Tools and applications    e All tools and applications within the environment will have documentation on use and  configuration    e The latest versions of these documents will be readily available to all administrators  of these systems     8 22 2011 MorphoTrust USA Confidential          4 of 5  EXEMPT INFORMATION    IT Managing Operations Policy PRC 00090 B 0
398. sed to address issue on a walk in basis and the Customer  as Top Priority Service Center is available to provide    directions to Enrollment Centers and  answer questions    Communication   Immediate trouble ticket 5 15 minutes No disruption to customers     records  lines disruption   issued and resources queued on Livescan for submission  of service released to address issue when lines are re established    as Top Priority       Workstations    Our workstations are designed to work in offline mode  so they continue to  function in the event of a server outage  When services to the Data Center are  restored  the data from the workstations is uploaded to the Data Center and  processing will resume     MorphoTrust is qualified to provide all maintenance for our Enrollment  Workstations without subcontracting with the manufacturer  therefore if the  Enrollment Agent encounters a problem they are unable to troubleshoot  our  Technical Help Desk is contacted  The Technical Help Desk employs trained   technicians that provide technical support for Enrollment Agents in Enrollment      SAFRAN Vendor Response Sheet  SE  83    MorphorTrust USA  Attachment A     otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    94    4 4 8 3    Centers  A Tech Help Desk agent has the ability to access each system with  secure remote access to perform an array of diagnostic tests to troubleshoot 
399. seeeessaaeees 4            FONG                                       5  Monitoring Update LogS            6  6  Use of Company Equipment                   ssesessesssssesseeeeeeene nennen               nnn nnn rris nani nnns nennen 6  EKO    RETE                               O 6  SON    inier        See M IM x LIMEN ED                  7  zc                                                                              7  ACC Salle Bea VION ancien TTD m Tm LR mm 7  LEE RTT T                                            8       Me IAC                                                            8       JOnmole JA DOS                9  Minimum Home Network                                                              9                 mm 10  Remote Control ACCESS RPRRRRRRTE                         10  10                                            11  11  ijo        E      11  10 23 2014 MorphoTrust USA Confidential 2    EXEMPT INFORMATION    Computer and System Use Policy PRC 00110 A 10    1  Introduction    This document describes the controls employed to protect MorphoTrust USA s  The Company  IT network  equipment and  by extension  the sensitive information entrusted to us by our customers  Only authorized  devices may be connected to the network and must be approved by IT Directors or the CIO     This policy applies to all MorphoTrust USA IT equipment  either owned or leased   The following topics  are addressed     Vendor Passwords   Passwords and Dual and Biometric Access Con
400. sical access control systems  These risks are updated as experience  both  corporate or industry  dictates  To be sure  the existing risk management  program covers a detailed list of environmental risks     The MorphoTrust risk management program characterizes likelihood of  occurrence as the Annual Rate of Occurrence  ARO   This ARO value is later  used in determining the appropriate risk response  The ARO for any given risk  may be analyzed quantitatively and or qualitatively     Quantitative evaluations consider the ARO on the basis of internal and external  data sets  Internally  MorphoTrust tracks previous risk exposures and what  if  any  attempts were made to exploit those risks  These data points provide useful   quantitative information on likelihood of occurrence  Externally  MorphoTrust  utilizes local  state  and federal resources that can provide Standard Annual  Frequency Estimates  SAFE  and Local Annual Frequency Estimates  LAFE    These estimates come from organizations like NOAA and the USGS  While all  four risk categories are considered in the quantitative analysis  natural and  environmental risks are most frequently represented in the quantitative analysis     Qualitative evaluations require a textual rubric describing the threat source  its  motivations  conditions  and its capabilities to exploit a particular risk  Many  threats are necessarily qualitative owing to the newness of the risk posed  The  MorphoTrust risk management program groups qualitat
401. sides within a secure facility or a secure room  within a secure facility  2  and uses access control technologies to control access to resources   The access control technologies can include identity based  role based  and or rule based access  control lists  ACLs  as well as other authentication and authorization mechanisms     10 9 2013 MorphoTrust USA Confidential and Proprietary Page 8 of 37    EXEMPT INFORMATION    Cyber Security Plan PLN 00091 A 02    Customer Secured Network     A network that is managed by a customer and that resides within  the customer s secure facility and uses access control technologies to control access to  resources  The access control technologies can include identity based  role based  and or rule   based ACLs as well as other authentication and authorization mechanisms     4 3 Cyber System Overview    For the CSP  the MorphoTrust network system consists of six logical groupings     1  An Admin Network which functions as a corporate network for administration and  corporate functions  finance  accounting  HR  legal  etc       2  An Engineering Network for engineering development  testing  quality control  and  internally based customer support     3  A Customer Network into which deployed MorphoTrust systems are installed  Often  times  the Customer Network can include other subnets for development  testing  user  acceptance testing  UAT   pilot implementations  and production     4  AFactory Network which provides access to MorphoTrust prod
402. sonnel     4 12 2 Privileged Accounts Management    The issuance and use of privileged accounts will be restricted and controlled  Inappropriate use  of system account privileges is often found to be a major contributing factor to the failure of    10 9 2013 MorphoTrust USA Confidential and Proprietary Page 19 of 37    EXEMPT INFORMATION    Cyber Security Plan PLN 00091 A 02    systems that have been breached  Processes must be developed to ensure that uses of  privileged accounts are monitored  and any suspected misuse of these accounts is                 investigated     4 12 3 User Password Management    Passwords are a common means of authenticating a user s identity to access an information  system or service  Password standards must be developed and implemented to ensure all  authorized individuals accessing MorphoTrust resources follow proven password management  practices  These password rules must be mandated by automated system controls whenever  possible     The MorphoTrust policy on user passwords is in       PRC 00089 B  7 Information Security Policy    The use of two factor authentication methods is encouraged whenever possible and practical     4 12 4 Service Account Management    Background processes and services that run on MorphoTrust computing systems all require  some identity by the OS  Background processes and services that are created by MorphoTrust  and run as part of MorphoTrust products  programs  and solutions must also have an identity   Considerat
403. sonnel     It is possible that customers may have policies governing VPN connections  and they may want  vendor support personnel  MorphoTrust support personnel  in this case  to use a client based  point to point VPN as supplied by the customer  This is acceptable for MorphoTrust support  personnel to use this connection method for providing support  Although  while it usually is an  easier and more convenient method of connecting to the customer s environment for the  MorphoTrust support personnel  point to point VPN connections do not offer MorphoTrust the  same level of security management as site to site VPNs  Effectively  this option transfers the  responsibility of VPN security management to the customer  but MorphoTrust is still responsible  for notifying the customer of changes to support personnel     A variation on the point to point VPN connection is if the customer provides a split tunnel VPN to  access their network  This should be discouraged strongly as it can bridge the customer s  network with the current network that the MorphoTrust support person is on  Normally  this would  be the MorphoTrust corporate network  but if the support person is traveling  it could      a less  secure network  In order to minimize the chance of any malware coming into either the  MorphoTrust environment or the customer s environment  split tunnel VPNs should not be used if  possible  If the customer insists on using a split tunnel VPN  it must be reviewed and approved  by the C
404. sruption to customers  both state users and applicants  by  planning maintenance to ensure downtime windows are as small as possible  by  providing visibility into the planned maintenance schedule  and by robustly  communicating when emergency maintenance or system failures occur  Key  aspects of our maintenance policies include       Planned maintenance   Security patches  operating system updates   software updates  and other maintenance tasks are performed once a  month during low volume activity periods  Fingerprint device calibration  occurs daily     e Unscheduled outages   When these occur  all stakeholders are notified as  soon as the outage has been confirmed and updates are provided at a  minimum of once every two hours if the outage is system wide     e Redundancy   Critical systems  such as database systems  are deployed in  clustered pairs allowing one server to be patched while the other  continues to provide services  Using this failover strategy  most critical  systems can be patched without any service disruption     MorphoTrust attempts to provide advanced notification to all stakeholders in the  event of an emergency  unplanned outage and defers non emergency  maintenance until the next planned maintenance window          network components are kept on a current vendor support contract  each  support contract requiring same day response  Routine monthly patching also  Occurs to ensure software operating system updates are applied to both the  workstations i
405. ssions be scheduled at least two weeks in advance     We respond to all requests in a timely manner and work with the requestor to  identify the most convenient  available option for the on site session  Full  instructions and guidance are provided to the customers during the schedule  setup  including technical and space requirements for the site  sample advanced  communication and notifications to applicants  and expectations during the on   site visit     Our mobile Enrollment Agent brings all equipment required to process  applicants  This equipment includes the Livescan device  a laptop  and supplies   Agencies are required to provide a suitable workspace that includes at a  minimum a standard desktop space to set up the equipment while affording the  applicant some degree of privacy  with at least three electrical outlets  Suitable  waiting space is also required     We have provided additional detail about our mobile solution in our response to  requirement 4 5 3  b      4 4 3 3 The Vendor should describe in detail their plan for dealing with Applicant  appointments  Included in the plan  the Vendor should detail the Applicant  identification process  collection of payment  the veracity of Applicant  demographic data  release of record authorization process as outlined in 28CFR           SAFRAN Vendor Response Sheet         MorphorTrust USA  Attachment A     otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Pur
406. ssment  coordinator  information systems coordinator  operations and logistics  coordinator  and security coordinator will be assigned        Theoperational aspect of the ConOps reflects the execution of the plan  insofar as remote sites and the operational IT environment are involved   This component requires detailed documentation relative to the  operational procedures  checklists  and contact information required for  successful continuity of operations        The technical aspect covers the information and data flows  the  mechanism used for real time data replication between primary and hot   standby facilities  and the methods for recovery of mid transaction    GS SAFRAN Mandatory Specification Checklist    MorphoTrust USA  Attachment B     otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    122    submissions  Bach of these areas of concern is thoroughly addressed and  reviewed by both management and the information systems security  officer for completeness     Risk Management Plan    MorphoTrust   s risk mitigation plan has been developed and refined over many  years in response to risks that we have identified during both normal operations  and exceptional circumstances  For each risk  we have identified the likelihood  and potential impact of the risk and implemented a response that appropriately  addresses risk levels in an efficient manner  In the course of
