Privacy Act of 1974; System of Records, 58720-58722 [2015-24792]

Download as PDF 58720 Federal Register / Vol. 80, No. 189 / Wednesday, September 30, 2015 / Notices administrative, and civil enforcement requirements. As such, this system of records is exempt from the following provisions of 5 U.S.C. 552a section (c)(3) and (4), (d), (e)(1) through (e)(3), (e)(4)(G) through (I), (e)(5), (f) and (g) of the Act. An exemption rule for this system has been promulgated in accordance with requirements of 5 U.S.C. 553(b)(1), (2), and (3), (c), and (e) and published in 32 CFR part 311. For additional information contact the system manager. [FR Doc. 2015–24632 Filed 9–29–15; 8:45 am] BILLING CODE 5001–06–P DEPARTMENT OF DEFENSE Office of the Secretary National Commission on the Future of the Army; Notice of Federal Advisory Committee Meeting Deputy Chief Management Officer, Department of Defense (DoD). ACTION: Notice of federal advisory committee meeting. AGENCY: The DoD is publishing this notice to announce two days of meetings of the National Commission on the Future of the Army (‘‘the Commission’’). The meetings will be closed to the public. DATES: Dates of the closed meetings: Thursday, October 15, 2015, from 8 a.m. to 5:30 p.m. and Friday, October 16, 2015, from 8 a.m. to 5:30 p.m. ADDRESSES: Address of Closed Meetings, October 15 and 16, 2015: Institute for Defense Analyses, 4850 Mark Center Dr., Alexandria, VA 22311. FOR FURTHER INFORMATION CONTACT: Mr. Don Tison, Designated Federal Officer, National Commission on the Future of the Army, 700 Army Pentagon, Room 3E406, Washington, DC 20310–0700, Email: dfo.public@ncfa.ncr.gov. Desk (703) 692–9099. Facsimile (703) 697– 8242. SUPPLEMENTARY INFORMATION: This meeting will be held under the provisions of the Federal Advisory Committee Act (FACA) of 1972 (5 U.S.C., Appendix, as amended), the Government in the Sunshine Act of 1976 (5 U.S.C. 552b, as amended), and 41 CFR 102–3.150. mstockstill on DSK4VPTVN1PROD with NOTICES SUMMARY: Purpose of Meetings During the closed meeting on Thursday, October 15, 2015, the Commission will be briefed on the classified war plan selected for analytical review, discuss the process and procedures for the conduct of the Classified Analytical Review and begin VerDate Sep<11>2014 18:27 Sep 29, 2015 Jkt 235001 the Classified Analytical Review using classified war plans and operational scenarios to examine the size and structure options for the future of the Army. During the closed meeting on Friday, October 16, 2015, the Commission will complete the Classified Analytical Review and discuss the results. Agendas October 15, 2015—Closed Meeting: The Commission will hold a closed meeting to conduct a classified analytical review using current war plans while applying predetermined variables to develop realistic results. Speakers include analysts from Institute for Defense Analyses (IDA), Center for Army Analysis, TRADOC Analysis Center, RAND Corporation. All presentations and resulting discussion are classified. October 16, 2015—Closed Meeting: The Commission will complete the classified analytical review and discuss the results in a closed meeting. The results will be used in the development of recommendations for the final report due on February 1, 2016. Speakers include analysts from IDA, Center for Army Analysis, TRADOC Analysis Center, RAND Corporation. All presentations and resulting discussion are classified. Meeting Accessibility In accordance with applicable law, 5 U.S.C. 552b(c) and 41 CFR 102–3.155, the DoD has determined that the meetings scheduled for October 15 and 16, 2015, will be closed to the public. Specifically, the Assistant Deputy Chief Management Officer, with the coordination of the DoD FACA Attorney, has determined in writing that these two meetings will be closed to the public because they will discuss matters covered by 5 U.S.C. 552b(c)(1). Written Comments Pursuant to section 10(a)(3) of the FACA and 41 CFR 102–3.105(j) and 102–3.140, the public or interested organizations may submit written comments to the Commission in response to the stated agenda of the closed meetings or the Commission’s mission. The Designated Federal Officer (DFO) will review all submitted written statements. Written comments should be submitted to Mr. Donald Tison, DFO, via facsimile or electronic mail, the preferred modes of submission. Each page of the comment must include the author’s name, title or affiliation, address, and daytime phone number. All comments received before Wednesday, October 14, 2015, will be PO 00000 Frm 00019 Fmt 4703 Sfmt 4703 provided to the Commission before the October 15, 2015, meeting. Comments received after Wednesday, October 14, 2015, will be provided to the Commission before its next meeting. All contact information may be found in the FOR FURTHER INFORMATION CONTACT section. Additional Information The DoD