| ||Format||Pages||Price|| |
|17||$50.00||  ADD TO CART|
|Hardcopy (shipping and handling)||17||$50.00||  ADD TO CART|
Significance and Use
4.1 There is currently no way to ensure consistency among all entities across the nation for access to an incident or event scene. This guide is intended to enable consistency in credentials with respect to verification of identity, qualifications, and deployment authorization (NIMS 0002).
4.2 This guide is intended to be used by any entity that manages and controls access to an incident scene to facilitate interoperability and ensure consistency.
1.1 The focus of this guide is on the development of guidelines for credentialing for access. The guide addresses the fundamental terms, criteria, references, definitions, and process model for implementation of credentialing or a credentialing program.
1.2 This guide explains and identifies actions and processes that can provide the foundation for consistent use and interoperability of credentialing for all entities.
1.3 This guide describes the activities involved in creating a credentialing framework, which may include a physical badge; however, it does not define the knowledge, skills, or abilities required to gain access to a site or event. This guide does not address a requirement for a physical badge as a prerequisite for a credential. A badge may be an accepted credential across jurisdictional lines and other credentials may be issues by the AHJ at the scene.
1.4 This guide reinforces the importance of controlling access to a site by individuals with the proper identification, qualification, and authorization, which supports effective management of deployed resources.
1.5 This guide relies on the existing rules, regulations, laws, and policies of the AHJ. Regulations identifying personal and private information as public record may differ from a responder’s home jurisdiction.
1.6 This guide utilizes the principles of the Data Management Association Guide to the Data Management Body of Knowledge (DAMA-DMBOK) in order to effectively control data and information assets and does not prescribe the use of technology-based solutions.
1.7 This standard does not purport to address all of the safety concerns, if any, associated with its use. It is the responsibility of the user of this standard to establish appropriate safety and health practices and determine the applicability of regulatory limitations prior to use.
2. Referenced Documents (purchase separately) The documents listed below are referenced within the subject standard but are not provided as part of the standard.
NIST StandardFIPS 201 Personal Identification Verification (PIV) of Federal Employees and Contractors and Associated Special Publications (SPs), March 2011
NFPA StandardNFPA 1600 Standard on Disaster/Emergency Management and Business Continuity Programs, NFPA 2007.
Department of Homeland SecurityHomeland Security Presidential Directive (HSPD) 12 Policy for a Common Identification Standard for Federal Employees and Contractors, August 27, 2004. NIMS Available from http://www.fema.gov/pdf/emerge December, 2008
DAMA InternationalThe DAMA Guide to the Data Management Body of Know 2009
Federal Emergency Management AgencyGuideline for the Credentialing of Personnel July 2011 National Response Framework Available from http:// January 2008 NIMS Guide 0002 Available from http://www.fema.gov National Credentialing Definition and Criteria, March 27, 2007. NIMS Guideline for the Credentialing of Personnel July 2011.
ICS Number Code 35.040 (Character sets and information coding); 35.240.99 (IT applications in other fields)
ASTM E2842-14, Standard Guide for Credentialing for Access to an Incident or Event Site, ASTM International, West Conshohocken, PA, 2014, www.astm.orgBack to Top