Privacy Act of 1974, as Amended; Amendment of an Existing System of Records, 11040-11042 [E7-4408]

Download as PDF 11040 Federal Register / Vol. 72, No. 47 / Monday, March 12, 2007 / Notices CONTESTING RECORDS PROCEDURE: DEPARTMENT OF THE INTERIOR A request for amendment of electronic records pertaining to the HSPD–12 credentialing process shall be addressed to the HSPD–12 System Manager identified in (1) above. A request for amendment of paper records pertaining to the personnel security management process shall be addressed to the appropriate Bureau Personnel Security System Manager identified in (2), above. All such requests must be in writing, signed by the requester, include the requester’s bureau and office affiliation and work address, if an employee, or the name and address of the bureau and office with whom the requester is associated for purposes of identity credentialing, and address of the facility or name of the system that the requester needed access to, to facilitate location of applicable paper records, if inquiring about paper records, and comply with the content requirements of 43 CFR 2.71. Note: Individuals who require regular, ongoing access to facilities and information systems and networks managed by other Federal agencies on whose behalf the Department issues identification credentials, as a shared-service provider, requesting amendment of identity management and personnel security records pertaining to themselves, must contact the appropriate party identified in this section of the Privacy Act system of records notice published by the agency with which they are affiliated. RECORD SOURCE CATEGORIES: Information is obtained from a variety of sources including the employee, contractor, or applicant via use of the SF–85, SF–85P, SF–86, SF–87A and FD 258 and personal interviews; employers’ and former employers’ records; other Federal agencies supplying data on covered individuals; FBI criminal history records and other databases; financial institutions and credit reports; medical records and health care providers; educational institutions. Other Federal agencies providing HSPD–12 enrollment services to Department of the Interior employees, contractors, etc. through third party enrollment brokers. EXEMPTIONS CLAIMED FOR THE SYSTEM: pwalker on PROD1PC71 with NOTICES None. [FR Doc. E7–4407 Filed 3–9–07; 8:45 am] BILLING CODE 4310–RK–P VerDate Aug<31>2005 18:04 Mar 09, 2007 Jkt 211001 Office of the Secretary Privacy Act of 1974, as Amended; Amendment of an Existing System of Records Office of the Secretary, Department of the Interior. ACTION: Proposed amendment of an existing system of records. AGENCY: SUMMARY: In accordance with the Privacy Act of 1974 (5 U.S.C. 552a), the Office of the Secretary is issuing public notice of its intent to amend an existing Privacy Act system of records notice, Interior, DOI—30, ‘‘Enterprise Access Control Service (EACS),’’ to implement Homeland Security Presidential Directive 12 (HSPD–12). HSPD–12 requires federal agencies to use a common identification credential for both logical and physical access to federally controlled facilities and information systems. Accordingly, the National Business Center, within the Office of the Secretary of the Department of the Interior, is planning to link, via Web services, its enterprise information technology directory, the Enterprise Access Control Service (EACS), with the identity management system (operated by the National Business Center) which automates the process of issuing HSPD–12 compliant credentials to all Departmental employees, contractors, volunteers and other individuals who require regular, ongoing access to agency facilities, systems and networks, based on sound criteria to verify an individual’s identity, that are strongly resistant to fraud, tampering, counterfeiting, and terrorist exploitation, and that provide for rapid, electronic authentification of personal identity, by a provider whose reliability has been established through an official accreditation process. For this reason, it is renaming and renumbering Interior, DOI–30, ‘‘Enterprise Access Control Service (EACS)’’ as Interior, DOI–47: ‘‘HSPD–12: Logical Security Files (Enterprise Access Control Service/EACS).’’ DATES: Effective Date: 5 U.S.C. 552a(e)(11) requires that the public be provided a 30-day period in which to comment on the agency’s intended use of the information in the system of records. The Office of Management and Budget, in its Circular A–130, requires an additional 10-day period (for a total of 40 days) in which to make these comments. Any persons interested in commenting on this proposed amendment may do so by submitting comments in writing to the Office of the PO 00000 Frm 00070 Fmt 4703 Sfmt 4703 Secretary Privacy Act Officer, Sue Ellen Sloca, U.S. Department of the Interior, MS–120 SIB, 1951 Constitution Avenue, NW., Washington, DC 20240, or by email to Sue_Ellen_Sloca@nbc.gov. Comments received within 40 days of publication in the Federal Register will be considered. The system will be effective as proposed at the end of the comment period unless comments are received which would require a contrary determination. The Department will publish a revised notice if changes are made based upon a review of comments received. FOR FURTHER INFORMATION CONTACT: Richard A. Delph, Office of the Chief Information Officer, Office of the Secretary, Department of the Interior, 625 Herndon Parkway, Herndon, VA 20170 or by e-mail to Richard_Delph@ios.doi.gov. In this notice, the Department of the Interior is amending Interior, DOI–30, ‘‘Enterprise Access Control Service (EACS),’’ to implement HSPD–12, and is renaming and renumbering it as Interior, DOI–47: ‘‘HSPD–12: Logical Security Files (Enterprise Access Control Service/ EACS).’’ In the process, it is expanding the categories of individuals covered by the system to include all individuals authorized to access DOI systems and networks, e.g., volunteers and other individuals who require regular, ongoing access to Departmental information systems and networks, individuals who have been issued HSPD–12 compliant credentials from other Federal agencies who require access to Departmental information systems and networks, etc. Accordingly, the Department of the Interior proposes to amend the system notice for Interior, DOI–30, ‘‘Enterprise Access Control Service (EACS)’’ in its entirety to read as follows: SUPPLEMENTARY INFORMATION: Dated: March 7, 2007. Sue Ellen Sloca, Office of the Secretary Privacy Act Officer. INTERIOR/DOI–47 SYSTEM NAME: HSPD–12: Logical Security Files (Enterprise Access Control Service/ EACS)—Interior, DOI–47 SYSTEM LOCATION: (1) Data covered by this system are maintained at two primary master sites at the following locations under the Department of the Interior (DOI), Office of the Secretary, Office of the Chief Information Officer, at: (a) The Enterprise Hosting Center, Reston, VA, and E:\FR\FM\12MRN1.SGM 12MRN1 Federal Register / Vol. 72, No. 47 / Monday, March 12, 2007 / Notices (b) The Enterprise Hosting Center, Denver, CO. (2) DOI bureau and office replicas of the master database of the EACS are located at strategic Departmental locations. CATEGORIES OF INDIVIDUALS COVERED BY THE SYSTEM: (1) Individuals who require access to Departmental networks, information systems, and e-mail services, including Departmental employees, contractors, students, interns, volunteers, etc. Note: All of these individuals are required to have HSPD–12 compliant credentials issued from the National Business Center, within the Office of the Secretary of the Department of the Interior, if they are employed by DOI for more than 180 days. (2) Individuals who have been issued HSPD–12 compliant credentials from other Federal agencies who require access to Departmental networks, information systems and e-mail services. CATEGORIES OF RECORDS IN THE SYSTEM: The following information may be retained in EACS: User full legal name, system login name, work e-mail address, web home page address, work address, work phone number, other contact information, user access and permission rights, password hash values, HSPD–12 authentication, digital signature, encryption, and/or other NIST specified certificates, along with the date and time of signature retained on the signed document, and supervisor’s name. Note: This list is not intended to be a full list of all information currently stored in the EACS. AUTHORITY FOR MAINTENANCE OF THE SYSTEM: 5 U.S.C. 301; the Paperwork Reduction Act of 1995 (44 U.S.C. 3501); the Government Paperwork Elimination Act (Pub. L. 105–277, 44 U.S.C. 3504); and Homeland Security Presidential Directive 12, Policy for a Common Identification Standard for Federal Employees and Contractors, August 27, 2004. ROUTINE USES OF RECORDS MAINTAINED IN THE SYSTEM INCLUDING CATEGORIES OF USERS AND THE PURPOSES OF SUCH USES: pwalker on PROD1PC71 with NOTICES THE PRIMARY PURPOSES OF THE SYSTEM ARE: (1) To provide a common authoritative directory service for the purpose of ensuring the security of DOI computer networks, resources and information and protecting them from unauthorized access, tampering or destruction; (2) To authenticate and verify that all persons accessing DOI computer VerDate Aug<31>2005 19:36 Mar 09, 2007 Jkt 211001 networks, resources and information are properly authorized to access them; (3) To ensure that persons signing official digital documents are indeed the persons represented and to provide for non-repudiation of the use of an electronic signature; and (4) To enable an individual to encrypt and decrypt documents for secure transmission. Note: This system interfaces with the Department’s identify management system and personnel security files, covered by Interior/DOI–45, ‘‘HSPD–12: Identity Management System and Personnel Security Files.’’ DISCLOSURES OUTSIDE THE DEPARTMENT OF THE INTERIOR MAY BE MADE: (1) To an expert, consultant, or contractor (including employees of the contractor) of DOI that performs, on DOI’s behalf, services requiring access to these records. (2) To the Federal Protective Service and appropriate Federal, State, local or foreign agencies responsible for investigating emergency response situations or investigating or prosecuting the violation of or for enforcing or implementing a statute, rule, regulation, order or license, when DOI becomes aware of a violation or potential violation of a statute, rule, regulation, order or license. (3) (a) To any of the following entities or individuals, when the circumstances set forth in paragraph (b) are met: (i) The U.S. Department of Justice (DOJ); (ii) A court or an adjudicative or other administrative body; (iii) A party in litigation before a court or an adjudicative or other administrative body; or (iv) Any DOI employee acting in his or her individual capacity if DOI or DOJ has agreed to represent that employee or pay for private representation of the employee; (b) When: (i) One of the following is a party to the proceeding or has an interest in the proceeding: (A) DOI or any component of DOI; (B) Any other Federal agency appearing before the Office of Hearings and Appeals; (C) Any DOI employee acting in his or her official capacity; (D) Any DOI employee acting in his or her individual capacity if DOI or DOJ has agreed to represent that employee or pay for private representation of the employee; (E) The United States, when DOJ determines that DOI is likely to be affected by the proceeding; and (ii) DOI deems the disclosure to be: PO 00000 Frm 00071 Fmt 4703 Sfmt 4703 11041 (A) Relevant and necessary to the proceeding; and (B) Compatible with the purpose for which the records were compiled. (4) To a congressional office in response to a written inquiry that an individual covered by the system, or the heir of such individual if the covered individual is deceased, has made to the congressional office about the individual. (5) To an official of another Federal agency to provide information needed in the performance of official duties related to reconciling or reconstructing data files, in support of the functions for which the records were collected and maintained. (6) To representatives of the General Services Administration or the National Archives and Records Administration to conduct records management inspections under the authority of 44 U.S.C. 2903 and 2904. (7) To appropriate agencies, entities, and persons when: (a) It is suspected or confirmed that the security or confidentiality of information in the system of records has been compromised; and (b) The Department has determined that as a result of the suspected or confirmed compromise there is a risk of harm to economic or property interest, identity theft or fraud, or harm to the security or integrity of this system or other systems or programs (whether maintained by the Department or another agency or entity) that rely upon the compromised information; and (c) The disclosure is made to such agencies, entities and persons who are reasonably necessary to assist in connection with the Department’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm. POLICIES AND PRACTICES FOR STORING, RETRIEVING, ACCESSING, RETAINING, AND DISPOSING OF RECORDS IN THE SYSTEM: STORAGE: Records are stored in electronic media on hard disks and magnetic tapes. RETRIEVABILITY: Records are retrievable from EACS by any defined field within the record. These fields include, but are not limited to: user name, full legal name, digital certificate, and Web home address or email address. SAFEGUARDS: The computer systems in which records are stored are located in computer facilities that are secured by alarm systems and off-master key access. EACS access granted to E:\FR\FM\12MRN1.SGM 12MRN1 11042 Federal Register / Vol. 72, No. 47 / Monday, March 12, 2007 / Notices individuals is password-protected. In the event that EACS is used to validate a user’s authentication certificate against existing data within the system, access to the user’s authentication certificate will require the use of a Personal Identification Number (PIN) known only to the user. Each person granted access to the system must be individually authorized to use the system. A Privacy Act Warning Notice will appear on the monitor screen when first displayed. Backup tapes are transported in a locked container under armed guard escort and are stored in a locked and controlled room in a secure, off-site location. A Privacy Impact Assessment was completed to ensure that Privacy Act requirements and personally identifiable information safeguard requirements are met. RETENTION AND DISPOSAL: Records relating to persons covered by this system are retained in accordance with a separate records schedule, identified as item 6600 of the Office of the Secretary Consolidated Subject-Function Code Records Disposition Schedule currently under development. pwalker on PROD1PC71 with NOTICES SYSTEM MANAGER(S) AND ADDRESS: (1) EACS Manager, Office of the Chief Information Officer, Office of the Secretary, Department of the Interior, 625 Herndon Parkway, Herndon, VA 20170. (2) Bureau Security Managers: a. Bureau of Indian Affairs: Director, Office of Information Technology Security & Privacy, Office of the Chief Information Officer—Indian Affairs, 625 Herndon Parkway, Herndon, VA 20170. b. Bureau of Indian Education: Director, Office of Information Technology Security & Privacy, Office