sponsor for the Commission is the Deputy Chief Management Officer. The Commission is tasked to submit a report, containing a comprehensive study and recommendations, by February 1, 2016 to the President of the United States and the Congressional defense committees. The report will contain a detailed statement of the findings and conclusions of the Commission, together with its recommendations for such legislation and administrative actions it may consider appropriate in light of the results of the study. The comprehensive study of the structure of the Army will determine whether, and how, the structure should be modified to best fulfill current and anticipated mission requirements for the Army in a manner consistent with available resources. Dated: September 25, 2015. Aaron Siegel, Alternate OSD Federal Register Liaison Officer, Department of Defense. [FR Doc. 2015–24754 Filed 9–29–15; 8:45 am] BILLING CODE 5001–06–P DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DoD–2015–OS–0078] Privacy Act of 1974; System of Records Office of the Secretary of Defense, DoD. ACTION: Notice to add a new System of Records. AGENCY: The Office of the Secretary of Defense proposes to add a new system of records, DPFPA 07, entitled ‘‘Counterintelligence Management Information System (CIMIS)’’ to conduct and exercise overall responsibility within PFPA for all matters pertaining to acts involving counterintelligence (CI) activities against PFPA employees, U.S. property, or interests. Also used as a management tool for statistical analysis, tracking, reporting, evaluating program effectiveness, and conducting research. SUMMARY: Comments will be accepted on or before October 30, 2015. This proposed DATES: E:\FR\FM\30SEN1.SGM 30SEN1 Federal Register / Vol. 80, No. 189 / Wednesday, September 30, 2015 / Notices Dated: July 31, 2015. Aaron Siegel, Alternate OSD Federal Register Liaison Officer, Department of Defense. action will be effective the day following the end of the comment period unless comments are received which result in a contrary determination. DPFPA 07 You may submit comments, identified by docket number and title, by any of the following methods: * Federal Rulemaking Portal: https:// www.regulations.gov. Follow the instructions for submitting comments. * Mail: Department of Defense, Office of the Deputy Chief Management Officer, Directorate of Oversight and Compliance, Regulatory and Audit Matters Office, 9010 Defense Pentagon, Washington, DC 20301–9010. Instructions: All submissions received must include the agency name and docket number for this Federal Register document. The general policy for comments and other submissions from members of the public is to make these submissions available for public viewing on the Internet at https:// www.regulations.gov as they are received without change, including any personal identifiers or contact information. ADDRESSES: Ms. Cindy Allard, Chief, OSD/JS Privacy Office, Freedom of Information Directorate, Washington Headquarters Service, 1155 Defense Pentagon, Washington, DC 20301–1155, or by phone at (571) 372–0461. FOR FURTHER INFORMATION CONTACT: The Office of the Secretary of Defense notices for systems of records subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended, have been published in the Federal Register and are available from the address in FOR FURTHER INFORMATION CONTACT or at https://dpcld.defense.gov/ . The proposed system report, as required by 5 U.S.C. 552a(r) of the Privacy Act of 1974, as amended, was submitted on July 30, 2015, to the House Committee on Oversight and Government Reform, the Senate Committee on Governmental Affairs, and the Office of Management and Budget (OMB) pursuant to paragraph 4c of Appendix I to OMB Circular No. A– 130, ‘‘Federal Agency Responsibilities for Maintaining Records About Individuals,’’ dated February 8, 1996 (February 20, 1996, 61 FR 6427). mstockstill on DSK4VPTVN1PROD with NOTICES SUPPLEMENTARY INFORMATION: VerDate Sep<11>2014 18:27 Sep 29, 2015 Jkt 235001 SYSTEM NAME: Counterintelligence Management Information System (CIMIS). SYSTEM LOCATION: Pentagon Force Protection Agency (PFPA), 9000 Defense Pentagon, Washington, DC 20301–9000. CATEGORIES OF INDIVIDUALS COVERED BY THE SYSTEM: Any individual involved, or suspected of being involved, in intelligence collection on behalf of a foreign government or foreign terror organization which may harm PFPA employees, U.S. property or interests. Individuals involved in or suspected of being involved in National Security Crimes of assassination, sedition, subversion, treason, espionage, sabotage or terrorism. Individuals who provide information that is relevant to the case, such as victims or witnesses, and individuals who report such crimes or acts. CATEGORIES OF RECORDS IN THE SYSTEM: Data on suspect: Name; other names used (former and aliases); other identification (ID) numbers (e.g., DoD ID number, passport, VISA, resident alien); driver’s license (state, number, and expiration date); date and place of birth; citizenship; legal status; gender; race/ ethnicity; description (height, weight, hair color, etc.); name of current employer and address; college/ university (major and/or degree); military records; home/office address; home/work/cell phone numbers; personal/work email address; personal property information (e.g., vehicle, photographic equipment (make/model/ serial number)); marital status; spouse location (city and state); and CIMIS incident number. DATA ON INDIVIDUALS (VICTIMS, WITNESSES, COMPLAINANT): Name; DoD ID number; work/home/ cell phone numbers; and employer information (e.g. organization, address). ADDITIONAL DATA: Law Enforcement Reports; National Crime Information Center (NCIC); Intelligence Information Reports (IIR). Individuals may voluntarily offer additional personal information in an effort to establish their identity. While not specifically requested, the information will be retained in the PO 00000 Frm 00020 Fmt 4703 Sfmt 4703 58721 record if it is deemed beneficial to the inquiry. AUTHORITY FOR MAINTENANCE OF THE SYSTEM: 10 U.S.C. 2674, Operation and control of Pentagon Reservation and defense facilities in National Capital Region; 18 U.S.C. 794, Gathering or Delivering Defense Information to Aid Foreign Government; E.O. 12333, United States Intelligence Activities; E.O. 12968, Access to Classified Information; DoD Directive (DoDD) 5105.68, Pentagon Force Protection Agency (PFPA); DoDD 5200.27, Acquisition of Information Concerning Persons and Organizations not Affiliated with the Department of Defense; DoDD 5240.01, DoD Intelligence Activities, as amended; DoDD 5240.02, Counterintelligence; DoDD 5240.06, DoD Counterintelligence Awareness and Reporting (CIAR); DoD Instruction (DoDI) O–5240.21, Counterintelligence Inquiries; and Administrative Instruction 30, Force Protection on the Pentagon Reservation. PURPOSES: To conduct and exercise overall responsibility within PFPA for all matters pertaining to acts involving counterintelligence (CI) activities against PFPA employees, U.S. property, or interests. Also used as a management tool for statistical analysis, tracking, reporting, evaluating program effectiveness, and conducting research. ROUTINE USES OF RECORDS MAINTAINED IN THE SYSTEM, INCLUDING CATEGORIES OF USERS AND THE PURPOSES OF SUCH USES: In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act of 1974, as amended, the records contained herein may specifically be disclosed outside the DoD as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows: To Federal counterintelligence and law enforcement agencies that administer programs or employ individuals involved in an incident or inquiry. LAW ENFORCEMENT ROUTINE USE: If a system of records maintained by a DoD Component to carry out its functions indicates a violation or potential violation of law, whether civil, criminal, or regulatory in nature, and whether arising by general statute or by regulation, rule, or order issued pursuant thereto, the relevant records in the system of records may be referred, as a routine use, to the agency concerned, whether federal, state, local, or foreign, charged with the responsibility of investigating or prosecuting such violation or charged with enforcing or implementing the E:\FR\FM\30SEN1.SGM 30SEN1 58722 Federal Register / Vol. 80, No. 189 / Wednesday, September 30, 2015 / Notices statute, rule, regulation, or order issued pursuant thereto. dpcld.defense.gov/Privacy/ SORNsIndex/BlanketRoutineUses.aspx’’ CONGRESSIONAL INQUIRIES DISCLOSURE ROUTINE USE: POLICIES AND PRACTICES FOR STORING, RETRIEVING, ACCESSING, RETAINING, AND DISPOSING OF RECORDS IN THE SYSTEM: Disclosure from a system of records maintained by a DoD Component may be made to a congressional office from the record of an individual in response to an inquiry from the congressional office made at the request of that individual. DISCLOSURE TO THE DEPARTMENT OF JUSTICE FOR LITIGATION ROUTINE USE: A record from a system of records maintained by a DoD Component may be disclosed as a routine use to any component of the Department of Justice for the purpose of representing the Department of Defense, or any officer, employee or member of the Department in pending or potential litigation to which the record is pertinent. DISCLOSURE OF INFORMATION TO THE NATIONAL ARCHIVES AND RECORDS ADMINISTRATION ROUTINE USE: A record from a system of records maintained by a DoD Component may be disclosed as a routine use to the National Archives and Records Administration for the purpose of records management inspections conducted under authority of 44 U.S.C. 2904 and 2906. mstockstill on DSK4VPTVN1PROD with NOTICES DATA BREACH REMEDIATION PURPOSES ROUTINE USE: A record from a system of records maintained by a Component may be disclosed to appropriate agencies, entities, and persons when (1) The Component suspects or has confirmed that the security or confidentiality of the information in the system of records has been compromised; (2) the Component has determined that as a result of the suspected or confirmed compromise there is a risk of harm to economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other systems or programs (whether maintained by the Component or another agency or entity) that rely upon the compromised information; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with the Components efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm. The DoD Blanket Routine Uses set forth at the beginning of the Office of the Secretary of Defense (OSD) compilation of systems of records notices may apply to this system. The complete list of DoD Blanket Routine Uses can be found online at: https:// VerDate Sep<11>2014 18:27 Sep 29, 2015 Jkt 235001 STORAGE: Electronic storage media. RETRIEVABILITY: Name, date of birth, and other identification (DoD ID number, passport, VISA or driver’s license number). SAFEGUARDS: Electronically stored records are maintained in ‘‘fail-safe’’ system software with password-protected access. Access to these records is rolebased and is limited to those individuals requiring access in performance of their official duties. Entry to the area is restricted by the use of cipher and combination locks, security guards, identification badges and closed circuit TV (CCTV). Data in transit and at rest is encrypted and computer servers are scanned to assess system vulnerabilities. Encryption of backups containing sensitive PII is in place. Firewalls are in place to control the incoming and outgoing data traffic based on an applied rule set. DoD Public Key Infrastructure Certificates are used to authenticate authorized users. Periodic security audits are maintained to document access to data. Regular monitoring of user’s security practice is conducted and methods are used to ensure only authorized personnel have access to PII. All individuals granted access to this system of records receives annual Information Assurance and Privacy Act training. RETENTION AND DISPOSAL: of records is exempt from the notification provisions described in 5 U.S.C. 552a(e)(4)(H). RECORD ACCESS PROCEDURES: An exemption rule has been published, and this Privacy Act system of records is exempt from the access provisions described in 5 U.S.C. 552a(d). CONTESTING RECORD PROCEDURES: An exemption rule has been published, and this Privacy Act system of records is exempt from the amendment and appeal provisions described in 5 U.S.C. 552a(f). RECORD SOURCE CATEGORIES: PFPA officers and investigators, state and local law enforcement, Federal departments and agencies, and intelligence agencies. EXEMPTIONS CLAIMED FOR THE SYSTEM: This system of records is used by the Department of Defense for a law enforcement purpose (k)(2), and the records contained herein are used for criminal, civil, and administrative enforcement requirements. As such, allowing individuals full exercise of the Privacy Act would compromise the existence of any criminal, civil, or administrative enforcement activity. This system of records is exempt from the following provisions of 5 U.S.C. 552a section (c)(3), (d), (e)(1), (e)(4)(G) through (I), and (f) of the Act. An exemption rule for this system has been promulgated in accordance with requirements of 5 U.S.C. 553(b)(1), (2), and (3), (c), and (e) and published in 32 CFR part 311. For additional information contact the system manager. [FR Doc. 2015–24792 Filed 9–29–15; 8:45 am] BILLING CODE 5001–06–P FILES RELATING TO FOREIGN NATIONALS: Close annually upon determination that the individual is no longer a threat to DoD, the Pentagon, Pentagon Reservation or DoD Facilities within the Capitol Region (NCR). Destroy 25 year(s) after cut off. FILES RELATING TO U.S. CITIZENS: Cut off after determination person(s) are no longer a CI threat to DoD, the Pentagon, Pentagon Reservation or DoD Facilities within the NCR. Destroy/ delete 90 days after cut off. Pentagon Force Protection Agency (PFPA), 9000 Defense Pentagon, Washington, DC 20301–9000. NOTIFICATION PROCEDURE: An exemption rule has been published, and this Privacy Act system Frm 00021 Fmt 4703 Sfmt 4703 Department of the Army [Docket ID: USA–2014–0017] Proposed Collection; Comment Request Office of the Administrative Assistant to the Secretary of the Army (OAA–AAHS), DoD. ACTION: Notice. AGENCY: In compliance with the Paperwork Reduction Act of 1995, the Department of the Army announces a proposed public information collection and seeks public comment on the provisions thereof. Comments are invited on: (a) Whether the proposed collection of information is necessary SUMMARY: SYSTEM MANAGER(S) AND ADDRESS: PO 00000 DEPARTMENT OF DEFENSE E:\FR\FM\30SEN1.SGM 30SEN1

Agencies

[Federal Register Volume 80, Number 189 (Wednesday, September 30, 2015)]
[Notices]
[Pages 58720-58722]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2015-24792]


-----------------------------------------------------------------------

DEPARTMENT OF DEFENSE

Office of the Secretary

[Docket ID: DoD-2015-OS-0078]


Privacy Act of 1974; System of Records

AGENCY: Office of the Secretary of Defense, DoD.

ACTION: Notice to add a new System of Records.

-----------------------------------------------------------------------

SUMMARY: The Office of the Secretary of Defense proposes to add a new 
system of records, DPFPA 07, entitled ``Counterintelligence Management 
Information System (CIMIS)'' to conduct and exercise overall 
responsibility within PFPA for all matters pertaining to acts involving 
counterintelligence (CI) activities against PFPA employees, U.S. 
property, or interests. Also used as a management tool for statistical 
analysis, tracking, reporting, evaluating program effectiveness, and 
conducting research.

DATES: Comments will be accepted on or before October 30, 2015. This 
proposed

[[Page 58721]]

action will be effective the day following the end of the comment 
period unless comments are received which result in a contrary 
determination.

ADDRESSES: You may submit comments, identified by docket number and 
title, by any of the following methods:
    * Federal Rulemaking Portal: https://www.regulations.gov. Follow the 
instructions for submitting comments.
    * Mail: Department of Defense, Office of the Deputy Chief 
Management Officer, Directorate of Oversight and Compliance, Regulatory 
and Audit Matters Office, 9010 Defense Pentagon, Washington, DC 20301-
9010.
    Instructions: All submissions received must include the agency name 
and docket number for this Federal Register document. The general 
policy for comments and other submissions from members of the public is 
to make these submissions available for public viewing on the Internet 
at https://www.regulations.gov as they are received without change, 
including any personal identifiers or contact information.

FOR FURTHER INFORMATION CONTACT: Ms. Cindy Allard, Chief, OSD/JS 
Privacy Office, Freedom of Information Directorate, Washington 
Headquarters Service, 1155 Defense Pentagon, Washington, DC 20301-1155, 
or by phone at (571) 372-0461.

SUPPLEMENTARY INFORMATION: The Office of the Secretary of Defense 
notices for systems of records subject to the Privacy Act of 1974 (5 
U.S.C. 552a), as amended, have been published in the Federal Register 
and are available from the address in FOR FURTHER INFORMATION CONTACT 
or at https://dpcld.defense.gov/.
    The proposed system report, as required by 5 U.S.C. 552a(r) of the 
Privacy Act of 1974, as amended, was submitted on July 30, 2015, to the 
House Committee on Oversight and Government Reform, the Senate 
Committee on Governmental Affairs, and the Office of Management and 
Budget (OMB) pursuant to paragraph 4c of Appendix I to OMB Circular No. 
A-130, ``Federal Agency Responsibilities for Maintaining Records About 
Individuals,'' dated February 8, 1996 (February 20, 1996, 61 FR 6427).

    Dated: July 31, 2015.
Aaron Siegel,
Alternate OSD Federal Register Liaison Officer, Department of Defense.
DPFPA 07

System name:
    Counterintelligence Management Information System (CIMIS).

System location:
    Pentagon Force Protection Agency (PFPA), 9000 Defense Pentagon, 
Washington, DC 20301-9000.

