Privacy Act of 1974; Notice of Updated System of Records, 60708-60710 [E6-17070]

Download as PDF 60708 Federal Register / Vol. 71, No. 199 / Monday, October 16, 2006 / Notices B. How Do I Submit Nominations Through EPA’s Nominations Web Site? The Web site is designed to provide key information to the Agency, as described in Section III. A of this notice, for each contaminant nominated to the CCL process. The Web address to nominate a contaminant can be found at http:// www.epa.gov/safewater/ccl/ccl3.html. C. How do I Submit Nominations in Hard Copy? You may submit nominations by mail. To allow full Agency consideration of your nomination, please ensure that your nominations are received or postmarked by midnight December 15, 2006. The addresses for submittal of nominations by mail are listed in the ADDRESSES section of this document. D. What Will Happen to My Nominations After I Submit Them? The Agency will include nominated contaminants into the CCL Universe. EPA will evaluate the information available for the nominated contaminants to determine the appropriateness of inclusion on the PCCL and finally the CCL. While EPA does not intend to respond to the nominations directly or individually, the Agency will fully explain nominated contaminants for the CCL3. Dated: October 6, 2006. Benjamin H. Grumbles, Assistant Administrator, Office of Water. [FR Doc. E6–17099 Filed 10–13–06; 8:45 am] BILLING CODE 6560–50–P IV. References Copies of these documents are found at http://www.regulations.gov, Docket ID No. EPA–OW–2005–0039. NAS 2001. National Academy of Sciences, National Research Council. 2001. Classifying Drinking Water Contaminants for Regulatory Consideration. National Academy Press. Washington, DC. Available at http:// books.nap.edu/books/0309074088/html/ index.html NDWAC 2004. National Drinking Water Advisory Council. National Drinking Water Advisory Council Report on the CCL Classification Process to the U.S. Environmental Protection Agency, May 18, 2004. Available at http://www.epa.gov/ safewater/ndwac/pdfs/report_ccl_ndwac_0706-04.pdf. Taylor, Latham, and Woolhouse. 2001. Risk factors for human disease emergence (Appendix A). Philosophical Transactions of the Royal Society of London Biology: 256:983–98. FEDERAL COMMUNICATIONS COMMISSION Sunshine Act Meeting; Deletion of Agenda Items; From October 12, 2006, Open Meeting and FCC to Hold an Additional Open Meeting, Friday, October 13, 2006, at 11 a.m. October 11, 2006. The following items have been deleted from the list of Agenda items scheduled for consideration at the Thursday, October 12, 2006, open meeting and previously listed in the Commission’s Notice of Thursday, October 5, 2006. These items will be considered at an additional open meeting scheduled for Friday, October 13, 2006, at 11 a.m. in the Commission Meeting Room, TW-C305, at 445 12th Street, SW., Washington, DC. Item no. Bureau Subject 4 .......... Wireline Competition .................................... 5 .......... Wireline Competition .................................... Title: AT&T Inc. and BellSouth Corporation Application for Transfer of Control (WC Docket No. 06–74). Summary: The Commission will consider a Memorandum Opinion and Order regarding the transfer of control application of AT&T and BellSouth. Title: Broadband Industry Practices. Summary: The Commission will consider a Notice of Inquiry regarding broadband industry practices. The prompt and orderly conduct of Commission business permits less than 7-days notice be given. Presidential Directive 12 (HSPD–12) and that individuals be fully informed about collection of their personal information. Federal Communications Commission. Marlene H. Dortch, Secretary. [FR Doc. 06–8726 Filed 10–12–06; 12:05 pm] EFFECTIVE DATE: BILLING CODE 6712–01–P The system of records will become effective without further notice on November 27, 2006 unless comments received on or before that date result in a contrary determination. Dated: September 21, 2006. Cheryl Paige, Acting Director, Office of Information Management. GSA/HRO–37 SYSTEM NAME: Personnel Security files. SECURITY CLASSIFICATION: GENERAL SERVICES ADMINISTRATION Call or e-mail the GSA Privacy Act Officer: telephone 202–501–1452; e-mail gsa.privacyact@gsa.gov. Privacy Act of 1974; Notice of Updated System of Records ADDRESSES: GSA Privacy Act Officer (CIB), General Services Administration, 1800 F Street, NW., Washington, DC 20405. SYSTEM LOCATION: FOR FURTHER INFORMATION: General Services Administration. ACTION: Notice. AGENCY: The General Services Administration (GSA) is providing notice of a revision to the record system Personnel Security Files (GSA/HRO– 37). The system provides control over personnel security. The revisions ensure that the system of records meet the