Privacy Act of 1974, as Amended; Amendment of an Existing System of Records, 11043-11046 [E7-4414]
Download as PDF
Federal Register / Vol. 72, No. 47 / Monday, March 12, 2007 / Notices
received which would require a
`
contrary determination vis-a-vis
Interior, DOI–45. Should the
Department receive comments that
require that it republish Interior, DOI–
45, this deletion notice will be effective
on the date on which the revised notice
for Interior, DOI–45 becomes effective.
FOR FURTHER INFORMATION CONTACT: Sue
Ellen Sloca, Office of the Secretary
Privacy Act Officer, 1951 Constitution
Avenue, NW., MS–120 SIB,
Washington, DC 20240, at 202–208–
6045, or by e-mail to
sue_ellen_sloca@nbc.gov.
Signed: March 7, 2007.
Sue Ellen Sloca,
Office of the Secretary Privacy Act Officer.
[FR Doc. E7–4413 Filed 3–9–07; 8:45 am]
BILLING CODE 4310–RK–P
DEPARTMENT OF THE INTERIOR
Office of the Secretary
Privacy Act of 1974, as Amended;
Amendment of an Existing System of
Records
Office of the Secretary,
Department of the Interior.
ACTION: Proposed amendment of an
existing system of records.
pwalker on PROD1PC71 with NOTICES
AGENCY:
SUMMARY: In accordance with the
Privacy Act of 1974 (5 U.S.C. 552a), the
Office of the Secretary is issuing public
notice of its intent to amend an existing
Privacy Act system of records notice,
Interior, OS–01, ‘‘Computerized ID
Security System,’’ to implement
Homeland Security Presidential
Directive 12 (HSPD–12) and to clarify its
interpretation of 5 U.S.C. 6106. HSPD–
12 requires federal agencies to use a
common identification credential for
both logical and physical access to
federally controlled facilities and
information systems. Accordingly, the
National Business Center, within the
Office of the Secretary of the
Department of the Interior, is integrating
its computerized smart-card physical
security system with the identity
management system which automates
the process of issuing credentials to all
Departmental employees, contractors,
volunteers and other individuals who
require regular, ongoing access to
agency facilities, systems and networks
based on sound criteria to verify an
individual’s identity, that are strongly
resistant to fraud, tampering,
counterfeiting, and terrorist
exploitation, and that provide for rapid,
electronic authentification of personal
identity, by a provider whose reliability
has been established through an official
VerDate Aug<31>2005
18:04 Mar 09, 2007
Jkt 211001
accreditation process. It is also
expanding the coverage of this system to
include all locations, Departmentwide,
both Federal buildings and Federallyleased space, where paper-based
physical security logs and registers have
been established, in addition to or in
place of smart-card access control
systems. For this reason, it is renaming
and renumbering this Privacy Act
system notice as Interior, DOI–46:
‘‘HSPD–12: Physical Security Files.’’
DATES: Effective Date: 5 U.S.C.
552a(e)(11) requires that the public be
provided a 30-day period in which to
comment on the agency’s intended use
of the information in the system of
records. The Office of Management and
Budget, in its Circular A–130, requires
an additional 10-day period (for a total
of 40 days) in which to make these
comments. Any persons interested in
commenting on this proposed
amendment may do so by submitting
comments in writing to the Office of the
Secretary Privacy Act Officer, Sue Ellen
Sloca, U.S. Department of the Interior,
MS–120 SIB, 1951 Constitution Avenue,
NW., Washington, DC 20240, or by email to Sue_Ellen_Sloca@nbc.gov.
Comments received within 40 days of
publication in the Federal Register will
be considered. The system will be
effective as proposed at the end of the
comment period unless comments are
received which would require a
contrary determination. The Department
will publish a revised notice if changes
are made based upon a review of
comments received.
FOR FURTHER INFORMATION CONTACT:
David VanderWeele, Security Specialist,
NBC Security Services, MS–1229 MIB,
1849 C St., NW., Washington, DC 20240,
or by e-mail to
David_A_Vanderweele@nbc.gov.
