Dear NYS Principals and Administrators,
As we’ve shared in previous emails, the Nonprofit Security Grant Program will be opening soon, but the application has not yet been released. The grant is still pending Congressional approval, and there will be a short time frame from when the application is released until it is due. Therefore, it is important to prepare for the grant in advance as much as possible.
The New York State Division of Homeland Security and Emergency Services (DHSES) is the agency that submits your applications to FEMA. Here are their guidelines for how to prepare for the grant:
-
You must be prequalified with NYS Grants Management at the time of application. This includes those organizations that may have been previously prequalified, as you must maintain prequalification status in order to apply for funds. For more information about prequalification, see here.
- You must have an up-to-date risk/vulnerability assessment for each site for which grant funding is requested.
-
You must be a registered user of the DHSES E-Grants System. All applications will be submitted to DHSES using this system. If you need information about this system or need to register for access, see here.
- Your organization must have a current and valid DUNS number.
Here are the Vulnerability Assessment Requirements:
-
A separate site-specific vulnerability assessment must be provided for each site for which funding is requested.
- The vulnerability assessment must contain the site’s physical address, which must match the physical address provided in the Investment Justification (IJ) and in the Work Plan of your E-Grants application.
-
Each and every project being requested in the IJ must be clearly linked to a security vulnerability identified in the vulnerability assessment. Requested projects that are not reflected as vulnerabilities in the assessment will not be funded.
- The vulnerability assessment submitted must be current and accurately reflect the site’s security vulnerabilities at the time your application is submitted.
In addition to the above requirements, it is recommended that the vulnerability assessment include thorough and comprehensive identification of all security vulnerabilities and should not be limited only to projects being requested with your current application.
Documents: