The Shipper's Declaration for Dangerous Goods can only be received by an Airman trained and certified to sign for such shipments.
Post-deployment training
Deployment planning that supports training operations typically involves "Training Deployment Plans." These plans focus on the integration of training resources, personnel, and equipment necessary to prepare military or operational units for specific missions. They ensure that training exercises are aligned with deployment timelines and objectives, facilitating effective skill development and readiness. Additionally, they may include simulations, live exercises, and the use of technology to enhance training outcomes prior to actual deployment.
Being in the ready pool with a CEF designation impacts collective training and deployment by stating who will be going next. The ready pool means that your unit is ready for rapid deployment.
immediately prior to deployment
LRS
These forces are capable of rapid deployment but are not yet alerted to dploy (AC) or alerted for mobilization (RC).
Within 45 days of arrival, annually, and prior to deployment
The document that typically requires an organization to ensure personnel receive system-specific training is the "System Security Plan" (SSP) or a similar policy document. This document outlines the security controls and practices that must be implemented for specific systems, emphasizing the need for personnel to be adequately trained on those systems to maintain security and compliance. Additionally, training requirements may also be specified in organizational policies or standard operating procedures related to information security and personnel training.
Trained / Ready
Local processes and procedures for deployment operations are typically outlined in documents such as Standard Operating Procedures (SOPs), Deployment Plans, and Operations Manuals. These documents provide detailed guidelines on the steps, responsibilities, and protocols to follow during deployment. Additionally, checklists and training materials may also be included to ensure compliance and efficiency in the deployment process.
The document that requires personnel to receive system-specific and annual information assurance (IA) awareness training is typically the organization's Information Assurance Policy or the Security Awareness Policy. These policies outline the responsibilities for maintaining security awareness among personnel and ensuring they are educated on relevant systems and threats. Compliance with these training requirements is often mandated by regulatory frameworks such as the Federal Information Security Management Act (FISMA) or related directives.
Muscular training