407. sswords must be changed before any computer or communications    system    is connected to a Company network or used for Company business  This policy applies to    passwords associated with end user IDs  as well as passwords associated with system  administrator and other privileged users     3 Dual Access  amp  Biometric Access Controls    Certain computers containing secure material and processes may require the use of two  or more passwords  each known by a separate individual  and or fingerprint scans to  access     The facilities manager and or the Chief Security Officer  in cooperation with the CIO  shall  identify which systems require such access     05 31 2013 MorphoTrust USA Confidential Page 3 of 5    EXEMPT INFORMATION    IT Information Security PRC 00089 B 06    4 Workstation and Application Timeouts    e    servers  workstations and applications in the MorphoTrust USA environment will be  configured to lock out the user after 15 minutes of inactivity  This is set through the GPO   Group Policy Object  within Active Directory within the domain    e All servers should be locked prior to leaving the server     5 Data     encryption       Any data  sensitive in nature  that is being transmitted external of the MorphoTrust USA  network and not using the established VPN for transmission will be encrypted           sensitive data may be transmitted to Safran Morpho affiliates     6        ess Review       On a quarterly basis a listing of all user privileges of system
408. st USA  LLC     Our Mission  To simplify  protect and secure the lives of the American people     COPYRIGHT AND TRADEMARKS    Copyright    2015 MorphoTrust USA  LLC  All rights reserved  The trademarks identified  herein are the trademarks or registered trademarks of MorphoTrust USA  LLC  its parent  and affiliated companies  or other third party            SAFRAN    MorphoTrust USA    May 11  2015    Tara Lyle   Department of Administration  Purchasing Division   2019 Washington Street East  Charleston  WV 25305 0130    Subject  MorphoTrust Response to CRFP DPS1500000010 for West Virginia State Police  Applicant Fingerprinting Services    Dear Ms  Lyle     Please find enclosed our response to your CRFP DPS1500000010 for statewide applicant  fingerprinting services  MorphoTrust USA  LLC  MorphoTrust  has been fingerprinting  applicants in the State of West Virginia since 2011 and today serves nearly 70 000 applicants  annually  We are excited to expand our partnership with the West Virginia State Police     Our proposal illustrates how our proven solutions  qualifications  and capabilities will meet all  of the requirements of this CRFP and will continue to serve the State Police and the residents of  West Virginia  Throughout our response we have made an effort to show proof points from the  current program in place today in the State of West Virginia     We are committed to providing the highest levels of customer service and a quality experience  for each applicant  We als
409. st on the network     02 13 2012 MorphoTrust USA Confidential Page 4 of 10  EXEMPT INFORMATION    IT Disaster Recovery Policy PRC 00095 B 02    2Pre disa ster Procedures  Proactive protection and duplication of data is the key to preparedness     Systems in the IT facility shall be protected via     Secure locked facility   Air conditioning   Emergency lighting   Fire detectors and alarms   Security Audit Trail of entry and exits  Password protected systems   Battery back up UPS systems   Antivirus systems   Firewalls   Back up of data and applications on servers  Back up of user systems on site   Off site data storage   Application inventory   Automated system status alarm mechanisms  Change Management policy   Skilled and knowledgeable IT staff      9 9 99 9 9 99 9 9 99 9    9    The following procedures have been written to ensure this happens as regular business practice           IT Physical IT Access Controls Policy and Procedure  IT Firewall Policy and Procedure   IT Remove Access Policy and Procedure   IT Computers on the Network Policy and Procedure  IT Virus Protection Policy and Procedure   IT Backup and Disaster Recovery Policy and Procedure  IT Information Security Policy and Procedure   IT Managing Operations Policy and Procedure   IT Change Management Policy and Procedure   IT Manage Performance Policy and Procedure   IT Electronic Communications Policy and Procedure         9 9 9 99 9 9 9    2 1 Bac kups    All systems shall be backed up according to the IT Ba
410. standard  At minimum the label will contain  MorphoTrust USA     the date and the sequence  number     4Bac  kup Monitoring    e All daily backup sessions are monitored by IT staff each day to ensure there are no  issues from the backup the night before     5 Exceptio n Reporting    e Exception reporting occurs thru the storage manager console which alerts administrative  staff when backups do not run as scheduled  fail  or in any way not perform as planned    e      exceptions to the backup schedule are automatically emailed to a mailbox monitored  by the Manager of Operations or designee     03 23 2012 MorphoTrust USA Confidential Page 3 of 4  EXEMPT INFORMATION    IT Backup  amp  Recovery Policy PRC 00084 B 03    6 Recording Backup  amp  Recovery Issues    e All backup failures are noted during the weekly review performed by the Manager of  Operations     TR                   e Data restores are managed using the same storage manager systems that are used for  the backups   e IT performs test restores on a quarterly basis     8 Disas ter Recovery     Adisaster recovery contract exists with Iron Mountain     03 23 2012 MorphoTrust USA Confidential Page 4 of 4  EXEMPT INFORMATION    Information Security  Customer Data Access and Security Policy PRC 00174 A 07    Information Security  Customer Data  Access and Security Policy    Document Number  PRC 00174 A  Revision Level  07    Approval    Dennis S  Kallelis Robert Eckel  Chief Security Officer President    This documentati
411. stration                                              SAFRAN  46 SAFRAN   Attachment A     MorphoTrust USA    otate of West Virginia    CRFP_DPS1500000010    Department of Administration Applicant Fingerprinting Services    Purchasing Division    Our Quality Training Program  Our proven Training Program has been utilized to    Enrollment Agents hired for this project  will go through an orientation and    train over 3 500 Enrollment Agents  fingerprint systematic training program that focuses    technicians  to date     on the West Virginia program    We believe that training is critical to develop a fully requirements  Upon the Enrollment    qualified Enrollment Agent capable of achieving a  98  classifiability rate  dealing with the general    Agent s completion of the onsite training     public  and handling equipment issues  Certified Trainers use a pre defined    Observed Behaviors Checklist to track the  enrollment agent s competency and    understanding of all written policies  procedures  The checklist identifies on the     job behaviors expected of all personnel such as professional customer interaction     professionalism  policy and procedure compliance  system navigation  capturing    quality prints and mastery of required skills     Training Curriculum    Our training program consists of     Hardware overview of the Livescan workstation     Software overview of the Livescan system  The Enrollment Agent must  become skilled in the operation of all Livescan softwar
412. swords are confidential among users and unknown to system administrators   Credentials cannot be exchanged between users   Open communication regarding passwords is discouraged  Users should not leave  password information in the workstation  e g  post notes  etc    System administrators must force the user to change the initial password immediately  after the initial user logon session   If an employee or third party is careless with password information  password changes  should be forced immediately   System administrators are responsible for monitoring  tracking  and following up       unsuccessful logon attempts   oystem administrators are responsible for configuring the operating system environment  according to the password rules in this policy and are to provide training to users for  password changes and security  Such rules include   Password history enforced at 5 passwords  Maximum password age  60 days  Passwords are not stored using reversible encryption  The account lockout threshold is set to five  5  invalid logon attempts  The account lockout duration is set to 30 minutes  after which the account  lockout counter is reset      15 minute time out for windows screen lock  Super user passwords will be generated and provided to System Administrators upon  approval from the Director of IT Infrastructure  Super user passwords are subject to the  password rules defined in the password table below     O O O O 0    2 1 Vendor Defaults    All vendor supplied default pa
413. t   o Develop and maintain requirements traceability   o Maintain an Integrated Master Plan and control metrics     Communications Management    o Conduct stakeholder outreach  issue management  and change  management programs    o Execute progress reviews and status reporting     lime  amp  Cost Management    o Define  according to the MS Project Plan  all the necessary  activities scheduling and its change management procedures    o Develop time and cost baselines based on the MS Project Plan  o Maintain project budget procedures    o Monitor and measure progress to assure the project finishes on  time and on budget       Risk Management  o Identify  Assess  Mitigate  and Monitor risks on an ongoing basis  o Escalate issues when necessary      Quality Management    o Monitor project control metrics and Quality Assurance  Surveillance Plan      5          Human Resources Management    o Attract and retain the right people to facilitate project continuity  and success    o Utilize proven training courses customized for WVSP  requirements    o Manage personnel security    Mandatory Specification Checklist m  120    SAFRAN   Attachment B  MorphoTrust USA    otate of West Virginia CRFP DPS1500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    o Maintain personnel database of all WVSP program participants  with clearance status  o Cross train people to mitigate critical resource dependencies     Procurement Ma
414. t USA  No part of this  document may be reproduced  disclosed  distributed  or used in any form by any means   graphic   electronic  or mechanical  including photocopying  recording  taping  or information storage or retrieval      without written permission of MorphoTrust USA     Users are responsible for making sure that they have the current revision of this  document     03 23 2012 MorphoTrust USA Confidential Page 1 of 4  EXEMPT INFORMATION    IT Backup  amp  Recovery Policy PRC 00084 B 03    TABLE OF CONTENTS    1 DATA STORAGE OVERVIEW                                      den I DNI                                                  3  2 DATA ACCESS                                                                                           3  3 DATA RETENTION                        H            3  4 BACKUP MONITORING    sonia      Eus ueni          nec              RA s aaa cosa Sa sue Sepa Cases 3  5 EXCEPTION REPORTING           3  6 RECORDING BACKUP 8  RECOVERY ISSUES                                                      nnn nana nnns 4  7 RESTORES                                                                        4  8 DISASTER RECOVER Y           4  03 23 2012 MorphoTrust USA Confidential Page 2 of 4    EXEMPT INFORMATION    IT Backup  amp  Recovery Policy PRC 00084 B 03    1 Data Storage Overview    e     MorphoTrust systems are backed up on a daily basis via Iron Mountain s Turbo  Restore Appliance  TRA   The following rules apply     e The daily backups are perform
415. t Wed 9 20   12 00  amp  1 00    5 00   Victoria 3004 Sam Houston Street M F9 5   WACO 1105 WOODED ACRES  SUITE 406 HOURS VARY   Waco 5016 W Waco Dr Mon   Sat Hours Vary   Waxahachie 201 E Main St  Ste 201 Mon   Thu 9 00   5 00  Fri  9 00   12 00   Weatherford 1404 South Main M   F 8 00 4 00   Wichita Falls 1501 Midwestern Pkwy  Ste 108 M  T  TH 8 15 4 30  Wed   Fri 8 00 12 00   Appendix C    AFRAN  ie List of Fingerprinting Centers 5  gt     MorphoTrust USA    otate of West Virginia  Department of Administration    Purchasing Division    CRFP DPS1500000010  Applicant Fingerprinting Services  West Virginia State Police    MorphoTrust Enrollment Centers in Tennessee    Athens  Bristol  Chattanooga  Chattanooga    Chattanooga    Clarksville  Cleveland  Columbia  Columbia    Cookeville  Cordova    Covington  Covington  Crossville  Dayton  Dickson    Dyersburg  Elizabethton  Farragut    Franklin  Gallatin    Greeneville  Harriman    Hendersonville    Hohenwald  Jackson  Johnson City             SAFRAN    MorphorTrust USA    412 S White St   1101 Volunteer Parkway Suite 5  6231 Perimeter Drive Suite 177  694 Manufacturers Rd    2288 Gunbarrel Rd  Ste 154    211 University Ave  114 Stuart Rd NE  501 W Eighth St  2516 Hospitality Dr    3 0 S Lowe Ave Suite A  1138 N Germantown Pkwy  Ste 101    1580 Highway 51 S   412 Long Ave  street sign shows Alston St   1576 N Main St   9297 Rhea County Hwy   432 Highway 46 South    710 Hwy 51 By Pass West  106 Broad St  11519 Kingston Pike    62
416. t data   No criminal record data is available     4 5 5 Security    The       and the State have computer security requirements  including connection to the internet  by any computer connected to State local area networks or mainframe system  The successful  Vendor  including employees and subcontractors working on this project  will be required to  comply with current CJIS and National Crime Prevention and Privacy Compact Council Security  requirements and policies throughout the duration of this contract award and will sign appropriate  agreements and abide by these security requirements     The successful Vendor personnel  including employees and subcontractors assigned to this  project or performing activities related to this project must be approved by the West Virginia State  Police     All software and hardware systems utilized by the Vendor in the performance of this contract  must be secured to prevent unauthorized access  The Vendor must provide the State with its IT  Security Policy  This policy must encompass all industry standard security measures to ensure    Mandatory Specification Checklist    110     amp  SAFRAN     Attachment B  MorphoTrust USA    otate of West Virginia CRFP DPS1500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    access to personal and financial information and systems is limited to those personnel requiring  access to perform the duties necessary to accomplish this con
