-INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'cat.spine.line.margin', $$ );0$$ );
-INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'cat.spine.line.height', $$ );9$$ );
-INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'cat.spine.line.width', $$ );8$$ );
-INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'cat.label.font.family', $$ );"monospace"$$ );
-INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'cat.label.font.size', $$ );10$$ );
-INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'cat.label.font.weight', $$ );"normal"$$ );
-INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'cat.default_classification_scheme', $$ );"2"$$ );
-INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.edit.au.dob.require', $$ );true$$ );
-INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.registration.require_address', $$ );true$$ );
-INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.default_country', $$ );"USA"$$ );
-INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.default_ident_type', $$ );"1"$$ );
-INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.staff.require_initials', $$ );true$$ );
-INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.edit.au.alert_message.show', $$ );true$$ );
-INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.edit.au.alias.show', $$ );false$$ );
-INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.edit.au.barred.show', $$ );true$$ );
-INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.edit.au.dob.calendar', $$ );true$$ );
-INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.edit.au.claims_returned_count.show', $$ );true$$ );
-INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'cat.bib.delete_on_no_copy_via_acq_lineitem_cancel', $$ );true$$ );
-INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'circ.checkout_fills_related_hold', $$ );true$$ );
-INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'circ.holds.expired_patron_block', $$ );true$$ );
-INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'circ.block_renews_for_holds', $$ );true$$ );
-INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'circ.holds.uncancel.reset_request_time', $$ );true$$ );
-INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'circ.patron_invalid_address_apply_penalty', $$ );true$$ );
-INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'circ.obscure_dob', $$ );false$$ );
-INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.circ.show_billing_tab_on_bills', $$ );true$$ );
-INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.edit.au.email.example', $$ );"address@example.com"$$ );
-INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.edit.au.evening_phone.example', $$ );"XXX-XXX-XXXX"$$ );
-INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.edit.au.day_phone.example', $$ );"XXX-XXX-XXXX"$$ );
-INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.edit.au.other_phone.example', $$ );"XXX-XXX-XXXX"$$ );
-INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.edit.au.email.regex', $$ );"[^@<> ]+@[^@<> ]+\\.[^@.*<> ]{2,}"$$ );
-INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.edit.phone.regex', $$ );"\\d{3}-\\d{3}-\\d{4}"$$ );
-INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.edit.aua.post_code.regex', $$ );"\\d{5}(-\\d{4})?"$$ );
+-- insert the PINES org_unit_settings that have been created in test environment
+
+BEGIN;
+INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'cat.spine.line.margin', $$0$$ );
+INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'cat.spine.line.height', $$9$$ );
+INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'cat.spine.line.width', $$8$$ );
+INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'cat.label.font.family', $$"monospace"$$ );
+INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'cat.label.font.size', $$10$$ );
+INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'cat.label.font.weight', $$"normal"$$ );
+INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'cat.default_classification_scheme', $$"2"$$ );
+INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.edit.au.dob.require', $$true$$ );
+INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.registration.require_address', $$true$$ );
+INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.default_country', $$"USA"$$ );
+INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.default_ident_type', $$"1"$$ );
+INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.staff.require_initials', $$true$$ );
+INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.edit.au.alert_message.show', $$true$$ );
+INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.edit.au.alias.show', $$false$$ );
+INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.edit.au.barred.show', $$true$$ );
+INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.edit.au.dob.calendar', $$true$$ );
+INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.edit.au.claims_returned_count.show', $$true$$ );
+INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'cat.bib.delete_on_no_copy_via_acq_lineitem_cancel', $$true$$ );
+INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'circ.checkout_fills_related_hold', $$true$$ );
+INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'circ.holds.expired_patron_block', $$true$$ );
+INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'circ.block_renews_for_holds', $$true$$ );
+INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'circ.holds.uncancel.reset_request_time', $$true$$ );
+INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'circ.patron_invalid_address_apply_penalty', $$true$$ );
+INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'circ.obscure_dob', $$false$$ );
+INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.circ.show_billing_tab_on_bills', $$true$$ );
+INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.edit.au.email.example', $$"address@example.com"$$ );
+INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.edit.au.evening_phone.example', $$"XXX-XXX-XXXX"$$ );
+INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.edit.au.day_phone.example', $$"XXX-XXX-XXXX"$$ );
+INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.edit.au.other_phone.example', $$"XXX-XXX-XXXX"$$ );
+INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.edit.au.email.regex', $$"[^@<> ]+@[^@<> ]+\\.[^@.*<> ]{2,}"$$ );
+INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.edit.phone.regex', $$"\\d{3}-\\d{3}-\\d{4}"$$ );
+INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.edit.aua.post_code.regex', $$"\\d{5}(-\\d{4})?"$$ );
+COMMIT;
+
+-- insert the new permission groups and assign them their perms.
+
+BEGIN;
+
+-- first, change the name and perm_interval of the existing ACQADMIN user:
+UPDATE permission.grp_tree SET ( name = 'ACQADMIN', perm_interval = '2 years' ) WHERE id = 44;
+
+-- next, add the application_perms to the perm list
+
+INSERT INTO permission.perm_list ( code, description ) VALUES ( 'group_application.user.staff.acq_fin', 'Allows a user to add/remove/edit users in the "ACQFIN" group' );
+INSERT INTO permission.perm_list ( code, description ) VALUES ( 'group_application.user.staff.acq_sel', 'Allows a user to add/remove/edit users in the "ACQSEL" group' );
+INSERT INTO permission.perm_list ( code, description ) VALUES ( 'group_application.user.staff.acq_list', 'Allows a user to add/remove/edit users in the "ACQLIST" group' );
+INSERT INTO permission.perm_list ( code, description ) VALUES ( 'group_application.user.staff.acq_rec', 'Allows a user to add/remove/edit users in the "ACQREC" group' );
+INSERT INTO permission.perm_list ( code, description ) VALUES ( 'group_application.user.staff.acq_cat', 'Allows a user to add/remove/edit users in the "ACQCAT" group' );
+INSERT INTO permission.perm_list ( code, description ) VALUES ( 'group_application.user.staff.global_acq_admin', 'Allows a user to add/remove/edit users in the "GLOBAL-ACQADMIN" group' );
+
+-- then insert the newly-created perm groups
+
+INSERT INTO permission.grp_tree ( id, name, parent, usergroup, perm_interval, description, application_perm, hold_priority ) VALUES ( 46, 'ACQFIN', 43, t, '2 years', 'responsible for all financial transactions, maintaining funds and funding sources, ordering, claiming', 'group_application.user.staff.acq_fin', 0 );
+INSERT INTO permission.grp_tree ( id, name, parent, usergroup, perm_interval, description, application_perm, hold_priority ) VALUES ( 47, 'ACQSEL', 43, t, '2 years', 'administers selection lists across library systems, checks for accuracy', 'group_application.user.staff.acq_sel', 0 );
+INSERT INTO permission.grp_tree ( id, name, parent, usergroup, perm_interval, description, application_perm, hold_priority ) VALUES ( 48, 'ACQLIST', 43, t, '2 years', 'Library or subject selectors, creates selection lists', 'group_application.user.staff.acq_list', 0 );
+INSERT INTO permission.grp_tree ( id, name, parent, usergroup, perm_interval, description, application_perm, hold_priority ) VALUES ( 49, 'ACQREC', 43, t, '2 years', 'receives orders for system', 'group_application.user.staff.acq_rec', 0 );
+INSERT INTO permission.grp_tree ( id, name, parent, usergroup, perm_interval, description, application_perm, hold_priority ) VALUES ( 50, 'ACQCAT', 43, t, '2 years', 'administers cataloging functions within acquisitions, links line items to PINES catalog, monitors brief records for accuracy, loads MARC records into catalog', 'group_application.user.staff.acq_cat', 0 );
+INSERT INTO permission.grp_tree ( id, name, parent, usergroup, perm_interval, description, application_perm, hold_priority ) VALUES ( 51, 'GLOBAL-ACQADMIN', 43, t, '2 years', 'Consortium-level Acq administrator', 'group_application.user.staff.global_acq_admin', 0 );
+
+-- then assign permissions to the groups
+
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 27, ( SELECT id FROM permission.perm_list WHERE CODE = 'DELETE_MONOGRAPH_PART' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 27, ( SELECT id FROM permission.perm_list WHERE CODE = 'UPDATE_MONOGRAPH_PART' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 27, ( SELECT id FROM permission.perm_list WHERE CODE = 'CREATE_MONOGRAPH_PART' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 32, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_HOLD_MATRIX_MATCHPOINT' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 32, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_CIRC_MOD' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 32, ( SELECT id FROM permission.perm_list WHERE CODE = 'DELETE_CIRC_MOD' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 32, ( SELECT id FROM permission.perm_list WHERE CODE = 'UPDATE_CIRC_MOD' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 32, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_CIRC_MATRIX_MATCHPOINT' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 32, ( SELECT id FROM permission.perm_list WHERE CODE = 'group_application.user.staff.acq_fin' ), 0, 't' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 32, ( SELECT id FROM permission.perm_list WHERE CODE = 'group_application.user.staff.acq_sel' ), 0, 't' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 32, ( SELECT id FROM permission.perm_list WHERE CODE = 'group_application.user.staff.acq_cat' ), 0, 't' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 32, ( SELECT id FROM permission.perm_list WHERE CODE = 'CREATE_CIRC_MOD' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 32, ( SELECT id FROM permission.perm_list WHERE CODE = 'group_application.user.staff.acq_rec' ), 0, 't' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 32, ( SELECT id FROM permission.perm_list WHERE CODE = 'DELETE_CIRC_DURATION' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 32, ( SELECT id FROM permission.perm_list WHERE CODE = 'UPDATE_CIRC_DURATION' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 32, ( SELECT id FROM permission.perm_list WHERE CODE = 'group_application.user.staff.acq_admin' ), 0, 't' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 32, ( SELECT id FROM