of the Chief Information Officer—Indian Affairs, 625 Herndon Parkway, Herndon, VA 20170. c. Bureau of Land Management: Division Chief, IT Security, Bureau of Land Management, Information Resources Management, 1849 C St., NW., Mail Stop 700LS, Washington, DC 20240. d. Bureau of Reclamation: Deputy Chief Information Officer, Bureau of Reclamation, P.O. Box 25007, Denver, CO 80225. e. Minerals Management Service: IT Specialist, Minerals Management Service, 381 Elden Street, Mail Stop 2200, Herndon, VA 20170. f. National Park Service: Security Program Manager, National Park Service, 1201 Eye Street, NW., Washington, DC 20005. g. Office of Surface Mining, Reclamation and Enforcement: Logical VerDate Aug<31>2005 18:04 Mar 09, 2007 Jkt 211001 Security Officer, Office of Surface Mining, Reclamation and Enforcement, 1951 Constitution Ave., NW., Mail Stop 344 SIB, Washington, DC 20240. h. Office of the Inspector General: Logical Security Manager, U.S. Geological Survey, 12030 Sunrise Valley Drive, Suite 230, Reston, VA 20191. i. Office of the Secretary/National Business Center: Logical Security Manager, National Business Center, 7301 W. Mansfield Ave., D 2130, Denver, CO 80235. j. Office of the Solicitor: Chief Information Officer, Division of Administration, Office of the Solicitor, 1849 C St., NW., Mail Stop 6556 MIB, Washington, DC 20240. k. U.S. Fish and Wildlife Service: AD IRTM, U.S. Fish and Wildlife Service, 4401 N. Fairfax Dr., 3rd Fl., Arlington, VA 22203. l. U.S. Geological Survey: Bureau Chief Technology Officer, U.S. Geological Survey, 8987 Yellow Brick Road, Baltimore, MD 21237. NOTIFICATION PROCEDURE: An individual requesting notification of the existence of records on himself or herself should address his/her request to the appropriate Bureau Security Manager identified in (2), above. The request must be in writing and signed by the requester. It must include the requester’s full name, bureau and office affiliation, and work address. (See 43 CFR 2.60.) RECORD ACCESS PROCEDURE: An individual requesting access to records on himself or herself should address his/her request to the appropriate Bureau Security Manager identified in (2), above. The request must be in writing and signed by the requester. It must include the requester’s full name, bureau and office affiliation, and work address. (See 43 CFR 2.63.) CONTESTING RECORDS PROCEDURE: An individual requesting amendment of records on himself or herself should address his/her request to the appropriate Bureau Security Manager identified in (2), above. The request must be in writing and signed by the requester. It must include the requester’s full name, bureau and office affiliation, and work address. (See 43 CFR 2.71.) RECORD SOURCE CATEGORIES: Information is obtained from individuals covered by the system, supervisors, and designated approving officials, certificate issuing authorities, and network systems officials, as well as PO 00000 Frm 00072 Fmt 4703 Sfmt 4703 the National Business Center’s identity management system (covered by Interior, DOI–45: ‘‘HSPD–12: Identity Management System and Personnel Security Files).’’ EXEMPTIONS CLAIMED FOR THE SYSTEM: None. [FR Doc. E7–4408 Filed 3–9–07; 8:45 am] BILLING CODE 4310–RK–P DEPARTMENT OF THE INTERIOR Office of the Secretary Privacy Act of 1974; as Amended; Deletion of an Existing System of Records Office of the Secretary, Department of the Interior. ACTION: Proposed deletion of an existing system of records. AGENCY: SUMMARY: In accordance with the Privacy Act of 1974 (5 U.S.C. 552a), the Office of the Secretary of the Department of the Interior is issuing public notice of its intent to delete an existing Privacy Act system of records notice, Interior, DOI–15, ‘‘Authenticated Computer Access and Signature System.’’ It was previously published in the Federal Register on January 5, 2005 (70 FR 1262). Records covered by this notice are being incorporated into an amendment of Interior, OS–45, ‘‘Security Clearance Files and Other Reference Files,’’ which is being updated to implement Homeland Security Presidential Directive 12 (HSPD–12), and is being renamed and renumbered as Interior, DOI–45, ‘‘HSPD–12: Identity Management System and Personnel Security Files.’’ HSPD–12 requires Federal agencies to use a common identification credential for both logical and physical access to federally controlled facilities and information systems. DATES: Effective Date: 5 U.S.C. 552a(e)(11) requires that the public be provided a 30-day period in which to comment on the agency’s intended use of the information in the system of records. The Office of Management and Budget, in its Circular A–130, requires an additional 10-day period (for a total of 40 days) in which to make these comments. Because records covered by this notice are still being collected and maintained by the Department of the Interior, this deletion notice will be effective at the end of the comment period for Interior, DOI–45, HSPD–12: ‘‘Identity Management System and Personnel Security Files,’’ which is being published concurrently with this deletion notice, unless comments are E:\FR\FM\12MRN1.SGM 12MRN1

