Form HUD-52676 PDF Details

Navigating the complexities of accessing the Enterprise Income Verification (EIV) system is a critical aspect of ensuring compliance and maintaining the integrity of information for housing authorities and individuals dealing with public and Indian housing. The HUD 52676 form plays an essential role in this process, serving as an authorization vehicle for granting, modifying, or terminating access to the EIV system. This form, approved by the Office of Management and Budget (OMB) under the Paperwork Reduction Act of 1995, is a testament to the federal government's commitment to accountability and privacy in managing personally identifiable information. It outlines the responsibility of users and delineates the expected conduct through its comprehensive access authorization sections and the Rules of Behavior and User Agreement. Those needing access to the EIV system or handling related information must navigate through initial setup, periodic updates, and acknowledgment of the system's rules, emphasizing the safeguarding of valuable data. With its expiration set for May 31, 2013, the form underlines the importance of timely compliance and adherence to the outlined practices for protecting HUD's information resources. Understanding the specifics of the HUD 52676 form, including the types of actions requested, user roles, project access, and even the nuances of user responsibilities and system use monitoring, is crucial for maintaining system security and ensuring that access is granted appropriately and managed responsibly over time.

QuestionAnswer
Form NameForm HUD-52676
Form Length17 pages
Fillable?Yes
Fillable fields66
Avg. time to fill out17 min 31 sec
Other nameshud form 52676, 2013, PHA, omb 2577 0267

Form Preview Example

OMB No. 2577-0267

Expires 05/31/2013

Office of Public and Indian Housing (PIH)

Enterprise Income Verification (EIV) System

User Access Authorization Form and

Rules of Behavior and User Agreement

Paperwork Reduction Notice: The information collection requirements contained in this notice have been approved by the Office of Management and Budget (OMB) under the Paperwork Reduction Act of 1995 (44 U.S.C. 3520) and assigned OMB control number(s) 2577-0267 . In accordance with the Paperwork Reduction Act, HUD may not conduct or sponsor, and a person is not required to respond to, a collection of information unless the collection displays a currently valid OMB control number.

Public reporting burden for this collection of information is estimated to average 1.0 and 0.25 hours for initial and periodic responses, respectively. This includes the time for collecting, reviewing, and reporting

the data. The information is being collected for the authorization and accountability of all individuals that will access HUD’s EIV system. Response to this request for information is required in order for HUD to

comply with the Federal Privacy Act’s (5 USC 552a) requirement that HUD account for all individuals who will have access to a system containing personally identifying information of individuals assisted by the Federal government. HUD may not collect this information, and you are not required to complete this form unless it displays a currently valid OMB number. Limited confidentiality is assured.

Purpose of this form: To request initial access, modify, or terminate existing access to the PIH EIV system. To review and acknowledge Rules of Behavior and signify compliance with User Agreement.

Send completed forms: To the designated EIV Coordinator at the local HUD office as listed in the

instructions. Note: Individuals who will not access the EIV system, but will view and/or handle printed or electronic EIV information, are not required to send this completed form to the EIV Coordinator.

PART I. ACCESS AUTHORIZATION

Check here if you will not have access to the EIV system and will only view or handle printed or electronic EIV information

A. Authorized User Details

1. PHA Code:

2. HUD Office/PHA or Management

3. Address:

 

(e.g. DC451)

Agent Name:

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

4.

Name (first name, middle initial, last name):

 

5.

WASS User ID (C/H/M-ID):

 

 

 

 

 

 

 

6.

Position Title:

 

 

 

7.

Phone Number:

 

 

 

 

 

 

 

8.

Email

 

 

 

9.

Fax Number:

Address:

 

 

 

 

 

 

 

 

 

 

 

 

10. Type of work which involves use of the EIV system or printed and/or electronic EIV information:

1

– Initial eligibility only

2

– Annual/interim reexams

3 – Security Administrator

4

– Request EIV access

5 – Certify EIV users

6 – Modify/terminate EIV access roles

7

– HUD Administrator

8

– Auditor

9 – Investigator/Program Compliance

10

– Enter/update/delete debts owed to PHAs & adverse termination information of former tenants

11

– Clerical/Administrative Support (Viewer or handler of EIV reports) – Do no complete sections B-E

Rev. May 20, 2010

Page 1 of 6

Form HUD-52676

 

 

 

 

 

OMB No. 2577-0267

Expires 05/31/2013

 

 

 

 

 

 

 

 

B. Type of Action Requested (See instructions)

 

 

 

 

 

 

1

– Add Access (Initial access request for new users)

 

 

 

 

2

– Reinstatement (Due to automatic system or other termination)

 

 

 

 

3

– Modify Access (Add/remove access roles for existing users)

 

 

 

 

4

– Terminate Access

 

 

 

 

 

 

 

 

C. PHA User Access Roles – External Users (See instructions)

 

 

1

– PHA Occupancy – Public Housing

5

– Program Administrator – Voucher (Section 8)

 

2

– PHA Occupancy – Voucher (Section 8)

6

– PHA User Administrator

 

3

– PHA Occupancy – Applications Processor

7

– PHA Security Administrator

 

4

– Program Administrator – Public Housing

8

– Other Prescribed by HUD

D. Public Housing Portfolio

Specify the project numbers (Asset Management Projects –AMPs) to which access will be limited.