requirements of Homeland Security jlentini on PROD1PC65 with NOTICES SUMMARY: VerDate Aug<31>2005 16:16 Oct 13, 2006 Jkt 211001 To comply with new requirements of Homeland Security Presidential Directive 12 (HSPD–12) GSA updated its personnel security system. This notice explains the new categories of records in the system and the authorities for maintaining the system. SUPPLEMENTARY INFORMATION: PO 00000 Frm 00023 Fmt 4703 Sfmt 4703 Some records in the system are classified under Executive Order 12958 as amended. Personnel security files are maintained with other appropriate records in the Personnel Security Requirements Division (CPR), GSA Building, 1800 F Street, NW., Washington, DC 20405. CATEGORIES OF INDIVIDUALS COVERED BY THE SYSTEM: Employees, applicants for employment, former employees of GSA and of commissions, committees, small agencies serviced by GSA, contractors, E:\FR\FM\16OCN1.SGM 16OCN1 Federal Register / Vol. 71, No. 199 / Monday, October 16, 2006 / Notices students, interns, volunteers, individuals authorized to perform or use services provided in GSA facilities (e.g. Credit Union or Fitness Center) and individuals formerly in any of these positions that require regular, ongoing access to Federal facilities, information technology systems or information classified in the interest of national security. Included are historical researchers, experts or consultants, and employees of contractors performing services for GSA. CATEGORIES OF RECORDS IN THE SYSTEM: Personnel security files contain information such as name, former names, date and place of birth, home address, phone numbers, height, weight, hair color, eye color, sex, passport information, military information, civil court information, employment history, residential history, Social Security Number, occupation, experience, and investigative material, education and degrees earned, names of associates and references and their contact information, citizenship, names of relatives, citizenship of relatives, names of relatives who work for the Federal government, criminal history, mental health history, drug use, financial information, fingerprints, summary report of investigation, results of suitability decisions, level of security clearance, date of issuance of security clearance, requests for appeals, witness statements, investigator’s notes, tax return information, credit reports, security violations, circumstances of violation, and agency action taken. FORMS: SF–85, SF–85P, SF–86, SF–87, FCRA, OF306, FD258. AUTHORITY FOR MAINTAINING THE SYSTEM: Depending upon the type of investigation, GSA is authorized to ask for this information under Executive Orders 10450 as amended, 10865 as amended, 12968 as amended, and 12958 as amended; sections 3301 and 9101 of title 5, U.S. Code; sections 2165 and 2201 of title 42, U.S. Code; parts 5, 732, and 736 of title 5, Code of Federal Regulations; and Homeland Security Presidential Directive 12. jlentini on PROD1PC65 with NOTICES PURPOSE: To assemble in one system information pertaining to issuing security clearances and public trust certifications, suitability decisions, fitness for service of applicants for federal employment and contract positions, and administrative actions. Information security files also are used for recommending administrative action VerDate Aug<31>2005 16:16 Oct 13, 2006 Jkt 211001 against employees found to be violating GSA classified national security information regulations. ROUTINE USES OF RECORDS IN THE SYSTEM, INCLUDING THE TYPES OF USERS AND THE PURPOSES OF SUCH USES: a. In any legal proceeding, where pertinent, to which GSA is a party before a court or administrative body. b. To the Department of Justice when: (a) The agency or any component thereof; or (b) any employee of the agency in his or her official capacity; (c) any employee of the agency in his or her individual capacity where agency or the Department of Justice has agreed to represent the employee; or (d) the United States Government, is a party to litigation or has an interest in such litigation, and by careful review, the agency determines that the records are both relevant and necessary to the litigation and the use of such records by DOJ is therefore deemed by the agency to be for a purpose compatible with the purpose for which the agency collected the records. c. To authorized officials engaged in investigating or settling a grievance, complaint, or appeal filed by an individual who is the subject of the record. d. Except as noted on Forms SF–85, 85–P, and 86, when a records on its face, or in conjunction with other records, indicates a violation or potential violation of law, whether civil, criminal, or regulatory in nature, and whether arising by general statute or particular program statute, or