Show Roles
{{model['LoggedInUser'][0].LogoTitle}}
{{model['LoggedInUser'][0].ApplicationTitle}}
version {{model['LoggedInUser'][0].ApplicationVersion}}
{{model['AlertMessage']}}
Automobile Use Tracking On-Line System
(AUTOS, version 2.3.122.000)
  This is a secure web application.
Training Window 2

here: {{(model['TipInformationTraining'] | filter:{CategoryID:x.TipCategoryID}).length}}
{{x.Category}}
{{y.TipName}}
No {{x.Category}} Tips

Training

No Training Tips
{{x.TipName}}

Information

No Info Tips
{{x.TipName}}
 {{displayCrumb()}} {{crumb2}}
SIGN-ON
If you have an active account, you may loin by clicking on the "Sign-On" button below. Welcome back!
REGISTER
Don't have an account yet? Not a problem. Sign up by clicking on the "Register" button below.
SUPPORT
We are here to help if you are having difficulties or have questions! Click “Contact Support” below.
PRIVACY NOTICE
By logging in you thereby accept the following terms. Violations to system or network security are prohibited, and can result in criminal and civil liability. Continuous attempts to infiltrate or damage network security and systems may be treated as violations. Examples of system or network security violations are as listed, but not limited to: (1) Unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of administrators. (3) Unauthorized monitoring of data or traffic on any network or system without express authorization SESA administrators. (4) Interference with service to any user, host or network including, without limitation, mail spam, flooding, deliberate attempts to overload a system and broadcast attacks. (5) Forging of any TCP-IP packet header or any part of the header information in an email or a newsgroup posting. You are responsible for Your own communications and their consequences.
SIGN-ON
If you have an active account, you may loin by clicking on the "Sign-On" button below. Welcome back!
REGISTER
Don't have an account yet? Not a problem. Sign up by clicking on the "Register" button below.
SUPPORT
We are here to help if you are having difficulties or have questions! Click “Contact Support” below.
PRIVACY NOTICE
By logging in you thereby accept the following terms. Violations to system or network security are prohibited, and can result in criminal and civil liability. Continuous attempts to infiltrate or damage network security and systems may be treated as violations. Examples of system or network security violations are as listed, but not limited to: (1) Unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of administrators. (3) Unauthorized monitoring of data or traffic on any network or system without express authorization SESA administrators. (4) Interference with service to any user, host or network including, without limitation, mail spam, flooding, deliberate attempts to overload a system and broadcast attacks. (5) Forging of any TCP-IP packet header or any part of the header information in an email or a newsgroup posting. You are responsible for Your own communications and their consequences.
USPS RunFAST Evaluation Tool
SIGN-ON
If you have an active account, you may login by clicking on the "Sign-On" button below. Welcome back!
REGISTER
Don't have an account yet? Not a problem. Sign up by clicking on the "Register" button below.
SUPPORT
We are here to help if you are having difficulties or have questions! Click “Contact Support” below.
PRIVACY NOTICE
By logging in you thereby accept the following terms. Violations to system or network security are prohibited, and can result in criminal and civil liability. Continuous attempts to infiltrate or damage network security and systems may be treated as violations. Examples of system or network security violations are as listed, but not limited to: (1) Unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of administrators. (3) Unauthorized monitoring of data or traffic on any network or system without express authorization SESA administrators. (4) Interference with service to any user, host or network including, without limitation, mail spam, flooding, deliberate attempts to overload a system and broadcast attacks. (5) Forging of any TCP-IP packet header or any part of the header information in an email or a newsgroup posting. You are responsible for Your own communications and their consequences.
Microsoft is ending support for Internet Explorer. Please, use one of the following browsers: Chrome, Edge, Firefox, Safari or other chromium-based browsers.
# Systems: {{model['supportedsystems'].length}}

High Priority

{{x.Name}}

{{x.RunDate | date:'medium'}}

Medium Priority

{{x.Name}}

{{x.RunDate | date:'medium'}}

High Priority

{{x.Name}}

{{x.RunDate | date:'medium'}}

Medium Priority

{{x.Name}}

{{x.RunDate | date:'medium'}}
Welcome to the U.S. Department of Labor, Office of Assistant Secretary for Administration and Management (OASAM), Business Operations Center (BOC), Office of Support Services Internal Operations Management Tracker (BOCOM). Here you'll find information regarding the BOC’s Contract Operations and Financial Management. We are committed to streamlining programs based upon a rigorous analysis of available data and careful examination of all BOC programs. This BOCOM tool has been established to create, update, monitor and maintain all BOC contracts and financial management operations as well as allow management visibility of all programs and financials.
WHAT WOULD YOU LIKE TO DO?

