How can I add alternate contact methods for receiving one-time PINS?
Question
How can I add alternate contact methods for receiving one-time PINS?
Answer
Access your Personal Settings menu and select the Two-Factor Authentication option. There you will be able to review and update your preferred method for receiving a one-time PIN. Your other email addresses or mobile number on record will become your alternate contact methods. Select the Email Address or Mobile Phone option to make updates.
You are entering an Official U.S. Government System
By using this Information system consent to the following conditions:
The USG routinely intercepts and monitors communications on this IS for purposes
including, but not limited to, penetration testing, COMSEC monitoring, network
operations and defense, personal misconduct (PM), law enforcement (LE), and
counterintelligence (CI) investigations.
At any time, the USG may inspect and seize data stored on this IS.
Communications using, or data stored on, this IS are not private, are subject
to routine monitoring, interception, and search, and may be disclosed or used
for any USG-authorized purpose.
This IS includes security measures (e.g., authentication and access controls) to
protect USG interests--not for your personal benefit or privacy.
Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI
investigative searching or monitoring of the content of privileged communications,
or work product, related to personal representation or services by attorneys,
psychotherapists, or clergy, and their assistants. Such communications and work
product are private and confidential. See User Agreement
and User Rules of Behavior for details.
Privacy Act Statement:
The Information accessed through this system is for OFFICIAL USE ONLY and
must be protected in accordance with the PRIVACY ACT OF 1974.
The Privacy Act of 1974 covers the information you provide to AskDFAS.
To receive a copy of the Privacy Act Statement for the actions you enter into the system, please see your supervisor.
Authority: Title 5 U.S.C. Chapters 53, 55, 81; Title 10 U.S.C. Chapters 11, 61-73; Title 37 U.S.C.;
GAO Manual for Guidance of Federal Agencies, Title 6, Chapter 4, para. 4.2.B.2; and E.O. 9397
Purpose of Use/Dissemination: Data gathered by the AskDFAS system is shared/disseminated to DFAS operations personnel with a need-to-know to include customer service representatives, accountants or technicians for purposes of use in identifying, researching and satisfying ticket inquiries within DFAS accounting systems. PII information types subject to gathering are listed here:
Routine Uses: Those generally permitted under the 5 U.S.C. 522A(B) of the Privacy Act as required.
Disclosure: Disclosure is voluntary.
Section 508 Compliance Statement
In accordance with Section 508 of the Rehabilitation Act of 1973, as amended, (29 U.S.C. 794d), DFAS is committed to
ensuring that AskDFAS functionality and content is accessible to all customers. Send feedback or concerns related to
the accessibility of this website to the DFAS 508 coordinator at: dfas.indianapolis-in.zta.mbx.section508@mail.mil.
For more information about Section 508, please visit the DoD Chief Information Officer (CIO) Section 508 Website
available at https://dodcio.defense.gov/DoDSection508.aspx
MANDATORY NOTICE AND CONSENT PROVISION FOR ALL DOD INFORMATION SYSTEM USER AGREEMENTS
By clicking the Consent button on the prior page to enter the system, you acknowledge:
You are accessing a U.S. Government (USG) information system (IS)
(which includes any device attached to this information system) that is
provided for U.S. Government-authorized use only.
You consent to the following conditions
The U.S. Government routinely intercepts and monitors
communications on this information system for purposes including,
but not limited to, penetration testing, communications security
(COMSEC) monitoring, network operations and defense, personnel
misconduct (PM), law enforcement (LE), and counterintelligence (CI)
investigations.
At any time, the U.S. Government may inspect and seize data stored
on this information system.
Communications using, or data stored on, this information system
are not private, are subject to routine monitoring, interception,
and search, and may be disclosed or used for any U.S.
Government-authorized purpose.
This information system includes security measures (e.g.,
authentication and access controls) to protect U.S. Government
interests -- not for your personal benefit or privacy.
Notwithstanding the above, using an information system does not
constitute consent to personnel misconduct, law enforcement, or
counterintelligence investigative searching or monitoring of the
content of privileged communications or data (including work
product) that are related to personal representation or services by
attorneys, psychotherapists, or clergy, and their assistants. Under
these circumstances, such communications and work product are
private and confidential, as further explained below:
Nothing in this User Agreement shall be interpreted to limit
the user's consent to, or in any other way restrict or affect,
any U.S. Government actions for purposes of network
administration, operation, protection, or defense, or for
communications security. This includes all communications and
data on an information system, regardless of any applicable
privilege or confidentiality.
The user consents to interception/capture and seizure of ALL
communications and data for any authorized purpose (including
personnel misconduct, law enforcement, or counterintelligence
investigation). However, consent to interception/capture or
seizure of communications and data is not consent to the use of
privileged communications or data for personnel misconduct, law
enforcement, or counterintelligence investigation against any
party and does not negate any applicable privilege or
confidentiality that otherwise applies.
Whether any particular communication or data qualifies for the
protection of a privilege, or is covered by a duty of
confidentiality, is determined in accordance with established
legal standards and DoD policy. Users are strongly encouraged
to seek personal legal counsel on such matters prior to using
an information system if the user intends to rely on the
protections of a privilege or confidentiality.