417. t description in our response to requirement 4 4 6     Mandatory Specification Checklist       92    SAFRAN   Attachment B  MorphoTrust USA    otate of West Virginia CRFP DPS1500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police         proposed Livescan devices meet       Image Quality Standards  IOS    Appendix    Standards and we have provided FBI certification letters in  Appendix E     Our Livescan solution will assign the unique transaction control number and  required data fields as specified in the Interface Control Document  which will be  transmitted the NIST file to the WVSP AFIS  MorphoTrust already has an  established interface between our fingerprinting technology and      WVSP AFIS   We will work with MorphoTrak on any additional development and testing that  may be required     b  ID Authentication    The Vendor personnel must require the Applicant to provide valid governmental photo  identification for proof of identity at the fingerprinting session using the most current ID  Verification guide from the Compact Council     MorphoTrust meets the requirements     While the Compact Council guidelines do allow for forms of identification that  do not contain a photo  MorphoTrust recommends requiring a Photo ID issued  by a U S  State  U S  Territory  or    U S  Government agency     Enrollment Agents will require a valid governmental photo identification for  proof of identity before the applican
418. t is fingerprinted  Our training program  prepares Enrollment Agents to determine that the ID is genuine and valid     As an added security feature  MorphoTrust proposes our Identity Proofing  Solution  which leverages our industry leading iA thenticate  authentication  software and B5000 Document Reader  The B5000 analyzes state and federal  government issued photo identification documents including driver licenses   government issued ID cards  military IDs  or Passports  We have described this  solution in detail in our response to requirement 4 4 6 1     c  Manual Process    The Vendor shall have the capability to provide an Applicant with a completed manual inked or  electronically printed FBl standard fingerprint card if requested     MorphoTrust meets the requirements     Our solution includes  Print and Go  capability that allows any applicant to  have a physical FD 258 hard card produced from their fingerprints  After  collecting the applicant data and capturing the fingerprints  the Enrollment  Agent prints a FD 258 hard card instead of submitting an electronic record  Hard  cards are printed using a Lexmark   5810        T600 series printer        SAFRAN Mandatory Specification Checklist    MorphoTrust USA  Attachment B  y     otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    94    We have described the manual process in more detail our response to  requireme
419. t paid and signature of  Enrollment Agent    Records are transmitted in real time from fixed sites    Records are transmitted within 24 hours for mobile sites or onsite fingerprinting  sessions without an internet connection       Please note that our solution transmits records from the Enrollment Centers in  real time  more than meeting the State s requirement for transmission within 24  hours from collection     Mandatory Specification Checklist      SAFRAN   Attachment B  MorphoTrust USA    otate of West Virginia CRFP DPS1500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    d  Electronic Submission Acceptance Requirements  The Vendor must be able to achieve and maintain acceptability rates of more than 9890     MorphoTrust will meet the requirements     We agree to maintain a ninety eight percent  9876  classifiable rate for all  Livescan fingerprint submissions digitally collected by MorphoTrust and our  partners  We cannot warrant the quality of Cardscan submissions where  fingerprints were physically collected by a third party     We provided additional information about our plan for fingerprint acceptance in  our response to requirement 4 4 3 6     e  Fingerprint Technician Training    The Vendor shall provide well trained personnel to take fingerprints  The responsibility and costs  for training these personnel is entirely with the Vendor  The Vendor must include a narrative  explaining the curric
420. t up with governmental agencies     MorphoTrust recommends that applicants continue to tender the entire  enrollment fee directly to MorphoTrust  as we do today in West Virginia   MorphoTrust will remit the associated fees to the State and or FBI via invoice  process or via direct ACH delivery  The frequency and method of remittance can  be customized to meet the State s specific needs     Our current solution and the UEP solution both allow applicants multiple  options for payment tender  including all major credit cards  Visa  MasterCard     Vendor Response Sheet      SAFRAN   Attachment A  MorphoTrust USA    otate of West Virginia CRFP DPS1500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    American Express  and Discover  as well as payment by check or through a  billing account     Applicants can pay by credit card online or via Call Center at the time of  scheduling  as currently provided in the West Virginia program  or in person at  the Enrollment Centers  As    best practice  MorphoTrust recommends that credit  cards are presented and processed at the time of enrollment to ensure correct  application of payment and reduce the number    Proven Fee Processing for West of refund events   Virginia Applicants and Agencies  In 2014  MorphoTrust processed more        than 740 000 applicant checks and money by check  which will be remotely deposited the  orders and more than  135 000 000 in same day  Our
421. table and often  necessary for the UAT environment to become the production environment once the UAT has  finished successfully  It is also acceptable that specialized tests for compliance with service level  agreements  SLAs  be run against production environments     4 11 3 Protection against Malicious Code    ooftware and associated controls must be implemented across MorphoTrust systems to prevent  and detect the introduction of malicious code  The introduction of malicious code  such as a  virus  network worm program or Trojan horse  can cause serious damage to networks   workstations and business data  particularly sensitive information  Users must be made aware of  the dangers of unauthorized or malicious code  MorphoTrust must implement controls to detect  and prevent a virus from being introduced to the MorphoTrust environment  The types of controls  and frequency of updating signature files  is dependent on the value and sensitivity of the  information that could be potentially at risk  For most MorphoTrust workstations  virus signature  files must be updated daily  On host systems or servers  the signature files will be updated daily  or when the virus software vendor s signature files are updated and published     MorphoTrust has an antivirus policy to help reduce the chance of malware causing damage       information loss       PRC 00093 B  7 Virus Protection Policy    MorphoTrust also uses web filtering technologies to reduce the chance of malware entering the  
422. tablish a cut off for hard card  submission while new applicants were routed into the network of more than 90 Enrollment Centers  throughout the state  For some agencies  MorphoTrust established data transfer protocols and software  interfaces that allowed the agencies to take advantage of time and money saving technological solutions  to manual processes or to replace previous technology solutions as seamlessly as possible  We  developed sophisticated interfaces for specific agencies which allow for the interchange of data in support  of established agency processes with no disruption to users     MorphoTrust was able to stand up more than 90 Enrollment Centers in both urban and rural areas of the  state in a very short period of time to ensure that the network met contractual requirements  While  Centers in urban areas are relatively easy to identify  rural areas of upstate New York required intense  effort     We provide the following services in association with this network    Multi lingual appointment scheduling by telephone to Call Center or via secure website  Convenient Enrollment Centers equipped with Enrollment Workstations and Enrollment Agents  Livescan  operators    iA thenticate     ID screening   Card Scan for out of state applicants   Customized agency system integration   Centralized secure Data Center   Electronic connection to the state AFIS Reporting   Administrative Queue Review   Fee Collection   Customer account and billing services   Onsite fingerprin
423. tain the repository of software  configuration information   documentation  and any other build artifacts that are approved for release to a customer     During installation and testing in the customer s environment  an Integration Engineer should  monitor the state of the system s security and CSP compliance and identify any issues as soon  as they are found to the Responsible Manager  and if applicable  the Systems Engineer      these issues cannot be remedied due to customer limitations  the Responsible Manager should  get a written release from the customer which explicitly allows for the lesser security in their  environment   See Section 4 18 for more information   A copy of the release should be  forwarded to the CSO and ISO  If any network infrastructure needs to change during installation  and testing  the Systems Engineer should review and approve the change to ensure that it does  not compromise security or CSP compliance  and then they should issue the change request to  the IT Department     10 9 2013 MorphoTrust USA Confidential and Proprietary Page 10 of 37    EXEMPT INFORMATION    Cyber Security Plan PLN 00091 A 02    For deployed systems  the Operations Manager for the customer will periodically monitor the  deployed systems for compliance at least once a year  and report the findings to the ISO  The  status of the compliance must be reevaluated when the system is changed or updated in any  significant way  either by MorphoTrust or by the customer  A Tier 3 S
424. tained from applicants in  any way outside of the performance of this contract     We meet all documented Information Security program requirements  We are  experienced with both Federal Security Authorization  SA  processes and State  government audits  We have a strong record of designing and building fully  FISMA compliant security controls  Moreover  our history also demonstrates our  ability to identify  analyze and close findings to remain compliant with FISMA  and Department of Homeland Security requirements     111    otate of West Virginia  Department of Administration  Purchasing Division    112    CRFP DPS1500000010  Applicant Fingerprinting Services  West Virginia State Police    The scope of MorphoTrust information security program includes information    systems and technologies  personnel security  physical and environmental    security for facilities that house our information systems  and business process    security  We employ a team of information system security engineers who are    MorphoTrust   s Unique Security Mandate    MorphoTrust is one of a rare few  companies governed by U S  Proxy and  National Security Agreements and is  mandated to follow the highest standards of  security to protect all personally identifiable  information     We may employ and subcontract with only  U S  citizens who are thoroughly vetted and  have successfully passed a background  check  drug test  financial review  and  security threat assessment     knowledgeable and exper
425. tatus   Applicant Selection      UBJECT  TEST TEST         1 888812505   INDIANA STATE POLICE   RDS DIVISION   RIMINAL HISTORY RECORDS INFORMATION SYSTEM   I ANA T CENTER NORTH  ROOM N382   INDIANAPOLIS  IN 46204    SEARCH OF THE FINGERPRINTS ON THE ABOVE  INDIVIDUAL HAS FAILED TO DISCLOSE PRIOR  RREST DATA        2      v State AFIS  v FBIAFIS Save and Get New  F7    Cusrert D   Closed         Save And Close  F11          Figure 43  Administrative Queue Review     Results Status Screen    Other Client Functions    MorphoTrust s Review Client software provides a robust transaction  management and documentation solution  In addition to the features described  above  the client software provides system support tools for creation and setup  of result letters  setting up details of each transaction type processed  user  management and security  and maintenance of submitting agency tables  As seen  in Figure 43  tabs across the top of the screen access functionality to add  processing notes to the transaction  attach scanned support documents to the  transaction  and resend result notifications to agencies     State Access to Data via Secure Administrative Web Portal    Approved agency users and internal WVSP users can also our secure web portal  to access transaction and applicant information  The main search screen  shown  in Figure 44 and Figure 45  allows a variety of search options to allow users to  find transactions and applicant status     In states where MorphoTrust provi