by regulation, rule, or order issued pursuant therto, disclosure may be made to the appropriate public authority, whether Federal, foreign, State, local or tribal, or otherwise, responsible for enforcing, investigating or prosecuting such violation or charged with enforcing or implementing the statute, or rule, regulation, or order issued pursuant thereto, if the information disclosed is relevant to any enforcement, regulatory, investigative or prosecutorial responsibility of the receiving entity. e. To a Federal agency in connection with the hiring or retention of an employee; the issuance of a security clearance; the reporting of an investigation; the letting of a contract; or the issuance of a grant, license, or other benefit to the extent that the information is relevant and necessary to a decision. f. To agency contractors or volunteers who have been engaged to assist the agency in the performance of a contract service, cooperative agreement, or other activity related to this system of records and who need to have access to the PO 00000 Frm 00024 Fmt 4703 Sfmt 4703 60709 records in order to perform their activity. Recipients shall be required to comply with the requirements of the Privacy Act of 1974, as amended, 5 U.S.C. 552a. g. To the Office of Personnel Management (OPM), the Office of Management and Budget (OMB), or the Government Accountability Office (GAO) when the information is required for program evaluation purposes. h. To a Member of Congress or staff on behalf of and at the request of the individual who is the subject of the record. i. To an expert, consultant, or contractor of GSA in the performance of a Federal duty to which the information is reluctant. j. To the National Archives and Records Administration (NARA) for records management purposes. k. To a Federal, State, or local agency, or other appropriate entities or individuals, or through established liaison channels to selected foreign governments, in order to enable an intelligence agency to carry out its responsibilities under the National Security Act of 1947 as amended, the CIA Act of 1949 as amended, Executive Order 12333 or any successor order, applicable national security directives, or classified implementing procedures approved by the Attorney General and promulgated pursuant to such statutes, orders, or directives. l. To the Office of Management and Budget when necessary to the review of private relief legislation pursuant to OMB Circular No. A–19. POLICIES AND PRACTICES FOR STORING, RETRIEVING, ACCESSING, RETAINING, AND DISPOSING OF RECORDS IN THE SYSTEM: STORAGE: Records are maintained on paper and electronically in secure locations. Records are maintained in the system of records Comprehensive Human Resources Integrated System (GSA/ PPFM–8) in the personnel security module and associated equipment. RETRIEVABILITY: Records are retrieved by name and Social Security Number. SAFEGUARDS: Personnel security file records are stored in a secured office in cabinets with access limited to authorized employees. A password system protects access to computer records. Access to the records is limited to those employees who have a need for them in the performance of their official duties. E:\FR\FM\16OCN1.SGM 16OCN1 60710 Federal Register / Vol. 71, No. 199 / Monday, October 16, 2006 / Notices RETENTION AND DISPOSAL: These records are retained and disposed of in accordance with General Records Schedule 18, item 22, approved by the National Archives and Records Administration (NARA). Records are destroyed by burning, pulping, or shredding, as scheduled in the HB GSA Records Maintenance and Disposition System (OAD P 1820.2A). SYSTEM MANAGER AND ADDRESS: The official responsible for personnel security files in the system is the Director, Personnel Security Requirements Division (CPR), 1800 F Street, NW., Washington, DC 20405. NOTIFICATION PROCEDURE: Inquiries by individuals as to whether the system contains a record pertaining to themselves should be addressed to the system manager. GENERAL SERVICES ADMINISTRATION Privacy Act of 1974; Notice of a New System of Records General Services Administration. ACTION: Notice. AGENCY: AUTHORITY FOR MAINTAINING THE SYSTEM: SUMMARY: The General Services Administration (GSA) is providing notice of a new record system, GSA/ PPFM–11 (Pegasys). Pegasys is a commercial-off-the-shelf based financial management system. Effective Date: The system of records will become effective without further notice on November 27, 2006 unless comments received on or before that date result in a contrary determination. FOR FURTHER INFORMATION CONTACT: Call or e-mail the GSA Privacy Act Officer: telephone 202–501–1452; e-mail gsa.privacyact@gsa.gov. GSA Privacy Act Officer (CIB), General Services Administration, 