Privacy Act of 1974; Notice of Updated System of Records, 60708-60710 [E6-17070]
Download as PDF
60708
Federal Register / Vol. 71, No. 199 / Monday, October 16, 2006 / Notices
B. How Do I Submit Nominations
Through EPA’s Nominations Web Site?
The Web site is designed to provide
key information to the Agency, as
described in Section III. A of this notice,
for each contaminant nominated to the
CCL process.
The Web address to nominate a
contaminant can be found at https://
www.epa.gov/safewater/ccl/ccl3.html.
C. How do I Submit Nominations in
Hard Copy?
You may submit nominations by mail.
To allow full Agency consideration of
your nomination, please ensure that
your nominations are received or
postmarked by midnight December 15,
2006. The addresses for submittal of
nominations by mail are listed in the
ADDRESSES section of this document.
D. What Will Happen to My
Nominations After I Submit Them?
The Agency will include nominated
contaminants into the CCL Universe.
EPA will evaluate the information
available for the nominated
contaminants to determine the
appropriateness of inclusion on the
PCCL and finally the CCL. While EPA
does not intend to respond to the
nominations directly or individually,
the Agency will fully explain nominated
contaminants for the CCL3.
Dated: October 6, 2006.
Benjamin H. Grumbles,
Assistant Administrator, Office of Water.
[FR Doc. E6–17099 Filed 10–13–06; 8:45 am]
BILLING CODE 6560–50–P
IV. References
Copies of these documents are found
at https://www.regulations.gov, Docket ID
No. EPA–OW–2005–0039.
NAS 2001. National Academy of Sciences,
National Research Council. 2001. Classifying
Drinking Water Contaminants for Regulatory
Consideration. National Academy Press.
Washington, DC. Available at https://
books.nap.edu/books/0309074088/html/
index.html NDWAC 2004. National Drinking
Water Advisory Council. National Drinking
Water Advisory Council Report on the CCL
Classification Process to the U.S.
Environmental Protection Agency, May 18,
2004. Available at https://www.epa.gov/
safewater/ndwac/pdfs/report_ccl_ndwac_0706-04.pdf.
Taylor, Latham, and Woolhouse. 2001.
Risk factors for human disease emergence
(Appendix A). Philosophical Transactions of
the Royal Society of London Biology:
256:983–98.
FEDERAL COMMUNICATIONS
COMMISSION
Sunshine Act Meeting; Deletion of
Agenda Items; From October 12, 2006,
Open Meeting and FCC to Hold an
Additional Open Meeting, Friday,
October 13, 2006, at 11 a.m.
October 11, 2006.
The following items have been
deleted from the list of Agenda items
scheduled for consideration at the
Thursday, October 12, 2006, open
meeting and previously listed in the
Commission’s Notice of Thursday,
October 5, 2006. These items will be
considered at an additional open
meeting scheduled for Friday, October
13, 2006, at 11 a.m. in the Commission
Meeting Room, TW-C305, at 445 12th
Street, SW., Washington, DC.
Item no.
Bureau
Subject
4 ..........
Wireline Competition ....................................
5 ..........
Wireline Competition ....................................
Title: AT&T Inc. and BellSouth Corporation Application for Transfer of Control (WC
Docket No. 06–74).
Summary: The Commission will consider a Memorandum Opinion and Order regarding
the transfer of control application of AT&T and BellSouth.
Title: Broadband Industry Practices.
Summary: The Commission will consider a Notice of Inquiry regarding broadband industry practices.
The prompt and orderly conduct of
Commission business permits less than
7-days notice be given.
Presidential Directive 12 (HSPD–12) and
that individuals be fully informed about
collection of their personal information.
Federal Communications Commission.
Marlene H. Dortch,
Secretary.
[FR Doc. 06–8726 Filed 10–12–06; 12:05 pm]
EFFECTIVE DATE:
BILLING CODE 6712–01–P
The system of records
will become effective without further
notice on November 27, 2006 unless
comments received on or before that
date result in a contrary determination.