426. te  WV 24970    South Charleston MorphoTrust USA Monday   Friday  38 River Walk Mall 8 00 am   6 00 pm  South Charleston  WV 25303    Spencer TBD  Spencer  WV 25276    Summersville Seneca Health Services  Inc  Wednesday  804 Broad Street 9 00 am   11 30 am  Summersville  WV 26651 12 30 pm   4 00 pm    Sutton Central WV Aging Services Inc  Every other Friday  101 2nd Street 10 00 am   2 00 pm  Sutton  WV 26601    McDowell County Every other Thursday  Commission on Aging 10 00 am   12 00 pm  725 Stewart Street 12 30 pm   4 00 pm  Welch  WV 24801    Weston TBD  Weston  WV 26452   Wheeling Change  Inc  Monday  Thursday  and Friday  700 First Street 8 30 am   11 00 am    Moundsville  WV 26041 Tuesday and Wednesday  8 30 am   3 00 pm       ADA Compliance    All Enrollment Center locations are required to pass a rigorous Readiness  Assessment  which requires the Site Assessor to evaluate over 50 qualities of the  facility  including compliance with ADA laws  All sites are reviewed against the  following ADA requirements     ADA accessible entrances   e Doors have a minimum 32 inch width clearance       External entrance is accessible directly from ground level  or easily  accessible via accessibility ramp if located above ground level       Internal entrance  if applicable  is accessible directly from ground level   or easily accessible via elevator if located above or below ground level       Elevators if building is multiple levels       Hallways have a minimum 36 inch width clear
427. ted to system recovery  This includes immediate outside services     8 Relocation of personnel    IT personnel may need to relocate to hot sites in order to reconstruct systems and to reactivate  business  The CIO is authorized to send staff or hire temporary contract staff to get these  emergency systems activated     9 Finance Pur chasing    The financial system administrators are responsible for getting the financial system back into  operation for their users  The IT staff shall work in cooperation with the financial system staff to  facilitate this task     10 Dev elopment    Development is responsible for reconstructing their laboratory system in times of a disaster  Once  the main IT systems are back up and operational  the IT staff shall assist the development teams  in their reconstruction     Therefore the development teams are responsible for knowing what their software application  tools are  what their test and development environments are  and how to reconstruct them     IT is responsible for getting the development servers and applications that are part of the IT  server room back up     Development users are responsible for getting their own office PCs data restored in case of  disaster     02 13 2012 MorphoTrust USA Confidential Page 9 of 10  EXEMPT INFORMATION    IT Disaster Recovery Policy PRC 00095 B 02    11 Cus tomer Support    Customer Support is to work closely with IT to restore their necessary services  These services  include the resumption of phone
428. ter Agreement    2015 05 13 0612 ESR05121500000003712  13 30 00    000000100868  MORPHOTRUST USA       FOR INFORMATION CONTACT THE BUYER    Tara Lyle     304  558 2544  tara   lyle wv gov    Signature X  All offers subject to all terms and conditions contained in this solicitation       Page  1 FORM ID   WV PRC SR 001    Comm Ln Desc Qty Unit Issue Unit Price Ln Total Or Contract Amount  Fingerprint services 1 00000 LS  12 50  12 50    Comm Code Manufacturer Specification Model      92121602    Extended Description   Addendum No  2   See attached pages  The bid opening has moved from 05 07 2015 to 05 13 2015  Responses to  vendor questions attached        Applicant Fingerprint Services    Page  2    MorphorTrust USA    The identity Company    State of West Virginia  Department of Administration  Purchasing Division    TECHNICAL PROPOSAL    In Response to   CRFP DPS1500000010  West Virginia State Police  Applicant Fingerprinting Services    Submission Date   May 13  2015    Submitted via wvOASIS to   Department of Administration  Purchasing Division  2019 Washington Street East  s  Charleston  WV 25305 0130           and President       FINGERPRINTING SERVICES          Submitted by  Contact   MorphoTrust USA  LLC John Olson  296 Concord Road  Suite 300 Principal Proposal Manager  Billerica  Massachusetts 01821 Telephone  952 945 3307  www morphotrust com Fax  952 932 7181    pe    SAFRAN    MorphoTrust USA    Email  jolson morphotrust com    Confidential Notice    Certain info
429. th internal and external systems  scans will be performed at least  annually to ensure that no major vulnerabilities have been introduced into the environment  The  frequency of additional scans will be determined by the CSO and the ISO  and it will depend on  the criticality and sensitivity of the information on the system  This scanning should include the  CSN and any systems hosted in third party facilities     Network vulnerability scanning will be conducted after new network software or major  configuration changes have been made on systems that are essential to supporting a process  that is critical to MorphoTrust business  and annually on all other systems  The output of the  scans will be reviewed in a timely manner by the CSO and ISO  and any vulnerability detected  will be evaluated for risk and mitigated  The tools used to scan for vulnerabilities will be updated  periodically to ensure that recently discovered vulnerabilities are included in any scans     Only the CSO or their designated authority can authorize and approve vulnerability scanning   Anyone authorized to perform vulnerability scanning must have a process defined  tested and  followed at all times to minimize the possibility of disruption  Reports of exposures to  vulnerabilities will be forwarded to the CSO and ISO and other designated staff     4 10 3 Penetration and Intrusion Testing    All MorphoTrust computing systems that are accessible from outside of MorphoTrust will be  subjected to penetrati
430. the Network PRC 00086 B 01    TABLE OF CONTENTS    1 OVERVIEW  3  2 POLICY  3  8 22 2011 MorphoTrust USA Confidential Page 2 of 3    EXEMPT INFORMATION    IT Policies   Computers on the Network PRC 00086 B 01    1 Ov    erview     The IT network is the backbone of corporate business  The IT network must be protected   This includes protection from unauthorized usage  client generated faults  bandwidth  abuse  and virus intrusion     Only authorized devices may be connected to the network  All devices attached to the  MorphoTrust USA IT networked need to be approved by IT     2Polic        Computers can only be attached to the network if they have virus protection     IT network wiring may not be modified or extended beyond the area of their intended use   This applies to all network wiring  hardware  and data jacks     The network may not be used to provide Internet access to anyone outside of  MorphoTrust USA for any purposes other than those that are in direct support of the  corporate mission     The IT network is a shared resource  Thus  network use or application use which inhibits  or interferes with the use of the network by others is not permitted   For example   applications which use an unusually high portion of the bandwidth for extended periods of  time  thus inhibiting the use of the network by others  are not permitted      Equipment attached to the network must be CE certified and must  conform to recognized network standards     Equipment attached to the netwo
431. thods to control  the security of the passwords themselves  including     e A password is never stored in plain text  it is always stored as a one way  hashed value    e There is no facility in the application to reveal a password    e Users are required to enter a configurable minimum number of  characters  numbers  and symbols for their password           SAFRAN Vendor Response Sheet ES  x MorphoTrust USA  Attachment A     otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    54       User ID password management is performed by the System  Administrator    MorphoTrust s password rules are compliant with the FBI CJIS 5 3 standard  We  require password to     e Beaminimum length of eight  8  characters on all systems      Not bea dictionary word or proper name       Not be the same as the User ID       Expire within a maximum of 90 calendar days       Not be identical to the previous ten  10  passwords     Furthermore  our systems do not transmit passwords in the clear outside the  secure location and do not display passwords when entered     UEP passwords expire every 90 calendar days and accounts are automatically  locked out after three unsuccessful login attempts     Personnel Security    MorphoTrust follows a successful and repeatable process to vet  onboard  and  train personnel  All personnel must be U S  citizens and must pass a rigorous  background check     Morph
432. tial 3  EXEMPT INFORMATION    IT Change Management Procedure PRC 00085 B 05    5  Types of Changes    There are four types of changes to IT Systems  as follows     a  Routine Standard  b  Normal   C  Major   d  Emergency    The following table details the Change types and their requirements                  Description Characteristics Required    Standard Work which is part of routine  Change that is well understood and does not alter baseline   Pre approval by IT  recurring maintenance and or Business requirements functionality of Service  Manager Director  support changes under applicable    procedures  Risk is well understood  No impact on other Services    May include repair   break fix   activities classified as  identical or equivalent changes  e g  like for like  swap     Normal Changes that are susceptible to Changes or additions to configurable elements without Approval IT  some level of risk and that require significantly altering the business requirements  Manager Director or    assessment and approval CIO    Little or no impact to the state of the computerized  system or software Notification to Impacted        Users  Requires few resources and minimal time to    complete    Risk of change to Service is generally assessed as  low    Major Changes that have a high impact Changes that considerably alter a system s requirements        Approval by CCB  IT  risk potential and that require that require a sizable number of resources and amount of Manager Director  CIO   
433. ting for groups of 30 or more    Participating Agencies Department of Criminal Justice Services  Department of Motor Vehicles  Department of State  Office of Children and Family Services  Lottery    Description of Technical MorphoTrust Live Scan system  Solution MorphoTrust Store and Forward Server  Proprietary registration  back end and billing software  Secure connection to State MorphoTrak AFIS  Cisco Virtual Private Network encryption of data transfer circuits  Customized agency system integration and data sharing protocols  Photo capture system  Morpho Trust iA thenticate document authentication system  Card scan system            SAFRAN Vendor Response Sheet  E 19    MorphorTrust USA  Attachment A     otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    Table 7  Michigan State Police    Company Michigan State Police   Company Address and Criminal Justice Information Center   Telephone Number Michigan State Police  333 S  Grand Ave  P O  Box 30634  Lansing  MI 48909 0634  517 241 0604    Contact Person Gregory Rivet    Manager  Criminal History Section  Criminal Justice Information Center  Michigan State Police   333 S  Grand Ave  P O  Box 30634  Lansing  MI 48909 0634    b17  241 0626    Rivetg1 michigan gov    Annual Fingerprint Volume 150 000    Description of Services    MorphoTrust provides a full service network of civil applicant fingerprinting services for th
434. tion  Applicant is given a receipt     4  MorphoTrust s systems transmit the records over secure connection to  the West Virginia State Police Data Center and record the return  acceptance     5  In the West Virginia Data Center  the AFIS collates State and FBI checks  and returns results back to a secure Results Server     6  MorphoTrust disseminates results to the authorized entity or provides  access to the Results Server based on agency setup     Upgrade to Latest Technology Platform    During the first year of the contract  we propose to upgrade the West Virginia  Applicant Fingerprinting Services program s technology to our next generation  Universal Enrollment Platform  UEP   UEP has been in use since 20123 for our    S SAFRAN Vendor Response Sheet           MorphoTrust USA  Attachment A     otate of West Virginia    CRFP     51500000010    Department of Administration Applicant Fingerprinting Services  Purchasing Division    24    West Virginia State Police    fingerprinting services contract with the U S  Department of Homeland Security     Transportation Security Administration  TSA   which includes the popular TSA    Pre 9 program  Our TSA program serves more than 1 5 million customers    annually in more than 330 Enrollment Centers throughout the United States and    currently maintains a customer satisfaction rate of over 99 8  based on applicant    surveys  UEP is also operational for our state fingerprinting services program in    Texas     Capabilities of UEP 
