SlideShare a Scribd company logo
1 of 1
Download to read offline
Fermilab
Computing Division
ID Card Security
Access Activation
Cardholders Name (Print)
Last

Citizenship is:

United States

Fermi I.D. Number

Access To:

FCC

M.I.

or Non-United States

Expiration Date:

Email:

On-site Phone #

First

Prox Card #

Affiliation or Company

CD-GCC
(List Specific Area)

CD-LCC

(List Specific Area)

CD-WH8

Cardholder:
Subcontractors
I have completed subcontractor safety orientation training and will carry contractors
training card with me at all times while at Fermilab.
Yes (Date Received)

No

Persons whose jobs require working in our computer rooms must read, print and sign:
Procedures for performing work in CD Computer Rooms (CD-Doc-628)
Hazard Analysis for working in Computer Rooms (CD-DOC-627)

I have completed the required training and understand Computing Division work rules.

Cardholders Signature
Supervisors Signature
(Notice: Supervisors must notify CD Building Management of changes to work assignments and needed access levels of Cardholders)

More Related Content

Viewers also liked

Penfield High School Wfs Parent Info Letter
Penfield High School Wfs   Parent Info LetterPenfield High School Wfs   Parent Info Letter
Penfield High School Wfs Parent Info Letterwaterforsudan
 
시시콜콜 및 OPEN API 설명
시시콜콜 및 OPEN API 설명시시콜콜 및 OPEN API 설명
시시콜콜 및 OPEN API 설명건우 이
 
Cornerstone Product
Cornerstone ProductCornerstone Product
Cornerstone Productbevlena
 
덕성여자대학교 낙소스 어플 다운로드 방법
덕성여자대학교 낙소스 어플 다운로드 방법덕성여자대학교 낙소스 어플 다운로드 방법
덕성여자대학교 낙소스 어플 다운로드 방법덕성여자대학교 도서관
 
SMED Setup & Lead Time Reduction
SMED Setup & Lead Time ReductionSMED Setup & Lead Time Reduction
SMED Setup & Lead Time ReductionAnand Subramaniam
 
Mathematical analysis of identical circles touching one another on the whole ...
Mathematical analysis of identical circles touching one another on the whole ...Mathematical analysis of identical circles touching one another on the whole ...
Mathematical analysis of identical circles touching one another on the whole ...Harish Chandra Rajpoot
 
컴퓨터기초설계(설문분석)2014-2
컴퓨터기초설계(설문분석)2014-2컴퓨터기초설계(설문분석)2014-2
컴퓨터기초설계(설문분석)2014-2Yong Heui Cho
 
Pulmonary Embolism
Pulmonary EmbolismPulmonary Embolism
Pulmonary Embolismdrmcbansal
 
SnS선거를 위한 서비스 (소셜홈 & 모바일홈)
SnS선거를 위한 서비스 (소셜홈 & 모바일홈)SnS선거를 위한 서비스 (소셜홈 & 모바일홈)
SnS선거를 위한 서비스 (소셜홈 & 모바일홈)호천 김
 
A오즈 화이트데이 이벤트
A오즈 화이트데이 이벤트A오즈 화이트데이 이벤트
A오즈 화이트데이 이벤트애니파크
 

Viewers also liked (12)

Penfield High School Wfs Parent Info Letter
Penfield High School Wfs   Parent Info LetterPenfield High School Wfs   Parent Info Letter
Penfield High School Wfs Parent Info Letter
 
시시콜콜 및 OPEN API 설명
시시콜콜 및 OPEN API 설명시시콜콜 및 OPEN API 설명
시시콜콜 및 OPEN API 설명
 
Basic metabolic principles
Basic metabolic principlesBasic metabolic principles
Basic metabolic principles
 
Cornerstone Product
Cornerstone ProductCornerstone Product
Cornerstone Product
 
덕성여자대학교 낙소스 어플 다운로드 방법
덕성여자대학교 낙소스 어플 다운로드 방법덕성여자대학교 낙소스 어플 다운로드 방법
덕성여자대학교 낙소스 어플 다운로드 방법
 
SMED Setup & Lead Time Reduction
SMED Setup & Lead Time ReductionSMED Setup & Lead Time Reduction
SMED Setup & Lead Time Reduction
 
Mathematical analysis of identical circles touching one another on the whole ...
Mathematical analysis of identical circles touching one another on the whole ...Mathematical analysis of identical circles touching one another on the whole ...
Mathematical analysis of identical circles touching one another on the whole ...
 
