RTTUZYUW RUOIAZZ1103 3231825-UUUU--RHMCSUU. ZNR UUUUU R 181825Z NOV 20 MID200000392429U FM COMNAVSAFECEN NORFOLK VA TO ALSAFE BT UNCLAS 021/20 SECINFO/U/-// MSGID/GENADMIN/COMNAVSAFECEN/00/NOV// SUBJ/RISK MANAGEMENT INFORMATION ROLES AND RESPONSIBILITIES GUIDANCE // REF/A/MSGID: DOC/RMI ENDORSEMENT PROCESS/-// REF/B/MSGID: ALSAFE 017/20/27AUG2020// NARR/REF A IS A 10AUG2020 DOCUMENT DESCRIBING THE NEW PROCESS FOR ENDORSING SAFETY REPORTS UPON THE INITIAL RELEASE OF THE RMI PROGRAM OF RECORD. THIS DOCUMENT WAS DISSEMINATED VIA DON TRACKER. REF B IS 27AUG2020 ALSAFE WHICH PROVIDES RISK MANAGEMENT SAFETY REPORTING TERMS AND GUIDANCE.// POC/LEWIS, ALAN R/NAVSAFECEN/UNIT: NORFOLK/NAME: 757-444-3520 X7037 /TEL: DSN 564-3520 X7037/EMAIL:ALAN.R.LEWIS@NAVY.MIL// GENTEXT/REMARKS/1. THIS ALSAFE EXPLAINS THE ROLES AND RESPONSIBILITIES OF PERSONNEL USING THE RISK MANAGEMENT INFORMATION (RMI) PROGRAM OF RECORD. 2. APPLICABILITY. THE INFORMATION PROVIDED IN THIS ALSAFE APPLIES TO ALL RMI USERS. 3. GENERAL INFORMATION A. RMI ROLES, PERMISSIONS, AND TERMINOLOGY ARE SIGNIFICANTLY DIFFERENT FROM THE WEB-ENABLED SAFETY SYSTEM (WESS) AND APPLY TO USERS IRRESPECTIVE OF FUNCTIONAL COMMUNITY. WITH THE SUNDOWN OF WESS, WESS ACCOUNT ROLES AND PERMISSIONS ARE NO LONGER APPLICABLE IN RMI. THE RMI ACCOUNT TYPE, CATEGORY, MODULE ACCESS AND JOB FUNCTIONS ARE IDENTIFIED DURING THE ACCOUNT CREATION PROCESS, AND ELEVATED AND APPROVED BY USER ADMINISTRATORS AT OR ABOVE THE UNIT LEVEL. THIS IS A SIGNIFICANT CHANGE FROM WESS, WHICH CENTRALIZED ACCOUNT MANAGEMENT AT THE NAVAL SAFETY CENTER. THIS ALSAFE AIMS TO AMPLIFY INFORMATION GIVEN IN USER ADMINISTRATOR TRAINING AND PROVIDED IN THE USER GUIDES, INCREASING UNDERSTANDING ACROSS THE NAVAL ENTERPRISE. B. USER ACCOUNT CATEGORIES: THERE ARE TWO ACCOUNT TYPES IN RMI, BASIC AND ELEVATED, AND TWO ACCOUNT CATEGORIES, PRIMARY AND SECONDARY. (1) BASIC: THIS TYPE OF ACCOUNT ALLOWS ACCESS TO COMMON, OPEN AREAS OF RMI, SUCH AS PUBLICATIONS & REFERENCES, AND FILE SHARING. THIS ACCOUNT WILL HAVE THE BASIC ACCT ROLE AND A WORKSPACE. (2) ELEVATED: ELEVATED ACCOUNTS HAVE ACCESS TO UNPROTECTED INFORMATION AND ONE OR MORE TYPES OF PROTECTED INFORMATION. INFORMATION MAY BE PROTECTED BY SAFETY PRIVILEGE, PRIVACY ACT, HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA), OR ANOTHER FORMAL MECHANISM, AND SECURITY ROLES ARE USED TO PROVIDE AND CONTROL APPROPRIATE ACCESS. THIS ACCOUNT WILL HAVE ADDITIONAL