435. tion  from your hotel room   for example  rather than over a public  unsecured wireless network    Refer to section 10  International Travel  if you are travelling outside the country    Keep your laptop locked up when it is not in use    Access MorphoTrust production environments like the CSN and Customer environments only  using a secure  dedicated VPN connection     Remote Control Access    Remote control access is only allowed with MorphoTrust named personnel  Exceptions to this rule can be  granted for trusted third party vendors  such as Cisco   under MorphoTrust USA IT supervision for  diagnostic purposes     10 23 2014 MorphoTrust USA Confidential 10    EXEMPT INFORMATION    Computer and System Use Policy PRC 001 10 A 10    10  International Travel    The following rules apply to MorphoTrust USA employees and contractors traveling outside of the United  otates or its territories  either for business or personal pleasure        You are not allowed to take any of the company s development software code or Subject Contract  Information  which includes PII  out of the country       You are not allowed to take any export controlled information unless authorized for the  destination and end use by the Export Compliance Officer  Refer to the MorphoTrust USA  Technology Control Plan PLN 00088 A 06 for additional information on export controls    e You are not allowed to VPN into the MorphoTrust network from outside of the country    e You are allowed to use https   mail morph
436. tion from the point of collection to  secure submission     Auditing  For auditing of solution access and key data changes  the system architecture  includes Security Information and Event Management  SIEM  capability  which    provides complete auditing of events across the solution components  Key user  access audit capabilities include     e Log on attempts  successful and unsuccessful       SAFRAN  Vendor Response Sheet 57    MorphoTrust USA  Attachment A     otate of West Virginia CRFP     51500000010    Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    e Password change attempts  successful and unsuccessful     e User account creation  deletion  and permissions changes Attempts to  create  modify  or delete system files and directories  successful and    unsuccessful     4 4 4 4 The Vendor should describe in detail their plan to provide a central results server which  would house the Applicant background results and be responsible for making results  available and providing notification to the appropriate submitting agencies as well as  reporting capabilities  This plan should include at a minimum the physical location of the  server  technical and security controls required to meet the current CJIS Security Policy   the method an agency will use to retrieve their results  what information an agency will  have available to them from this server and the method the state will use to transmit the  results to t
437. tions for testing performance of both web sites     Both web sites are available 24 hours a day  seven days a week  365 days a year   with minimal downtime for maintenance that is scheduled during off peak  times  Both web sites safeguard the applicant s      personal and financial information using a Secure  Secure Infrastructure in Place  MorphoTrust already has infrastructure  in place for the secure transmission and  storage of personal and financial  information of West Virginia applicants     Socket Layer protocol  SSL  following industry  standards for encryption     More than two million applicants per year register  with us online  including 55 000 applicants from the  West Virginia program         Fee Collection    Vendor must collect all Applicant fees including State and FBI fees  Vendor must accept a  the  following forms of payment online  e check and credit card  at least Visa and MasterCard  and b   the following forms of payment at the fingerprinting location  personal check  credit card  at least  Visa and MasterCard  and money order and c  prepaid and or credit billing accounts for private  agencies and employers and d  credit billing accounts for governmental agencies     The Vendor must provide statistics on the number of Applicant fingerprinting payment  transactions processed annually by payment type     The Vendor must ensure that Applicant appointments are scheduled in a timely manner within 10  business days from the time the Applicant makes initial 
438. tionship built through adversity    As we move into the future  please know that MorphoTrust will continue to  prove our commitment to the success of this program  by devoting the time and  resources necessary to resolve all outstanding program related issues and by  making quality of service to the State of West Virginia our  1 objective     Upgrade to Advanced Technology    Together we have built the trusted and reliable fingerprinting service for West  Virginia citizens that is in place today  MorphoTrust   s commitment to our  partner agencies is to continue to innovate  We propose a NO RISK upgrade our  next generation advanced technology Universal Enrollment Platform  UEP     during the first year of the new contract    UEP   An Award Winning Product   As evidence of the success of UEP  the   TSA Prev    program recently received the fingerprinting services contract with the U S    Award for the Greatest Citizen Impact and  the 2015 SAFRAN Innovation Award for   Customer Satisfaction  which includes the popular TSA Prev       UEP has been in use since 2013 for our    Transportation Security Administration  TSA      program  Our TSA program serves more than  1 5 million customers annually in more than 330 Enrollment Centers throughout  the United States and currently maintains a customer satisfaction rate of over  99 8  based on applicant surveys     UEP is also operational for our state fingerprinting services program in Texas   Just as we are doing Texas  we will phase
439. to draft a waiver or  release for the security accommodation  If the Legal Department has concerns about  granting the security accommodation  the Legal Department discusses them with the  ISO or CSO and a final resolution is determined  If the final resolution still permits the  security accommodation to be made  the Legal Department determines what information  needs to be in the waiver or release     4  The Responsible Manager sends the waiver or release to the customer for their  approval and acceptance  Once the waiver or release is accepted by the customer  the  work on implementing the security accommodation may begin     A copy of the signed or accepted waiver or release along with any supporting documentation  should be forwarded to the CSO and ISO as well as the MorphoTrust Legal Department     The granting of a security accommodation in one situation should be not construed as an implied  approval for a similar security accommodation in a similar or related situation  Each security  accommodation must be reviewed and approved separately for each situation     4 18 2 Unacceptable Security Accommodations    No security accommodations can be made in the following circumstances  unless explicitly  approved by the CSO and ISO     1  Whenever the system needs to interact openly with the Internet  Example  An application  includes functionality from Google Maps     2  Whenever the system needs to interact with any MorphoTrust systems  Examples  The  system connects to the
440. tract  At a minimum  the IT Security  Policy must address     Physical security   Access security   Monitoring and auditing capability  Data encryption   Internet security   Communication security   Intrusion protection    Virus protection    The personal information obtained from Applicants will not be utilized in any way by the Vendor  outside of the performance of this contract  Information obtained from the Applicant cannot be  resold  disseminated to any entity  business  or individual  The contractor will be required to sign  a nondisclosure agreement  This agreement is contained in Appendix B     The Vendor must provide the State with its Personal Data Privacy Policy       SAFRAN Mandatory Specification Checklist  MorphoTrust USA  Attachment B     MorphoTrust meets the requirements     In our response to requirement 4 4 4 3  we have described our approach to  security including logical access  personnel security  physical security  and  network security     In addition  Appendix A provides the following MorphoTrust policies        Privacy Policy  POL 00144 A    Describes our policies for safeguarding  the private information of our customer s citizens  Personal Data Privacy  Policy         Cyber Security Plan  PLN 00091 A 02    Describes our policies for  ensuring the security and protection of the sensitive data and the  information systems that transmit or store the data from cyber attacks  IT  Security Policy      MorphoTrust will not use the personal information ob
441. transaction completion  email notifications are sent to employing or  licensing agencies       Automated Renewal Required Notifications   tor credentials that have  expiration dates  ex  Concealed Weapon Permit   notification letters are  generated prior to the expiration advising the credential holder of the  steps required to complete the renewal process     Generation of Response Letters    MorphoTrust   s Review Client solution provides batch processing of letters  and or emails as an integral step of adjudication processing  Configurable result  processing rules govern how letter processing occurs  based upon factors such as  agency and applicant type  Key results processing capabilities of the solution  include       Only personnel authorized by State of West Virginia can generate  response letters    Q SAFRAN Mandatory Specification Checklist 105  MorphoTrust USA E     otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    106    e From      list of applicants for whom an adjudication decision has been  made  authorized personnel can specify whether to print letters for all  applicants  batch  or selectively indicate one or more applicants for  whom to generate a response letter    e Checklist of applicants for whom letters will be produced  so authorized  personnel can verify that all letters are printed and can reprint any letters  lost to printer jams  toner outag
442. trols  Network and System Access Accounts   Virus Protection   Use of Company Equipment and Software   Internet Use   Remote Access   International Travel   Encryption   Privacy    Refer to the Cell Phone and Mobile Device Policy POL 00237 A for information about such devices     2  Vendor Passwords    All vendor supplied default passwords must be changed before  or shortly thereafter  any computer or  communications system is connected to a Company network or used for Company business  This policy  applies to passwords associated with end user IDs  as well as passwords associated with system  administrator and other privileged users     3  Passwords    Network and System accounts are created by a security administrator after receiving an approved  request from human resources  The user account s access is specified in the request and access is  approved granted per the specifications  An initial password is issued for the account which automatically  prompts the user to change the password on their first login attempt  Password structure  expiration  and  reuse limitations are subject to change as needed and are described below     System  Application Length Characters Expiration Depth    Interval    Systems  Min      8 Alpha  60 days  numeric      Max      minimum 1  System numeric  Determined       Applications  Min      8 Alpha  60 days  numeric      Max      minimum 1  Application numeric  Determined    10 23 2014 MorphoTrust USA Confidential 3  EXEMPT INFORMATION    Com
443. ts should only have the privileges necessary to administer the machine and the  MorphoTrust applications  If possible  the built in Administrator account should be renamed  Any  guest accounts should be disabled  The default passwords for all default accounts should be  changed     For several types of deployments  computing devices  workstations  servers  networking gear   etc   may be logically organized into groups of devices that are configured in the same way and  provide the same functionality within a group  In production environments or customer  environments  the local Administrator account on these groups of devices may be the same on all  devices or within a group  provided the devices are on a secure network or a customer secured  network  This usually is necessary when the number of computing devices is large  such as a  large number of client workstations     Passwords on all computing devices should not be reused between different programs or  customers     10 9 2013 MorphoTrust USA Confidential and Proprietary Page 22 of 37    EXEMPT INFORMATION    Cyber Security Plan PLN 00091 A 02    4 12 10 Application Access Security Policy    All access to publicly available MorphoTrust services  Such as web applications and FIP sites   that require authentication should use a secure logon process so that usernames and passwords  are protected at all times  All access should be logged     If a secure transport mechanism such as Transport Layer Security  TLS  or Secure Soc
444. ty for the specified days  Expand a location to show appointment availability by day     Site Site Id  El Aberdeen  SD    Programs Date Appointment Slots Appointments Percent Full  TWIC  PreCheck  HME 72 16 22 22   03 10 2015 12 1 100 00   03 17 2015 12 16 67   03 24 2015 12 16 67   03 31 2015 12 0 00   04 07 2015 12 0 00   04 14 2015 12 0 00   TWIC  PreCheck  HME 739 11 64   TWIC  PreCheck  HME 877 7 64        Akron  OH  8 Albany  NY       Albuquerque  NM  Carlisle Blvd      Alexandria  VA Duke Street   8 Anchorage  AK    amp  Arlington  VA DCA   8 Ashtabula  OH   8 Atlanta  GA    amp  Atlanta  GA   Century Blvd   8 Atlanta  GA ATL   8 Atlanta  GA ATL South Terminal  8 Austin  TX      Bakersfield  CA     Baltimore  MD      Baton Rouge  LA  Bluebonnet Blvd   El Beaumont  TX    amp  Belleville  IL    amp  Bennington  VT   8 Berkeley Springs  WV    amp  Berlin  VT      Billerica  MA    TWIC  PreCheck   TWIC  PreCheck   TWIC  PreCheck     PreCheck    TWIC  PreCheck   TWIC  PreCheck   TWIC  PreCheck     PreCheck  PreCheck  PreCheck    TWIC  PreCheck   TWIC  PreCheck   TWIC  PreCheck   TWIC  PreCheck   TWIC  PreCheck   TWIC  PreCheck    PreCheck   TWIC  PreCheck   TWIC  PreCheck     HME  HME  HME    HME  HME  HME    398    704    182  640    18 3496  8 71   6 82    51 48   6 04   8 28    55 2096  6 1396  9 1296   10 4595  4 8896  4 2495   19 4295  3 7396  7 2495  0 9296  7 9295   38 2796  8 0496       Figure 6  Appointment Availability Report    Once UEP is deployed  MorphoTrust w