Santiago Calatrava
Santiago CalatravaSantiago Calatrava
Santiago Calatrava
 
컴퓨터기초설계(설문분석)2014-2
컴퓨터기초설계(설문분석)2014-2컴퓨터기초설계(설문분석)2014-2
컴퓨터기초설계(설문분석)2014-2
 
Pulmonary Embolism
Pulmonary EmbolismPulmonary Embolism
Pulmonary Embolism
 
SnS선거를 위한 서비스 (소셜홈 & 모바일홈)
SnS선거를 위한 서비스 (소셜홈 & 모바일홈)SnS선거를 위한 서비스 (소셜홈 & 모바일홈)
SnS선거를 위한 서비스 (소셜홈 & 모바일홈)
 
A오즈 화이트데이 이벤트
A오즈 화이트데이 이벤트A오즈 화이트데이 이벤트
A오즈 화이트데이 이벤트
 

Similar to Fermilab Procedures for Protected PII Dane Skow

Source Code Escrow Agreements 2010.02.12
Source Code Escrow Agreements   2010.02.12Source Code Escrow Agreements   2010.02.12
Source Code Escrow Agreements 2010.02.12Richard Austin
 
Gilco Consulting Services Semiconductor Presentation
Gilco Consulting Services Semiconductor PresentationGilco Consulting Services Semiconductor Presentation
Gilco Consulting Services Semiconductor Presentationgilco915
 
Policies & Laws in IT industry
Policies & Laws in IT industryPolicies & Laws in IT industry
Policies & Laws in IT industryRohana K Amarakoon
 
Dmdc ccc-ticketing system requirements v7b
Dmdc ccc-ticketing system requirements  v7bDmdc ccc-ticketing system requirements  v7b
Dmdc ccc-ticketing system requirements v7bAlecia Chrin
 
Ezhilarasu_C,C++,Telecom,Resume
Ezhilarasu_C,C++,Telecom,ResumeEzhilarasu_C,C++,Telecom,Resume
Ezhilarasu_C,C++,Telecom,ResumeEzhilarasu A
 
Project Proposal Presentation-C.O.D.E-7 Solutions
Project Proposal Presentation-C.O.D.E-7 SolutionsProject Proposal Presentation-C.O.D.E-7 Solutions
Project Proposal Presentation-C.O.D.E-7 SolutionsDiren Dantanarayana
 
Cm peoplesoft admin
Cm peoplesoft adminCm peoplesoft admin
Cm peoplesoft adminGururaj Iyer
 
Embedded systems presentation power point.ppt
Embedded systems presentation power point.pptEmbedded systems presentation power point.ppt
Embedded systems presentation power point.pptssuser1b4013
 
Pc assembly with_configuration_and_networking
Pc assembly with_configuration_and_networkingPc assembly with_configuration_and_networking
Pc assembly with_configuration_and_networkingJohndion Ruloma
 
Amy C. Lease Resume update 2016
Amy C. Lease Resume update 2016Amy C. Lease Resume update 2016
Amy C. Lease Resume update 2016Lease Amy
 
Technical functional requirements every contractor must adhere to before appl...
Technical functional requirements every contractor must adhere to before appl...Technical functional requirements every contractor must adhere to before appl...
Technical functional requirements every contractor must adhere to before appl...Shane Emerson
 
CMMC for Contractors and Manufacturers – What to Know for 2023
CMMC for Contractors and Manufacturers – What to Know for 2023CMMC for Contractors and Manufacturers – What to Know for 2023
CMMC for Contractors and Manufacturers – What to Know for 2023Withum
 
Three d company-AAI Presentation
Three d company-AAI PresentationThree d company-AAI Presentation
Three d company-AAI PresentationAmit Kumar
 
Cisco cdr reporting it’s easy if you do it smart
Cisco cdr reporting  it’s easy if you do it smartCisco cdr reporting  it’s easy if you do it smart
Cisco cdr reporting it’s easy if you do it smartReza Mousavi
 
2016 01-05 csr css non-confidential slide deck
2016 01-05 csr  css non-confidential slide deck2016 01-05 csr  css non-confidential slide deck
2016 01-05 csr css non-confidential slide deckRichard (Dick) Kaufman
 

Similar to Fermilab Procedures for Protected PII Dane Skow (20)