PRIVACY NOTICE
By logging in you thereby accept the following terms. Violations to system or network security are prohibited, and can result in criminal and civil liability. Continuous attempts to infiltrate or damage network security and systems may be treated as violations. Examples of system or network security violations are as listed, but not limited to: (1) Unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of SESA administrators. (3) Unauthorized monitoring of data or traffic on any network or system without express authorization SESA administrators. (4) Interference with service to any user, host or network including, without limitation, mail spam, flooding, deliberate attempts to overload a system and broadcast attacks. (5) Forging of any TCP-IP packet header or any part of the header information in an email or a newsgroup posting. You are responsible for Your own communications and their consequences.
WELCOME to GPC!
GPC is your source for tracking your government purchase card. GPC gives you the power and ease to manage your SMART PAY certifications, transactions, and purchases. GPC is your one-stop management system for both cardholders and AOPCs.
WELCOME to the DOL Mail System!
WELCOME to the GSAXcess Digital Solution (GDS)!
GDS was developed to assist DOL agencies with managing the transfer or disposal of agency owned vehicles and accountable assets. GDS will assist agencies by providing additional analytical support to manage your current inventory and any surplus assets reported to GSAXcess for processing. GDS has the capability to utilize multiple datasets to audit and track previously reported agency owned assets. It is PPMO’s goal to develop a tool that is both user friendly and easy to navigate. If you have any questions about gaining access or navigating GDS, please contact PPMO at 202-693-7181 or ZZDOL-OASAM-PersonalProperty@dol.gov.
PRIVACY NOTICE
By logging in you thereby accept the following terms. Violations to system or network security are prohibited, and can result in criminal and civil liability. Continuous attempts to infiltrate or damage network security and systems may be treated as violations. Examples of system or network security violations are as listed, but not limited to: (1) Unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of {{model['LoggedInUser'][0].ApplicationName}} administrators. (3) Unauthorized monitoring of data or traffic on any network or system without express authorization {{model['LoggedInUser'][0].ApplicationName}} administrators. (4) Interference with service to any user, host or network including, without limitation, mail spam, flooding, deliberate attempts to overload a system and broadcast attacks. (5) Forging of any TCP-IP packet header or any part of the header information in an email or a newsgroup posting. You are responsible for Your own communications and their consequences.
WELCOME to Integrated Logistics Management System (ILMS)!

Ø  If you were forwarded this VAM Survey, your account may not be established yet. Please follow the directions below:

Ø  ALL LOCAL POC’s that are new to the system, click on Register.

 

ILMS was developed to assist DOT agencies with managing DOT's fleet of vehicles including GSA Leased, Agency Owned and Commercially Leased. ILMS assists the department by providing additional analytical support to manage current/planned/prior year inventory. ILMS has the capability to utilize multiple datasets to audit and track previously reported vehicles. It is ILMS’s goal to provide a tool that is both user friendly and easy to navigate.

If you have any questions about gaining access or navigating ILMS, please contact Eugene Tumblin at eugene.tumblin@dot.gov.
WELCOME to the Moving Services Portal (MSP)!
The Moving Services Portal (MSP) is tailor-made to facilitate the initiation and monitoring of moving service requests exclusively for the Francis Perkins Building.

Requests for MSP are initiated through the Department of Labor's Customer Intake Request Form, DL1-7070.

Within the MSP platform, users can effortlessly generate a comprehensive work order, outlining all requested services, points of contact, due dates, and other pertinent details associated with the job.

The MSP is equipped with the ability to automatically generate email alerts for acknowledgment, scheduling, cancellation, and completion notifications.

This portal is employed by the BOC Personal Property Management Office to meet the moving requirements of the Department of Labor's Francis Perkins Building.


Please contact zzPPMO-MovingServices@dol.gov if you have any questions regarding a pending service ticket.

Need technical support, please contact Support@NetDigitalSolutions.com.


WELCOME to the Automobile Use Tracking On-Line System (AUTOS)!
Beginning November 1, 2023, All FY24 Fleet transactions and reconciliation requirements will be placed on hold until after completion of the FY23 FAST requirements. Please contact your agency Fleet Manager if you have any additional questions or concerns.
AUTOS is now reopened for monthly fleet data review. Local Vehicle POCs should review and certify their October and November’s fleet data by January 1st. Should you encounter any issues or require assistance while utilizing AUTOS, please reach out to your agency fleet manager or support@netdigitalsolutions.com.
AUTOS was specifically designed to aid DOL agencies in effectively overseeing the Department of Labor's diverse fleet of vehicles, encompassing GSA Leased, Agency Owned, and Commercially Leased vehicles. This platform extends support to the department by furnishing enhanced analytical capabilities for managing current, future, and prior-year vehicle inventories. AUTOS primary aim is to furnish a user-friendly and easily navigable tool that harnesses multiple datasets to facilitate the auditing and tracking of DOL’s fleet.

