Search results
{{$ui.public('rma.banner')}} {{$ui.public('rma.banner')}}
iPERMS is the Army's authorized personnel records repository for the Army Military Human Resource Record (AMHRR). The AMHRR is the Army's System of Records protected by the Privacy Act...
The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. At any time, the USG may inspect and seize data stored on this IS.
Identity Management is DS Logon's secure, self-service logon ID created by the Defense Manpower Data Center (DMDC) as an enterprise identity credential that allows individuals affiliated with the...
My Record Portal is HRC's self-service portal for the Army’s Active Duty, Reserve, National Guard, Retirees and Veterans. IPERMS data is no longer available in My Record Portal. Users must go...
Soldier Management Services - Web Portal (SMS Web) is a web-based collection of data, applications, and tools to assist Career Managers and other Human Resource Personnel in supporting Active...
iPERMS 2.2.2 is a maintenance, database, and defect fix release of the 2.2.1 iPERMS application. This release addresses multiple defect and technical issues experienced by the iPERMS user...
The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. At any time, the USG may inspect and seize data stored on this IS.
Follow the instructions below once an email has been received stating New AMHRR document has been added to your iPERMS. How to access your AMHRR. Click on the provided link:...
The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. At any time, the USG may inspect and seize data stored on this IS.