Source Code Escrow Agreements 2010.02.12
Source Code Escrow Agreements   2010.02.12Source Code Escrow Agreements   2010.02.12
Source Code Escrow Agreements 2010.02.12
 
Gilco Consulting Services Semiconductor Presentation
Gilco Consulting Services Semiconductor PresentationGilco Consulting Services Semiconductor Presentation
Gilco Consulting Services Semiconductor Presentation
 
Final Project
Final ProjectFinal Project
Final Project
 
Policies & Laws in IT industry
Policies & Laws in IT industryPolicies & Laws in IT industry
Policies & Laws in IT industry
 
Dmdc ccc-ticketing system requirements v7b
Dmdc ccc-ticketing system requirements  v7bDmdc ccc-ticketing system requirements  v7b
Dmdc ccc-ticketing system requirements v7b
 
Ezhilarasu_C,C++,Telecom,Resume
Ezhilarasu_C,C++,Telecom,ResumeEzhilarasu_C,C++,Telecom,Resume
Ezhilarasu_C,C++,Telecom,Resume
 
Project Proposal Presentation-C.O.D.E-7 Solutions
Project Proposal Presentation-C.O.D.E-7 SolutionsProject Proposal Presentation-C.O.D.E-7 Solutions
Project Proposal Presentation-C.O.D.E-7 Solutions
 
Cm peoplesoft admin
Cm peoplesoft adminCm peoplesoft admin
Cm peoplesoft admin
 
Embedded systems presentation power point.ppt
Embedded systems presentation power point.pptEmbedded systems presentation power point.ppt
Embedded systems presentation power point.ppt
 
Pc assembly with_configuration_and_networking
Pc assembly with_configuration_and_networkingPc assembly with_configuration_and_networking
Pc assembly with_configuration_and_networking
 
Sample
SampleSample
Sample
 
Amy C. Lease Resume update 2016
Amy C. Lease Resume update 2016Amy C. Lease Resume update 2016
Amy C. Lease Resume update 2016
 
Technical functional requirements every contractor must adhere to before appl...
Technical functional requirements every contractor must adhere to before appl...Technical functional requirements every contractor must adhere to before appl...
Technical functional requirements every contractor must adhere to before appl...
 
CMMC for Contractors and Manufacturers – What to Know for 2023
CMMC for Contractors and Manufacturers – What to Know for 2023CMMC for Contractors and Manufacturers – What to Know for 2023
CMMC for Contractors and Manufacturers – What to Know for 2023
 
cv for H
cv for  Hcv for  H
cv for H
 
Computer svc3
Computer svc3Computer svc3
Computer svc3
 
Three d company-AAI Presentation
Three d company-AAI PresentationThree d company-AAI Presentation
Three d company-AAI Presentation
 
Narf blank 4
Narf blank 4Narf blank 4
Narf blank 4
 
Cisco cdr reporting it’s easy if you do it smart
Cisco cdr reporting  it’s easy if you do it smartCisco cdr reporting  it’s easy if you do it smart
Cisco cdr reporting it’s easy if you do it smart
 
2016 01-05 csr css non-confidential slide deck
2016 01-05 csr  css non-confidential slide deck2016 01-05 csr  css non-confidential slide deck
2016 01-05 csr css non-confidential slide deck
 

More from Information Security Awareness Group

Securing the Data in Big Data Security Analytics by Kevin Bowers, Nikos Trian...
Securing the Data in Big Data Security Analytics by Kevin Bowers, Nikos Trian...Securing the Data in Big Data Security Analytics by Kevin Bowers, Nikos Trian...
Securing the Data in Big Data Security Analytics by Kevin Bowers, Nikos Trian...Information Security Awareness Group
 
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
 Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf... Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...Information Security Awareness Group
 
Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...
Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...
Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...Information Security Awareness Group
 
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...Information Security Awareness Group
 
Big data analysis concepts and references by Cloud Security Alliance
Big data analysis concepts and references by Cloud Security AllianceBig data analysis concepts and references by Cloud Security Alliance
Big data analysis concepts and references by Cloud Security AllianceInformation Security Awareness Group
 
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...
 Authorization Policy in a PKI Environment  Mary Thompson Srilekha Mudumbai A... Authorization Policy in a PKI Environment  Mary Thompson Srilekha Mudumbai A...
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...Information Security Awareness Group
 
Introduction to distributed security concepts and public key infrastructure m...
Introduction to distributed security concepts and public key infrastructure m...Introduction to distributed security concepts and public key infrastructure m...
Introduction to distributed security concepts and public key infrastructure m...Information Security Awareness Group
 
OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...
OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...
OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...Information Security Awareness Group
 
Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...
Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...
Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...Information Security Awareness Group
 

More from Information Security Awareness Group (20)

Securing the Data in Big Data Security Analytics by Kevin Bowers, Nikos Trian...
Securing the Data in Big Data Security Analytics by Kevin Bowers, Nikos Trian...Securing the Data in Big Data Security Analytics by Kevin Bowers, Nikos Trian...
Securing the Data in Big Data Security Analytics by Kevin Bowers, Nikos Trian...
 