Check here to grant access to all public housing projects

Project Number

Project Number

Project Number

1)

4)

7)

2)

5)

8)

3)

6)

9)

E. HUD User Access Roles – Internal Users (See instructions)

Select Region (Check only one region)

HHQ

 

HUB

FO

TARC

1

– Occupancy Specialist

 

5

– HQ PIH DHAP

 

 

2

– Security Administrator

 

6

– HQ System Administrator

 

3

– User Administrator

 

7

– HQ PIH Help Desk/TAC

 

4

– HUD OIG

 

8

– Other Prescribed by HUD

 

F. Authorization

As the Authorizing Official, I authorize the above-named person to have access to the EIV system or view printed or electronic EIV information, as indicated by my signature below. I further understand this form for each user must be maintained on-site by the PHA and may be subject to audit at any time.

 

 

 

 

 

 

 

 

 

Date

Authorizing Official’s Name

Authorizing Official’s Signature

 

(Print Full Name)

 

 

 

 

Check here for ELECTRONIC SIGNATURE (Original signed document must be on file and is subject to inspection)

G. For HUD Use Only (Maintain a copy of this completed form in your files)

Date Application Received:

Date Application Processed:

HUD EIV Coordinator’s Name:

 

Action taken:

Approved

 

 

Denied

Reason:

Rev. May 20, 2010

Page 2 of 6

Form HUD-52676

OMB No. 2577-0267

Expires 05/31/2013

PART II. RULES OF BEHAVIOR

A. Introduction

The U.S. Department of Housing and Urban Development (HUD) is actively involved in implementing and maintaining Departmental policies and procedures to keep its Systems

secure from unauthorized access and inappropriate use. In compliance with various security- related Federal laws and regulations, HUD’s Office of Public and Indian Housing (PIH) created

these Rules of Behavior for the Enterprise Income Verification (EIV) system. This document was created to ensure that EIV system users (including those individuals who will not access the EIV

system, but will view and/or handle printed or electronic EIV information and collectively referred to as “users”) comply with HUD security policies. In addition, this document ensures

that system accounts remain secure and are used in the appropriate manner.

HUD may grant limited system access to users who have a need to utilize HUD information resources. These include: HUD employees, HUD contractors, Public Housing Agencies (PHAs), and PHA-hired management agents. EIV resources are for official use only. As a condition of receiving access, all users are required to understand and abide by the HUD and

EIV system security policies and procedures. The purpose of these policies and procedures is to safeguard HUD’s valuable information resources.

All users must adhere to the Rules of Behavior outlined in this document. The rules clearly delineate responsibilities of, and expectations for, all individuals with access to the EIV system or EIV information. Non-compliance with these rules will be disciplined through sanctions. This may include removal of system access for a specific period of time or termination depending on the severity of the violation. Also, see Part III for potential civil and criminal penalties, which may apply as a result of misuse of the EIV system and/or its data.

B. Responsibilities

HUD-PIH, as the System Owner, is responsible for ensuring that an adequate level of protection is afforded to the EIV system through an appropriate implementation of technical, operational, and managerial security controls.

Users are responsible for the protection of passwords, information, equipment, systems, networks, and communication pathways to which they have access. All HUD computer resources including hardware, software, programs, files, paper reports, and data are the sole property of HUD.

C. Other Policies and Procedures

The Rules of Behavior do not replace existing HUD policies, rather they are intended to enhance and further define the specific rules each user must follow while accessing the EIV system. The rules are consistent with the policy and procedures described in the following security documents:

HUD Information Technology Security Policy. HUD Handbook 2400.25, Rev. 2, dated October 1, 2008, establishes responsibilities, practices, and conditions that directly or indirectly promote security in the development, operation, maintenance, and support of all HUD information technology (IT) resources.