In this
notice, the Department of the Interior
(DOI) is amending Interior, OS–01,
‘‘Computerized ID Security System’’ to
implement HSPD–12, and is renaming
and renumbering it as Interior, DOI–46:
‘‘HSPD–12: Physical Security Files.’’ In
the process, it is expanding the
categories of individuals covered by the
system to include all individuals who
have access to DOI facilities, and the
categories of records covered by the
system notice to include additional
personal identity verification (PIV) data
such as fingerprints. It is also clarifying
its interpretation of 5 U.S.C. 6106 by
deleting the note that follows the list of
the routine uses of the records
maintained in the system. This note
concerned disclosures within DOI of
data pertaining to the date and time of
SUPPLEMENTARY INFORMATION:
PO 00000
Frm 00073
Fmt 4703
Sfmt 4703
11043
entry and exit of an agency employee
working in the District of Columbia.
Accordingly, the Department of the
Interior proposes to amend the system
notice for Interior, OS–01,
‘‘Computerized ID Security System’’ in
its entirety to read as follows:
Dated: March 7, 2007.
Sue Ellen Sloca,
Office of the Secretary Privacy Act Officer.
INTERIOR/DOI–46
SYSTEM NAME:
HSPD–12: Physical Security Files—
Interior, DOI–46.
SYSTEM LOCATION:
(1) Data covered by this system are
maintained at the following main
locations:
(a) U.S. Department of the Interior,
Office of the Secretary, National
Business Center, Computer Center, 1849
C Street, NW., Washington, DC 20240;
and
(b) U.S. Department of the Interior,
Office of the Secretary, National
Business Center, 7301 W. Mansfield
Ave., MS D–2130, Denver, CO 80235–
2300.
(2) Portions of the data covered by
this system are also maintained at other
Department of the Interior locations,
both Federal buildings and Federallyleased space, where staffed guard
stations have been established in
facilities that have installed a smart card
ID system, and/or paper-based physical
security logs and registers, as well as the
physical security office(s) of those
locations. A list of these locations (as
applicable to each bureau) is maintained
by each bureau’s Security Manager,
whose address is provided under item
(2) in System Manager and Address,
below.
CATEGORIES OF INDIVIDUALS COVERED BY THE
SYSTEM:
(1) Individuals who require regular,
ongoing access to Departmental
facilities, including Departmental
employees, contractors, students,
interns, volunteers, affiliates, and
individuals formerly in any of these
positions. The system also includes
individuals authorized to perform or use
services provided in Departmental
facilities (e.g., Credit Union, Fitness
Center, etc.) NOTE: All of these
individuals are required to have HSPD–
12 compliant credentials issued from
the National Business Center, within the
Office of the Secretary of the
Department of the Interior, if they are
employed by DOI for more than 180
days.
(2) Individuals who have been issued
HSPD–12 compliant credentials from
E:\FR\FM\12MRN1.SGM
12MRN1
11044
Federal Register / Vol. 72, No. 47 / Monday, March 12, 2007 / Notices
other Federal agencies who require
access to Departmental facilities.
(3) Visitors and other individuals who
require infrequent access to Department
facilities including services provided in
Departmental facilities (e.g.,
Departmental Museum, Indian Arts and
Crafts Shop, etc.)
CATEGORIES OF RECORDS IN THE SYSTEM:
(1) Records maintained on individuals
issued HSPD–12 compliant credentials
by the Department and by other Federal
agencies include the following data
fields: full name, Social Security
Number; date of birth; signature; image
(photograph); fingerprints; hair color;
eye color; height; weight; home address;
work address; e-mail address; agency
affiliation (i.e., employee, contractor,
volunteer, etc.); telephone number;
personal identity verification (PIV) card
issue and expiration dates; personal
identification number (PIN); results of
background investigation; PIV request
form; PIV registrar approval signature;
PIV card serial number; emergency
responder designation; copies of ‘‘I–9’’
documents (e.g., driver’s license,
passport, birth certificate, etc.) used to
verify identification or information
derived from those documents such as
document title, document issuing
authority, document number, or
document expiration date; level of
national security clearance and
expiration date; computer system user
name; user access and permission
rights, authentication certificates; and
digital signature information.