To establish a new AUTOS account, individuals are encouraged to reach out to their respective Agency Fleet Manager for access.




To create a new AUTOS account, please contact your Agency Fleet Manager for access.

If you have any questions regarding access or require assistance with navigating AUTOS, please contact AUTOS Customer Support at support@netdigitalsolutions.com.

If you have any questions regarding DOL’s Fleet Management Program or associated vehicle requirements, please email zzPPMO-FleetManagement@dol.gov or the DOL Fleet Manager at rogers.ron@dol.gov.
PRIVACY NOTICE
By logging in you thereby accept the following terms. Violations to system or network security are prohibited, and can result in criminal and civil liability. Continuous attempts to infiltrate or damage network security and systems may be treated as violations. Examples of system or network security violations are as listed, but not limited to: (1) Unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of {{model['LoggedInUser'][0].ApplicationName}} administrators. (3) Unauthorized monitoring of data or traffic on any network or system without express authorization {{model['LoggedInUser'][0].ApplicationName}} administrators. (4) Interference with service to any user, host or network including, without limitation, mail spam, flooding, deliberate attempts to overload a system and broadcast attacks. (5) Forging of any TCP-IP packet header or any part of the header information in an email or a newsgroup posting. You are responsible for Your own communications and their consequences.
WELCOME to the Demo Automobile Use Tracking On-Line System (AUTOS)!
Successfuly uploaded the following files. Do whatever the heck you want with them! :)
AUTOS is a Fleet Management Software System that will give you the required tools to manage and analyze your fleet data.
  • AUTOS is a premier Fleet Management Software System developed by qualified and proven experts in the industry.
  • Utilized and trusted!
  • AUTOS assists departments like yours by providing additional analytical support to manage current, planned, and prior year inventories.
  • AUTOS has the capability to utilize multiple datasets to audit and track previously reported vehicles.
  • Autos provides you with intuitive, easy-to-use screens & online training guides to get you going quickly!
LET'S GET STARTED!
To walkthrough AUTOS at your own pace, select register for immediate access. With our online training guides and pop-up tips you will not be alone on your experience!
If you would like a 15-minute virtual demo, please contact us via our Contact Us form or email/phone us directly. We can be reached at support@netdigitalsolutions.com or 877.496.8435 EXT 103, 8am to 5pm EST Mon-Fri.
{{model['Vehicle1'][0].VIN}} {{model['Vehicle1'][0].Make}} {{model['Vehicle1'][0].Model}} Selected!
PRIVACY NOTICE
By logging in you thereby accept the following terms. Violations to system or network security are prohibited, and can result in criminal and civil liability. Continuous attempts to infiltrate or damage network security and systems may be treated as violations. Examples of system or network security violations are as listed, but not limited to: (1) Unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of {{model['LoggedInUser'][0].ApplicationName}} administrators. (3) Unauthorized monitoring of data or traffic on any network or system without express authorization {{model['LoggedInUser'][0].ApplicationName}} administrators. (4) Interference with service to any user, host or network including, without limitation, mail spam, flooding, deliberate attempts to overload a system and broadcast attacks. (5) Forging of any TCP-IP packet header or any part of the header information in an email or a newsgroup posting. You are responsible for Your own communications and their consequences.
WELCOME to the Automobile Use Tracking On-Line System (AUTOS)!
Successfuly uploaded the following files. Do whatever the heck you want with them! :)
AUTOS is a Fleet Management Software System that will give you the required tools to manage and analyze your fleet data.
  • AUTOS is a premier Fleet Management Software System developed by qualified and proven experts in the industry.
  • Utilized and trusted!
  • AUTOS assists departments like yours by providing additional analytical support to manage current, planned, and prior year inventories.
  • AUTOS has the capability to utilize multiple datasets to audit and track previously reported vehicles.
  • Autos provides you with intuitive, easy-to-use screens & online training guides to get you going quickly!
LET'S GET STARTED!
To walkthrough AUTOS at your own pace, select register for immediate access. With our online training guides and pop-up tips you will not be alone on your experience!
If you would like a 15-minute virtual demo, please contact us via our Contact Us form or email/phone us directly. We can be reached at support@netdigitalsolutions.com or 877.496.8435 EXT 103, 8am to 5pm EST Mon-Fri.
{{model['Vehicle1'][0].VIN}} {{model['Vehicle1'][0].Make}} {{model['Vehicle1'][0].Model}} Selected!
PRIVACY NOTICE