Agencies

[Federal Register Volume 72, Number 47 (Monday, March 12, 2007)]
[Notices]
[Pages 11040-11042]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: E7-4408]


-----------------------------------------------------------------------

DEPARTMENT OF THE INTERIOR

Office of the Secretary


Privacy Act of 1974, as Amended; Amendment of an Existing System 
of Records

AGENCY: Office of the Secretary, Department of the Interior.

ACTION: Proposed amendment of an existing system of records.

-----------------------------------------------------------------------

SUMMARY: In accordance with the Privacy Act of 1974 (5 U.S.C. 552a), 
the Office of the Secretary is issuing public notice of its intent to 
amend an existing Privacy Act system of records notice, Interior, DOI--
30, ``Enterprise Access Control Service (EACS),'' to implement Homeland 
Security Presidential Directive 12 (HSPD-12). HSPD-12 requires federal 
agencies to use a common identification credential for both logical and 
physical access to federally controlled facilities and information 
systems. Accordingly, the National Business Center, within the Office 
of the Secretary of the Department of the Interior, is planning to 
link, via Web services, its enterprise information technology 
directory, the Enterprise Access Control Service (EACS), with the 
identity management system (operated by the National Business Center) 
which automates the process of issuing HSPD-12 compliant credentials to 
all Departmental employees, contractors, volunteers and other 
individuals who require regular, ongoing access to agency facilities, 
systems and networks, based on sound criteria to verify an individual's 
identity, that are strongly resistant to fraud, tampering, 
counterfeiting, and terrorist exploitation, and that provide for rapid, 
electronic authentification of personal identity, by a provider whose 
reliability has been established through an official accreditation 
process. For this reason, it is renaming and renumbering Interior, DOI-
30, ``Enterprise Access Control Service (EACS)'' as Interior, DOI-47: 
``HSPD-12: Logical Security Files (Enterprise Access Control Service/
EACS).''

DATES: Effective Date: 5 U.S.C. 552a(e)(11) requires that the public be 
provided a 30-day period in which to comment on the agency's intended 
use of the information in the system of records. The Office of 
Management and Budget, in its Circular A-130, requires an additional 
10-day period (for a total of 40 days) in which to make these comments. 
Any persons interested in commenting on this proposed amendment may do 
so by submitting comments in writing to the Office of the Secretary 
Privacy Act Officer, Sue Ellen Sloca, U.S. Department of the Interior, 
MS-120 SIB, 1951 Constitution Avenue, NW., Washington, DC 20240, or by 
e-mail to Sue--Ellen--Sloca@nbc.gov. Comments received within 40 days 
of publication in the Federal Register will be considered. The system 
will be effective as proposed at the end of the comment period unless 
comments are received which would require a contrary determination. The 
Department will publish a revised notice if changes are made based upon 
a review of comments received.

