What is CMMC?

EPC Group's CMMC Compliance Consulting

CMMC stands for Cybersecurity Maturity Model Certification, with a motive to set new cybersecurity standards, especially for the companies working with or working for the Department of Defense.

Essentially it is a new umbrella standard comprising requirements from the Federal Defense Acquisition Requirements (DFARS 252.204-7012) and the National Institute of Standards and Technology (NIST). The idea of CMMC is primarily based on the NIST 800-171 model. It helped outline many aspects of cybersecurity, from psychical security to IT and cybersecurity. The new CMMC standards are based on the revised or NIST 800-171 rev1 model and strictly enforced with third-party assessments, audits, and certifications.

The CMMC presents a set of policies and practices that are imperative for all the companies supporting or feeding into the Defense Industrial Base (DIB). Through CMMC Certification, DoD is determined to compare the cybersecurity posture of DIB partners and suppliers in terms of cybersecurity threat handling and preparedness. Besides, it will also check how well cybersecurity is integrated within their organizational culture.

Why CMMC is Important?

EPC Group's CMMC Compliance Consulting

United States Department of Defense (US DoD) initiated the CMMC program for securing the Defense Industrial Base (DIB). The program follows a unified standard for cybersecurity aiming to protect both – the defense and the supplier information system. Besides, it also prevents Adversaries of the United States from manipulating, destroying, or stealing the defense information or putting US DoD systems in a compromising situation.

The US DoD wants the Defense Industrial Base (DIB) to follow the CMMC; because they do feel that their adversaries are weakening the defensive and offensive capabilities through supply chains. As the US Defense adversaries have access to critical weapon systems, degrading the defending capabilities of the nation through information systems of US DoD suppliers is a serious cause of concern.

Although these adversaries might have partial or complete access to the entire plan for a particular intellectual property like a weapon system, stealing it from multiple suppliers is always eminent. CMMC is designed to forbid such activities and eradicate all the vulnerabilities that may exploit at the time of choosing adversaries.

Compatibility Domains of CMMC Construct

Access Control (AC)
It’s a fundamental security domain and a set of security principles applied to both - physical and logical assets. CMMC defines 4 Access Control capabilities – Establish system access requirements, Control internal system access, Control remote system access, Limit data access to authorized users and processes.
Asset Management (AM)
An organization consists of many tangible and intangible assets - like buildings, laptops, people, PCs, and data. More assets mean a broader ‘attack surface’. CMMC defines 2 Asset Management (AM) capabilities - Identify and document assets, Manage asset inventory.
Awareness and Training (AT)
Being Forewarned is staying Forearmed. To identify and manage a cyber threat, an organization has to be aware of what they are and get trained to identify and handle them. CMMC defines 2 Awareness and Training (AT) capabilities -Conduct security awareness activities and Conduct training.
Audit and Accountability (AU)
Audit logging is an important requirement for system governance and is used in versatile activities. CMMC defines 4 Audit and Accountability (AU) capabilities – Define audit requirements, perform auditing, Identify and protect audit information, and Review and manage audit logs.
Configuration Management (CM)
It helps establish a consistent, controlled, and audited process to manage system changes and subsequently system security, performance, and functionality. CMMC defines 2 Configuration Management (CM) capabilities – Establish configuration baselines and Perform configuration and change management.
Identification and Authentication (IA)
Before allowing users to access systems, they need to be identified and authenticated. It keeps systems secure and free of nonauthorized access. CMMC defines 1 Identification and Authentication (IA) capability - Grant access to authenticated entities.
Incident Response (IR)
An IR plan is a clear set of actions to detect, respond and recover from an attack. CMMC defines 5 Incident Response (IR) capabilities – Plan incident response. Detect and report events, Develop and implement a response to a declared incident, Perform post-incident reviews, and Test incident response.
Maintenance (MA)
Frequent system maintenance ensures operations are running smoothly and minimizes the risks of breakdown. It helps find the vulnerabilities and prevent threats even before occurring. CMMC defines 1 Maintenance (MA) capability - Manage maintenance.
Media Protection (MP)
Data is the life and blood of modern organizations, hence needs to be protected in whatever form it takes, logical or physical. CMMC defines 4 Media Protection (MP) capabilities - Identify and mark media, Protect and control media, sanitize media, and Protect media during transport.
Personnel Security (PS)
The most important asset of an organization is its people, yet some of the largest security attacks and data breaches occur from inside making personal security all the more important. CMMC defines 2 Personnel Security (PS) capabilities – Screen personnel and Protect CUI during personnel actions.
Physical Protection (PE)
Physical and logical protection go hand in hand. You cannot protect assets such as computers, laptops, servers holding the company’s IP without Physical Protection. Physical protection ensures the safety of the organization’s IP infrastructure. CMMC defines 1 Physical Protection (PE) capability - Limit physical access.
Recovery (RE)
IT and system failures are part of organizations operating environment. A recovery plan Protects its assets, IP, FCI, CUI, and helps overcome specific disaster scenarios possible threats. CMMC defines 2 Recovery (RE) capabilities - Manage backups and Manage information security continuity.
Risk Management (RM)
An efficient Risk Management helps manage cyber-attacks and their consequences by identifying and managing the most significant of such risks, threats, or attacks. CMMC defines 3 Risk Management (RM) capabilities - Identify and evaluate risk, manage risk, and Manage supply chain risk.
Security Assessment (CA)
Security Assessment means evaluating security measures undertaken by the organization to manage its cyber risk profile. CMMC defines 3 Security Assessment (CA) capabilities - Develop and manage a system security plan, Define and manage controls, and Perform code reviews.
Situational Awareness (SA)
Cyber-attack is an impending threat to almost all organizations. Situational Awareness allows organizations to identify the threats which apply to their business either directly or indirectly. CMMC defines 1 Situational Awareness (SA) capability - Implement threat monitoring.
Systems and Communications Protection
System Communications Protection allows organizations to get a clear view of the adequate level of security that needs to be applied. CMMC defines 2 System Communications Protection capabilities - Define security requirements for systems and communications and Control communications at system boundaries.
System and Information Integrity (SI)
It is required to maintain the confidentiality, integrity, and availability of FCI and CUI. CMMC defines 4 Systems Information Integrity (SI) capabilities - Identify and manage information system flaws, Identify malicious content, Perform network and system monitoring, and Implement advanced email protections.