Rev. May 20, 2010

Page 3 of 6

Form HUD-52676

OMB No. 2577-0267

Expires 05/31/2013

This handbook is available online at: http://www.hud.gov/offices/adm/hudclips/handbooks/admh/2400.25/index.cfm. The HUD information security policies are based on recent federal laws, regulations, and guidance on information security (from National Institute of Standards and Technology (NIST)). In areas where federal guidelines are lacking or still evolving, the policy reflects established best security practices within the security community.

D. Application Rules

The Web Access Security System (WASS) user identification (user ID) and password issued to

you is to be used solely in connection with the performance of your responsibilities in support of HUD’s mission and administration of HUD rental assistance program, and may not be used for

personal or private gain. You agree to be responsible for the confidentiality of the assigned information and accountable for all activity with your user ID. Furthermore, you agree that you will not provide this confidential user ID and password to another user during employment nor upon leaving the employment of the agency. Additional rules of the EIV system are as follows:

Required TrainingEIV system users are required to participate in annual Security Awareness Training and HUD-sponsored initial and updated PIH-EIV System training. Individuals who will not access the EIV system, but will view and/or handle printed or electronic EIV information is required to participate in only annul Security Awareness training. Free HUD-sponsored Security Awareness and EIV training is available online at http://www.hud.gov/webcasts/archives/iv.cfm. PIH-sponsored EIV training materials are located at http://www.hud.gov/offices/pih/programs/ph/rhiip/training.cfm. Users will not be permitted to access the EIV system or printed or electronic EIV information if the user has not completed EIV System and Security Awareness training.

System Access (on-site only): Users are required to use only approved HUD software, software settings, and comply with vendor software license agreements. Users are allowed to access the system only using the mechanisms specified by HUD.

Unofficial use of government information: Users must be aware that personal use of information resources is prohibited. EIV data is personal information covered by the Federal Privacy Act (5 USC 552a), as amended, and penalties apply to the misuse of that data. State and local laws may also prohibit misuse of personal information and impose penalties for misuse of the data.

Information protection: Users must avoid leaving system output records or reports unattended or unsecured. Users should lock the computer or log out of the system when leaving work areas unattended. Users shall not violate Public Law 93-579, Privacy Act of 1974, as amended, which requires confidentiality of personal data contained in government and contractor data files. Users should securely store EIV data in accordance with HUD policy.

Use of passwords: User passwords and user IDs are for your individual use only and are confidential HUD information. Users are required to change passwords every 30 days. Users are encouraged to avoid creating passwords that can be easily associated with you or your user ID.

Rev. May 20, 2010

Page 4 of 6

Form HUD-52676

OMB No. 2577-0267

Expires 05/31/2013

System privileges: Users are given access to the system and EIV data based on a need to

perform specific work related only to the administration of the following PIH programs: Public Housing, Housing Choice Voucher (HCV), Project-Based Voucher, Project-Based Certificate, and Disaster Housing Assistance programs. Users shall only access the information for which they are authorized.

Individual accountability: Users shall be held accountable for their actions while accessing the system or viewing printed or electronic EIV data. Be aware that all computer resources are monitored and audited.

Monitoring of EIV System Use: All users and agencies are subject to monitoring of their EIV system use and compliance with security requirements by HUD, HUD contractors or a 3rd party. If it is determined that an agency or any of its users are not in compliance with security

requirements or any provision of this document, HUD will immediately terminate one or all of an agency’s users’ EIV access. HUD will reinstate access upon the successful

implementation of corrective action(s) to cure the deficiency.

Automatic EIV System Terminations: Users’ EIV system access is automatically terminated if the user does not access HUD’s Web Access Security Subsystem at least once every 90

days; or if the user is not certified by the respective EIV User Administrator.

Incident Response: Users should immediately contact their supervisor and the HUD Headquarters Security Officer at PIH.RHIIP.TA@HUD.GOV, with a copy to local HUD office, regarding any suspected violation or breach of system security.

Rev. May 20, 2010

Page 5 of 6

Form HUD-52676

OMB No. 2577-0267

Expires 05/31/2013

PART III. USER AGREEMENT

I have read the above policy regarding system security awareness and practices when accessing HUD’s information technology resources. I understand the policies and procedures

as set forth above, and I agree to comply with these requirements as a condition of being granted limited access to the EIV system and/or its data.

As an authorized user of the EIV system or viewer and/or handler of EIV data, I understand the information obtained may only be used for official HUD business. I understand that authorized users may access, disclose, inspect and use these data only within the scope of their official duties of administering a HUD rental assistance program. HUD employees are held to the highest level of responsibility/accountability for the protection of HUD data. HUD contractor firms will be expected to apply similar standards to their employees. Anyone who abuses EIV access privileges may be stripped of that and other access rights to HUD secure systems. Employees of an agency may be subject to personnel discipline consistent with applicable personnel rules. Contractor firms that do not assure that the Rules of Behavior are observed may be subject to remedies under the terms of their contract.