FOR FURTHER INFORMATION CONTACT: Richard A. Delph, Office of the Chief 
Information Officer, Office of the Secretary, Department of the 
Interior, 625 Herndon Parkway, Herndon, VA 20170 or by e-mail to 
Richard--Delph@ios.doi.gov.

SUPPLEMENTARY INFORMATION: In this notice, the Department of the 
Interior is amending Interior, DOI-30, ``Enterprise Access Control 
Service (EACS),'' to implement HSPD-12, and is renaming and renumbering 
it as Interior, DOI-47: ``HSPD-12: Logical Security Files (Enterprise 
Access Control Service/EACS).'' In the process, it is expanding the 
categories of individuals covered by the system to include all 
individuals authorized to access DOI systems and networks, e.g., 
volunteers and other individuals who require regular, ongoing access to 
Departmental information systems and networks, individuals who have 
been issued HSPD-12 compliant credentials from other Federal agencies 
who require access to Departmental information systems and networks, 
etc.
    Accordingly, the Department of the Interior proposes to amend the 
system notice for Interior, DOI-30, ``Enterprise Access Control Service 
(EACS)'' in its entirety to read as follows:

    Dated: March 7, 2007.
Sue Ellen Sloca,
Office of the Secretary Privacy Act Officer.
INTERIOR/DOI-47

SYSTEM NAME:
    HSPD-12: Logical Security Files (Enterprise Access Control Service/
EACS)--Interior, DOI-47

SYSTEM LOCATION:
    (1) Data covered by this system are maintained at two primary 
master sites at the following locations under the Department of the 
Interior (DOI), Office of the Secretary, Office of the Chief 
Information Officer, at:
    (a) The Enterprise Hosting Center, Reston, VA, and

[[Page 11041]]

    (b) The Enterprise Hosting Center, Denver, CO.
    (2) DOI bureau and office replicas of the master database of the 
EACS are located at strategic Departmental locations.

CATEGORIES OF INDIVIDUALS COVERED BY THE SYSTEM:
    (1) Individuals who require access to Departmental networks, 
information systems, and e-mail services, including Departmental 
employees, contractors, students, interns, volunteers, etc.


    Note: All of these individuals are required to have HSPD-12 
compliant credentials issued from the National Business Center, 
within the Office of the Secretary of the Department of the 
Interior, if they are employed by DOI for more than 180 days.

    (2) Individuals who have been issued HSPD-12 compliant credentials 
from other Federal agencies who require access to Departmental 
networks, information systems and e-mail services.

CATEGORIES OF RECORDS IN THE SYSTEM:
    The following information may be retained in EACS: User full legal 
name, system login name, work e-mail address, web home page address, 
work address, work phone number, other contact information, user access 
and permission rights, password hash values, HSPD-12 authentication, 
digital signature, encryption, and/or other NIST specified 
certificates, along with the date and time of signature retained on the 
signed document, and supervisor's name.

    Note: This list is not intended to be a full list of all 
information currently stored in the EACS.

Authority for maintenance of the system:
    5 U.S.C. 301; the Paperwork Reduction Act of 1995 (44 U.S.C. 3501); 
the Government Paperwork Elimination Act (Pub. L. 105-277, 44 U.S.C. 
3504); and Homeland Security Presidential Directive 12, Policy for a 
Common Identification Standard for Federal Employees and Contractors, 
August 27, 2004.

Routine uses of records maintained in the system including categories 
of users and the purposes of such uses:
The primary purposes of the system are:
    (1) To provide a common authoritative directory service for the 
purpose of ensuring the security of DOI computer networks, resources 
and information and protecting them from unauthorized access, tampering 
or destruction;
    (2) To authenticate and verify that all persons accessing DOI 
computer networks, resources and information are properly authorized to 
access them;
    (3) To ensure that persons signing official digital documents are 
indeed the persons represented and to provide for non-repudiation of 
the use of an electronic signature; and
    (4) To enable an individual to encrypt and decrypt documents for 
secure transmission.