permission.perm_list WHERE CODE = 'group_application.user.staff.acq' ), 0, 't' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 32, ( SELECT id FROM permission.perm_list WHERE CODE = 'group_application.user.staff.acq_list' ), 0, 't' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 32, ( SELECT id FROM permission.perm_list WHERE CODE = 'DELETE_USER' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_ACQ_FUND_TAG' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'DELETE_FUND_ALLOCATION' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_ACQ_FUND_ALLOCATION_PERCENT' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'UPDATE_PROVIDER' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'MANAGE_PROVIDER' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_INVOICE' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_ACQ_LINEITEM_ALERT_TEXT' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'CREATE_USER_GROUP_LINK' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_ACQ_CANCEL_CAUSE' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'ASSIGN_GROUP_PERM' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'group_application.user.staff.acq_fin' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'group_application.user.staff.acq_rec' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'VIEW_INVOICE' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'RECEIVE_PURCHASE_ORDER' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'UPDATE_PICKLIST' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'IMPORT_ACQ_LINEITEM_BIB_RECORD' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'group_application.user.staff.acq' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_LINEITEM_MARC_ATTR_DEF' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_ACQ_DISTRIB_FORMULA' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'VIEW_PICKLIST' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'CREATE_PICKLIST' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'ASSIGN_WORK_ORG_UNIT' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'group_application.user.staff' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'VIEW_PURCHASE_ORDER' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'CREATE_PURCHASE_ORDER' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'CREATE_INVOICE' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'group_application.user.staff.acq_sel' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'group_application.user.staff.acq_list' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_CLAIM_POLICY' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'ACQ_XFER_MANUAL_DFUND_AMOUNT' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'CREATE_FUND_ALLOCATION' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'CREATE_PROVIDER' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'DELETE_PROVIDER' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_ACQ_CLAIM' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'RUN_REPORTS' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'VIEW_REPORT_OUTPUT' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_FUNDING_SOURCE' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'ACQ_XFER_MANUAL_DFUND_AMOUNT' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'UPDATE_PROVIDER' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'MANAGE_PROVIDER' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_ACQ_CLAIM_TYPE' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_INVOICE' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_INVOICE_PAYMENT_METHOD' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_LINEITEM_MARC_ATTR_DEF' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_PROVIDER' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'CREATE_INVOICE' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'RECEIVE_PURCHASE_ORDER' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'IMPORT_ACQ_LINEITEM_BIB_RECORD' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'UPDATE_PICKLIST' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'MANAGE_FUND' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'CREATE_PURCHASE_ORDER' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'VIEW_PURCHASE_ORDER' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'CREATE_PICKLIST' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'VIEW_PICKLIST' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_CURRENCY_TYPE' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_ACQ_FUND_TAG' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_FUND' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'CREATE_PROVIDER' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'DELETE_PROVIDER' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_ACQ_CLAIM' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_CLAIM_POLICY' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_ACQ_CLAIM_EVENT_TYPE' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'CREATE_INVOICE_ITEM_TYPE' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_ACQ_DISTRIB_FORMULA' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'MANAGE_FUNDING_SOURCE' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_ACQ_CANCEL_CAUSE' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'VIEW_REPORT_OUTPUT' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'RUN_REPORTS' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_ACQ_FUND' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 