Letter of Intent
  • Please click one of the document icons in the table below to download our Letter of Intent.
  • A box will appear, either press the "SAVE" button or the "CANCEL" button. (Pressing the other buttons will get you out of this site). The "SAVE" will place this document on your PC’s hard drive. (Usually in a ‘download’ directory).
  • Once the document is saved, print it out on your agency's letterhead so that your agency director can sign off on it.
  • Send it to MERLIN via hand mail or some form of mail to: Logan Litchliter 301 North Lamar Street, Suite 400 Jackson, Mississippi 39201
  • Once you have completed printing the Letter of Intent, you can continue the registration process by clicking on the “CONTINUE” button.
  • The "AGENCY INFORMATION" form will appear on your screen.
  • You will have to fill in each of the blanks. Click on "SUBMIT AGENCY". If one of the fields is incomplete, an error will be displayed and you will have to follow those instructions to get back to the form.
  • When the form is complete, the information will be forwarded to MERLIN staff. Read and follow the instructions on this last screen display. "Click to Continue".
  • You will find yourself back at MERLIN’s home screen. Once the MERLIN Staff has received your Letter of Intent and Agency Information you will be contacted with further instructions.

Letter of Intent - Word Merlin Letter of intent - Revised 20230629.docMerlin Letter of intent - Revised 20230629.doc
Letter of Intent MERLIN.net (only) - Word
Merlin.net (only) Letter of intent - Revised 20230629.docMerlin.net (only) Letter of intent - Revised 20230629.doc

Disclaimer

Each agency's primary and backup security contacts for MERLIN is responsible for ensuring that the MERLIN security requested for and assigned to agency staff is appropriate and does not exceed what is required to do their job. In addition, if the MERLIN user has access to data in the source system, i.e. SPAHRS, the requested MERLIN security should not grant greater access to data than what the user has access to in the legacy system.