Dated: September 21, 2006.
Cheryl Paige,
Acting Director, Office of Information
Management.
GSA/HRO–37
SYSTEM NAME:
Personnel Security files.
SECURITY CLASSIFICATION:
GENERAL SERVICES
ADMINISTRATION
Call or e-mail
the GSA Privacy Act Officer: telephone
202–501–1452; e-mail
gsa.privacyact@gsa.gov.
Privacy Act of 1974; Notice of Updated
System of Records
ADDRESSES:
GSA Privacy Act Officer
(CIB), General Services Administration,
1800 F Street, NW., Washington, DC
20405.
SYSTEM LOCATION:
FOR FURTHER INFORMATION:
General Services
Administration.
ACTION: Notice.
AGENCY:
The General Services
Administration (GSA) is providing
notice of a revision to the record system
Personnel Security Files (GSA/HRO–
37). The system provides control over
personnel security. The revisions ensure
that the system of records meet the
requirements of Homeland Security
jlentini on PROD1PC65 with NOTICES
SUMMARY:
VerDate Aug<31>2005
16:16 Oct 13, 2006
Jkt 211001
To comply
with new requirements of Homeland
Security Presidential Directive 12
(HSPD–12) GSA updated its personnel
security system. This notice explains
the new categories of records in the
system and the authorities for
maintaining the system.
SUPPLEMENTARY INFORMATION:
PO 00000
Frm 00023
Fmt 4703
Sfmt 4703
Some records in the system are
classified under Executive Order 12958
as amended.
Personnel security files are
maintained with other appropriate
records in the Personnel Security
Requirements Division (CPR), GSA
Building, 1800 F Street, NW.,
Washington, DC 20405.
CATEGORIES OF INDIVIDUALS COVERED BY THE
SYSTEM:
Employees, applicants for
employment, former employees of GSA
and of commissions, committees, small
agencies serviced by GSA, contractors,
E:\FR\FM\16OCN1.SGM
16OCN1
Federal Register / Vol. 71, No. 199 / Monday, October 16, 2006 / Notices
students, interns, volunteers,
individuals authorized to perform or use
services provided in GSA facilities (e.g.
Credit Union or Fitness Center) and
individuals formerly in any of these
positions that require regular, ongoing
access to Federal facilities, information
technology systems or information
classified in the interest of national
security. Included are historical
researchers, experts or consultants, and
employees of contractors performing
services for GSA.
CATEGORIES OF RECORDS IN THE SYSTEM:
Personnel security files contain
information such as name, former
names, date and place of birth, home
address, phone numbers, height, weight,
hair color, eye color, sex, passport
information, military information, civil
court information, employment history,
residential history, Social Security
Number, occupation, experience, and
investigative material, education and
degrees earned, names of associates and
references and their contact
information, citizenship, names of
relatives, citizenship of relatives, names
of relatives who work for the Federal
government, criminal history, mental
health history, drug use, financial
information, fingerprints, summary
report of investigation, results of
suitability decisions, level of security
clearance, date of issuance of security
clearance, requests for appeals, witness
statements, investigator’s notes, tax
return information, credit reports,
security violations, circumstances of
violation, and agency action taken.
FORMS:
SF–85, SF–85P, SF–86, SF–87, FCRA,
OF306, FD258.
AUTHORITY FOR MAINTAINING THE SYSTEM:
Depending upon the type of
investigation, GSA is authorized to ask
for this information under Executive
Orders 10450 as amended, 10865 as
amended, 12968 as amended, and 12958
as amended; sections 3301 and 9101 of
title 5, U.S. Code; sections 2165 and
2201 of title 42, U.S. Code; parts 5, 732,
and 736 of title 5, Code of Federal
Regulations; and Homeland Security
Presidential Directive 12.
jlentini on PROD1PC65 with NOTICES
PURPOSE:
To assemble in one system
information pertaining to issuing
security clearances and public trust
certifications, suitability decisions,
fitness for service of applicants for
federal employment and contract
positions, and administrative actions.
Information security files also are used
for recommending administrative action
VerDate Aug<31>2005
16:16 Oct 13, 2006
Jkt 211001
against employees found to be violating
GSA classified national security
information regulations.
ROUTINE USES OF RECORDS IN THE SYSTEM,
INCLUDING THE TYPES OF USERS AND THE
PURPOSES OF SUCH USES:
a. In any legal proceeding, where
pertinent, to which GSA is a party
before a court or administrative body.
b. To the Department of Justice when:
(a) The agency or any component
thereof; or (b) any employee of the
agency in his or her official capacity; (c)
any employee of the agency in his or her
individual capacity where agency or the
Department of Justice has agreed to
represent the employee; or (d) the
United States Government, is a party to
litigation or has an interest in such
litigation, and by careful review, the
agency determines that the records are
both relevant and necessary to the
litigation and the use of such records by
DOJ is therefore deemed by the agency
to be for a purpose compatible with the
purpose for which the agency collected
the records.
c. To authorized officials engaged in
investigating or settling a grievance,
complaint, or appeal filed by an
individual who is the subject of the
record.
d. Except as noted on Forms SF–85,
85–P, and 86, when a records on its
face, or in conjunction with other
records, indicates a violation or
potential violation of law, whether civil,
criminal, or regulatory in nature, and
whether arising by general statute or
particular program statute, or by
regulation, rule, or order issued
pursuant therto, disclosure may be
made to the appropriate public
authority, whether Federal, foreign,
State, local or tribal, or otherwise,
responsible for enforcing, investigating
or prosecuting such violation or charged
with enforcing or implementing the
statute, or rule, regulation, or order
issued pursuant thereto, if the
information disclosed is relevant to any
enforcement, regulatory, investigative or
prosecutorial responsibility of the
receiving entity.
e. To a Federal agency in connection
with the hiring or retention of an
employee; the issuance of a security
clearance; the reporting of an
investigation; the letting of a contract; or
the issuance of a grant, license, or other
benefit to the extent that the information
is relevant and necessary to a decision.
f. To agency contractors or volunteers
who have been engaged to assist the
agency in the performance of a contract
service, cooperative agreement, or other
activity related to this system of records
and who need to have access to the
PO 00000
Frm 00024
Fmt 4703
Sfmt 4703
60709
records in order to perform their
activity. Recipients shall be required to
comply with the requirements of the
Privacy Act of 1974, as amended, 5
U.S.C. 552a.
g. To the Office of Personnel
Management (OPM), the Office of
Management and Budget (OMB), or the
Government Accountability Office
(GAO) when the information is required
for program evaluation purposes.
h. To a Member of Congress or staff
on behalf of and at the request of the
individual who is the subject of the
record.
i. To an expert, consultant, or
contractor of GSA in the performance of
a Federal duty to which the information
is reluctant.
j. To the National Archives and
Records Administration (NARA) for
records management purposes.
k. To a Federal, State, or local agency,
or other appropriate entities or
individuals, or through established
liaison channels to selected foreign
governments, in order to enable an
intelligence agency to carry out its
responsibilities under the National
Security Act of 1947 as amended, the
CIA Act of 1949 as amended, Executive
Order 12333 or any successor order,
applicable national security directives,
or classified implementing procedures
approved by the Attorney General and
promulgated pursuant to such statutes,
orders, or directives.
l. To the Office of Management and
Budget when necessary to the review of
private relief legislation pursuant to
OMB Circular No. A–19.
POLICIES AND PRACTICES FOR STORING,
RETRIEVING, ACCESSING, RETAINING, AND
DISPOSING OF RECORDS IN THE SYSTEM:
STORAGE:
Records are maintained on paper and
electronically in secure locations.
Records are maintained in the system of
records Comprehensive Human
Resources Integrated System (GSA/
PPFM–8) in the personnel security
module and associated equipment.
RETRIEVABILITY:
Records are retrieved by name and
Social Security Number.
SAFEGUARDS:
Personnel security file records are
stored in a secured office in cabinets
with access limited to authorized
employees. A password system protects
access to computer records. Access to
the records is limited to those
employees who have a need for them in
the performance of their official duties.
E:\FR\FM\16OCN1.SGM
16OCN1
60710
Federal Register / Vol. 71, No. 199 / Monday, October 16, 2006 / Notices
RETENTION AND DISPOSAL:
These records are retained and
disposed of in accordance with General
Records Schedule 18, item 22, approved
by the National Archives and Records
Administration (NARA). Records are
destroyed by burning, pulping, or
shredding, as scheduled in the HB GSA
Records Maintenance and Disposition
System (OAD P 1820.2A).
SYSTEM MANAGER AND ADDRESS:
The official responsible for personnel
security files in the system is the
Director, Personnel Security
Requirements Division (CPR), 1800 F
Street, NW., Washington, DC 20405.
NOTIFICATION PROCEDURE:
Inquiries by individuals as to whether
the system contains a record pertaining
to themselves should be addressed to
the system manager.
GENERAL SERVICES
ADMINISTRATION
Privacy Act of 1974; Notice of a New
System of Records
General Services
Administration.
ACTION: Notice.
AGENCY:
AUTHORITY FOR MAINTAINING THE SYSTEM:
SUMMARY: The General Services
Administration (GSA) is providing
notice of a new record system, GSA/
PPFM–11 (Pegasys). Pegasys is a
commercial-off-the-shelf based financial
management system.
Effective Date: The system of records
will become effective without further
notice on November 27, 2006 unless
comments received on or before that
date result in a contrary determination.
FOR FURTHER INFORMATION CONTACT: Call
or e-mail the GSA Privacy Act Officer:
telephone 202–501–1452; e-mail
gsa.privacyact@gsa.gov.
GSA Privacy Act Officer
(CIB), General Services Administration,
1800 F Street, NW., Washington, DC
20405.
ADDRESSES:
RECORD ACCESS PROCEDURES:
Requests from individuals for access
to records should be addressed to the
system manager and should include full
name (maiden name where appropriate),
address, and date and place of birth.
General inquiries may be made by
telephone.
PROCEDURES FOR CONTESTING RECORDS:
GSA rules for accessing records,
contesting their content, and appealing
initial decisions appear in 41 CFR part
105–64.
RECORD SOURCES:
Individuals, employees, informants,
law enforcement agencies, other
Government agencies, employees’
references, co-workers, neighbors,
educational institutions, and
intelligence sources. Security violation
information is obtained from a variety of
sources, such as security guard’s
reports, security inspections, witnesses,
supervisor’s reports, and audit reports.
Pegasys is
part of a shared-services financial
operation providing a commercial-offthe-shelf financial system (in a privatevendor hosted environment), financial
transaction processing, and financial
analysis for its main business lines of
Federal supplies and technology, public
buildings, and general management and
administration offices. GSA also utilizes
this shared-service operation to cross
service multiple external client
agencies. The system information will
be accessed and used by GSA
employees, training centers, and outside
agencies.
SUPPLEMENTARY INFORMATION:
Dated: September 28, 2006.
Cheryl Paige,
Acting Director, Office of Information
Management.
GSA/PPFM–11
SYSTEM NAME:
Pegasys.
jlentini on PROD1PC65 with NOTICES
FILES EXEMPTED FROM PARTS OF THE ACT:
SYSTEM LOCATION:
Under 5 U.S.C. 552a(k)(5), the
personnel security case files in the
system of records are exempt from
subsections (c)(3); (d); (e)(1); (e)(4)(G),
(H), and (I); and (f) of the act.
Information will be withheld to the
extent it identifies witnesses promised
confidentiality as a condition of
providing information during the course
of the background investigation.