ROLES OTHER THAN THOSE IN A BASIC ACCOUNT. (A) PRIMARY: BY DEFAULT, EVERY RMI USER HAS A PRIMARY ACCOUNT. THIS ACCOUNT CONTAINS THEIR DEMOGRAPHIC INFORMATION (E.G., EMPLOYMENT STATUS, GRADE, NAME, ASSIGNED ORGANIZATION, ASSIGNED OFFICE SYMBOL, EMAIL, ETC.) AND ASSIGNED RMI ROLES (PERMISSIONS). (B) SECONDARY: A SECONDARY ACCOUNT IS REQUIRED WHEN A USER NEEDS AN ACCOUNT LISTING AN ORGANIZATION DIFFERENT FROM THE ONE ON THEIR PRIMARY ACCOUNT. EXAMPLES WHEN A SECONDARY ACCOUNT IS NECESSARY INCLUDE: 1) AN RMI USER IS ASSIGNED TO TWO OR MORE ORGANIZATIONS WITH SEPARATE REPORTING HIERARCHIES. FOR EXAMPLE, A USER MAY WORK MONDAY THROUGH FRIDAY AS A CIVILIAN IN ONE OF THE DON PROGRAM SAFETY OFFICES AND PERIODICALLY AS A MILITARY MEMBER IN A RESERVE ORGANIZATION SAFETY OFFICE. 2) AN RMI USER IS ASSIGNED TO ONE ORGANIZATION, AND BECAUSE OF GEOGRAPHIC PROXIMITY, IS ASSIGNED TO MANAGE USERS AT A GEOGRAPHICALLY NEARBY ORGANIZATION WITH A SEPARATE REPORTING HIERARCHY. C. RMI ACCOUNT ROLES: SINCE RMI IS IN THE FIRST PHASE OF IMPLEMENTATION, NOT ALL ACCOUNT ROLES ARE CURRENTLY AVAILABLE OR ACTIVE FOR USE. THIS PARAGRAPH DIRECTS WHICH ROLES ARE ACTIVE, WHICH ARE AWAITING FUTURE SAFETY PROGRAM MANAGEMENT MODULES, AND WHICH SHOULD NOT BE REQUESTED BY USERS IN THE USN/USMC WORKSPACE. A BRIEF EXPLANATION IS PROVIDED FOR THE ACTIVE ACCOUNT ROLES. ALL DON RMI USERS MUST HAVE THE USN/USMC WORKSPACE ASSIGNED. (1) ACTIVE ACCOUNT ROLES: (A) DIVE-JUMP REPORTING SYSTEM (DJRS): DJRS USER - GIVES THE USER ACCESS TO THE DIVE JUMP REPORTING SYSTEM. ONLY APPLICABLE TO THE DIVE AND JUMP COMMUNITIES. ASSIGNED BY A LOCAL USER ADMINISTRATOR. (B) DATA EXTRACTION ACCESS: EVENTS - GIVES THE USER ACCESS TO RETRIEVE EVENT DATA USING THE AFSAS DATA EXTRACTION TOOL (DET) AND/OR IBM COGNOS BUSINESS INTELLIGENCE TOOL. ASSIGNED BY A LOCAL USER ADMINISTRATOR. (C) DATA EXTRACTION ACCESS: OSHA 300/300A - ALLOWS THE USER TO BUILD OSHA 300 AND 300A FORMS IN THE AFSAS DET AND/OR IBM COGNOS BUSINESS INTELLIGENCE TOOL. ASSIGNED BY A LOCAL USER ADMINISTRATOR. (D) DATA EXTRACTION ACCESS: RECOMMENDATIONS - ALLOWS THE USER TO RETRIEVE RECOMMENDATION DATA USING THE AFSAS DET AND/OR IBM COGNOS BUSINESS INTELLIGENCE TOOL. ASSIGNED BY A LOCAL USER ADMINISTRATOR. (E) EVENT TABS: ACCESS APPROVAL (CONV AUTH ONLY) - ALLOWS THE USER TO APPROVE SAFETY INVESTIGATION BRIEFINGS BY THE CONVENING AUTHORITY WITHIN THE EXHIBIT SECTION OF THE REPORT. ASSIGNED BY A HIGHER ORGANIZATION