Secure web fingerprint transmission (SWFT) is a web-enabled system for the collection and transmission of electronic fingerprints for applicants requiring a background investigation for a personnel security clearance. SWFT eliminates the paper-based capture and handling of fingerprints, expedites the background check process by reducing invalid fingerprint submissions, provides end-to-end accountability for sensitive PII data, and implements stringent security standards for all electronic transactions.
According to a memorandum dated July 29, 2010, the Under Secretary of Defense for Intelligence issued a requirement for all Department of Defense (DoD) components to transition to electronic capture and submission of fingerprint images in support of all background investigations by the end of December, 2013.
While working with the Carin group, clients are kept current on our capabilities, costs, schedules and deliverables. Our commitment to professionally manage our client’s security needs provides the confidence that they will be in full compliance and at a reasonable cost.
The Carin Group provide proven and reliable solutions that let our clients focus on their mission rather than on the technology supporting it. No matter the challenge, the Carin group has the skills and experience to deliver at every critical stage on-time and on-budget.
The Carin group strives to achieve full client satisfaction while maintaining an ethical and professional workplace and security environment. This is our pledge made to all of our clients.
By using the SWFT web enabled system to collect and transmit electronic fingerprints, we have eliminated the need for paper based fingerprint capturing, which is even more vital in today’s environment as the COVID-19 pandemic has made paper based fingerprint capture a hazardous and risky method of taking fingerprints.
The SWFT system has also greatly sped up the process of checking the backgrounds of people and there is an extremely high level of accountability for sensitive data, which ensures that unauthorized personnel cannot gain access to data that is above their security clearance.