Pegasys records and files are
maintained in the Phoenix Data Center
(PDC), with records also stored in the
Washington, DC Central Office, Ft.
Worth regional office, and Kansas City
regional office.
Individuals covered by the system:
Individuals covered by Pegasys include
GSA vendors and Federal employees.
[FR Doc. E6–17070 Filed 10–13–06; 8:45 am]
Pegasys contains records and files
pertaining to financial information;
BILLING CODE 6820–34–P
VerDate Aug<31>2005
16:16 Oct 13, 2006
Jkt 211001
RECORDS IN THE SYSTEM:
PO 00000
Frm 00025
Fmt 4703
Sfmt 4703
therefore, these files and records contain
the following privacy data:
• Social Security Number (SSN)
• Employee address
• Banking information
• Credit Card number
The Chief Financial Officers (CFO)
Act of 1990 (Pub. L. 101–576) as
amended.
PURPOSE:
Pegasys is the GSA core financial
management system of records to make
payments and record accounting
transactions. This includes funds
management (budget execution and
purchasing), credit cards, accounts
payable, disbursements, standard
general ledger, and reporting. It is part
of a shared-services financial operation
providing a commercial-off-the-shelf
(COTS) financial system (in a privatevendor hosted environment), financial
transaction processing, and financial
analysis for its main business lines of
Federal supplies and technology, public
buildings, and general management and
administration offices. GSA also utilizes
this shared-service operation to cross
service multiple external client
agencies.
ROUTINE USES OF THE SYSTEM RECORDS,
INCLUDING CATEGORIES OF USERS AND THEIR
PURPOSE FOR USING THE SYSTEM:
System information accessed by
Pegasys may be used by designated
finance center employees and their
supervisors, along with designated
analysts and managers. System
information also may be used:
a. In any legal proceeding, where
pertinent, to which GSA is a party
before a court or administrative body.
b. To conduct investigations, by
authorized officials, that are
investigating or settling a grievance,
complaint, or appeal filed by an
individual who is the subject of the
record.
c. To a Federal agency in connection
with the hiring or retention of an
employee; the issuance of a security
clearance; the reporting of an
investigation; the letting of a contract; or
the issuance of a grant, license, or other
benefit to the extent that the information
is relevant and necessary to a decision.
d. To the Office of Personnel
Management (OPM), the Office of
Management and Budget (OMB), or the
Government Accountability Office
(GAO) when the information is required
for program evaluation purposes.
e. To an expert, consultant, or
contractor of GSA in the performance of
a Federal duty to which the information
is relevant.
E:\FR\FM\16OCN1.SGM
16OCN1
Agencies
[Federal Register Volume 71, Number 199 (Monday, October 16, 2006)]
[Notices]
[Pages 60708-60710]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: E6-17070]
=======================================================================
-----------------------------------------------------------------------
GENERAL SERVICES ADMINISTRATION
Privacy Act of 1974; Notice of Updated System of Records
AGENCY: General Services Administration.
ACTION: Notice.
-----------------------------------------------------------------------
SUMMARY: The General Services Administration (GSA) is providing notice
of a revision to the record system Personnel Security Files (GSA/HRO-
37). The system provides control over personnel security. The revisions
ensure that the system of records meet the requirements of Homeland
Security Presidential Directive 12 (HSPD-12) and that individuals be
fully informed about collection of their personal information.
EFFECTIVE DATE: The system of records will become effective without
further notice on November 27, 2006 unless comments received on or
before that date result in a contrary determination.
FOR FURTHER INFORMATION: Call or e-mail the GSA Privacy Act Officer:
telephone 202-501-1452; e-mail gsa.privacyact@gsa.gov.
ADDRESSES: GSA Privacy Act Officer (CIB), General Services
Administration, 1800 F Street, NW., Washington, DC 20405.