1800 F Street, NW., Washington, DC 20405. ADDRESSES: RECORD ACCESS PROCEDURES: Requests from individuals for access to records should be addressed to the system manager and should include full name (maiden name where appropriate), address, and date and place of birth. General inquiries may be made by telephone. PROCEDURES FOR CONTESTING RECORDS: GSA rules for accessing records, contesting their content, and appealing initial decisions appear in 41 CFR part 105–64. RECORD SOURCES: Individuals, employees, informants, law enforcement agencies, other Government agencies, employees’ references, co-workers, neighbors, educational institutions, and intelligence sources. Security violation information is obtained from a variety of sources, such as security guard’s reports, security inspections, witnesses, supervisor’s reports, and audit reports. Pegasys is part of a shared-services financial operation providing a commercial-offthe-shelf financial system (in a privatevendor hosted environment), financial transaction processing, and financial analysis for its main business lines of Federal supplies and technology, public buildings, and general management and administration offices. GSA also utilizes this shared-service operation to cross service multiple external client agencies. The system information will be accessed and used by GSA employees, training centers, and outside agencies. SUPPLEMENTARY INFORMATION: Dated: September 28, 2006. Cheryl Paige, Acting Director, Office of Information Management. GSA/PPFM–11 SYSTEM NAME: Pegasys. jlentini on PROD1PC65 with NOTICES FILES EXEMPTED FROM PARTS OF THE ACT: SYSTEM LOCATION: Under 5 U.S.C. 552a(k)(5), the personnel security case files in the system of records are exempt from subsections (c)(3); (d); (e)(1); (e)(4)(G), (H), and (I); and (f) of the act. Information will be withheld to the extent it identifies witnesses promised confidentiality as a condition of providing information during the course of the background investigation. Pegasys records and files are maintained in the Phoenix Data Center (PDC), with records also stored in the Washington, DC Central Office, Ft. Worth regional office, and Kansas City regional office. Individuals covered by the system: Individuals covered by Pegasys include GSA vendors and Federal employees. [FR Doc. E6–17070 Filed 10–13–06; 8:45 am] Pegasys contains records and files pertaining to financial information; BILLING CODE 6820–34–P VerDate Aug<31>2005 16:16 Oct 13, 2006 Jkt 211001 RECORDS IN THE SYSTEM: PO 00000 Frm 00025 Fmt 4703 Sfmt 4703 therefore, these files and records contain the following privacy data: • Social Security Number (SSN) • Employee address • Banking information • Credit Card number The Chief Financial Officers (CFO) Act of 1990 (Pub. L. 101–576) as amended. PURPOSE: Pegasys is the GSA core financial management system of records to make payments and record accounting transactions. This includes funds management (budget execution and purchasing), credit cards, accounts payable, disbursements, standard general ledger, and reporting. It is part of a shared-services financial operation providing a commercial-off-the-shelf (COTS) financial system (in a privatevendor hosted environment), financial transaction processing, and financial analysis for its main business lines of Federal supplies and technology, public buildings, and general management and administration offices. GSA also utilizes this shared-service operation to cross service multiple external client agencies. ROUTINE USES OF THE SYSTEM RECORDS, INCLUDING CATEGORIES OF USERS AND THEIR PURPOSE FOR USING THE SYSTEM: System information accessed by Pegasys may be used by designated finance center employees and their supervisors, along with designated analysts and managers. System information also may be used: a. In any legal proceeding, where pertinent, to which GSA is a party before a court or administrative body. b. To conduct investigations, by authorized officials, that are investigating or settling a grievance, complaint, or appeal filed by an individual who is the subject of the record. c. To a Federal agency in connection with the hiring or retention of an employee; the issuance of a security clearance; the reporting of an investigation; the letting of a contract; or the issuance of a grant, license, or other benefit to the extent that the information is relevant and necessary to a decision. d. To the Office of Personnel Management (OPM), the Office of Management and Budget (OMB), or the Government Accountability Office (GAO) when the information is required for program evaluation purposes. e. To an expert, consultant, or contractor of GSA in the performance of a Federal duty to which the information is relevant. E:\FR\FM\16OCN1.SGM 16OCN1