Start Your Journey to CMMC

CMMC certification is a must for all defense contractors to acquire a contract offered by the United States Department of Defense (DoD) starting from 2021. Besides, DoD is empowered to specify the level of CMMC certification needed for a specific contract for allotting it to the most appropriately certified federal contractors. By the end of 2026, DoD wants all the defense contractors to be CMMC Certified.

You must implement the CMMC systems and get certified as early as possible to become a qualified provider if your organization is doing business or is willing to do business with the Department of Defense as a Contractor, Subcontractor, or Supplier.

Previous Defense Federal Acquisition Regulation (DFAR) security protocol Successfully complied with the NIST 800-171, thereby protecting the Controlled Unclassified Information (CUI). However, the new CMMC model introduced multiple levels requiring third-party certifications. The Office of the Under Secretary of Defense for Acquisition and Sustainment will be responsible for managing the CMMC.

All US DoD RFP’s will mandate a CMMC level from 1-5, and this will affect prime contractors, along with suppliers to prime contractors in contract flow downs. From here on, every DoD Request for Proposal (RFP) will be listing the level of CMMC compliance required to place the bid, and all the bidders are expected to have achieved that level. Besides, they must possess proof of certification to place their bids.

Five Levels of Cybersecurity Maturity Model Certification

Fortunately, the CMMC Certification allows many current and prospective DoD contractors to undergo five classifiable levels of CMMC Certifications. A set of processes and practices at every level are designed to bring gradual cybersecurity maturity progression with every level. The levels range from initial “basic cyber hygiene” placed at level 1 to last advanced or progressive cybersecurity positioned at level 5. The processes range from “performed” at level 1 to “optimizing” at level 5.