USER ADMINISTRATOR. (F) EVENT TABS: VIEW (ORG & TIME RESTRICTED) - PROVIDES AUTOMATIC EXHIBIT ACCESS TO ANY EVENT WHOSE CONVENING AUTHORITY IS WITHIN YOUR ORGANIZATIONAL HIERARCHY FOR TWO YEARS AFTER THE RELEASE OF THE INVESTIGATION. AFTER THIS (AND FOR EVENTS OUTSIDE YOUR HIERARCHY) YOU NEED TO REQUEST EXHIBIT ACCESS. ASSIGNED BY A LOCAL USER ADMINISTRATOR. (G) EVENT: DATA VIEWER - ALLOWS THE USER TO VIEW ALL EVENT DATA ENTRY FIELDS EXCEPT DOD ID. ASSIGNED BY A LOCAL USER ADMINISTRATOR. (H) EVENT: INVESTIGATOR - THIS ROLE GRANTS USERS THE ABILITY TO CREATE INVESTIGATIONS FOR ANY CATEGORY OR CLASS, VIEW THEIR INVESTIGATIONS, VIEW INVESTIGATIONS FOR THEIR ORGANIZATION & BELOW, TAKE ACTION ON INVESTIGATIONS, GRANTED ACCESS TO, SEARCH INVESTIGATIONS, SET MESSAGE RULES, GRANT & REQUEST ACCESS TO INVESTIGATIONS, AND CREATE HAZARD MANAGEMENT EVENTS. ALSO ALLOWS THE USER TO CREATE A PRELIMINARY MESSAGE FOR REVIEW AND APPROVAL BY THE DESIGNATED CONVENING AUTHORITY. THIS ROLE IS REQUIRED TO ENTER MEMORANDUM OF FINAL EVALUATION (MOFE) COMMENTS. ASSIGNED BY A LOCAL USER ADMINISTRATOR. (I) EVENT: MESSAGE (VIEW ONLY) - ALLOWS THE USER TO ONLY VIEW RELEASED MESSAGES. ASSIGNED BY A LOCAL USER ADMINISTRATOR. (J) EVENT: MESSAGE APPROVAL - ALLOWS THE USER TO REVIEW AND APPROVE ALL MESSAGES FOR THEIR ORGANIZATION AND SUBORDINATE COMMANDS FOR QUALITY CONTROL LED BY THE NAVAL SAFETY CENTER. THIS ROLE CANNOT CREATE EVENT INVESTIGATIONS OR ENTER DATA FOR EVENT INVESTIGATIONS. ASSIGNED BY A LOCAL USER ADMINISTRATOR. (K) EVENT: PROVIDER - ALLOWS THE USER TO ENTER EVENT PERSON PHYSIOLOGICAL INFORMATION. ASSIGNED BY A LOCAL USER ADMINISTRATOR. (L) EVENT: SUPERVISOR INVESTIGATOR - ALLOWS THE USER TO ENTER DATA FOR ANY REPORT FOR WHICH THE CONVENING AUTHORITY IS BELOW THEIR ORGANIZATION AND IN THEIR CHAIN OF COMMAND. USER WILL ALSO BE ABLE TO VIEW, SEARCH, AND COMMENT ON MOFES. THIS ROLE MAINTAINS ALL PERMISSIONS PREVIOUSLY ASSIGNED TO "(H) EVENT: INVESTIGATOR." ASSIGNED BY A LOCAL USER ADMINISTRATOR. (M) RECOMMENDATION: APPROVAL - ALLOWS THE USER TO APPROVE CLOSURE OF RECOMMENDATIONS. THE RECOMMENDATION MUST HAVE THE USER'S ORGANIZATION ASSIGNED AS AN APPROVAL AUTHORITY. ASSIGNED BY A LOCAL USER ADMINISTRATOR. (N) RECOMMENDATION: COORDINATION - ALLOWS THE USER TO COORDINATE RECOMMENDATIONS. THE RECOMMENDATION MUST HAVE THE USER'S ORGANIZATION ASSIGNED AS A COORDINATION AUTHORITY. ASSIGNED BY A LOCAL USER ADMINISTRATOR. (O) RECOMMENDATION: OFFICE OF COLLATERAL RESPONSIBILITY (OCR) MANAGEMENT - ALLOW ACCESS TO UPDATE THE OCRPAGE AND CHANGE THE OCR WITHIN THEIR CHAIN OF COMMAND. IT CANNOT CHANGE THE ACTIONS COMPLETED FIELD IF THE RECOMMENDATION IS IN WORK. ASSIGNED BY A LOCAL USER ADMINISTRATOR. (P) RECOMMENDATION: SUPERVISOR (SAFETY ONLY) - ALLOWS THE USER TO MANAGE RECOMMENDATIONS. SUPERVISOR ACCESS IS GRANTED WHERE THE SUPERVISOR IS AT OR ABOVE THE OFFICE OF PRIMARY RESPONSIBILITY (OPR) ORGANIZATION HIERARCHY. THIS SECURITY PERMISSION GRANTS ACCESS TO SPECIALIZED MANAGEMENT FUNCTIONS, SUCH AS REOPEN A RECOMMENDATION, CHANGE THE RECOMMENDATION NARRATIVE, ETC. THESE SPECIAL MANAGEMENT FUNCTIONS ARE THE SPECIAL CASES THAT ARISE FROM PECULIAR CIRCUMSTANCES. ASSIGNED BY A LOCAL USER ADMINISTRATOR. (Q) RECOMMENDATION: UPDATE (OPR/OCR) - ALLOWS THE USER TO EDIT AND UPDATE OPEN RECOMMENDATIONS AS AN OPR OR OCR. THE RECOMMENDATION MUST HAVE THE USER'S ORGANIZATION AND OFFICE ASSIGNED AS EITHER THE OPR OR OCR. SAFETY OFFICES OR ORGANIZATIONS HIGHER IN THE ORGANIZATIONAL STRUCTURE WITH THIS ROLE MAY ACCESS A SUBORDINATE ORGANIZATIONS RECOMMENDATION. ASSIGNED BY A LOCAL USER ADMINISTRATOR. (R) RECOMMENDATION: VIEW ONLY - ALLOWS THE USER TO ONLY VIEW ANY RECOMMENDATION IN THE RECOMMENDATIONS MODULE. ASSIGNED BY A LOCAL USER ADMINISTRATOR. (S) USER ADMINISTRATOR - ALLOWS THE USER TO ADD, EDIT, OR REMOVE USERS IN YOUR CURRENT OR SUBORDINATE ORGANIZATIONS. ASSIGNED BY A HIGHER ORGANIZATION USER ADMINISTRATOR. (T) WORKSPACE: U.S. NAVY/MARINES - THIS ROLE PROVIDES ACCESS TO THE WORKSPACE CONTAINING U.S. NAVY / MARINES' RECORDS. OTHER ROLES CONTROL THE ACTIONS A USER MAY PERFORM (E.G., CREATE NEW INVESTIGATIONS, READ MESSAGES, RETRIEVE DATA, ETC.) IN THIS WORKSPACE. ALL DON RMI USERS MUST HAVE THIS WORKSPACE ASSIGNED. ASSIGNED BY A LOCAL USER ADMINISTRATOR. (2) FUTURE ACCOUNT ROLES: THESE ROLES SHOULD NOT BE REQUESTED OR ASSIGNED AT THIS TIME. ADDITIONAL INFORMATION ON THESE ROLES WILL BE PROVIDED WHEN ACTIVATED. (A) DATA EXTRACTION ACCESS: INSPECTION (B) EVENT TABS: WAIVER COORDINATION (STEP 1) (C) INSPECTIONS: DATA VIEWER (D) INSPECTIONS: SAFETY INSPECTOR (E) INSPECTIONS: SUPERVISOR INSPECTOR (F) MUSTT: MOTORCYCLE SAFETY REPRESENTATIVE (G) OSHA: EVENT INVESTIGATOR (H) OSHA: EVENT SUPERVISOR (I) TRAINING: RECORDS ADMINISTRATOR (J) WORKFLOW: EXPLOSIVE SITE PLAN ADMINISTRATOR (K) WORKFLOW: EXPLOSIVE SITE PLAN COORDINATOR (L) WORKFLOW: TASKER