    Note: This system interfaces with the Department's identify 
management system and personnel security files, covered by Interior/
DOI-45, ``HSPD-12: Identity Management System and Personnel Security 
Files.''

Disclosures outside the Department of the Interior may be made:
    (1) To an expert, consultant, or contractor (including employees of 
the contractor) of DOI that performs, on DOI's behalf, services 
requiring access to these records.
    (2) To the Federal Protective Service and appropriate Federal, 
State, local or foreign agencies responsible for investigating 
emergency response situations or investigating or prosecuting the 
violation of or for enforcing or implementing a statute, rule, 
regulation, order or license, when DOI becomes aware of a violation or 
potential violation of a statute, rule, regulation, order or license.
    (3) (a) To any of the following entities or individuals, when the 
circumstances set forth in paragraph (b) are met:
    (i) The U.S. Department of Justice (DOJ);
    (ii) A court or an adjudicative or other administrative body;
    (iii) A party in litigation before a court or an adjudicative or 
other administrative body; or
    (iv) Any DOI employee acting in his or her individual capacity if 
DOI or DOJ has agreed to represent that employee or pay for private 
representation of the employee;
    (b) When:
    (i) One of the following is a party to the proceeding or has an 
interest in the proceeding:
    (A) DOI or any component of DOI;
    (B) Any other Federal agency appearing before the Office of 
Hearings and Appeals;
    (C) Any DOI employee acting in his or her official capacity;
    (D) Any DOI employee acting in his or her individual capacity if 
DOI or DOJ has agreed to represent that employee or pay for private 
representation of the employee;
    (E) The United States, when DOJ determines that DOI is likely to be 
affected by the proceeding; and
    (ii) DOI deems the disclosure to be:
    (A) Relevant and necessary to the proceeding; and
    (B) Compatible with the purpose for which the records were 
compiled.
    (4) To a congressional office in response to a written inquiry that 
an individual covered by the system, or the heir of such individual if 
the covered individual is deceased, has made to the congressional 
office about the individual.
    (5) To an official of another Federal agency to provide information 
needed in the performance of official duties related to reconciling or 
reconstructing data files, in support of the functions for which the 
records were collected and maintained.
    (6) To representatives of the General Services Administration or 
the National Archives and Records Administration to conduct records 
management inspections under the authority of 44 U.S.C. 2903 and 2904.
    (7) To appropriate agencies, entities, and persons when:
    (a) It is suspected or confirmed that the security or 
confidentiality of information in the system of records has been 
compromised; and
    (b) The Department has determined that as a result of the suspected 
or confirmed compromise there is a risk of harm to economic or property 
interest, identity theft or fraud, or harm to the security or integrity 
of this system or other systems or programs (whether maintained by the 
Department or another agency or entity) that rely upon the compromised 
information; and
    (c) The disclosure is made to such agencies, entities and persons 
who are reasonably necessary to assist in connection with the 
Department's efforts to respond to the suspected or confirmed 
compromise and prevent, minimize, or remedy such harm.

POLICIES AND PRACTICES FOR STORING, RETRIEVING, ACCESSING, RETAINING, 
AND DISPOSING OF RECORDS IN THE SYSTEM:
STORAGE:
    Records are stored in electronic media on hard disks and magnetic 
tapes.

RETRIEVABILITY:
    Records are retrievable from EACS by any defined field within the 
record. These fields include, but are not limited to: user name, full 
legal name, digital certificate, and Web home address or e-mail 
address.

SAFEGUARDS:
    The computer systems in which records are stored are located in 
computer facilities that are secured by alarm systems and off-master 
key access. EACS access granted to

[[Page 11042]]

individuals is password-protected. In the event that EACS is used to 
validate a user's authentication certificate against existing data 
within the system, access to the user's authentication certificate will 
require the use of a Personal Identification Number (PIN) known only to 
the user. Each person granted access to the system must be individually 
authorized to use the system. A Privacy Act Warning Notice will appear 
on the monitor screen when first displayed. Backup tapes are 
transported in a locked container under armed guard escort and are 
stored in a locked and controlled room in a secure, off-site location. 
A Privacy Impact Assessment was completed to ensure that Privacy Act 
requirements and personally identifiable information safeguard 
requirements are met.