Level 1: Basic Cyber Hygiene
  • It includes 17 practices derived from NIST standards.
  • It offers a performance-only approach to cybersecurity.
  • It mostly covers basic cybersecurity practices that the majority of the companies working for DoD might have in place.
Level 2: Intermediate Cyber Hygiene
  • It includes 72 practices with 55 new standards and 17 from level 1.
  • It expects organizations to establish and document standard operating procedures, policies, and strategic plans for its cybersecurity plan.
Level 3: Good Cyber Hygiene
  • It includes 130 practices.
  • This level is mandatory for all DoD adversaries handling, using, or sharing CUI.
  • Additionally, it requires a framework for incident reporting and the ability to demonstrate the management of practice implementation.
Level 4: Proactive
  • It includes 156 practices and represents a more advanced cybersecurity system.
  • Not many organizations are expected to reach level 4 CMMC certifications.
  • This level expects organizations to review and document activities for effectiveness and convey all issues to the higher management.
Level 5: Advanced/Progressive
  • It includes 171 practices and is the highest level of CMMC compliance.
  • Level 3 certified organizations are expected to have the highest, advanced, and progressive cybersecurity in place.
  • These organizations are capable to assess advanced threats and optimize tools for repelling those threats.

How to Become Compliant with CMMC Requirements?

As per specifications mandated in DFARS Case 2019-D041, the full cybersecurity requirements adhering to CMMC are yet to be put in place. However, the Office of the Under Secretary of Defense for Acquisition & Sustainment has already made it clear that contract requirements outlining CMMC compliance will be awarded to only those parties that are appropriately CMMC level certified.

The best way to get CMMC Compliant is to start early, assess gaps, find best practices, remediate as per necessity, test, and re-access. Some of these changes will take time for full implementation and become a part of your company culture.

Here is a basic outline to become CMMC compliant:

  • Understand if you can defend or handle the CUI or FCI and find the minimum certification requirements for CMMC compliance.
  • Scrutinize readiness assessment – compare the current practices in your organization with the ones outlined for CMMC requirements. It will help you understand the appropriate level of CMMC certification.
  • Conduct a risk assessment and create a plan to remediate gaps. Work to attain appropriate cybersecurity maturity level and measure its impact on budget and work culture. Also, understand how much time it will take to implement all the changes.
  • Make it a habit of documenting all the new processes and practices you want to implement.
  • Test the changes, validate the results, and document the results.
  • At the right moment, involve a third-party Certified Auditing Organization (3PCAO) to conduct a formal audit.
  • If possible, take help from a Managed IT Service Provider (MSP) for periodic evaluation and validation of cybersecurity maturity level.

CMMC Compliance Consulting from EPC Group

EPC Group is one of the leading Managed Security Service Providers in the USA. Their experience in implementing cybersecurity processes, accessing maturity processes, and applying government-wide policies makes them one of the go-to third-party assessors to initiate the CMMC certification process.

EPC Group has the technical expertise and appropriate knowledge to conduct readiness assessments and perform a gap analysis.

EPC Group will help you –

  • Learn, understand, and train about CMMC technical requirements and prepare your organization for appropriate CMMC Certification, ensuring you maintain lifelong cybersecurity agility.
  • Apart from meeting the essential 15 safeguarding environments under FAR, EPC will help you meet 110 controls under NIST 800-171 if you are creating any Controlled Unclassified Information (CUI).
  • To keep you in a CMMC Compliant environment, EPC will monitor, detect, and report on cybersecurity incidents in an evolving technological atmosphere giving you enough time to address vulnerabilities and update your security plan.
  • EPC Group will help you schedule your CMMC audit through a certified 3PAO. Depending on the results, EPC will help, either to bridge security gaps or stay CMMC compliant for the next three years for which your CMMC certification is valid.

Contact us to find out more and know more about the remaining CMMC Compliant.