Agencies

[Federal Register Volume 71, Number 199 (Monday, October 16, 2006)]
[Notices]
[Pages 60708-60710]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: E6-17070]


=======================================================================
-----------------------------------------------------------------------

GENERAL SERVICES ADMINISTRATION


Privacy Act of 1974; Notice of Updated System of Records

AGENCY: General Services Administration.

ACTION: Notice.

-----------------------------------------------------------------------

SUMMARY: The General Services Administration (GSA) is providing notice 
of a revision to the record system Personnel Security Files (GSA/HRO-
37). The system provides control over personnel security. The revisions 
ensure that the system of records meet the requirements of Homeland 
Security Presidential Directive 12 (HSPD-12) and that individuals be 
fully informed about collection of their personal information.

EFFECTIVE DATE: The system of records will become effective without 
further notice on November 27, 2006 unless comments received on or 
before that date result in a contrary determination.

FOR FURTHER INFORMATION: Call or e-mail the GSA Privacy Act Officer: 
telephone 202-501-1452; e-mail gsa.privacyact@gsa.gov.

ADDRESSES: GSA Privacy Act Officer (CIB), General Services 
Administration, 1800 F Street, NW., Washington, DC 20405.

SUPPLEMENTARY INFORMATION: To comply with new requirements of Homeland 
Security Presidential Directive 12 (HSPD-12) GSA updated its personnel 
security system. This notice explains the new categories of records in 
the system and the authorities for maintaining the system.

    Dated: September 21, 2006.
Cheryl Paige,
Acting Director, Office of Information Management.
GSA/HRO-37

System name:
    Personnel Security files.

Security classification:
    Some records in the system are classified under Executive Order 
12958 as amended.

System location:
    Personnel security files are maintained with other appropriate 
records in the Personnel Security Requirements Division (CPR), GSA 
Building, 1800 F Street, NW., Washington, DC 20405.

Categories of individuals covered by the system:
    Employees, applicants for employment, former employees of GSA and 
of commissions, committees, small agencies serviced by GSA, 
contractors,

[[Page 60709]]

students, interns, volunteers, individuals authorized to perform or use 
services provided in GSA facilities (e.g. Credit Union or Fitness 
Center) and individuals formerly in any of these positions that require 
regular, ongoing access to Federal facilities, information technology 
systems or information classified in the interest of national security. 
Included are historical researchers, experts or consultants, and 
employees of contractors performing services for GSA.

Categories of records in the system:
    Personnel security files contain information such as name, former 
names, date and place of birth, home address, phone numbers, height, 
weight, hair color, eye color, sex, passport information, military 
information, civil court information, employment history, residential 
history, Social Security Number, occupation, experience, and 
investigative material, education and degrees earned, names of 
associates and references and their contact information, citizenship, 
names of relatives, citizenship of relatives, names of relatives who 
work for the Federal government, criminal history, mental health 
history, drug use, financial information, fingerprints, summary report 
of investigation, results of suitability decisions, level of security 
clearance, date of issuance of security clearance, requests for 
appeals, witness statements, investigator's notes, tax return 
information, credit reports, security violations, circumstances of 
violation, and agency action taken.

Forms:
    SF-85, SF-85P, SF-86, SF-87, FCRA, OF306, FD258.

Authority for maintaining the system:
    Depending upon the type of investigation, GSA is authorized to ask 
for this information under Executive Orders 10450 as amended, 10865 as 
amended, 12968 as amended, and 12958 as amended; sections 3301 and 9101 
of title 5, U.S. Code; sections 2165 and 2201 of title 42, U.S. Code; 
parts 5, 732, and 736 of title 5, Code of Federal Regulations; and 
Homeland Security Presidential Directive 12.

Purpose:
    To assemble in one system information pertaining to issuing 
security clearances and public trust certifications, suitability 
decisions, fitness for service of applicants for federal employment and 
contract positions, and administrative actions. Information security 
files also are used for recommending administrative action against 
employees found to be violating GSA classified national security 
information regulations.