INITIATOR (M) WORKFLOW: TASKER POC (3) ACCOUNT ROLES NOT SUPPORTED BY RMI: THESE ROLES SHOULD NEVER BE REQUESTED OR ASSIGNED IN THE USN/USMC WORKSPACE. (A) DATA EXTRACTION ACCESS: OCC ILLNESS (B) EVENT TABS: VIEW (JA TIME RESTRICTED) (C) EVENT: ASAP TRIAGE (D) OCC ILLNESS: BIOENVIRONMENTAL ENGINEER (E) OCC ILLNESS: DATA VIEWER (F) OCC ILLNESS: MESSAGE (VIEW ONLY) (G) OCC ILLNESS: PROVIDER (H) OCC ILLNESS: PUBLIC HEALTH (I) OCC ILLNESS: SUPERVISOR INVESTIGATOR (J) WORKSPACE: DEFENSE COMMISSARY AGENCY (K) WORKSPACE: DEFENSE CONTRACT MANAGEMENT AGENCY (L) WORKSPACE: DEFENSE FINANCE AND ACCOUNTING SERVICES (M) WORKSPACE: DEFENSE HEALTH AGENCY (N) WORKSPACE: DEFENSE INTELLIGENCE AGENCY (O) WORKSPACE: OTHER DOD AGENCY (P) WORKSPACE: U.S. AIR FORCE (Q) WORKSPACE: U.S. ARMY (R) WORKSPACE: U.S. COAST GUARD (S) WORKSPACE: UNIFIED COMMAND D. USER ADMINISTRATOR RESPONSIBILITIES: USER ADMINISTRATORS ARE THE RESPONSIBLE PARTY FOR ALL ACCOUNT CHANGES AND ISSUES FOR THOSE ACCOUNTS THAT THEY ADMINISTER. USER ADMINISTRATORS ARE EXPECTED TO MANAGE THEIR USERS, INCLUDING USER ADMINISTRATORS BELOW THEM IN THE ORGANIZATIONAL HIERARCHY. BECAUSE RMI CONTAINS SAFETY-PRIVILEGED AND OTHER SENSITIVE INFORMATION, USER ADMINISTRATORS ARE RESPONSIBLE FOR ENSURING THAT ACCESS IS ONLY GIVEN TO THOSE WITH A LEGITIMATE NEED. AS SUCH, THE USER ADMINISTRATOR ROLE IS AN INHERENTLY GOVERNMENTAL ROLE THAT MUST BE FILLED BY A DON UNIFORMED SERVICE MEMBER OR GOVERNMENT CIVILIAN. USER ADMINISTRATORS SHOULD ONLY ASSIGN PERSONNEL ACCOUNTROLES NECESSARY TO COMPLETE ASSIGNED TASKS. ALL SAFETY PERSONNEL MUST ENSURE THAT NO USER HAS ACCESS TO SAFETY INFORMATION INAPPROPRIATELY OR OUTSIDE THEIR JOB DESCRIPTION, AND THE ROLES IN RMI/AFSAS ARE DESIGNED TO AID IN THIS GOAL. USER ADMINISTRATORS MUST BE DESIGNATED IN WRITING BY THEIR COMMAND AND MUST ALSO SIGN AN ACKNOWLEDGEMENT OF THEIR RESPONSIBILITIES AND THE LIMITATIONS OF THEIR AUTHORITY. TEMPLATES FOR THESE DOCUMENTS CAN BE FOUND AT HTTPS://NAVALSAFETYCENTER.NAVY.MIL/RESOURCES/RMI AND WILL BE INCLUDED IN THE UPDATES OF OPNAVINST 3750.6 AND 5102.1. BOTH USERADMINISTRATOR DOCUMENTS MUST BE UPLOADED TO THE INDIVIDUAL'S PROFILE IN THE RMI SYSTEM TO RETAIN A USER ADMINISTRATOR ROLE. THIS APPLIES TO NEWLY REQUESTED ACCOUNTS AND TO ACCOUNTS WHICH ARE CURRENTLY ASSIGNED THE USER ADMINISTRATOR ROLE. ONLY TWO USER ADMINISTRATORS ARE AUTHORIZED PER UNIT. ALTHOUGH USER ADMINISTRATORS ARE AUTHORIZED TO GRANT AND