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
 Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf... Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
 
Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...
Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...
Mobile Devices – Using Without Losing Mark K. Mellis, Associate Information S...
 
IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,
 
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
 
Big data analysis concepts and references by Cloud Security Alliance
Big data analysis concepts and references by Cloud Security AllianceBig data analysis concepts and references by Cloud Security Alliance
Big data analysis concepts and references by Cloud Security Alliance
 
Big data analysis concepts and references
Big data analysis concepts and referencesBig data analysis concepts and references
Big data analysis concepts and references
 
PKI by Tim Polk
PKI by Tim PolkPKI by Tim Polk
PKI by Tim Polk
 
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...
 Authorization Policy in a PKI Environment  Mary Thompson Srilekha Mudumbai A... Authorization Policy in a PKI Environment  Mary Thompson Srilekha Mudumbai A...
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...
 
Pki by Steve Lamb
Pki by Steve LambPki by Steve Lamb
Pki by Steve Lamb
 
PKI by Gene Itkis
PKI by Gene ItkisPKI by Gene Itkis
PKI by Gene Itkis
 
Introduction to distributed security concepts and public key infrastructure m...
Introduction to distributed security concepts and public key infrastructure m...Introduction to distributed security concepts and public key infrastructure m...
Introduction to distributed security concepts and public key infrastructure m...
 
OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...
OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...
OThe Open Science Grid: Concepts and Patterns Ruth Pordes, Mine Altunay, Bria...
 
Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...
Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...
Optimal Security Response to Attacks on Open Science Grids Mine Altunay, Sven...
 
THE OPEN SCIENCE GRID Ruth Pordes
THE OPEN SCIENCE GRID Ruth PordesTHE OPEN SCIENCE GRID Ruth Pordes
THE OPEN SCIENCE GRID Ruth Pordes
 
Open Science Grid security-atlas-t2 Bob Cowles
Open Science Grid security-atlas-t2 Bob CowlesOpen Science Grid security-atlas-t2 Bob Cowles
Open Science Grid security-atlas-t2 Bob Cowles
 
Security Open Science Grid Doug Olson
Security Open Science Grid Doug OlsonSecurity Open Science Grid Doug Olson
Security Open Science Grid Doug Olson
 
Open Science Group Security Kevin Hill
Open Science Group Security Kevin HillOpen Science Group Security Kevin Hill
Open Science Group Security Kevin Hill
 
Xrootd proxies Andrew Hanushevsky
Xrootd proxies Andrew HanushevskyXrootd proxies Andrew Hanushevsky
Xrootd proxies Andrew Hanushevsky
 
Privilege Project Vikram Andem
Privilege Project Vikram AndemPrivilege Project Vikram Andem
Privilege Project Vikram Andem
 

Recently uploaded

Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinojohnmickonozaleda
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 

Recently uploaded (20)

Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipino
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 

Fermilab Procedures for Protected PII Dane Skow

  • 1. Fermilab Computing Division ID Card Security Access Activation Cardholders Name (Print) Last Citizenship is: United States Fermi I.D. Number Access To: FCC M.I. or Non-United States Expiration Date: Email: On-site Phone # First Prox Card # Affiliation or Company CD-GCC (List Specific Area) CD-LCC (List Specific Area) CD-WH8 Cardholder: Subcontractors I have completed subcontractor safety orientation training and will carry contractors training card with me at all times while at Fermilab. Yes (Date Received) No Persons whose jobs require working in our computer rooms must read, print and sign: Procedures for performing work in CD Computer Rooms (CD-Doc-628) Hazard Analysis for working in Computer Rooms (CD-DOC-627) I have completed the required training and understand Computing Division work rules. Cardholders Signature Supervisors Signature (Notice: Supervisors must notify CD Building Management of changes to work assignments and needed access levels of Cardholders)