By logging in you thereby accept the following terms. Violations to system or network security are prohibited, and can result in criminal and civil liability. Continuous attempts to infiltrate or damage network security and systems may be treated as violations. Examples of system or network security violations are as listed, but not limited to: (1) Unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of {{model['LoggedInUser'][0].ApplicationName}} administrators. (3) Unauthorized monitoring of data or traffic on any network or system without express authorization {{model['LoggedInUser'][0].ApplicationName}} administrators. (4) Interference with service to any user, host or network including, without limitation, mail spam, flooding, deliberate attempts to overload a system and broadcast attacks. (5) Forging of any TCP-IP packet header or any part of the header information in an email or a newsgroup posting. You are responsible for Your own communications and their consequences.
WELCOME to the UAT Automobile Use Tracking On-Line System (AUTOS)!
Successfuly uploaded the following files. Do whatever the heck you want with them! :)
AUTOS is a Fleet Management Software System that will give you the required tools to manage and analyze your fleet data.
  • AUTOS is a premier Fleet Management Software System developed by qualified and proven experts in the industry.
  • Utilized and trusted! Developed and deployed into a production environment for Department of Labor (DOL) and Department of Transportation (DOT) for over 9 years!
  • AUTOS assists departments like yours by providing additional analytical support to manage current, planned, and prior year inventories.
  • AUTOS has the capability to utilize multiple datasets to audit and track previously reported vehicles.
  • Autos provides you with intuitive, easy-to-use screens & online training guides to get you going quickly!
LET'S GET STARTED!
To walkthrough AUTOS at your own pace, select register for immediate access. With our online training guides and pop-up tips you will not be alone on your experience!
If you would like a 15-minute virtual demo, please contact us via our Contact Us form or email/phone us directly. We can be reached at support@netdigitalsolutions.com or 877.496.8435 EXT 103, 8am to 5pm EST Mon-Fri.
{{model['Vehicle1'][0].VIN}} {{model['Vehicle1'][0].Make}} {{model['Vehicle1'][0].Model}} Selected!
PRIVACY NOTICE
By logging in you thereby accept the following terms. Violations to system or network security are prohibited, and can result in criminal and civil liability. Continuous attempts to infiltrate or damage network security and systems may be treated as violations. Examples of system or network security violations are as listed, but not limited to: (1) Unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of {{model['LoggedInUser'][0].ApplicationName}} administrators. (3) Unauthorized monitoring of data or traffic on any network or system without express authorization {{model['LoggedInUser'][0].ApplicationName}} administrators. (4) Interference with service to any user, host or network including, without limitation, mail spam, flooding, deliberate attempts to overload a system and broadcast attacks. (5) Forging of any TCP-IP packet header or any part of the header information in an email or a newsgroup posting. You are responsible for Your own communications and their consequences.
TEST !!!!! WELCOME to the GSAXcess Digital Solution (GDS)!
GDS was developed to assist DOL agencies with managing the transfer or disposal of agency owned vehicles and accountable assets. GDS will assist agencies by providing additional analytical support to manage your current inventory and any surplus assets reported to GSAXcess for processing. GDS has the capability to utilize multiple datasets to audit and track previously reported agency owned assets. It is PPMO’s goal to develop a tool that is both user friendly and easy to navigate. If you have any questions about gaining access or navigating GDS, please contact PPMO at 202-693-7181 or Net Digital Solutions at support@netdigitalsolutions.
WELCOME to the Executive SMS
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Praesent metus est, efficitur sit amet finibus eu, maximus interdum risus. Aliquam aliquam sagittis urna eu tempus. Quisque ac turpis id magna pellentesque luctus eu vel velit. Curabitur ultricies tempus cursus. Maecenas rutrum bibendum gravida. Duis eleifend orci ante, non vehicula felis tincidunt eu. Morbi at vehicula risus. Nulla non tempus purus. Nam in consequat ipsum. Suspendisse egestas vulputate mauris, at venenatis elit ornare eget. Sed sagittis arcu id tincidunt semper. Cras at enim quis tellus congue blandit nec vitae augue.

Nteger interdum rutrum lacinia. Aenean venenatis magna eget lectus lacinia, fringilla consectetur ex hendrerit. Duis lacus justo, interdum a dolor quis, rutrum tristique purus. Proin ut sapien nunc. Mauris tempor, mauris eget malesuada pellentesque, lacus enim euismod enim, ultrices condimentum sapien mi nec odio. Curabitur eget neque diam. Sed malesuada id velit ac commodo. Aliquam tristique augue a nisi laoreet, blandit lobortis dui elementum. Phasellus at arcu at neque porttitor ultrices.
WELCOME to Integrated Logistics Management System (ILMS)!
Developed and Powered by Bones version 2.3.122.000  from Net Digital Solutions
{{dialogTitle[0]}}
{{dialogTitle[1]}}
{{model['Tip'].Tip}}