Routine uses of records in the system, including the types of users and 
the purposes of such uses:
    a. In any legal proceeding, where pertinent, to which GSA is a 
party before a court or administrative body.
    b. To the Department of Justice when: (a) The agency or any 
component thereof; or (b) any employee of the agency in his or her 
official capacity; (c) any employee of the agency in his or her 
individual capacity where agency or the Department of Justice has 
agreed to represent the employee; or (d) the United States Government, 
is a party to litigation or has an interest in such litigation, and by 
careful review, the agency determines that the records are both 
relevant and necessary to the litigation and the use of such records by 
DOJ is therefore deemed by the agency to be for a purpose compatible 
with the purpose for which the agency collected the records.
    c. To authorized officials engaged in investigating or settling a 
grievance, complaint, or appeal filed by an individual who is the 
subject of the record.
    d. Except as noted on Forms SF-85, 85-P, and 86, when a records on 
its face, or in conjunction with other records, indicates a violation 
or potential violation of law, whether civil, criminal, or regulatory 
in nature, and whether arising by general statute or particular program 
statute, or by regulation, rule, or order issued pursuant therto, 
disclosure may be made to the appropriate public authority, whether 
Federal, foreign, State, local or tribal, or otherwise, responsible for 
enforcing, investigating or prosecuting such violation or charged with 
enforcing or implementing the statute, or rule, regulation, or order 
issued pursuant thereto, if the information disclosed is relevant to 
any enforcement, regulatory, investigative or prosecutorial 
responsibility of the receiving entity.
    e. To a Federal agency in connection with the hiring or retention 
of an employee; the issuance of a security clearance; the reporting of 
an investigation; the letting of a contract; or the issuance of a 
grant, license, or other benefit to the extent that the information is 
relevant and necessary to a decision.
    f. To agency contractors or volunteers who have been engaged to 
assist the agency in the performance of a contract service, cooperative 
agreement, or other activity related to this system of records and who 
need to have access to the records in order to perform their activity. 
Recipients shall be required to comply with the requirements of the 
Privacy Act of 1974, as amended, 5 U.S.C. 552a.
    g. To the Office of Personnel Management (OPM), the Office of 
Management and Budget (OMB), or the Government Accountability Office 
(GAO) when the information is required for program evaluation purposes.
    h. To a Member of Congress or staff on behalf of and at the request 
of the individual who is the subject of the record.
    i. To an expert, consultant, or contractor of GSA in the 
performance of a Federal duty to which the information is reluctant.
    j. To the National Archives and Records Administration (NARA) for 
records management purposes.
    k. To a Federal, State, or local agency, or other appropriate 
entities or individuals, or through established liaison channels to 
selected foreign governments, in order to enable an intelligence agency 
to carry out its responsibilities under the National Security Act of 
1947 as amended, the CIA Act of 1949 as amended, Executive Order 12333 
or any successor order, applicable national security directives, or 
classified implementing procedures approved by the Attorney General and 
promulgated pursuant to such statutes, orders, or directives.
    l. To the Office of Management and Budget when necessary to the 
review of private relief legislation pursuant to OMB Circular No. A-19.

Policies and practices for storing, retrieving, accessing, retaining, 
and disposing of records in the system:
Storage:
    Records are maintained on paper and electronically in secure 
locations. Records are maintained in the system of records 
Comprehensive Human Resources Integrated System (GSA/PPFM-8) in the 
personnel security module and associated equipment.

Retrievability:
    Records are retrieved by name and Social Security Number.

Safeguards:
    Personnel security file records are stored in a secured office in 
cabinets with access limited to authorized employees. A password system 
protects access to computer records. Access to the records is limited 
to those employees who have a need for them in the performance of their 
official duties.

[[Page 60710]]

Retention and disposal:
    These records are retained and disposed of in accordance with 
General Records Schedule 18, item 22, approved by the National Archives 
and Records Administration (NARA). Records are destroyed by burning, 
pulping, or shredding, as scheduled in the HB GSA Records Maintenance 
and Disposition System (OAD P 1820.2A).

System manager and address:
    The official responsible for personnel security files in the system 
is the Director, Personnel Security Requirements Division (CPR), 1800 F 
Street, NW., Washington, DC 20405.

Notification procedure:
    Inquiries by individuals as to whether the system contains a record 
pertaining to themselves should be addressed to the system manager.

Record access procedures:
    Requests from individuals for access to records should be addressed 
to the system manager and should include full name (maiden name where 
appropriate), address, and date and place of birth. General inquiries 
may be made by telephone.

Procedures for contesting records:
    GSA rules for accessing records, contesting their content, and 
appealing initial decisions appear in 41 CFR part 105-64.

Record sources:
    Individuals, employees, informants, law enforcement agencies, other 
Government agencies, employees' references, co-workers, neighbors, 
educational institutions, and intelligence sources. Security violation 
information is obtained from a variety of sources, such as security 
guard's reports, security inspections, witnesses, supervisor's reports, 
and audit reports.

Files exempted from parts of the act:
    Under 5 U.S.C. 552a(k)(5), the personnel security case files in the 
system of records are exempt from subsections (c)(3); (d); (e)(1); 
(e)(4)(G), (H), and (I); and (f) of the act. Information will be 
withheld to the extent it identifies witnesses promised confidentiality 
as a condition of providing information during the course of the 
background investigation.

 [FR Doc. E6-17070 Filed 10-13-06; 8:45 am]
BILLING CODE 6820-34-P