Operational Change to George Washington Bridge SWAC Processing Center
Please be advised that the SWAC Processing Center at George Washington Bridge will change operations from Tuesday's to Thursdays effective immediately. We will also have expanded hours of operation from 6:00 A.M. until 2:30 P.M. If you need any further information, please contact our customer service department at 212-608-0855.
Welcome to the SWAC Website
The Secure Worker Access Consortium (SWAC) is a unique cooperative security program that enables the effective and efficient screening of individuals who require access to secure areas or confidential information. SWAC successfully meets the challenges of Personal Identity Verification (PIV) for contracted workers to help ensure they are known, well-trained, and have a threat-free history in accordance with federal standards.
Public agencies, private corporations, labor organizations and contractors strategically partner in SWAC to mitigate risk, develop the SWAC Trusted Community, and cooperatively improve regional and national security. The largest transportation agencies in the New York metro area including the Port Authority of New York and New Jersey (PANYNJ), Metropolitan Transit Authority (MTA), and New Jersey Transit (NJT) have adopted SWAC as the regional standard for access control to sensitive facilities, critical infrastructures, and key national resources.
SWAC background screening is based on, but not necessarily identical to, criteria provided by the Department of Homeland Security (DHS) Transportation Security Administration's (TSA) list of Disqualifying Criminal Offenses. These are detailed in 49 CFR 1542.209(d) (SIDA) and 49 CFR 1572.103 (TWIC) and shall be updated as required. Additionally, the advanced, patent-pending technology used by SWAC enables real-time secure information sharing among disconnected facilities on a strictly need-to-know basis. To gain access to unique secure zones, prescreened members' personal information, certifications, credentials and access rights are verified by security professionals.
- Personnel data collection and program administration
- Identity document verification, photo capture and authorization-form management
- Supervision of independent, third-party personal identity verification and criminal history background screening vendors
- Production and delivery of membership ID Cards
- Secure, web-based information management system
- Daily search of terrorist watch lists