445. ubmit the record once  Again  if no response is  received  the issue will be escalated with the State s AFIS support team         If the submission was rejected due to poor print quality  the applicant  will be notified that their prints will need to be recaptured  Once their  prints are recaptured  the new record will be submitted to the State     Backup  Fault Tolerance  and Procedure for Unplanned Outages    UEP is serviced by our Data Center in Franklin  TN  Within this Data Center  our  network  storage  and computing devices are deployed in a reductant fashion   which allows for seamless failover when one device fails     At the data storage layer  our NAS system prevents loss of data  even if a disk  fails  by ensuring all data is stored on multiple disks  At the network layer  if a  network device fails  a backup device will automatically take over  At the  application layer  if an operation fails  the software is programmed to  automatically retry     By providing redundancy at every layer of our solution  we can ensure no data  will be lost due to a hardware failure and that data integrity can be maintained  during a failover event  Further  in the event of a power outage  our Data Center  is provided with diesel generated power to maintain services     Our workstations are designed to work on a limited basis in offline mode  so  they will continue to function during Data Center or internet outages  When  services to the Data Center are restored  the data from the w
446. uction facilities     A Customer Support Network  CSN  sometimes known as the Customer Solutions  Network  which connects a Customer Network to a Factory Network and allows the  Engineering Network access to it for maintenance and updates     6  AServices Network which offers public facing  Internet accessible applications     Firewalls with IP and port routing rules along with virtual local area network  VLAN  routing rules  are used to control connectivity and access between these different logical networks  VLANs are  used extensively within MorphoTrust to allow for finer control within these logical groupings     The following table shows the type of data that can be stored or transmitted for the type of logical  network     Company Customer  Confidential Confidential  Logical Network Type Information Information Pil Data  Admin Network       Ye            Yes    Y  Engineering Network  Customer Network    Customer Support Network  CSN     1  The Engineering Network has only a limited amount of access controlled       data on it for development  testing  and investigating specialized problems  as  authorized by management        es   es   o   No                2  There may be circumstances when            Company Confidential Information  will be shared with a customer or potential customer  with the appropriate  approvals from MorphoTrust senior management  This information may be  delivered to the customer by conventional electronic mechanisms such as email   and as suc
447. ue  If no contact information is provided  the cards are  returned to the applicant with instructions on how to complete the  registration  payment process  The applicant will complete the process and  re submit the cards to MorphoTrust     4  Cards Scanned   The Cardscan Technician scans the cards in batches and then  combines the images with the correct registration entry  MorphoTrust  software automatically converts the fingerprint card to a digital image in  preparation to building the NIST file for submission to the WVSP AFIS     5  Records submitted   The data files are combined with the fingerprint images  and transmitted to our secure Data Center     6  Transmission to Channeling Agent   Records are transmitted to WVSP AFIS  in accordance with specifications     Central Server Store and Forward Configuration    Upon contract award  MorphoTrust will continue to operate the existing central  servers and submission channels in place today  Ours 15 the only no risk  solution available that will allow continued transmissions and uninterrupted  service to applicants through the transition to the new contract  Testing and  deploying the current system will provide additional experience with the current  AFIS so we are well prepared for the upgrade to UEP     MorphoTrust   s UEP system consists of four major software components and the  hardware that hosts them  One of the software components  the    workstation      exists at the Enrollment Center site  the other three are h
448. ults    e Fee processing center that accepts money orders  checks  and credit cards   The center also manages more than 5 000 customer billing accounts     e Technical Help Desk currently supporting more than 1 200 Enrollment Centers  in all 50 U S  states     Plan for Providing Electronic Livescan Fingerprinting Services    Figure 2 summarizes our current and proposed fingerprinting process in West  Virginia  from the applicant s initial request through reporting           WendrRespnseShet    Q SAFRAN  22 SAFRAN   Attachment A  D MorphoTrust USA    State of West Virginia CRFP DPS1500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police       Figure 2  Proposed Process for West Virginia Applicant Fingerprinting Services    The steps shown in Figure 2 are as follows     1  West Virginia agency provides applicant with MorphoTrust s contact  information     2  Applicant pre enrolls using MorphoTrust   s Pre Enrollment Website or  toll free telephone  During the pre enrollment process  demographic data  is collected or entered  the applicant can pay the required fees  and an  appointment is scheduled  The applicant receives a unique identifier and  directions to the selected Enrollment Center     3  Applicant visits an Enrollment Center where their ID and demographic  data are verified  fee collected  and they are fingerprinted  The full  fingerprint record is transmitted to our Secure Data Center via secure  connec
449. ulum used for training certifying fingerprint personnel     MorphoTrust meets the requirements     We will staff Enrollment Centers with certified Enrollment Agents who are fully  trained in all aspects of the fingerprinting process  We understand that all costs  related to training Enrollment Agents rest with us and we will assume  responsibility for training and all associated costs     In addition to the following description of our curriculum used for  training certifying fingerprint personnel  we have described our Training and  Operations Manual  Computer Based Training  and Performance Evaluations in  our response to requirement 4 4 3 7     Enrollment Agent Certification Training         fingerprint technicians  referred to by MorphoTrust as Enrollment Agents   for the West Virginia Enrollment Centers  whether MorphoTrust employee   partner  or subcontractor  are required to complete an internal certification  process to ensure the Agent is competent to perform the job responsibilities   functional requirements of operating the equipment  and quality standards of  performance  Our professional certification process blends the use of a scripted  training manual with supervisory  trainer observation and Enrollment Agents  work demonstration     Enrollment Agents hired for this project will go through an orientation and  systematic training program that focuses on the West Virginia program  requirements  Upon the Enrollment Agent s completion of the onsite training   Cert
450. upport Engineer can  assist the Operations Manager with this task  If any new compliance issues are identified  they  should be addressed as soon as possible  However  if they cannot be remedied because of  customer limitations  the Operations Manager should get a written release from the customer  which explicitly allows for the lesser security in their environment   See Section 4 18 for more  information   A copy of the release should be forwarded to the CSO and ISO     For both internally hosted systems and externally hosted systems  the CIO  the Tier 3 Support  Administrator  or the Service Manager is responsible for making sure the network and  operating system  OS  configurations are secure and compliant with the CSP  including regular  patching  updating  and monitoring  For the applications being hosted  the responsible  MorphoTrust party or Primary Owner  typically a Product Manager  Program Manager or  Service Manager  is responsible for ensuring that the applications and any associated databases  are secure and compliant     For internal corporate applications and databases on the Admin Network such as HR  Finance  and Accounting systems  the CIO is responsible for securing them  Furthermore  the CIO is the  data owner for company confidential information and all data processed and stored on internal  systems in the Admin Network  The Configuration Manager is the data owner for all  development outputs on the Engineering Network  such as software  source code  buil
451. urity  We    employ a team of information system security engineers who are knowledgeable    TSA Proven Information Assurance    MorphoTrust s track record of seven  successful Certifications and Accreditations  over four TSA contracts demonstrates our  ability to meet rigorous Department of  Homeland Security and TSA information  security requirements     Our resources and credentials include     e Certified Information Systems Security  Professionals  CISSP     e Certified Ethical Hacker            e Certified Information Systems Auditor   CISA    e Certified Information Privacy  Technologist  CIPT       Co Authorship of NIST Computer  Security Special Publication   e Social Engineering Phishing Security  Awareness Training    and experienced in delivering State  FBI  and  FISMA compliant security programs     Our internal information security program is  predicated upon the guidance set forth in NIST  Special Publication 800 37  Guide for Applying  the Risk Management Framework to Federal  Information Systems  Our information security  program meets Federal Information Security  Management Act  FISMA  requirements in  order to serve our federal customers  We  implement and monitor all applicable  management  operational  and technical  controls defined by NIST Special Publication  800 53  Security and Privacy Controls for  Federal Information Systems and  Organizations  and we ensure compliance with  agency security policies and requirements     Security Awareness Training
452. urposes  and to verify its continued presence on the network    Any computer that has been on an outside network must first be brought to IT in order to allow for  a complete virus Spyware scan prior to re admittance of the computer back onto the MorphoTrust  USA network     5  Additional Information    Please refer to IT Computer and System Use Procedures  PRC 001 10 A  for further information     10 23 2014 MorphoTrust USA Confidential 4    EXEMPT INFORMATION    IT Managing Operations Policy PRC 00090 B 01    IT MANAGING OPERATIONS POLICY    Document Number  PRC 00090 B    Revision Level  01    Approval    Robert Stack Robert Eckel    Chief Information Officer President       This document contains confidential and proprietary information of MorphoTrust USA  No part of this  document may be reproduced  disclosed  distributed  or used in any form by any means   graphic   electronic  or mechanical  including photocopying  recording  taping  or information storage or retrieval      without written permission of MorphoTrust USA     Users are responsible for making sure that they have the current revision of this  document     8 22 2011 MorphoTrust USA Confidential Page 1 of 5  EXEMPT INFORMATION    IT Managing Operations Policy PRC 00090 B 01    TABLE OF CONTENTS    1 OVERVIEW M                                                     3  2 Q9  Mem                                                                         3  2 1 MONITORING OF EVENT LOGS  amp  SERVER HEALTH              
453. urs due a breach in compliance with the CSP  the CSO must  be notified promptly     4 7 Personnel Security Policy  The intent of the Personnel Security Policy is to reduce the risk of human error and misuse of    sensitive information and facilities to an acceptable level     10 9 2013 MorphoTrust USA Confidential and Proprietary Page 12 of 37    EXEMPT INFORMATION    Cyber Security Plan PLN 00091 A 02    Security roles and responsibilities must be documented and they should include general  responsibilities for all MorphoTrust personnel  Whenever possible  they should include specific  responsibilities for protecting specific confidential information and performing tasks related to the  relevant security processes and or procedures     MorphoTrust has a policy for screening potential employees and contractors to evaluate their  security risk and potential       PRC 00134 A Employee Security Screening Policy    MorphoTrust has a security awareness training policy that must be followed       PRC 00152 A Security Training Awareness Policy    MorphoTrust also has a policy so individuals can understand the liability issues involved with  protecting sensitive information       PRC 00140 A Liability Policy    4 8 Physical and Environmental Security Policy    Critical sensitive information processing and storage facilities must be contained in secure areas  protected by a defined security perimeter  with appropriate security barriers and physical access  controls  Physical protectio