Why Choose Us

Why Organizations Recognize EPC Group's Consulting Services as the Industry Leader
EPC Group wrote the book on SharePoint & Power BI
Microsoft Partner for 20+ Years
Over 4 million Office 365 users successfully migrated
200+ years combined senior team migration experience
Expertise migrating to Office 365 in every vertical
EPC Group's Chief Architect Errin O'Connor was on the original SharePoint and
Office 365 Beta teams
[gravityform id="43" title="true" description="false" ajax="true"]
<div class='gf_browser_chrome gform_wrapper gform_legacy_markup_wrapper' id='gform_wrapper_43' ><div id='gf_43' class='gform_anchor' tabindex='-1'></div> <div class='gform_heading'> <h3 class="gform_title">Subscriber - Powerbi e-book</h3> </div><form method='post' enctype='multipart/form-data' target='gform_ajax_frame_43' id='gform_43' action='/cmmc-compliance-consulting/#gf_43' > <div class='gform_body gform-body'><ul id='gform_fields_43' class='gform_fields top_label form_sublabel_below description_below'><li id="field_43_7" class="gfield gfield--width-full gform_hidden field_sublabel_below field_description_below gfield_visibility_visible" ><div class='ginput_container ginput_container_text'><input name='input_7' id='input_43_7' type='hidden' class='gform_hidden' aria-invalid="false" value='' /></div></li><li id="field_43_4" class="gfield gfield_html gfield_html_formatted gfield_no_follows_desc field_sublabel_below field_description_below gfield_visibility_visible" > <div class="description_data"> <p class="dp_one">Subscribe to our newsletter and get the first three chapters of the eBook for <strong>free<strong>.</p> </div></li><li id="field_43_6" class="gfield gfield_contains_required field_sublabel_below field_description_below gfield_visibility_visible" ><label class='gfield_label gfield_label_before_complex' >Name<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label><div class='ginput_complex ginput_container no_prefix has_first_name no_middle_name has_last_name no_suffix gf_name_has_2 ginput_container_name' id='input_43_6'> <span id='input_43_6_3_container' class='name_first' > <input type='text' name='input_6.3' id='input_43_6_3' value='' aria-required='true' placeholder='First Name' /> <label for='input_43_6_3' >First</label> </span> <span id='input_43_6_6_container' class='name_last' > <input type='text' name='input_6.6' id='input_43_6_6' value='' aria-required='true' placeholder='Last Name' /> <label for='input_43_6_6' >Last</label> </span> </div></li><li id="field_43_2" class="gfield gfield_contains_required field_sublabel_below field_description_below gfield_visibility_visible" ><label class='gfield_label' for='input_43_2' >Email Address<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label><div class='ginput_container ginput_container_email'> <input name='input_2' id='input_43_2' type='text' value='' class='medium' aria-required="true" aria-invalid="false" aria-describedby="gfield_description_43_2" /> </div><div class='gfield_description' id='gfield_description_43_2'>Please enter your correct email address. You will receive an email to download the eBook.</div></li><li id="field_43_3" class="gfield g-captcha field_sublabel_below field_description_below gfield_visibility_visible" ><label class='gfield_label screen-reader-text' for='input_43_3' ></label><div id='input_43_3' class='ginput_container ginput_recaptcha' data-sitekey='6LdQ388UAAAAAJaahWs7D_jWzeQhUZW6-VNwWfaU' data-theme='light' data-tabindex='0' data-badge=''></div></li><li id="field_43_5" class="gfield gfield_html gfield_html_formatted gfield_no_follows_desc field_sublabel_below field_description_below gfield_visibility_visible" ><div class="note_description"><p><i><strong>NOTE: </strong>We will never send you spam or pass on your email address to any third party. You may choose to opt-out at any time.