I also understand that unauthorized disclosure or inspection of EIV data may result in civil and criminal penalties. The penalties are as follows:

Unauthorized disclosure may result in me being found guilty of a misdemeanor and fined not more than $5,000 and/or imprisoned up to five (5) years.

Unauthorized inspection of EIV data may result in me being found guilty of a misdemeanor and fined not more than $5,000 and/or imprisoned up to five (5) years.

I understand that my user ID and password are to be used only by me. Under no circumstances

will I reveal or allow use of my user ID or password by another person. Nor will I use another person’s password and user ID. I will protect EIV data within my control, whether online,

printed, or stored in media, from unauthorized access and disclosure.

I understand and agree to follow all HUD standards, policies, and procedures.

Certification of EIV & Security Awareness Training. Authorized user certifies that s/he has participated in initial PIH EIV system training and Security Awareness training within the last 12 months, and agrees to participate in Security Awareness training annually and PIH-EIV System training when HUD provides updated training. Failure to provide this certification and/or participate in training will result in denied or discontinued EIV Access.

 

 

 

 

 

 

User’s Name

 

Date

 

(Print Full Name)

 

 

 

 

 

 

 

 

 

 

 

 

User’s Signature

Check here for ELECTRONIC SIGNATURE (Original signed document must be on file and is subject to inspection)

Note: All EIV system users are required to complete initial EIV system training provided by HUD prior to accessing the system. All individuals who will view and/or handle printed or electronic EIV information are required to complete annual Security Awareness training. Security Awareness training provided by third parties is acceptable when HUD has not offered such training.

Rev. May 20, 2010

Page 6 of 6

Form HUD-52676

How to Edit Form HUD-52676 Online for Free

You are able to fill in 2013 without difficulty in our PDFinity® editor. To make our editor better and easier to work with, we consistently develop new features, taking into consideration suggestions from our users. Getting underway is effortless! Everything you need to do is follow the following basic steps down below:

Step 1: Hit the "Get Form" button in the top section of this page to get into our tool.

Step 2: With our online PDF editing tool, it is easy to accomplish more than simply complete blank fields. Express yourself and make your docs appear faultless with customized textual content added in, or modify the file's original content to perfection - all accompanied by an ability to incorporate almost any images and sign it off.

Completing this PDF needs attentiveness. Ensure all necessary areas are filled in properly.

1. Whenever completing the 2013, be certain to include all of the important fields in its associated form section. It will help speed up the process, which allows your information to be handled quickly and properly.

The best ways to complete hud 52676 part 1

2. Once your current task is complete, take the next step – fill out all of these fields - Initial eligibility only, Security Administrator, Annualinterim reexams Certify, Rev May, Page of, and Form HUD with their corresponding information. Make sure to double check that everything has been entered correctly before continuing!

Security Administrator, Form HUD, and Page  of in hud 52676

3. Completing B Type of Action Requested See, PHA Occupancy Public Housing, Program Administrator Voucher, D Public Housing Portfolio Specify, Check here to grant access to all, Project Number, Project Number, Project Number, E HUD User Access Roles Internal, Occupancy Specialist Security, and HQ PIH DHAP HQ System is essential for the next step, make sure to fill them out in their entirety. Don't miss any details!

Step # 3 for submitting hud 52676

4. The fourth part arrives with these particular empty form fields to enter your particulars in: Occupancy Specialist Security, F Authorization, HQ PIH DHAP HQ System, As the Authorizing Official I, Authorizing Officials Name Print, Authorizing Officials Signature, Date, Check here for ELECTRONIC, subject to inspection, G For HUD Use Only Maintain a copy, HUD EIV Coordinators Name, and Action taken Approved Denied Reason.

hud 52676 completion process explained (portion 4)

People who use this form generally make errors while filling out HQ PIH DHAP HQ System in this part. You should definitely read again whatever you type in here.

5. To conclude your form, this particular segment requires some extra blank fields. Entering I understand and agree to follow, Date, Users Signature Check here for, subject to inspection, Note All EIV system users are, and HUD prior to accessing the system will certainly conclude the process and you can be done in a short time!

Step number 5 for submitting hud 52676

Step 3: Check that your details are correct and simply click "Done" to conclude the project. Right after registering a7-day free trial account with us, you will be able to download 2013 or send it via email directly. The file will also be readily accessible from your personal account with all your changes. FormsPal ensures your information privacy via a protected method that in no way records or distributes any type of personal information used in the PDF. Feel safe knowing your paperwork are kept confidential any time you use our services!