(2) Records maintained on visitors
and other individuals who require
infrequent access to Department
facilities include the following data
fields: Full name, signature; image
(photograph), Social Security Number
(or one of the following: Driver’s
License number, ‘‘Green Card’’ number,
Visa number, or other ID number),
images of relevant ID document(s), U.S.
Citizenship (yes or no/logical data
field), date of entry, time of entry,
location of entry, time of exit, location
of exit, purpose for entry, agency point
of contact, company name, security
access category, and access status.
pwalker on PROD1PC71 with NOTICES
AUTHORITY FOR MAINTENANCE OF THE SYSTEM:
5 U.S.C. 301; Federal Information
Security Act (Pub. L. 104–106, sec.
5113); Electronic Government Act (Pub.
L. 104–347, sec. 203); the Paperwork
Reduction Act of 1995 (44 U.S.C. 3501);
the Government Paperwork Elimination
Act (Pub. L. 105–277, 44 U.S.C. 3504);
Homeland Security Presidential
Directive 12, Policy for a Common
Identification Standard for Federal
Employees and Contractors, August 27,
VerDate Aug<31>2005
18:04 Mar 09, 2007
Jkt 211001
2004; Federal Property and
Administrative Act of 1949, as
amended; 5 U.S.C. 301; and Presidential
Memorandum on Upgrading Security at
Federal Facilities, June 28, 1995.
ROUTINE USES OF RECORDS MAINTAINED IN THE
SYSTEM, INCLUDING CATEGORIES OF USERS AND
THE PURPOSES OF SUCH USES:
The primary purposes of the system
are:
(1) To ensure the safety and security
of DOI facilities and their occupants in
which the system is installed.
(2) To verify that all persons entering
DOI facilities or other Government
facilities with smart card systems are
authorized to enter them.
(3) To verify that all persons entering
DOI facilities or other Government
facilities without smart cards are
authorized to enter them.
Note: This system interfaces with the
Department’s identify management system
and personnel security files, covered by
Interior/DOI–45, ‘‘HSPD–12: Identity
Management System and Personnel Security
Files.’’
Disclosures outside the Department of
the Interior may be made:
(1) To an expert, consultant, or
contractor (including employees of the
contractor) of DOI that performs, on
DOI’s behalf, services requiring access
to these records.
(2) To the Federal Protective Service
and appropriate Federal, State, local or
foreign agencies responsible for
investigating emergency response
situations or investigating or
prosecuting the violation of or for
enforcing or implementing a statute,
rule, regulation, order or license, when
DOI becomes aware of a violation or
potential violation of a statute, rule,
regulation, order or license.
(3) To another agency with a similar
HSPD–12 (PIV/smart card) system when
a person with identification credentials
issued by the Department desires access
to that agency’s facilities.
(4) (a) To any of the following entities
or individuals, when the circumstances
set forth in paragraph (b) are met:
(i) The U.S. Department of Justice
(DOJ);
(ii) A court or an adjudicative or other
administrative body;
(iii) A party in litigation before a court
or an adjudicative or other
administrative body; or
(iv) Any DOI employee acting in his
or her individual capacity if DOI or DOJ
has agreed to represent that employee or
pay for private representation of the
employee;
(b) When:
(i) One of the following is a party to
the proceeding or has an interest in the
proceeding:
PO 00000
Frm 00074
Fmt 4703
Sfmt 4703
(A) DOI or any component of DOI;
(B) Any other Federal agency
appearing before the Office of Hearings
and Appeals;
(C) Any DOI employee acting in his or
her official capacity;
(D) Any DOI employee acting in his
or her individual capacity if DOI or DOJ
has agreed to represent that employee or
pay for private representation of the
employee;
(E) The United States, when DOJ
determines that DOI is likely to be
affected by the proceeding; and
(ii) DOI deems the disclosure to be:
(A) Relevant and necessary to the
proceeding; and
(B) Compatible with the purpose for
which the records were compiled.
(5) To a congressional office in
response to a written inquiry that an
individual covered by the system, or the
heir of such individual if the covered
individual is deceased, has made to the
congressional office about the
individual.
(6) To an official of another Federal
agency to provide information needed
in the performance of official duties
related to reconciling or reconstructing
data files, in support of the functions for
which the records were collected and
maintained.
(7) To representatives of the General
Services Administration or the National
Archives and Records Administration to
conduct records management
inspections under the authority of 44
U.S.C. 2903 and 2904.
(8) To another agency with a similar
HSPD–12 (PIV/smart card) system when
it controls access to facilities occupied
by the agency.
(9) To appropriate agencies, entities,
and persons when:
(a) It is suspected or confirmed that
the security or confidentiality of
information in the system of records has
been compromised; and
(b) The Department has determined
that as a result of the suspected or
confirmed compromise there is a risk of
harm to economic or property interest,
identity theft or fraud, or harm to the
security or integrity of this system or
other systems or programs (whether
maintained by the Department or
another agency or entity) that rely upon
the compromised information; and
(c) The disclosure is made to such
agencies, entities and persons who are
reasonably necessary to assist in
connection with the Department’s
efforts to respond to the suspected or
confirmed compromise and prevent,
minimize, or remedy such harm.
E:\FR\FM\12MRN1.SGM
12MRN1
Federal Register / Vol. 72, No. 47 / Monday, March 12, 2007 / Notices
POLICIES AND PRACTICES FOR STORING,
RETRIEVING, ACCESSING, RETAINING, AND
DISPOSING OF RECORDS IN THE SYSTEM:
STORAGE:
Records are stored in electronic media
and in paper files.
RETRIEVABILITY:
Records are retrievable by name,
Social Security Number, other ID
number, image (photograph),
fingerprint, organization/office of
assignment, agency point of contact,
company name, security access,
category, date of entry, time of entry,
location of entry, time of exit, location
of exit, ID security card issue date, ID
security card expiration date, and ID
security card serial number.
SAFEGUARDS:
Access to records covered by the
system will be permitted only to
authorized personnel in accordance
with requirements found in the
Departmental Privacy Act regulations
(43 CFR 2.51). Paper records are stored
in locked file cabinets in a secure area.
Electronic records are maintained with
safeguards meeting the requirements of
43 CFR 2.51 for automated records,
which conform to Office of Management
and Budget and Departmental
guidelines reflecting the
implementation of the Federal
Information Security Management Act.
The computer servers in which records
are stored are located in computer
facilities that are secured by alarm
systems and off-master key access. The
computer servers themselves are
password-protected. Access granted to
individuals at guard stations is
password-protected; each person
granted access to the system at guard
stations must be individually authorized
to use the system. A Privacy Act
Warning Notice appears on the monitor
screen when records containing
information on individuals are first
displayed. Data exchanged between the
servers and the client PCs at the guard
stations and badging office are
encrypted. Backup tapes are stored in a
locked and controlled room in a secure,
off-site location. A Privacy Impact
Assessment was completed to ensure
that Privacy Act requirements and
personally identifiable information
safeguard requirements are met.
pwalker on PROD1PC71 with NOTICES
RETENTION AND DISPOSAL:
Records relating to persons covered
by this system are retained in
accordance with General Records
Schedule 18, Item No. 17. Unless
retained for specific, ongoing security
investigations:
VerDate Aug<31>2005
18:04 Mar 09, 2007
Jkt 211001
(1) Records relating to individuals
other than employees are destroyed two
years after ID security card expiration
date.
(2) Records relating to date and time
of entry and exit of employees are
destroyed two years after date of entry
and exit.
(3) All other records relating to
employees are destroyed two years after
ID security card expiration date.
SYSTEM MANAGER(S) AND ADDRESS:
(1) Security Manager, Physical
Security Office, Division of Employee
and Public Services, National Business
Center, MS–1224, 1849 C Street, NW,
Washington, DC 20240.