Users should take reasonable steps to identify such
communications or data that the user asserts are protected by
any such privilege or confidentiality. However, the user's
identification or assertion of a privilege or confidentiality
is not sufficient to create such protection where none exists
under established legal standards and DoD policy.
A user's failure to take reasonable steps to identify such
communications or data as privileged or confidential does not
waive the privilege or confidentiality if such protections
otherwise exist under established legal standards and DoD
policy. However, in such cases the U.S. Government is
authorized to take reasonable actions to identify such
communication or data as being subject to a privilege or
confidentiality, and such actions do not negate any applicable
privilege or confidentiality.
These conditions preserve the confidentiality of the
communication or data, and the legal protections regarding the
use and disclosure of privileged information, and thus such
communications and data are private and confidential. Further,
the U.S. Government shall take all reasonable measures to
protect the content of captured/seized privileged
communications and data to ensure they are appropriately
protected.
In cases when the user has consented to content searching or
monitoring of communications or data for personnel misconduct, law
enforcement, or counterintelligence investigative searching, (i.e.,
for all communications and data other than privileged
communications or data that are related to personal representation
or services by attorneys, psychotherapists, or clergy, and their
assistants), the U.S. Government may, solely at its discretion and
in accordance with DoD policy, elect to apply a privilege or other
restriction on the U.S. Government's otherwise authorized use or
disclosure of such information.
All of the above conditions apply regardless of whether the access or use
of an information system includes the display of a Notice and Consent
Banner ("banner"). When a banner is used, the banner functions to remind
the user of the conditions that are set forth in this User Agreement,
regardless of whether the banner describes these conditions in full detail
or provides a summary of such conditions, and regardless of whether the
banner expressly references this User Agreement.
AskDFAS Rules of Behavior
By clicking the Consent button on the prior page to enter the system, you
acknowledge as an Authorized user you shall:
Hold a U.S. Government security clearance commensurate with the level of
access granted.
Access only that data, control information, software, hardware, and
firmware for which they are authorized access and have a need-to-know, and
assume only those roles and privileges for which they are authorized.
Observe policies and procedures governing the secure operation and
authorized use of a DoD information system.
Use AskDFAS only for authorized purposes.
Immediately report all IA-related events, potential threats, and
vulnerabilities involving AskDFAS to either the System ISSM, System Manager,
or contact DFAS CSSP at 327-212-9172. After hours, call DMI at
1-844-DISA-HLP (844-347-2457), press 5 or email:
dfasdmiservicedesk@mail.mil
.
Ensure that system media and output are properly marked, controlled,
stored, transported, and destroyed based on classification or sensitivity
and need-to-know.
Not introduce or use unauthorized software, firmware, or hardware with
AskDFAS.
Ensure that devices that display or output sensitive information in
human-readable form are positioned to deter unauthorized individuals from
reading the information and/or obtain a privacy screen filter for your
monitor.
Ensure that all documents, equipment, and machine-readable media
containing sensitive data are cleared, properly marked, and sanitized
before being released outside of the Department of Defense.
Protect Common Access Card (CAC) and/or personal identification number
(PIN). Do not record, write or display PINs at any time. PINs will be kept
confidential and are not to be shared with anyone. Only the individual will
have knowledge of the login ID and PIN combination. This unique login ID
and PIN combination will be used as the basis for holding the individual
accountable for actions associated with their login ID. PINs shall not be
composed of easily guessed names or personally related items such as
children's or spouse's names addresses, etc. If you believe your PIN has
been compromised, promptly change the PIN and immediately notify the
Information System Security Manager (ISSM).
Personally Identifiable Information (PII):
You may be granted access to personal information about an individual that
identifies, links, relates, or is unique to, or describes him or her, e.g.,
name, phone numbers, rank/grade. Such information is also known as
personally identifiable information (PII).
Users Shall:
Comply with DFAS policies for safeguarding and protecting PII.
Follow DFAS policies and procedures for reporting a PII breach.
Administrative and Privileged users shall:
Utilize public key (PK)-enabled government owned computers while
accessing DoD systems for administrative and/or privileged use.
Connect to the application system via DFAS Network.
If you have any questions or comments about the information presented here,
please contact the System Manager.
Information Types Subject to Gathering:
Social Security Number (SSN) (full or in any form)
Birth Date
Child Information
Citizenship
Disability Information
DoD ID Number
Driver's License
Employment Information
Financial Information
Gender/Gender Identification
Home/Cell Phone
Law Enforcement Information
Legal Status
Mailing/Home Address
Marital Status
Medical Information
Military Records
Mother's Middle/Maiden Name
Name(s)
Official Duty Address
Official Duty Telephone Number
Other ID Number
Personal E-mail Address
Place of Birth
Position/Title
Protected Health Information (PHI)
Race/Ethnicity
Rank/Grade
Work E-mail Address
In addition to the above, other data elements may be requested or required in the course of researching and responding to ticket submissions.