Categories of individuals covered by the system:
    Any individual involved, or suspected of being involved, in 
intelligence collection on behalf of a foreign government or foreign 
terror organization which may harm PFPA employees, U.S. property or 
interests. Individuals involved in or suspected of being involved in 
National Security Crimes of assassination, sedition, subversion, 
treason, espionage, sabotage or terrorism. Individuals who provide 
information that is relevant to the case, such as victims or witnesses, 
and individuals who report such crimes or acts.

Categories of records in the system:
    Data on suspect: Name; other names used (former and aliases); other 
identification (ID) numbers (e.g., DoD ID number, passport, VISA, 
resident alien); driver's license (state, number, and expiration date); 
date and place of birth; citizenship; legal status; gender; race/
ethnicity; description (height, weight, hair color, etc.); name of 
current employer and address; college/university (major and/or degree); 
military records; home/office address; home/work/cell phone numbers; 
personal/work email address; personal property information (e.g., 
vehicle, photographic equipment (make/model/serial number)); marital 
status; spouse location (city and state); and CIMIS incident number.

Data on individuals (victims, witnesses, complainant):
    Name; DoD ID number; work/home/cell phone numbers; and employer 
information (e.g. organization, address).

Additional data:
    Law Enforcement Reports; National Crime Information Center (NCIC); 
Intelligence Information Reports (IIR).
    Individuals may voluntarily offer additional personal information 
in an effort to establish their identity. While not specifically 
requested, the information will be retained in the record if it is 
deemed beneficial to the inquiry.

Authority for maintenance of the system:
    10 U.S.C. 2674, Operation and control of Pentagon Reservation and 
defense facilities in National Capital Region; 18 U.S.C. 794, Gathering 
or Delivering Defense Information to Aid Foreign Government; E.O. 
12333, United States Intelligence Activities; E.O. 12968, Access to 
Classified Information; DoD Directive (DoDD) 5105.68, Pentagon Force 
Protection Agency (PFPA); DoDD 5200.27, Acquisition of Information 
Concerning Persons and Organizations not Affiliated with the Department 
of Defense; DoDD 5240.01, DoD Intelligence Activities, as amended; DoDD 
5240.02, Counterintelligence; DoDD 5240.06, DoD Counterintelligence 
Awareness and Reporting (CIAR); DoD Instruction (DoDI) O-5240.21, 
Counterintelligence Inquiries; and Administrative Instruction 30, Force 
Protection on the Pentagon Reservation.

Purposes:
    To conduct and exercise overall responsibility within PFPA for all 
matters pertaining to acts involving counterintelligence (CI) 
activities against PFPA employees, U.S. property, or interests. Also 
used as a management tool for statistical analysis, tracking, 
reporting, evaluating program effectiveness, and conducting research.

Routine uses of records maintained in the system, including categories 
of users and the purposes of such uses:
    In addition to those disclosures generally permitted under 5 U.S.C. 
552a(b) of the Privacy Act of 1974, as amended, the records contained 
herein may specifically be disclosed outside the DoD as a routine use 
pursuant to 5 U.S.C. 552a(b)(3) as follows:
    To Federal counterintelligence and law enforcement agencies that 
administer programs or employ individuals involved in an incident or 
inquiry.

Law Enforcement Routine Use:
    If a system of records maintained by a DoD Component to carry out 
its functions indicates a violation or potential violation of law, 
whether civil, criminal, or regulatory in nature, and whether arising 
by general statute or by regulation, rule, or order issued pursuant 
thereto, the relevant records in the system of records may be referred, 
as a routine use, to the agency concerned, whether federal, state, 
local, or foreign, charged with the responsibility of investigating or 
prosecuting such violation or charged with enforcing or implementing 
the

[[Page 58722]]

statute, rule, regulation, or order issued pursuant thereto.

Congressional Inquiries Disclosure Routine Use:
    Disclosure from a system of records maintained by a DoD Component 
may be made to a congressional office from the record of an individual 
in response to an inquiry from the congressional office made at the 
request of that individual.

Disclosure to the Department of Justice for Litigation Routine Use:
    A record from a system of records maintained by a DoD Component may 
be disclosed as a routine use to any component of the Department of 
Justice for the purpose of representing the Department of Defense, or 
any officer, employee or member of the Department in pending or 
potential litigation to which the record is pertinent.

Disclosure of Information to the National Archives and Records 
Administration Routine Use:
    A record from a system of records maintained by a DoD Component may 
be disclosed as a routine use to the National Archives and Records 
Administration for the purpose of records management inspections 
conducted under authority of 44 U.S.C. 2904 and 2906.