454. us operation when any one node in the cluster either fails or  is taken offline for maintenance     The following Figure 46 shows the ad hoc search capability used to produce  reports in real time     Q SAFRAN Mandatory Specification Checklist 113  MorphoTrust USA              otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    Home  gt  User Reports    Finance    UES Pay Gov Report DW Home   My Subscnptrons           Start Date  4 14 2015 21 snd Date  4 21 2015 m View Report    Programs  Unknown  Multiple Program                  02  b bl ext Wd  d                  Pay Gov             Tuesday  April 21  2015 3 57       Pay Gov Report  from Tuesday  April 14  2015 to Tuesday  April 21  2015     All dates are in GMT    Payment Date Amount Type Origin Location Name     Location ID     UE ID Service Date Program Service Replacement Type Reconcile Status Submission Date Remit Date    Da    04 14 2015  60 00 CreditCardPayment Web UZZYOOORKE 04 14 2015        Enroll Reconciled Success 4 14 2015 4 14 2015  04 14 2015  60 00 CouponPayment Web UZZY0007E3 04 14 2015 CWP Enroll Reconciled Success 4 14 2015 4 14 2015  04 14 2015  67 00 CreditCardPayment Web UZZYOOOLSC 04 14 2015 NCPA  Enroll Reconciled Success 4 14 2015 4 14 2015  04 14 2015  67 00 CreditCardPayment Neb UZZYOO0S4S 04 14 2015 EMS Enroll Reconciled Success 4 14 2015 4 14 2015  04 14 2015  60 00 CreditCardPayment Web U
455. usiness activity  consume company resources bandwidth or  violate any other company policies     10 23 2014 MorphoTrust USA Confidential 6  EXEMPT INFORMATION    Computer and System Use Policy PRC 001 10 A 10    Inappropriate use of MorphoTrust USA computer systems includes the unauthorized use of test or  network probing mechanisms for the detection of network or system vulnerabilities  The possession or the  usage of these tools without the written approval of the CIO  CSO  or ISO is prohibited  Any use that  conflicts with any Human Resources policies is considered inappropriate     Software    Employees may not change the operating system configuration or install new software in such a way as  to weaken the security of the system on any MorphoTrust USA supplied computer hardware without the  written approval of the Security Department  All installed software must be used in accordance to its  license agreement and must be reviewed and approved by IT  Automatic updates of previously approved  software are normally fine  but new products should always be approved by IT     Installation of personally owned software is discouraged but allowed with the advance written permission  of the employee s immediate Manager as well as the CIO or the Director of IT  A copy of the license must  be kept with the system at all times to ensure compliance  Copying or  burning  of software in a manner  that is not consistent with the vendor s license is strictly forbidden     Email    All Mor
456. using a Lexmark MS810n or T600 series printer  Figure  35   These printers have printed thousands of hard cards while deployed in West  Virginia and other states       SAFRAN Vendor Response Sheet 75  MorphoTrust USA  Attachment A     otate of West Virginia CRFP     51500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    76    LEXMARK          9       Figure 35  Lexmark Printer Figure 36  Topaz Signature Capture Pad  Lexmark printers have printed Topaz signature pad has been used within the  thousands of hard cards in West Universal Enrollment Platform for more than  Virginia and other states  3 5 million applicants     Digital Signatures    Both the current and proposed UEP solutions offer the ability for applicant  digital signatures  After an applicant provides their demographic data and the  fingerprints are captured  the enrollment workstation requires the applicant to  attest that the information they have provided is true and accurate  The applicant  acknowledges the data is true and accurate by signing on a Topaz electronic  signature pad  Figure 36      Signatures are submitted in the Type 8 record of the NIST record  The Topaz  signature pad has been used within the Universal Enrollment Platform for more  than 3 5 million applicants     Cardscan Conversion    Hard cards may be mailed to MorphoTrust s central facility where we will  digitize them and submit them to the State AFIS just like a Lives
457. ust USA Confidential 1    EXEMPT INFORMATION    https   secure compli com Content Instance ContentInstanceViewer aspx ContentId 3984    4 17 2015    Compli  Print   MorphoTrust   Privacy Policy    Page 2 of 6                       ETT ESSE      Privacy Policy POL 00144 A 09          Table of Contents     DEM I os                                                          2         Fair Information Practice Principles                                         2  MorphoTrust USA Privacy                                                                    MC Maro                 3 1 Guidelines for Use and Handling of Privacy Information                             4     3 2 Mishandling or Misuse of Privacy Information                                       4     3 3 Testing with Customer                                           emm mmm memes 4     3 4 Obligation to Report Mishandling or Misuse of Privacy Information                         4     4      Data Examples mt tt ttn 5     E  paleas souches                                  E          5     6  Confidentiality of Pll Litt cnc 5     7  Privacy Laws and                                                               2 secs ee se enseecensne ce trist seinem e tmemr              eats 6         Bihira Fels IRR                                                  6         Edu  ation        LI m        10 08 2014 MorphoTrust USA Confidential 2    https   secure compli com Content Instance ContentInstanceViewer aspx ContentId   3984       E
458. ust re authenticate in order to gain access to the system again     To protect against sensitive information from escaping on aging media or media that is to be  reallocated  the information and  if applicable  the media should be destroyed according to the  policies in     10 9 2013 MorphoTrust USA Confidential and Proprietary Page 13 of 37    EXEMPT INFORMATION    Cyber Security Plan PLN 00091 A 02       PRC 00146 A Destruction of Electronic Media Policy    4 8 2 Customer Environments    When new projects or programs are started that will be deployed into customer environments  the  physical security considerations that should be addressed are described in      PRC 00111 A Project Security Policy    These considerations also factor in the physical security measures that are required in the  customer s environment into which MorphoTrust systems will be deployed  The lack of sufficient  physical security protections  such as in the customer s front offices  will require that any sensitive  data  typically      data  is protected with additional means  such as encryption     4 8 3 Third Party Environments    For any MorphoTrust systems that are hosted in third party environments  these environments  must be secure data centers with appropriate policies  processes and procedures to ensure the  protection of the MorphoTrust systems from any non MorphoTrust individuals  The third party  management of their facility should include risk management policies  incident reporting  proc
459. ustomer  Service Representative are forwarded to the West Virginia Customer  Service Supervisor or our Technical Support Center for resolution     e Step Three   Problems that cannot be solved or addressed by the  Customer Service Supervisor or Technical Support will be forwarded to  the Operations Manager     e Step Four   If a problem cannot be solved by the Operations Manager  the  issue will be escalated to the Project Manager  Denny Wear  Mr  Wear s  contact information is included above     e Step Five   In the unlikely event that a problem must be escalated above  the Project Manager level  the Program Executive  Kent Schmitt  should  be contacted  Mr  Schmitt s contact information is included above        Step Six   In the unlikely event that a problem must be escalated above  the Program Executive level  the Senior Vice President  Charles Carroll   should be contacted  Mr  Carroll s contact information is included above       SAFRAN Vendor Response Sheet            MorphoTrust USA  Attachment A     otate of West Virginia  Department of Administration  Purchasing Division    86    This page intentionally left blank     Vendor Response Sheet   Attachment A     CRFP DPS1500000010  Applicant Fingerprinting Services  West Virginia State Police      SAFRAN    MorphoTrust USA    Mandatory Specification Checklist   Attachment B     By signing and dating Attachment B  Mandatory Specification Checklist   MorphoTrust acknowledges that we meet or exceed each of these specificati
460. ver s license  the Enrollment Agent will insert the  license into the reader and then lay it on the platen to scan it  If the document is  dual sided  the system will ask the Enrollment Agent to scan the opposite side     Once the B5000 scans the document and performs the authentication process  the  software provides the Enrollment Agent with a status or requests further  clarifying information  For instance  if the document is dirty  the software asks  the Enrollment Agent if they are able to visually identify a specific piece of  information in a specific location of the document and provide a diagram of  where the information should be printed  If the information is found  the  Enrollment Agent confirms and the process continues     If the iA thenticate device identifies a discrepancy  the Enrollment Agent is  notified not to accept the document and the Enrollment Agent will follow the  State of West Virginia s protocols regarding un authenticated identification  documents  MorphoTrust will not fingerprint an applicant who is unable to  provide the required valid ID documents     Our UEP Livescan software will be configured to require that a valid identity  document is verified by the B5000 before allowing the record to be submitted  from the Enrollment Workstation to our Central Server  In addition  the data    Vendor Response Sheet   SAFRAN        Attachment A  MorphoTrust USA    otate of West Virginia CRFP_DPS1500000010    Department of Administration Applicant Fingerp
461. version to DSS     02 3 5 2012 Incorporated feedback from MorphoTrust James Kottas  personnel  This will become the customer  accommodation policy   02 3 8 2012 Updated Section 4 9 to remove the reference   James Kottas  to PRC 00087 B and updated the reference  to PRC 001 13 A as these two policy  documents were merged     4 9 2012 Added template letter for customer security James Kottas  accommodation notice to Section 4 17 1   Added the list of unacceptable security  accommodations to Section 4 17 2   6 15 2012   Updated policy document titles to remove James Kottas   Corporate  from them   7 18 2012   Updated Section 4 13 to include the handling   James Kottas  of large amounts of PII data when received  from a customer   02 7 20 2012   Updated Section 4 12 to add the third James Kottas  paragraph saying that all default passwords  must be changed to secure passwords that  are compliant with applicable policies   02 9 7 2012 Updated the end of Section 4 16 3 to allow for   James Kottas  a private certificate authority created and  maintained by MorphoTrust for issuing  certificates on closed networks   02 9 7 2012 Inserted a new Section 4 17 to establish a James Kottas  policy for customer support  The existing  Section 4 17 became Section 4 18  with  subsequent sections being renumbered  accordingly     02 10 30 2012   Updated Section 4 18 and its subsections James Kottas  based on feedback from Gary Chan     10 9 2013 MorphoTrust USA Confidential and Proprietary Page 35
462. vices may be connected to the network  All devices attached to the MorphoTrust USA  IT networked need to be approved by IT Management or the CIO     2  Server Room Access    The following rules control access to the IT Server Rooms   e Each Server Room is a locked facility      All Server Rooms must have a keycard entry system that monitors and logs who has accessed it  and when   Daily server room access is restricted to IT department personnel   Only authorized individuals are allowed in a Server Room   The CIO is the authorizing agent   The CIO  the CSO or their designees are the only people authorized to add an individual to the  access key card list for the Server Room  These requests are made to the key card agent   Contractors requiring access to a Server Room must be authorized by the CIO CSO designee   e Contractors granted access shall be escorted by an IT department member  Unescorted  contractor access requires authorization by the CIO and CSO       he CIO reviews Server Room access logs quarterly     3  Firewall    The following rules define the Firewall policy    e Firewalls shall be put in place where ever there is access to the internet  Remote access using  approved IT software and methods may be granted to allow employees access to critical systems  within the MorphoTrust USA network    e Remote access to critical systems  if allowed  requires a two factor authorization method such as  password and biometric  finger or voice print  and or a token or digital 
463. ware source code   hardware designs  technical drawings and specifications  In general  customers do not see or  have access to Company Confidential Information  Customer requests to see Company  Confidential Information must be approved by both the Chief Executive Officer  CEO  and the  Head of the Department which owns or maintains the requested information  for example  the  Chief Finance Officer  CFO  in the case of requests for financial or accounting information      Customer Confidential Information     Any information that is received from the customer in  confidence or to be shared with the customer in confidence  The information may originate with  the customer or it may originate within MorphoTrust  Such as any program specifications for  which the customer needs to sign off   Depending on the information involved  it may be  considered as being both Customer Confidential Information and Company Confidential  Information  In this case  the stronger of the security policies protecting Customer Confidential  Information and Company Confidential Information shall hold  unless the CSO and ISO give  explicit permission otherwise     Confidential Information     Can be either Company Confidential Information or Customer  Confidential Information or the combination of both types of information     Personally Identifiable Information  PII      The definition for PII is taken from the NSA between  MorphoTrust and the United States of America  from section 1 1  bullet    O  