47, ( SELECT id FROM permission.perm_list WHERE CODE = 'UPDATE_PICKLIST' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 47, ( SELECT id FROM permission.perm_list WHERE CODE = 'CREATE_PICKLIST' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 47, ( SELECT id FROM permission.perm_list WHERE CODE = 'VIEW_PICKLIST' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 48, ( SELECT id FROM permission.perm_list WHERE CODE = 'CREATE_PICKLIST' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 48, ( SELECT id FROM permission.perm_list WHERE CODE = 'VIEW_PICKLIST' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 48, ( SELECT id FROM permission.perm_list WHERE CODE = 'UPDATE_PICKLIST' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 49, ( SELECT id FROM permission.perm_list WHERE CODE = 'RECEIVE_PURCHASE_ORDER' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 50, ( SELECT id FROM permission.perm_list WHERE CODE = 'IMPORT_MARC' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 50, ( SELECT id FROM permission.perm_list WHERE CODE = 'CREATE_PICKLIST' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 50, ( SELECT id FROM permission.perm_list WHERE CODE = 'UPDATE_PICKLIST' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 50, ( SELECT id FROM permission.perm_list WHERE CODE = 'CREATE_MARC' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 50, ( SELECT id FROM permission.perm_list WHERE CODE = 'UPDATE_MARC' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 50, ( SELECT id FROM permission.perm_list WHERE CODE = 'CREATE_PURCHASE_ORDER' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_INVOICE_PAYMENT_METHOD' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_CURRENCY_TYPE' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_ACQ_FUND_TAG' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_ACQ_FUND' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'ACQ_XFER_MANUAL_DFUND_AMOUNT' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'CREATE_FUND_ALLOCATION' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'CREATE_PROVIDER' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'DELETE_PROVIDER' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_ACQ_CLAIM' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_ACQ_DISTRIB_FORMULA' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_LINEITEM_MARC_ATTR_DEF' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'group_application.user.staff.acq' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'group_application.user.staff.acq_cat' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'group_application.user.staff.acq_list' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'group_application.user.staff.acq_sel' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_PROVIDER' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'ASSIGN_GROUP_PERM' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'VIEW_INVOICE' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'RECEIVE_PURCHASE_ORDER' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'IMPORT_ACQ_LINEITEM_BIB_RECORD' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'UPDATE_PICKLIST' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'CREATE_INVOICE_ITEM_TYPE' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'DELETE_INVOICE_ITEM_TYPE' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'group_application.user.staff' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'ASSIGN_WORK_ORG_UNIT' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'UPDATE_INVOICE_ITEM_TYPE' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'MANAGE_FUNDING_SOURCE' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_CLAIM_POLICY' ), 1, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_FUNDING_SOURCE' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_FUND' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'DELETE_FUND_ALLOCATION' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_ACQ_FUND_ALLOCATION_PERCENT' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'UPDATE_PROVIDER' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'MANAGE_PROVIDER' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_INVOICE' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_ACQ_LINEITEM_ALERT_TEXT' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_ACQ_CANCEL_CAUSE' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'group_application.user.staff.acq_admin' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'group_application.user.staff.acq_fin' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'group_application.user.staff.acq_rec' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'group_application.user.staff.global_acq_admin' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'CREATE_INVOICE' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'CREATE_PURCHASE_ORDER' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'VIEW_PURCHASE_ORDER' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'CREATE_PICKLIST' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'VIEW_PICKLIST' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'DEBUG_CLIENT' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_INVOICE_METHOD' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'RUN_REPORTS' ), 0, 'f' );
+INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'VIEW_REPORT_OUTPUT' ), 0, 'f' );
+
+COMMIT;