UPDATE RMI ACCOUNT PERMISSIONS FOR DON UNIFORMED AND GOVERNMENT CIVILIAN PERSONNEL, THEY ARE PROHIBITED FROM GRANTING PERMISSIONS TO PERSONNEL FROM OTHER DON ORGANIZATIONS, MILITARY SERVICES, OR U.S. GOVERNMENTAL AGENCIES, AS WELL AS TO CONTRACTORS, FOREIGN EXCHANGE OR LIAISON PERSONNEL, OR ANY NON-DON CIVILIANS. USER ADMINISTRATORS WHO FAIL TO PROTECT PRIVILEGED SAFETY INFORMATION WILL HAVE THEIR USER ADMINISTRATOR AND RMI ACCOUNT ROLES SUSPENDED OR REVOKED. E. RMI FUNCTIONAL ROLES AND THE ASSOCIATED ROLE PERMISSIONS: THIS SECTION WILL DISCUSS THE MOST COMMON FUNCTIONAL ROLES AND IDENTIFY THE RECOMMENDED ACCOUNT ROLES, WHICH FALL UNDER THEM. USER ADMINISTRATIONS NEED TO BE FAMILIAR WITH THESE ROLES TO ENSURE THEY ASSIGN ACCOUNT ROLES APPROPRIATELY. ALL DON PERSONNEL NEED TO BE ASSIGNED THE "WORKSPACE: NAVY AND MARINE CORPS" (3.C.1.T) IN ORDER TO OPERATE WITHIN THE NAVY/MARINE CORPS DOMAIN. (1) USER ADMINISTRATORS: APPLIES TO INDIVIDUALS AT ALL LEVELS OF COMMAND. USER ADMINISTRATORS MUST BE ASSIGNED THE "USER ADMINISTRATOR" (3.C.1.S) ACCOUNT ROLE. (2) DATA ANALYSTS: APPLIES TO INDIVIDUALS AT ALL LEVELS OF COMMAND. TO CONDUCT DATA ANALYSIS, THE USER SHOULD HAVE ACCESS TO "DATA EXTRACTION ACCESS: EVENTS" (3.C.1.B), "DATA EXTRACTION ACCESS: OSHA 300/300A" (3.C.1.C), AND "DATA EXTRACTION ACCESS: RECOMMENDATIONS" (3.C.1.D). (3) MISHAP OR HAZARD INVESTIGATORS: APPLIES TO MEMBERS (NORMALLY REPORTING CUSTODIANS / COMMANDS ACTING AS THE ACCOUNTING ORGANIZATION) ASSIGNED TO INVESTIGATE A MISHAP OR HAZARD EITHER AS A SINGLE INVESTIGATOR OR A MEMBER OF A SAFETY INVESTIGATION BOARD. THE INVESTIGATOR SHOULD HAVE: "EVENT: DATA VIEWER" (3.C.1.G), "EVENT: INVESTIGATOR" (3.C.1.H), "EVENT: MESSAGE (VIEW ONLY)" (3.C.1.I), "EVENT: PROVIDER" FOR MEDICAL PERSONNEL (3.C.1.K), "RECOMMENDATION: COORDINATION" (3.C.1.N), AND "RECOMMENDATION: VIEW ONLY" (3.C.1.R). (4) INVESTIGATION OVERSIGHT: APPLIES TO SAFETY MANAGERS / OFFICERS FROM ECHELONS ABOVE ACCOUNTING ORGANIZATION WHO ARE RESPONSIBLE FOR INVESTIGATION OVERSIGHT. THESE INDIVIDUALS SHOULD HAVE: "ACCESS APPROVAL (CONV AUTH ONLY)" (3.C.1.E), "EVENT: MESSAGE APPROVAL" (3.C.1.J), AND "EVENT: SUPERVISOR INVESTIGATOR" (3.C.1.L). (5) RECOMMENDATION MANAGEMENT: APPLIES TO ALL INDIVIDUALS RESPONSIBLE FOR RECOMMENDATION MANAGEMENT. THESE INDIVIDUALS SHOULD HAVE: "RECOMMENDATION: APPROVAL" (3.C.1.M), "RECOMMENDATION: COORDINATION" (3.C.1.N), "RECOMMENDATION: OCR MANAGEMENT" (3.C.1.O), "RECOMMENDATION: UPDATE (OPR/OCR)" (3.C.1.Q), AND "RECOMMENDATION: VIEW ONLY. (3.C.1.R)" (6) MESSAGE APPROVERS: THIS ROLE GRANTS THE USER THE ABILITY TO REVIEW AND APPROVE ALL MESSAGES FOR THEIR ORGANIZATION AND SUBORDINATE COMMANDS. THESE INDIVIDUALS SHOULD HAVE THE "EVENT: MESSAGE APPROVAL" (3.C.1.J) ACCOUNT ROLE. F. RECOMMENDED ROLE ASSIGNMENTS BY BILLET TYPE: CORRECT ROLE ASSIGNMENT IS CRITICAL TO THE FUNCTIONALITY OF THE RMI SYSTEM AND ITS PROCESSES. IT IS THE APPLICABLE USER ADMINISTRATOR WHO IS RESPONSIBLE TO ASSIGN AND MAINTAIN ROLES WITHIN THEIR UNITS. IN SOME CASES, INDIVIDUALS WILL BE ASSIGNED MULTIPLE ROLES SIMULTANEOUSLY, IN OTHER CASES, A SINGLE ROLE IS ALL THAT IS REQUIRED. BECAUSE RMI IS ROLE DRIVEN, USER ADMINISTRATORS ARE RESPONSIBLE FOR ENSURING THAT ROLES ARE ONLY GIVEN TO THOSE WITH A LEGITIMATE NEED. THE FOLLOWING INFORMATION PROVIDES ROLE RECOMMENDATIONS FOR FUNCTIONAL RESPONSIBILITIES. THESE ROLE RECOMMENDATIONS ARE BOTH ACCOUNT ROLES TAKEN FROM PARAGRAPH 3.C AND FUNCTIONAL ROLES TAKEN FROM PARAGRAPH 3.E. (1) DIVE AND JUMP MASTERS / COMMUNITY MANAGERS REQUIRE THE "DJRS: DJRS USER" (3.C.1.A) ACCOUNT ROLE. (2) ACCOUNTING ORGANIZATION / REPORTING CUSTODIAN / COMMAND SAFETY MANAGER / OFFICER - USER ADMINISTRATOR (3.E.1), DATA ANALYSTS (3.E.2), MISHAP OR HAZARD INVESTIGATORS (3.E.3), RECOMMENDATION MANAGEMENT (3.E.5) FUNCTIONAL ROLES. (3) ACCOUNTING ORGANIZATION / REPORTING CUSTODIAN / COMMAND COMMANDING OFFICER - REQUIRES THE "EVENT: MESSAGE (VIEW ONLY)" (3.C.1.I) ACCOUNT ROLE TO SEE MESSAGES AND THE "EVENT: INVESTIGATOR" (3.C.1.H) ACCOUNT ROLE TO ENTER THE COMMANDING OFFICER'S COMMENTS ON NON-ENDORSED REPORTS AND MOFE COMMENTS WHEN ENDORSEMENT IS REQUIRED. (4) ACCOUNTING ORGANIZATION / REPORTING CUSTODIAN / COMMAND MEDICAL OFFICER / REPRESENTATIVE - REQUIRES "EVENT: PROVIDER" (3.C.1.K) ACCOUNT ROLE TO ENTER MEDICAL INFORMATION INTO THE SYSTEM. (5) IMMEDIATE SUPERIOR IN COMMAND / CHAIN OF COMMAND SAFETY MANAGER / OFFICER - USER ADMINISTRATOR (3.E.1), DATA ANALYSTS (3.E.2), INVESTIGATION OVERSIGHT (3.E.4) MINUS THE "ACCESS APPROVAL (CONV AUTH ONLY)" (3.C.1.E) ACCOUNT ROLE, AND THE RECOMMENDATION MANAGEMENT (3.E.5) FUNCTIONAL ROLES. (6) IMMEDIATE SUPERIOR IN COMMAND OR CHAIN OF COMMAND COMMANDING OFFICER - REQUIRES THE "EVENT: MESSAGE (VIEW ONLY)" (3.C.1.I) TO SEE MESSAGES AND THE "EVENT: SUPERVISOR INVESTIGATOR" (3.C.1.L) ACCOUNT ROLE TO ENTER MOFE COMMENTS. (7) CONTROLLING CUSTODIAN / COMMAND SAFETY MANAGER / OFFICER - USER ADMINISTRATOR (3.E.1), DATA ANALYSTS (3.E.2), INVESTIGATION OVERSIGHT (3.E.4) INCLUDING THE "ACCESS APPROVAL (CONV AUTH ONLY)" (3.C.1.E) ACCOUNT ROLE, RECOMMENDATION MANAGEMENT (3.E.5) FUNCTIONAL ROLES AND THE "EVENT TABS: VIEW (ORG & TIME RESTRICTED)" (3.C.1.F), "RECOMMENDATION: SUPERVISOR (SAFETY ONLY)" (3.C.1.P), AND "EVENT: SUPERVISOR INVESTIGATOR" (3.C.1.L) ACCOUNT ROLES. (8) CONTROLLING CUSTODIAN / COMMAND COMMANDING OFFICERS - REQUIRES THE "EVENT: MESSAGE (VIEW ONLY)" (3.C.1.I) TO SEE MESSAGES AND THE "EVENT: SUPERVISOR INVESTIGATOR" (3.C.1.L) ACCOUNT ROLE TO ENTER MOFE COMMENTS. G. NON-DON ACCOUNT REQUESTS: AS STATED ABOVE, UNIT USER ADMINISTRATORS ARE NOT AUTHORIZED TO APPROVE RMI ACCESS OR ROLES TO PERSONNEL FROM OTHER MILITARY SERVICES, U.S. GOVERNMENTAL AGENCIES, CONTRACTORS, FOREIGN EXCHANGE OR LIAISON PERSONNEL, OR ANY NON-DON CIVILIANS. ALL SUCH REQUESTS MADE BY NON-DON PERSONNEL MUST BE FORWARDED TO THE NAVAL SAFETY CENTER FOR ACTION. 4. NAVAL SAFETY CENTER/CMC SAFETY DIVISION POINTS OF CONTACT: A. RMI HELP DESK (PRIMARY): TEL: 833-637-3669/EMAIL: NESD.RMI.FCT@NAVY.MIL B. RMI HELP DESK (SECONDARY): TEL: 866-210-7474/EMAIL: RMITESTTEAM@CHENEGA.ONMICROSOFT.COM C. SYSTEM ACCOUNT ADMINISTRATION POLICY QUESTIONS: ANDREW JONES/NAVSAFECEN/TEL: 757-444-3520 X7036/ TEL: DSN 564-3520 X7036/EMAIL: ANDREW.JONES2@NAVY.MIL D. GENERAL OPNAVINST 5102.1D POLICY QUESTIONS: LEWIS, ALAN R/NAVSAFECEN/TEL: 757-444-3520X7037/TEL: DSN 564-3520 X7037/ EMAIL: ALAN.R.LEWIS@NAVY.MIL E. GENERAL OPNAVINST 3750.6S POLICY QUESTIONS/AVIATION SPECIFIC QUESTIONS: HYAMS, ADAM/NAVSAFECEN/ TEL: 757-444-3520 X7226/ TEL: DSN 564-3520 X7225/EMAIL: ADAM.E.HYAMS@NAVY.MIL F. SHORE/SYSCOM SPECIFIC QUESTIONS: GUM, CHARLES E./NAVSAFECEN/ TEL: 757-444-3520 X7022/TEL: DSN 564-3520X7022/EMAIL: CHARLES.GUM@NAVY.MIL G. AFLOAT SPECIFIC QUESTIONS: KEIM, RON/NAVSAFECEN/TEL: 757-444-3520 X7090/TEL: DSN 564-3520 X7090/EMAIL: RONALD.KEIM@NAVY.MIL H. NAVY EXPEDITIONARY OPS/DIVING SPECIFIC QUESTIONS: BEJO, PETRIT OR GARRETT, RICHARD/NAVSAFECEN/TEL: 757-444-3520 X7374/TEL: DSN 564-3520 X7374/EMAIL: NAVSAFECEN_CODE42_EXW_DIVE@NAVY.MIL OR NAVSAFECEN_CODE44_EXW_JUMP@NAVY.MIL I. MARINE CORPS SPECIFIC QUESTIONS: BEDELL, THOMAS M., COL/CMC SAFETY DIVISION/TEL:703-604-4361/EMAIL: THOMAS.BEDELL@USMC.MIL; WARTHEN, ALTON, LTCOL/CMC SAFETY DIVISION/TEL: 703-614-4172/EMAIL: ALTON.WARTHEN@USMC.MIL// BT #1103 NNNN