(2) Bureau Physical Security
Managers:
(a) Bureau of Indian Affairs: Indian
Affairs Homeland Security Coordinator,
1849 C St., NW., Mail Stop 4160 MIB,
Washington, DC 20240.
(b) Bureau of Indian Education:
Indian Affairs Homeland Security
Coordinator, 1849 C St., NW., Mail Stop
4160 MIB, Washington, DC 20240.
(c) Bureau of Land Management: Chief
Security and Intelligence, Bureau of
Land Management, Office of Law
Enforcement and Security, 1620 L
Street, NW., Washington, DC 20036.
(d) Bureau of Reclamation:
Reclamation Security Officer, Bureau of
Reclamation, P.O. Box 25007, Denver,
CO 80225.
(e) Minerals Management Service: IT
Specialist, Minerals Management
Service, 381 Elden Street, Mail Stop
2050, Herndon, VA 20170.
(f) National Park Service: Law
Enforcement, Security and Emergency
Service Manager, National Park Service,
Security and Intelligence Branch, 1201
I (Eye) St., NW., 10th Floor,
Washington, DC 20005.
(g) Office of Surface Mining,
Reclamation and Enforcement: Security
Officer, Office of Surface Mining,
Reclamation and Enforcement, 1951
Constitution Ave., NW., Mail Stop 344
SIB, Washington, DC 20240.
(h) Office of the Inspector General:
Support Services Supervisor, Office of
the Inspector General, 12030 Sunrise
Valley Drive, Suite 350, Mail Stop 5341,
Reston, VA 20191.
(i) Office of the Secretary/National
Business Center: Office of the Secretary/
National Business Center: Security
Manager, National Business Center,
Mail Stop 1224 MIB, 1849 C St., NW.,
Washington, DC 20240.
(j) Office of the Solicitor: Director of
Administrative Services, Division of
Administration, Office of the Solicitor,
1849 C St., NW., Mail Stop 6556 MIB,
Washington, DC 20240.
PO 00000
Frm 00075
Fmt 4703
Sfmt 4703
11045
(k) U.S. Fish and Wildlife Service:
Security and Emergency Manager, U.S.
Fish and Wildlife Service, 4401 N.
Fairfax Dr., Arlington, VA 22203.
(l) U.S. Geological Survey: Bureau
Security Manager, U.S. Geological
Survey, 250 National Center, 12201
Sunrise Valley Drive, Reston, VA 20192.
NOTIFICATION PROCEDURE:
An individual requesting notification
of the existence of records on himself or
herself maintained at either of the two
main system locations should address
his/her request to the Security Manager
identified in (1), above. A request for
notification of the existence of physical
security records located at any other
location should be addressed to the
appropriate Bureau Security Manager
identified in (2), above. The request
must be in writing, signed by the
requester, and include the requester’s
bureau and office affiliation and the
address of the facility to which the
requester needed access to facilitate
location of the applicable records. (See
43 CFR 2.60.)
RECORD ACCESS PROCEDURE:
An individual requesting access to
records maintained on himself or
maintained at either of the two main
system locations should address his/her
request to the Security Manager
identified in (1), above. A request for
access to physical security records
located at any other location should be
addressed to the appropriate Bureau
Security Manager identified in (2),
above. The request must be in writing,
signed by the requester, and include the
requester’s bureau and office affiliation
and the address of the facility to which
the requester needed access to facilitate
location of the applicable records. (See
43 CFR 2.63.)
CONTESTING RECORDS PROCEDURE:
An individual requesting amendment
of a record maintained on himself or
herself at either of the two main system
locations should address his/her request
to the Security Manager identified in
(1), above. A request for amendment of
physical security records located at any
other location should be addressed to
the appropriate Bureau Security
Manager identified in (2), above. The
request must be in writing, signed by
the requester, and include the
requester’s bureau and office affiliation
and the address of the facility to which
the requester needed access to facilitate
location of the applicable records. (See
43 CFR 2.71.)
RECORD SOURCE CATEGORIES:
Information is obtained from
individuals covered by the system,
E:\FR\FM\12MRN1.SGM
12MRN1
11046
Federal Register / Vol. 72, No. 47 / Monday, March 12, 2007 / Notices
supervisors, and designated approving
officials, as well as records supplied by
the National Business Center’s identity
management system, other Federal
agencies issuing HSPD–12 compliant
cards, and HSPD–12 compliant cards
carried by individuals seeking access to
Departmental and other Federal
facilities occupied by agency
employees.