</i></p></div></li></ul></div> <div class='gform_footer top_label'> <input type='submit' id='gform_submit_button_43' class='gform_button button' value='Download Now' onclick='if(window["gf_submitting_43"]){return false;} window["gf_submitting_43"]=true; ' onkeypress='if( event.keyCode == 13 ){ if(window["gf_submitting_43"]){return false;} window["gf_submitting_43"]=true; jQuery("#gform_43").trigger("submit",[true]); }' /> <input type='hidden' name='gform_ajax' value='form_id=43&amp;title=1&amp;description=&amp;tabindex=0' /> <input type='hidden' class='gform_hidden' name='is_submit_43' value='1' /> <input type='hidden' class='gform_hidden' name='gform_submit' value='43' /> <input type='hidden' class='gform_hidden' name='gform_unique_id' value='' /> <input type='hidden' class='gform_hidden' name='state_43' value='WyJbXSIsIjEwNTJhNGVmMWMyNzI3YTJmMjdiZTA1NjU4ZDMzYzY3Il0=' /> <input type='hidden' class='gform_hidden' name='gform_target_page_number_43' id='gform_target_page_number_43' value='0' /> <input type='hidden' class='gform_hidden' name='gform_source_page_number_43' id='gform_source_page_number_43' value='1' /> <input type='hidden' name='gform_field_values' value='' /> </div> <p style="display: none !important;"><label>&#916;<textarea name="ak_hp_textarea" cols="45" rows="8" maxlength="100"></textarea></label><input type="hidden" id="ak_js_3" name="ak_js" value="85"/><script>document.getElementById( "ak_js_3" ).setAttribute( "value", ( new Date() ).getTime() );</script></p></form> </div> <iframe style='display:none;width:0px;height:0px;' src='about:blank' name='gform_ajax_frame_43' id='gform_ajax_frame_43' title='This iframe contains the logic required to handle Ajax powered Gravity Forms.'></iframe> <script type="text/javascript"> gform.initializeOnLoaded( function() {gformInitSpinner( 43, '' );jQuery('#gform_ajax_frame_43').on('load',function(){var contents = jQuery(this).contents().find('*').html();var is_postback = contents.indexOf('GF_AJAX_POSTBACK') >= 0;if(!is_postback){return;}var form_content = jQuery(this).contents().find('#gform_wrapper_43');var is_confirmation = jQuery(this).contents().find('#gform_confirmation_wrapper_43').length > 0;var is_redirect = contents.indexOf('gformRedirect(){') >= 0;var is_form = form_content.length > 0 && ! is_redirect && ! is_confirmation;var mt = parseInt(jQuery('html').css('margin-top'), 10) + parseInt(jQuery('body').css('margin-top'), 10) + 100;if(is_form){jQuery('#gform_wrapper_43').html(form_content.html());if(form_content.hasClass('gform_validation_error')){jQuery('#gform_wrapper_43').addClass('gform_validation_error');} else {jQuery('#gform_wrapper_43').removeClass('gform_validation_error');}setTimeout( function() { /* delay the scroll by 50 milliseconds to fix a bug in chrome */ jQuery(document).scrollTop(jQuery('#gform_wrapper_43').offset().top - mt); }, 50 );if(window['gformInitDatepicker']) {gformInitDatepicker();}if(window['gformInitPriceFields']) {gformInitPriceFields();}var current_page = jQuery('#gform_source_page_number_43').val();gformInitSpinner( 43, '' );jQuery(document).trigger('gform_page_loaded', [43, current_page]);window['gf_submitting_43'] = false;}else if(!is_redirect){var confirmation_content = jQuery(this).contents().find('.GF_AJAX_POSTBACK').html();if(!confirmation_content){confirmation_content = contents;}setTimeout(function(){jQuery('#gform_wrapper_43').replaceWith(confirmation_content);jQuery(document).scrollTop(jQuery('#gf_43').offset().top - mt);jQuery(document).trigger('gform_confirmation_loaded', [43]);window['gf_submitting_43'] = false;wp.a11y.speak(jQuery('#gform_confirmation_message_43').text());}, 50);}else{jQuery('#gform_43').append(contents);if(window['gformRedirect']) {gformRedirect();}}jQuery(document).trigger('gform_post_render', [43, current_page]);} );} ); </script>
[gravityforms id=41 title=”true” description=”false”]
<div class='gf_browser_chrome gform_wrapper exit_intent_popup_wrapper gform_legacy_markup_wrapper' id='gform_wrapper_41' > <div class='gform_heading'> <h3 class="gform_title">Exit Intent</h3> <span class='gform_description'></span> </div><form method='post' enctype='multipart/form-data' id='gform_41' class='exit_intent_popup gform_legacy_markup' action='/cmmc-compliance-consulting/' > <div class='gform_body gform-body'><ul id='gform_fields_41' class='gform_fields top_label form_sublabel_below description_below'><li id="field_41_1" class="gfield gform_hidden field_sublabel_below field_description_below gfield_visibility_visible" ><div class='ginput_container ginput_container_text'><input name='input_1' id='input_41_1' type='hidden' class='gform_hidden' aria-invalid="false" value='' /></div></li><li id="field_41_11" class="gfield gfield--width-full gform_hidden field_sublabel_below field_description_below gfield_visibility_visible" ><div class='ginput_container ginput_container_text'><input