Why despite the reform activities in the process are taking longer in fiscal year 2015 is an average of 95 days to process the secret clearance and 179 days for the secret clearance. In 2016, it took an average of 166 days to process and 246 for the topsecret clearance. Thats quite a job in the timeline it takes to get there. More than a decade ago that processes were transferred from the department of defense and now there is talk of transferring the process back to the department of defense. We also have the newly created the opm and the dod have a shared responsibility to make sure we stop moving the organizational boxes around as we transition, we need to talk about the efficiency and make sure at the end of the day we are protecting and securing the United States of america. Theres a tremendous amount of people that are working on these issues. We will have additional hearings and discuss that. I personally believe and i would like to draw this out, attracting and retaining the pr
Why despite the reform activities in the process are taking longer in fiscal year 2015 is an average of 95 days to process the secret clearance and 179 days for the secret clearance. In 2016, it took an average of 166 days to process and 246 for the topsecret clearance. Thats quite a job in the timeline it takes to get there. More than a decade ago that processes were transferred from the department of defense and now there is talk of transferring the process back to the department of defense. We also have the newly created the opm and the dod have a shared responsibility to make sure we stop moving the organizational boxes around as we transition, we need to talk about the efficiency and make sure at the end of the day we are protecting and securing the United States of america. Theres a tremendous amount of people that are working on these issues. We will have additional hearings and discuss that. I personally believe and i would like to draw this out, attracting and retaining the pr
Efficiency of federal employee background checks. The Oversight Reform Committee questioned office and management of budget officials to protect federal employees personal information. This hearing is about 2. 5 hours. Committee on oversight government reform will come to order and without objection, the chair is authorized to declare a recess at any time. Appreciate you all being here. We have very important hearing. We have a number of members that im sure will be here, but it will be late. There is the National Prayer breakfast and getting across town at this point of the day is a difficult task. Nevertheless, glad to have you here and look forward to this important hearing. Two years ago, the office of Personnel Management suffered one of the most damaging data breaches in the history of the federal government. This went on for some time and we still, there are still Additional Details that need to be learned. But the counterintelligence value of the data that was stolen will last
Mrs. Gillibrand madam president . The presiding officer the senator from new york. Mrs. Gillibrand i rise today to speak about my amendment to the National Defense authorization act, an amendment known as the bipartisan military justice improvement act. I want to start by thanking my colleagues on both sides of the aisle for their strong and unwavering leadership on behalf of our brave men and women in uniform. I could not be more proud of the bipartisan work that has been done to do the right thing. I want to thank senator reid, senator booker, senator heller, our three most recent supporters of our bill. I want to thank them for scored scored for their leadership to end the scourge of Sexual Violence in the military. I want to thank the senator from missouri for her unwavering commitment for helping victims of Sexual Assault. Although we disagree on my amendment, i want to remind all our colleagues that the Defense Authorization has been made stronger in innumerable ways by senator m
Is that not typically a question you would ask . Well or. Its like this. If you design a part for a car, you know your parts working, would you like to know that the car works . Absolutely. Thats what im asking you, would you have liked to have known your system worked, is that correct . Well, that would be correct. Ms. Bauer . Yes. Okay. Are these controls embedded in the applications at the direction of cms . They were assessed, but, yes, they were embedded, configuration changes would be made based on controls. And at what point of the phase should security controls begin to be embedded into the application . At the production phase. Generally, when we test, were assuming were looking at the productionready version of the application, and then we apply those cms security controls we talked about and assess those against the productionready version. They em belledded into the architecture of healthcare. Gov . The overall cms Enterprise Security controls are to be applied across all t