Home   Package List   Routine Alphabetical List   Global Alphabetical List   FileMan Files List   FileMan Sub-Files List   Package Component Lists   Package-Namespace Mapping  
Info |  Source |  Caller Graph |  Entry Points |  Interaction Calls |  Local Variables  | All
Print Page as PDF
Routine: RMPRP23

Package: Prosthetics

Routine: RMPRP23


Information

RMPRP23 ;PHX/HNB -PRINT PURCHASE CARD FORM ;3/1/1996

Source Information

Source file <RMPRP23.m>

Caller Graph

Legends:

Legend of Colors

Package Component Superscript legend

action A extended action Ea event driver Ed subscriber Su protocol O limited protocol LP run routine RR broker B edit E server Se print P screenman SM inquire I

Caller Graph

Caller Graph Total: 2

Package Total Caller Graph
Prosthetics 2 RMPRP21  RMPRP55  

Entry Points

Name Comments DBIA/ICR reference
PRI ;ENTRY POINT FOR PRINTING PRIVACY ACT FOR 10-2421 AND 10-55 AND 2419
  • ICR #6544
    • Status: Pending
    • Usage: Private
    PRI1

    Interaction Calls

    Name Line Occurrences
    Function Call: WRITE
    • Prompt: @IOF,!!,"Security Requirements Interim Guidance - January 2013 (Per Acquisition Policy"
    • Line Location: PRI+1
    Function Call: WRITE
    • Prompt: !," Flash 12-04, dated 2/2/12, suspending VAAR clause 852.273-75)",!
    • Line Location: PRI+2
    Function Call: WRITE
    • Prompt: !,"A. Any contractor and/or subcontractor retained to do work for VA under"
    • Line Location: PRI+3
    Function Call: WRITE
    • Prompt: !,"this Contract that requires the access, use, storage, modification, or"
    • Line Location: PRI+4
    Function Call: WRITE
    • Prompt: !,"transmission of VA Sensitive Personal Information (SPI) must follow and"
    • Line Location: PRI+5
    Function Call: WRITE
    • Prompt: !,"adhere to the security controls, enhancements, compensating controls,"
    • Line Location: PRI+6
    Function Call: WRITE
    • Prompt: !,"protocols, regulations, and VA directions as the Contracting Officer"
    • Line Location: PRI+7
    Function Call: WRITE
    • Prompt: !,"(CO) shall direct, including, but not limited to those derived from the"
    • Line Location: PRI+8
    Function Call: WRITE
    • Prompt: !,"Federal Information Security Management Act (FISMA), OMB Circular No."
    • Line Location: PRI+9
    Function Call: WRITE
    • Prompt: !,"A-130, and VA Handbook 6500/6500.6. The contractor must report any data"
    • Line Location: PRI+10
    Function Call: WRITE
    • Prompt: !,"breach according to the protocols and timeframes in HB 6500.",!
    • Line Location: PRI+11
    Function Call: WRITE
    • Prompt: !,"B. If any contractor/sub-contractor retained to do work for VA under"
    • Line Location: PRI1+0
    Function Call: WRITE
    • Prompt: !,"this Contract requires access, use, etc., of VA SPI as aforesaid, and if an"
    • Line Location: PRI1+1
    Function Call: WRITE
    • Prompt: !,"actionable data breach occurs because of the contractor/subcontractor's acts,"
    • Line Location: PRI1+2
    Function Call: WRITE
    • Prompt: !,"omissions, or negligence in following the VA-directed security controls,"
    • Line Location: PRI1+3
    Function Call: WRITE
    • Prompt: !,"enhancements, compensating controls, protocols, and/or measures, including,"
    • Line Location: PRI1+4
    Function Call: WRITE
    • Prompt: !,"but not limited to the sources above, the contractor/subcontractor is"
    • Line Location: PRI1+5
    Function Call: WRITE
    • Prompt: !,"further subject to the statutory requirement to assess liquidated damages"
    • Line Location: PRI1+6
    Function Call: WRITE
    • Prompt: !,"against contractors and/or subcontractors under 38 U.S.C. 5725 in the event"
    • Line Location: PRI1+7
    Function Call: WRITE
    • Prompt: !,"of a breach of Sensitive Personal Information (SPI)/Personally Identifiable"
    • Line Location: PRI1+8
    Function Call: WRITE
    • Prompt: !,"Information (PII). Said liquidated damages shall be assessed at $37.50"
    • Line Location: PRI1+9
    Function Call: WRITE
    • Prompt: !,"per affected Veteran or beneficiary. A breach in this context includes"
    • Line Location: PRI1+10
    Function Call: WRITE
    • Prompt: !,"the unauthorized acquisition, access, use, or disclosure of VA SPI which"
    • Line Location: PRI1+11
    Function Call: WRITE
    • Prompt: !,"compromises not only the information's security or privacy but that of the"
    • Line Location: PRI1+12
    Function Call: WRITE
    • Prompt: !,"Veteran or beneficiary as well as the potential exposure or wrongful"
    • Line Location: PRI1+13
    Function Call: WRITE
    • Prompt: !,"disclosure of such information as a result of a failure to follow proper"
    • Line Location: PRI1+14
    Function Call: WRITE
    • Prompt: !,"data security controls and protocols."
    • Line Location: PRI1+15

    Local Variables

    Legend:

    >> Not killed explicitly
    * Changed
    ! Killed
    ~ Newed

    Name Field # of Occurrence
    IOF PRI+1
    Info |  Source |  Caller Graph |  Entry Points |  Interaction Calls |  Local Variables  | All