name='input_11' id='input_41_11' type='hidden' class='gform_hidden' aria-invalid="false" value='ddd01b75-d4fc-ea11-a816-000d3a591fb8' /></div></li><li id="field_41_12" class="gfield gfield--width-full gform_hidden field_sublabel_below field_description_below gfield_visibility_visible" ><div class='ginput_container ginput_container_text'><input name='input_12' id='input_41_12' type='hidden' class='gform_hidden' aria-invalid="false" value='' /></div></li><li id="field_41_13" class="gfield gfield--width-full gform_hidden field_sublabel_below field_description_below gfield_visibility_visible" ><div class='ginput_container ginput_container_text'><input name='input_13' id='input_41_13' type='hidden' class='gform_hidden' aria-invalid="false" value='' /></div></li><li id="field_41_9" class="gfield gfield_contains_required field_sublabel_below field_description_below gfield_visibility_visible" ><label class='gfield_label' for='input_41_9' >Full Name<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label><div class='ginput_container ginput_container_text'><input name='input_9' id='input_41_9' type='text' value='' class='medium' placeholder='Full Name' aria-required="true" aria-invalid="false" /> </div></li><li id="field_41_6" class="gfield gfield_contains_required field_sublabel_below field_description_below gfield_visibility_visible" ><label class='gfield_label' for='input_41_6' >Email<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label><div class='ginput_container ginput_container_email'> <input name='input_6' id='input_41_6' type='text' value='' class='medium' placeholder='Email Address' aria-required="true" aria-invalid="false" /> </div></li><li id="field_41_7" class="gfield gfield_contains_required field_sublabel_below field_description_below gfield_visibility_visible" ><label class='gfield_label' for='input_41_7' >Phone<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label><div class='ginput_container ginput_container_phone'><input name='input_7' id='input_41_7' type='text' value='' class='medium' placeholder='Phone Number' aria-required="true" aria-invalid="false" /></div></li><li id="field_41_10" class="gfield gfield_contains_required field_sublabel_below field_description_below gfield_visibility_visible" ><label class='gfield_label' for='input_41_10' >Company Name<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label><div class='ginput_container ginput_container_text'><input name='input_10' id='input_41_10' type='text' value='' class='medium' placeholder='Company Name' aria-required="true" aria-invalid="false" /> </div></li><li id="field_41_8" class="gfield gfield_contains_required field_sublabel_below field_description_below gfield_visibility_visible" ><label class='gfield_label' for='input_41_8' >Message<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label><div class='ginput_container ginput_container_textarea'><textarea name='input_8' id='input_41_8' class='textarea medium' placeholder='Type your message here...' aria-required="true" aria-invalid="false" rows='10' cols='50'></textarea></div></li></ul></div> <div class='gform_footer top_label'> <input type='submit' id='gform_submit_button_41' class='gform_button button' value='Submit' onclick='if(window["gf_submitting_41"]){return false;} window["gf_submitting_41"]=true; ' onkeypress='if( event.keyCode == 13 ){ if(window["gf_submitting_41"]){return false;} window["gf_submitting_41"]=true; jQuery("#gform_41").trigger("submit",[true]); }' /> <input type='hidden' class='gform_hidden' name='is_submit_41' value='1' /> <input type='hidden' class='gform_hidden' name='gform_submit' value='41' /> <input type='hidden' class='gform_hidden' name='gform_unique_id' value='' /> <input type='hidden' class='gform_hidden' name='state_41' value='WyJbXSIsIjEwNTJhNGVmMWMyNzI3YTJmMjdiZTA1NjU4ZDMzYzY3Il0=' /> <input type='hidden' class='gform_hidden' name='gform_target_page_number_41' id='gform_target_page_number_41' value='0' /> <input type='hidden' class='gform_hidden' name='gform_source_page_number_41' id='gform_source_page_number_41' value='1' /> <input type='hidden' name='gform_field_values' value='' /> </div> <p style="display: none !important;"><label>&#916;<textarea name="ak_hp_textarea" cols="45" rows="8" maxlength="100"></textarea></label><input type="hidden" id="ak_js_4" name="ak_js" value="207"/><script>document.getElementById( "ak_js_4" ).setAttribute( "value", ( new Date() ).getTime() );</script></p></form> </div>