RETENTION AND DISPOSAL:
    Records relating to persons covered by this system are retained in 
accordance with a separate records schedule, identified as item 6600 of 
the Office of the Secretary Consolidated Subject-Function Code Records 
Disposition Schedule currently under development.

SYSTEM MANAGER(S) AND ADDRESS:
    (1) EACS Manager, Office of the Chief Information Officer, Office 
of the Secretary, Department of the Interior, 625 Herndon Parkway, 
Herndon, VA 20170.
    (2) Bureau Security Managers:
    a. Bureau of Indian Affairs: Director, Office of Information 
Technology Security & Privacy, Office of the Chief Information 
Officer--Indian Affairs, 625 Herndon Parkway, Herndon, VA 20170.
    b. Bureau of Indian Education: Director, Office of Information 
Technology Security & Privacy, Office of the Chief Information 
Officer--Indian Affairs, 625 Herndon Parkway, Herndon, VA 20170.
    c. Bureau of Land Management: Division Chief, IT Security, Bureau 
of Land Management, Information Resources Management, 1849 C St., NW., 
Mail Stop 700LS, Washington, DC 20240.
    d. Bureau of Reclamation: Deputy Chief Information Officer, Bureau 
of Reclamation, P.O. Box 25007, Denver, CO 80225.
    e. Minerals Management Service: IT Specialist, Minerals Management 
Service, 381 Elden Street, Mail Stop 2200, Herndon, VA 20170.
     f. National Park Service: Security Program Manager, National Park 
Service, 1201 Eye Street, NW., Washington, DC 20005.
    g. Office of Surface Mining, Reclamation and Enforcement: Logical 
Security Officer, Office of Surface Mining, Reclamation and 
Enforcement, 1951 Constitution Ave., NW., Mail Stop 344 SIB, 
Washington, DC 20240.
    h. Office of the Inspector General: Logical Security Manager, U.S. 
Geological Survey, 12030 Sunrise Valley Drive, Suite 230, Reston, VA 
20191.
    i. Office of the Secretary/National Business Center: Logical 
Security Manager, National Business Center, 7301 W. Mansfield Ave., D 
2130, Denver, CO 80235.
     j. Office of the Solicitor: Chief Information Officer, Division of 
Administration, Office of the Solicitor, 1849 C St., NW., Mail Stop 
6556 MIB, Washington, DC 20240.
    k. U.S. Fish and Wildlife Service: AD IRTM, U.S. Fish and Wildlife 
Service, 4401 N. Fairfax Dr., 3rd Fl., Arlington, VA 22203.
    l. U.S. Geological Survey: Bureau Chief Technology Officer, U.S. 
Geological Survey, 8987 Yellow Brick Road, Baltimore, MD 21237.

NOTIFICATION PROCEDURE:
    An individual requesting notification of the existence of records 
on himself or herself should address his/her request to the appropriate 
Bureau Security Manager identified in (2), above. The request must be 
in writing and signed by the requester. It must include the requester's 
full name, bureau and office affiliation, and work address. (See 43 CFR 
2.60.)

RECORD ACCESS PROCEDURE:
    An individual requesting access to records on himself or herself 
should address his/her request to the appropriate Bureau Security 
Manager identified in (2), above. The request must be in writing and 
signed by the requester. It must include the requester's full name, 
bureau and office affiliation, and work address. (See 43 CFR 2.63.)

CONTESTING RECORDS PROCEDURE:
    An individual requesting amendment of records on himself or herself 
should address his/her request to the appropriate Bureau Security 
Manager identified in (2), above. The request must be in writing and 
signed by the requester. It must include the requester's full name, 
bureau and office affiliation, and work address. (See 43 CFR 2.71.)

RECORD SOURCE CATEGORIES:
    Information is obtained from individuals covered by the system, 
supervisors, and designated approving officials, certificate issuing 
authorities, and network systems officials, as well as the National 
Business Center's identity management system (covered by Interior, DOI-
45: ``HSPD-12: Identity Management System and Personnel Security 
Files).''

EXEMPTIONS CLAIMED FOR THE SYSTEM:
    None.
[FR Doc. E7-4408 Filed 3-9-07; 8:45 am]
BILLING CODE 4310-RK-P
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.