Making a difference at the front line



When to file a T-SAP report



An eligible Technical Operations Services employee may file a T-SAP report for any potential safety risk to the National Airspace System (NAS) involving operations, equipment, or personnel. It is imperative that employees identify all potential safety hazards within the NAS in order to maintain the integrity of the system and to take appropriate corrective actions as necessary. Reporting safety hazards (either systemic or individual) enhances system integrity and ensures the necessary protections for personnel, equipment and operations.
What should I report?
1. Non-compliance reports. Non-compliance reports identify specific instances of a failure to follow FAA directives.
2. Aviation safety concern reports. - Aviation safety concerns that do not involve specific non-compliance with FAA directives are reportable via T-SAP. These may include, but are not limited to, potential safety events or perceived problems with policies, procedures, equipment, automation, and publications used to provide air traffic services.
When should I report it?
When an employee observes a safety problem or experiences a safety-related event, he or she should note the problem or event and describe it in enough detail so that it can be evaluated by a third party. At an appropriate time during the workday, the employee should electronically submit a T-SAP report for each safety problem or event at www.t-sap.org.
What are the benefits of reporting to T-SAP?
This program fosters a voluntary, cooperative, and non-punitive environment for the open reporting of safety concerns. This information will be analyzed in order to develop corrective actions to help solve safety issues that previously may not have been discovered, thereby reducing the likelihood of errors, incidents or other safety related events. For a report accepted under T-SAP, the FAA will not take punitive or credentialing action against the submitter with respect to the reported event.


Copyright © CSSI, Inc. - cssiinc.com

Privacy Policy
Privacy Policy

T-SAP Privacy Policy

Our Commitment

We respect your right to privacy and will protect it when you visit our website. This Privacy Policy explains our online information practices only, including how we collect and use your personal information. It does not apply to third-party websites that you are able to reach from t-sap.org.

What We Automatically Collect Online

We collect information about your visit that does not identify you personally. We can tell the computer, browser, and web service you are using. We also know the date, time, and pages you visit. Collecting this information helps us design the site to suit your needs. In the event of a known security or virus threat, we may collect information on the web content you view.

Other Information We May Collect

When you visit our website, we may request and collect the following categories of personal information from you:

  • Contact information
  • Other official document information to verify your identity

Why We Collect Information

Our principal purpose for collecting personal information online is to provide you with what you need and want, address security and virus concerns, and to ease the use of our website.

We will only use your information for the purposes you intended, to address security or virus threats, or for the purposes required under the law. See "Choices on How We Use the Information You Provide" to learn more.

We collect information to:

  • Respond to your complaints
  • Reply to your "feedback comments"
  • Manage your access to restricted areas of the website
  • Fulfill requests for reports and other similar information
  • Register you for a member account

Choices on How We Use the Information You Provide

Throughout our website, we will let you know whether the information we ask you to provide is voluntary or required. By providing personally identifiable information, you grant us consent to use this information, but only for the primary reason you are giving it. We will ask you to grant us consent before using your voluntarily provided information for any secondary purposes, other than those required under the law.

Information Collected from Interactive Forms

On some of our webpages we may offer interactive forms that let you voluntarily submit personal information (such as your email address, name, or organization). We only use your information for the expressed purposes for which it is intended. Your information is not made available to any third party. However, if you supply your name, email address, or other personal information when you submit a comment we may post that information along with your comment.

Cookies or Other Tracking Devices

A "cookie" is a small text file stored on your computer that makes it easy for you to move around a website without continually re-entering your name, password, preferences, for example.

We only use "session" cookies on our website. This means we store the cookie on your computer only during your visit to our website. After you turn off your computer or stop using the Internet, the cookie disappears with your personal information.

Securing Your Information

Properly securing the information we collect online is a primary commitment. To help us do this, we take the following steps to:

  • Employ internal access controls to ensure the only people who see your information are those with a need to do so to perform their official duties
  • Train relevant personnel on our privacy and security measures to know requirements for compliance
  • Secure the areas where we hold hard copies of information we collect online
  • Perform regular backups of the information we collect online to insure against loss
  • Use technical controls to secure the information we collect online including but not limited to:
    • Secure Socket Layer (SSL)
    • Encryption
    • Firewalls
    • Password protections
  • We periodically test our security procedures to ensure personnel and technical compliance
  • We employ external access safeguards to identify and prevent unauthorized tries of outsiders to hack into, or cause harm to, the information in our systems
  • Tampering with this website is against the law. Depending on the offense, it is punishable under the Computer Fraud and Abuse Act of 1986 and the National Information Infrastructure Protection Act.

Your Rights Under the Privacy Act of 1974

The Privacy Act of 1974 protects the personal information the federal government keeps on you in systems of records (SOR) (information an agency controls recovered by name or other personal identifier). The Privacy Act regulates how the government can disclose, share, provide access to, and keep the personal information that it collects. The Privacy Act does not cover all information collected online.

The Act's major terms require agencies to:

  • Publish a Privacy Act Notice in the Federal Register explaining the existence, character, and uses of a new or revised SOR
  • Keep information about you accurate, relevant, timely, and complete to assure fairness in dealing with you
  • Allow you to, on request, access and review your information held in an SOR and request amendment of the information if you disagree with it.

When t-sap.org collects information from you online that is subject to the Privacy Act (information kept in an SOR), we will provide a Privacy Act Statement specific to that collected information. This Privacy Act Statement tells you:

  • The authority for and the purpose and use of the information collected subject to the Privacy Act
  • Whether providing the information is voluntary or mandatory
  • The effects on you if you do not provide any or all requested information.