464. what  purpose it serves  Access to non public data is considered on a Need to Know basis  Refer to the Need  To Know Policy POL 00141 A for more information     The Director of Manufacturing and Tier 3 Lead  are considered custodians of sensitive data  with the  authority to delegate access to data to eligible personnel and to their office staff as they deem  appropriate  The following pre requisitions are required for all custodians and delegates    e Successful background checks   e Data security training   e Final review and signoff by an authorized agent of the customer    Management  defined as the President  Executive Vice President  Senior Vice President  and Vice  Presidents  are considered Policy Makers and are typically not eligible for sensitive data access     Applicability    This policy applies to all data regardless of its media and or form  and to all those who handle secure  information including third party service providers     10 23 2014 MorphoTrust USA Confidential 3  EXEMPT INFORMATION    Sensitive Data Handling and Storage Procedures    Classification of Data    The following table classifies the data the Company handles     NON   aan PUBLIC INTERNAL  DATA  Sensitivity Open       Low to Moderate High Critical            unclassified    NON PUBLIC    CONFIDENTIAL REGULATED DATA           PRC 00148 A 05               Requirements    Information  authorized  for release  to the public    Public  information  that can be  disclosed  without  violating an  i
465. while allowing for the appropriate  processing of non public data in support of company and customer services     01 31 2012 Confidential 3 of 7    EXEMPT INFORMATION    Information Security  Customer Data Access and Security Policy PRC 00174 A 07    1 3 Applicability of Policy    This policy applies to all data regardless of its media and or form  and to all those who handle  secure information including third party service providers    2  Classification of Data    Use the criteria in the following table to determine which data classification is appropriate for a  particular information or infrastructure system     NON   NON PUBLIC  mE jns          n CONFIDENTIAL REGULATED  Sensitivity Open       Low to Moderate High Critical    Restricted data  subject to federal  state   Protection level of and other regulations  including the   data is set by the FERPA  PCI DSS  Gramm Leach Bliley   owner      custodian    HIPAA  Proxy Agreement  NSA  and or  other legal requirements        Legal  Requirements    Information    Employees  non    authorized employees with a Only those individuals with approved   for release business need to access and signed non disclosure forms  to the public    know    Information that MorphoTrust USA and its  employees have a legal  regulatory  or  social obligation to protect  Unauthorized  disclosure would violate individual privacy  rights   Highly regulated information   Unauthorized disclosure could subject  individuals to identity theft and could 
466. word or key must be transmitted separately  preferably  using a different mechanism  i e    out of band                                       must have a need to know of the PII data in order to perform their duties in  support of a customer contract     If the PII data is delivered on physically removable media  the      data contents of the media  should be transferred to the MorphoTrust secure network and the media should be locked in a  secure cabinet with limited or controlled access  Alternatively  the media can be properly erased  or destroyed if requested by the customer or the supervising Responsible Manager  If the  removable media is to be destroyed  it should be done according to        PRC 00146 A Destruction of Electronic Media Policy    Any sensitive information that is backed up or archived should follow the appropriate polices in       PRC 00084 B  7 Backup  amp  Recovery Policy     PRC 00124 A MorphoTrust USA DL ID Installation Data  amp  Security Policy      PRC 00233 A Data Encryption Policy    If sensitive information is to be backed up or archived at an off site location that is maintained by  an approved third party backup provider  the following conditions should be enforced       The sensitive information must be encrypted using a reasonably strong encryption  algorithm  While the strongest encryption algorithms are preferable  their increased  computational demands may not be practical for very large amounts of data        he encryption key must rema
467. y MorphoTrust USA    Figure 11  Appointment Confirmation    The confirmation page provides appointment details  payment information  address of the  Enrollment Center  details for preparing for the appointment  and a link to an online map     Onsite Identification Process    Currently  the Enrollment Agent reviews the applicant   s valid photo  identification prior to capturing fingerprints  in accordance with state guidelines   The Enrollment Agent ascertains  to the best extent possible  that the person is  being fingerprinted for the intended purpose and is the person shown on the ID   Acceptable forms of identification will be required  If an applicant presents an ID    Vendor Response Sheet    SAFRAN     Attachment A  MorphoTrust USA    otate of West Virginia CRFP DPS1500000010  Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    that is out of date  the Enrollment Agent informs them that they will need to  obtain a valid ID before they can be fingerprinted     Information about the requirement to present valid identification documents  before being printed and what types of identification are acceptable is provided  to the applicant at the time they schedule their appointment     Once our UEP solution is deployed  workstations will be equipped with our  proprietary document authentication software and B5000 reader to analyze state  or federal government issued photo identification documents for authenticity  
468. y maintained  updated  and tested as necessary  These  functions can be performed by the personnel identified above  so long as they have prior approval  of the CSO     8 22 2011 MorphoTrust USA Confidential Page 3 of 4  EXEMPT INFORMATION    Removable Media Policy PRC 00150 A 01    Data used in these processes  while not sensitive in and of itself  is installed on sensitive and  secure production systems and equipment  Data can be loaded from removable media by the  approved managers engineers  so long as the media meet the following requirements            approved by the CIO   e Employ  at a minimum  whole disk encryption   e Remain in the possession of the manager engineer at all times    e Never be used for any other purpose on any other machine or system       Atnotime is any PII to be placed on to the removable media    8 22 2011 MorphoTrust USA Confidential Page 4 of 4  EXEMPT INFORMATION    
469. y resources           MorphoTrust USA email records in the possession of any company email user     3 Details    3 1 E mail    Email is an efficient and timely communications tool that is provided by MorphoTrust USA to its  employees and contractors to assist them in supporting the company s functions and conducting  business within its own organization  with government and private business partners  and with the  public  Appropriate use of the email system can enhance productivity and communication  but  inappropriate use can conflict with MorphoTrust USA policies and compromise availability of the  system for all  This policy defines requirements and prohibitions for the appropriate use of the  email system or any messaging system     Principles    Use of the email system constitutes consent to abide by all elements of this policy              electronic mail address or account assigned by MorphoTrust USA is the property of  the company and under management control of the CIO       Email messages are the equivalent of letters sent on official letterhead  and must  therefore be written in a professional and courteous tone  If an email signature is being  utilized  it must adhere to the policies set forth by the MorphoTrust USA Marketing  Department       MorphoTrust USA email is public communication and therefore  senders and receivers of  email can have no expectation of privacy and are subject to company inspection and  legal discovery     02 14 2012 MorphoTrust USA Confid
470. ye Color     We    01171985 USA  BLOND   v   BLUE    504 110   Address Phone Number    800 ANY DRIVE      Curent                    Of COUCATION  rei Cducetion    Tranzachon Number FBI TCR Transaction Date Previous FBI TCR  801000000196    73 201 92743       State  State Card Sent State Name Search FBI Card Sent FBI Name Search       Applicant    2  Print Applicant Letter               Previous Tranzacbon Number  801000000196    FBI Reject              r     Cancel F10    Save   Save And Close  F11       Figure 17  View Applicant Detail   Includes demographic and transactional data       SAFRAN    MorphorTrust USA    Vendor Response Sheet     Attachment A     61    otate of West Virginia CRFP     51500000010    Department of Administration Applicant Fingerprinting Services  Purchasing Division West Virginia State Police    Ub WV CacyPath   Admeitrative Queve Review              Appi ant F            tup Windas Help                                  Screen          APPUCANT             kimpan   Notes   Documents Rendi Staten   Aoc  cant Selection     vist VIRGINIA AFIE STATE SEARCH RESULTS   W4 Mow 2011 9 36               SEARCH           TEST  AFPLICANT  SEARCH         1171985      RESPONDENT           TEST  AFFLICANT       RESPONDENT DON  in 171785       RESPONDENT  1  1195891                           Rap theet gt        FR                                     257087 BOING CET RAF        THIS RESPONSE 15 THE RESULT OF YOUR INQUIRY        FUR    ATR AFIS SID 1195871 FBL       
471. ying the CSO     External firewalls shall be tested for security weaknesses on a quarterly basis  including  ethical hacking     The firewall system administrator is responsible for implementing and documenting all  rules and filters     The initial configuration of the firewall and all changes must be approved by the Change  Control Board  CCB  led by the senior most operations manager and the CIO  in writing     Changes to the base firewall infrastructure must go through the MorphoTrust USA IT  Change Control Management Process     Any operational alterations to the existing firewall must be approved by the CCB and the        in writing     All security changes to the firewall must be tracked by the IT Change Control System and  all security events shall be tracked in the security log     The firewall rules and filters shall be reviewed every quarter by the Manager of  Operations and rationalized against 1  service needs and 2  customer requirements     05 31 2013 MorphoTrust USA Confidential Page 3 of 3    EXEMPT INFORMATION    Electronic Communication Policy PRC 001 13 A 02    IT Electronic    Communication Policy    Document Number  PRC 0001 13 A    Hevision Level  02    Approval    Dennis Kallelis Hobert Stack       Chief Security Officer  CSO  Chief Information Officer  CIO     This document contains confidential and proprietary information of MorphoTrust USA  No part of this  document may be reproduced  disclosed  distributed  or used in any form by any means   graphi
472. za Dr  Ste 106 Mon   Fri 10 00   7 00  Sat  10 00   2 00   Fort Worth 13820 Hwy 377 S Hours Vary   FORT WORTH 100 UNIVERSITY DRIVE M   F 8 4 30   Frisco 3311 Preston Rd  Ste 9 Mon   Sat Hours Vary   FRISCO 5515 OHIO M F8 4 30   Galveston 4623 Fort Crockett Mon   Fri 9 00   6 00   GARLAND 501 S JUPITER ROAD M F9 4   George West 208 N Nueces Thu 10 00   4 30   Gonzales 1811 E Sarah Dewitt Dr Mon  amp  Thu 11 00   4 30   Graham 1581 US 380 Tues 9 00 4 00   Greenville 2806 Mitchell St Mon  Wed  amp  Fri 1 00    4 30  T  Th 9 00 5 00   Harlingen 1325 South 77 Sunshine Strip  Ste  B M  W  F 9 00 5 00  T  Th    9 00 7 00  Sat 9 00 4 00    F UPU                  I   H                                                         SAFRAN Appendix C      MorphoTrust USA List of Fingerprinting Centers    CRFP DPS1500000010  Applicant Fingerprinting Services  West Virginia State Police    otate of West Virginia  Department of Administration  Purchasing Division    HARLINGEN 222 VAN BUREN  SUITE 610 HOURS VARY   HEREFORD 601 N 25 MILE AVE W 8 00 12 00   Hereford 601 N 25 Mile Ave Tue 8 00   12 00  Thu 8 00    4 00   Hondo 1210 18th St  Ste B 1 Tue 10 00   5 00   Houston 6870 Harrisburg Blvd M      11 00   7 00   Houston 9474 Hammerly Blvd Mon   Thurs 11 00 7 00   Houston 10763 Gulf Freeway M   F 11 00 6 40   Houston 11111 Katy Fwy  Suite 750   Houston 11250 Charles Rd Mon   Fri 8 30   4 30   Houston 440 Benmar Dr  Ste 2000 Mon   Fri 8 20   4 30   HOUSTON 14425 TORREY CHASE  SUITE 240 HOURS VARY 
    
Download Pdf Manuals
 
 
    
Related Search
    
Related Contents
  soba-rotary-table  OPERATION & INSTALLATION MANUAL AIS RX CARBON & AIS  Colombelles City    LG 47LH90 47" Full HD LED TV  壁寄せTVボード  FINGERPRINT LOCK USER'S GUIDE  Supermicro PDSM4  PC1000 User Manual - Sun Electronic Systems    Copyright © All rights reserved. 
   Failed to retrieve file