Data Breach Remediation Purposes Routine Use:
    A record from a system of records maintained by a Component may be 
disclosed to appropriate agencies, entities, and persons when (1) The 
Component suspects or has confirmed that the security or 
confidentiality of the information in the system of records has been 
compromised; (2) the Component has determined that as a result of the 
suspected or confirmed compromise there is a risk of harm to economic 
or property interests, identity theft or fraud, or harm to the security 
or integrity of this system or other systems or programs (whether 
maintained by the Component or another agency or entity) that rely upon 
the compromised information; and (3) the disclosure made to such 
agencies, entities, and persons is reasonably necessary to assist in 
connection with the Components efforts to respond to the suspected or 
confirmed compromise and prevent, minimize, or remedy such harm.
    The DoD Blanket Routine Uses set forth at the beginning of the 
Office of the Secretary of Defense (OSD) compilation of systems of 
records notices may apply to this system. The complete list of DoD 
Blanket Routine Uses can be found online at: https://dpcld.defense.gov/
Privacy/SORNsIndex/BlanketRoutineUses.aspx''

Policies and practices for storing, retrieving, accessing, retaining, 
and disposing of records in the system:
Storage:
    Electronic storage media.

Retrievability:
    Name, date of birth, and other identification (DoD ID number, 
passport, VISA or driver's license number).

Safeguards:
    Electronically stored records are maintained in ``fail-safe'' 
system software with password-protected access. Access to these records 
is role-based and is limited to those individuals requiring access in 
performance of their official duties. Entry to the area is restricted 
by the use of cipher and combination locks, security guards, 
identification badges and closed circuit TV (CCTV). Data in transit and 
at rest is encrypted and computer servers are scanned to assess system 
vulnerabilities. Encryption of backups containing sensitive PII is in 
place. Firewalls are in place to control the incoming and outgoing data 
traffic based on an applied rule set. DoD Public Key Infrastructure 
Certificates are used to authenticate authorized users. Periodic 
security audits are maintained to document access to data. Regular 
monitoring of user's security practice is conducted and methods are 
used to ensure only authorized personnel have access to PII. All 
individuals granted access to this system of records receives annual 
Information Assurance and Privacy Act training.

Retention and disposal:
Files relating to Foreign Nationals:
    Close annually upon determination that the individual is no longer 
a threat to DoD, the Pentagon, Pentagon Reservation or DoD Facilities 
within the Capitol Region (NCR). Destroy 25 year(s) after cut off.

Files relating to U.S. Citizens:
    Cut off after determination person(s) are no longer a CI threat to 
DoD, the Pentagon, Pentagon Reservation or DoD Facilities within the 
NCR. Destroy/delete 90 days after cut off.

System manager(s) and address:
    Pentagon Force Protection Agency (PFPA), 9000 Defense Pentagon, 
Washington, DC 20301-9000.

Notification procedure:
    An exemption rule has been published, and this Privacy Act system 
of records is exempt from the notification provisions described in 5 
U.S.C. 552a(e)(4)(H).

Record access procedures:
    An exemption rule has been published, and this Privacy Act system 
of records is exempt from the access provisions described in 5 U.S.C. 
552a(d).

Contesting record procedures:
    An exemption rule has been published, and this Privacy Act system 
of records is exempt from the amendment and appeal provisions described 
in 5 U.S.C. 552a(f).

Record source categories:
    PFPA officers and investigators, state and local law enforcement, 
Federal departments and agencies, and intelligence agencies.

Exemptions claimed for the system:
    This system of records is used by the Department of Defense for a 
law enforcement purpose (k)(2), and the records contained herein are 
used for criminal, civil, and administrative enforcement requirements. 
As such, allowing individuals full exercise of the Privacy Act would 
compromise the existence of any criminal, civil, or administrative 
enforcement activity. This system of records is exempt from the 
following provisions of 5 U.S.C. 552a section (c)(3), (d), (e)(1), 
(e)(4)(G) through (I), and (f) of the Act.
    An exemption rule for this system has been promulgated in 
accordance with requirements of 5 U.S.C. 553(b)(1), (2), and (3), (c), 
and (e) and published in 32 CFR part 311. For additional information 
contact the system manager.

[FR Doc. 2015-24792 Filed 9-29-15; 8:45 am]
 BILLING CODE 5001-06-P
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.