SUPPLEMENTARY INFORMATION: To comply with new requirements of Homeland
Security Presidential Directive 12 (HSPD-12) GSA updated its personnel
security system. This notice explains the new categories of records in
the system and the authorities for maintaining the system.
Dated: September 21, 2006.
Cheryl Paige,
Acting Director, Office of Information Management.
GSA/HRO-37
System name:
Personnel Security files.
Security classification:
Some records in the system are classified under Executive Order
12958 as amended.
System location:
Personnel security files are maintained with other appropriate
records in the Personnel Security Requirements Division (CPR), GSA
Building, 1800 F Street, NW., Washington, DC 20405.
Categories of individuals covered by the system:
Employees, applicants for employment, former employees of GSA and
of commissions, committees, small agencies serviced by GSA,
contractors,
[[Page 60709]]
students, interns, volunteers, individuals authorized to perform or use
services provided in GSA facilities (e.g. Credit Union or Fitness
Center) and individuals formerly in any of these positions that require
regular, ongoing access to Federal facilities, information technology
systems or information classified in the interest of national security.
Included are historical researchers, experts or consultants, and
employees of contractors performing services for GSA.
Categories of records in the system:
Personnel security files contain information such as name, former
names, date and place of birth, home address, phone numbers, height,
weight, hair color, eye color, sex, passport information, military
information, civil court information, employment history, residential
history, Social Security Number, occupation, experience, and
investigative material, education and degrees earned, names of
associates and references and their contact information, citizenship,
names of relatives, citizenship of relatives, names of relatives who
work for the Federal government, criminal history, mental health
history, drug use, financial information, fingerprints, summary report
of investigation, results of suitability decisions, level of security
clearance, date of issuance of security clearance, requests for
appeals, witness statements, investigator's notes, tax return
information, credit reports, security violations, circumstances of
violation, and agency action taken.
Forms:
SF-85, SF-85P, SF-86, SF-87, FCRA, OF306, FD258.
Authority for maintaining the system:
Depending upon the type of investigation, GSA is authorized to ask
for this information under Executive Orders 10450 as amended, 10865 as
amended, 12968 as amended, and 12958 as amended; sections 3301 and 9101
of title 5, U.S. Code; sections 2165 and 2201 of title 42, U.S. Code;
parts 5, 732, and 736 of title 5, Code of Federal Regulations; and
Homeland Security Presidential Directive 12.
Purpose:
To assemble in one system information pertaining to issuing
security clearances and public trust certifications, suitability
decisions, fitness for service of applicants for federal employment and
contract positions, and administrative actions. Information security
files also are used for recommending administrative action against
employees found to be violating GSA classified national security
information regulations.
Routine uses of records in the system, including the types of users and
the purposes of such uses:
a. In any legal proceeding, where pertinent, to which GSA is a
party before a court or administrative body.
b. To the Department of Justice when: (a) The agency or any
component thereof; or (b) any employee of the agency in his or her
official capacity; (c) any employee of the agency in his or her
individual capacity where agency or the Department of Justice has
agreed to represent the employee; or (d) the United States Government,
is a party to litigation or has an interest in such litigation, and by
careful review, the agency determines that the records are both
relevant and necessary to the litigation and the use of such records by
DOJ is therefore deemed by the agency to be for a purpose compatible
with the purpose for which the agency collected the records.
c. To authorized officials engaged in investigating or settling a
grievance, complaint, or appeal filed by an individual who is the
subject of the record.
d. Except as noted on Forms SF-85, 85-P, and 86, when a records on
its face, or in conjunction with other records, indicates a violation
or potential violation of law, whether civil, criminal, or regulatory
in nature, and whether arising by general statute or particular program
statute, or by regulation, rule, or order issued pursuant therto,
disclosure may be made to the appropriate public authority, whether
Federal, foreign, State, local or tribal, or otherwise, responsible for
enforcing, investigating or prosecuting such violation or charged with
enforcing or implementing the statute, or rule, regulation, or order
issued pursuant thereto, if the information disclosed is relevant to
any enforcement, regulatory, investigative or prosecutorial
responsibility of the receiving entity.
e. To a Federal agency in connection with the hiring or retention
of an employee; the issuance of a security clearance; the reporting of
an investigation; the letting of a contract; or the issuance of a
grant, license, or other benefit to the extent that the information is
relevant and necessary to a decision.
f. To agency contractors or volunteers who have been engaged to
assist the agency in the performance of a contract service, cooperative
agreement, or other activity related to this system of records and who
need to have access to the records in order to perform their activity.
Recipients shall be required to comply with the requirements of the
Privacy Act of 1974, as amended, 5 U.S.C. 552a.
g. To the Office of Personnel Management (OPM), the Office of
Management and Budget (OMB), or the Government Accountability Office
(GAO) when the information is required for program evaluation purposes.
h. To a Member of Congress or staff on behalf of and at the request
of the individual who is the subject of the record.
i. To an expert, consultant, or contractor of GSA in the
performance of a Federal duty to which the information is reluctant.
j. To the National Archives and Records Administration (NARA) for
records management purposes.
k. To a Federal, State, or local agency, or other appropriate
entities or individuals, or through established liaison channels to
selected foreign governments, in order to enable an intelligence agency
to carry out its responsibilities under the National Security Act of
1947 as amended, the CIA Act of 1949 as amended, Executive Order 12333
or any successor order, applicable national security directives, or
classified implementing procedures approved by the Attorney General and
promulgated pursuant to such statutes, orders, or directives.
l. To the Office of Management and Budget when necessary to the
review of private relief legislation pursuant to OMB Circular No. A-19.
Policies and practices for storing, retrieving, accessing, retaining,
and disposing of records in the system:
Storage:
Records are maintained on paper and electronically in secure
locations. Records are maintained in the system of records
Comprehensive Human Resources Integrated System (GSA/PPFM-8) in the
personnel security module and associated equipment.
Retrievability:
Records are retrieved by name and Social Security Number.
Safeguards:
Personnel security file records are stored in a secured office in
cabinets with access limited to authorized employees. A password system
protects access to computer records. Access to the records is limited
to those employees who have a need for them in the performance of their
official duties.
[[Page 60710]]
Retention and disposal:
These records are retained and disposed of in accordance with
General Records Schedule 18, item 22, approved by the National Archives
and Records Administration (NARA). Records are destroyed by burning,
pulping, or shredding, as scheduled in the HB GSA Records Maintenance
and Disposition System (OAD P 1820.2A).
System manager and address:
The official responsible for personnel security files in the system
is the Director, Personnel Security Requirements Division (CPR), 1800 F
Street, NW., Washington, DC 20405.
Notification procedure:
Inquiries by individuals as to whether the system contains a record
pertaining to themselves should be addressed to the system manager.
Record access procedures:
Requests from individuals for access to records should be addressed
to the system manager and should include full name (maiden name where
appropriate), address, and date and place of birth. General inquiries
may be made by telephone.
Procedures for contesting records:
GSA rules for accessing records, contesting their content, and
appealing initial decisions appear in 41 CFR part 105-64.
Record sources:
Individuals, employees, informants, law enforcement agencies, other
Government agencies, employees' references, co-workers, neighbors,
educational institutions, and intelligence sources. Security violation
information is obtained from a variety of sources, such as security
guard's reports, security inspections, witnesses, supervisor's reports,
and audit reports.
Files exempted from parts of the act:
Under 5 U.S.C. 552a(k)(5), the personnel security case files in the
system of records are exempt from subsections (c)(3); (d); (e)(1);
(e)(4)(G), (H), and (I); and (f) of the act. Information will be
withheld to the extent it identifies witnesses promised confidentiality
as a condition of providing information during the course of the
background investigation.
[FR Doc. E6-17070 Filed 10-13-06; 8:45 am]
BILLING CODE 6820-34-P