EXEMPTIONS CLAIMED FOR THE SYSTEM:
None.
[FR Doc. E7–4414 Filed 3–9–07; 8:45 am]
BILLING CODE 4310–RK–P
DEPARTMENT OF THE INTERIOR
Fish and Wildlife Service
Post-delisting Monitoring Plan for
Eggert’s Sunflower (Helianthus
eggertii)
Fish and Wildlife Service,
Interior.
ACTION: Notice of document availability.
AGENCY:
SUMMARY: We, the Fish and Wildlife
Service, announce the availability of the
Post-delisting Monitoring Plan for
Eggert’s sunflower (Helianthus eggertii)
(Monitoring Plan). The status of Eggert’s
sunflower will be monitored over a
5-year period from 2006 through 2010,
through annual evaluation of
information routinely being collected by
seven agencies that have entered into
long-term management agreements with
us covering 27 populations of Eggert’s
sunflowers, combined with a total
census of these populations during the
second and fifth year of the monitoring
period.
ADDRESSES: Copies of the Monitoring
Plan are available by request from the
Field Supervisor, Fish and Wildlife
Service, 446 Neal Street, Cookeville,
Tennessee 38501 (telephone 931–528–
6481; fax: 931–528–7074). This
Monitoring Plan is also available on the
World Wide Web at https://www.fws.gov/
cookeville.
FOR FURTHER INFORMATION CONTACT:
Geoff Call, Recovery Coordinator, at the
above Cookeville address, at
geoff_call@fws.gov, or at 931/528–6481,
extension 213.
SUPPLEMENTARY INFORMATION:
pwalker on PROD1PC71 with NOTICES
Background
Eggert’s sunflower is a perennial
member of the aster family (Asteraceae)
known only from Alabama, Kentucky,
and Tennessee. The species is
commonly associated with the barrens/
woodland ecosystem. It occurs on
rolling-to-flat uplands and in full sun or
VerDate Aug<31>2005
18:04 Mar 09, 2007
Jkt 211001
partial shade. It is often found in open
fields or in thickets along woodland
borders and with other tall herbs and
small trees. It persists in, and may even
invade, roadsides, power line rights-ofway, or fields that have suitable open
habitat.
Eggert’s sunflower was listed as
threatened under the Endangered
Species Act (Act) on May 22, 1997 (62
FR 27973). At the time of listing, there
were 34 known Eggert’s sunflower sites
occurring in 1 site in 1 county in
Alabama, 13 sites in 5 counties in
Kentucky, and 20 sites in 8 counties in
Tennessee. When the Recovery Plan for
this species was finalized in 1999, there
was 1 known site in Alabama, 27 sites
in 6 counties in Kentucky, and 203 sites
in 12 counties in Tennessee. Presently,
there are 287 known Eggert’s sunflower
sites distributed across 3 counties in
Alabama, 9 counties in Kentucky, and
15 counties in Tennessee.
On August 18, 2005, we published a
final rule removing Eggert’s sunflower
from the Federal List of Endangered and
Threatened Wildlife and Plants (70 FR
48482). Our decision to delist this
species was based on a review of all
available data, which indicated that the
species was more widespread and
abundant than was documented at the
time of listing, was more resilient and
less vulnerable to certain activities than
previously thought, and is now
protected on Federal, State, and county
lands.
Section 4(g)(1) of the Act requires that
we implement a system, in cooperation
with the States, to monitor all species
that have been delisted, or removed
from the Federal List of Endangered and
Threatened Wildlife and Plants, due to
recovery for at least 5 years following
delisting. The purpose of this postdelisting monitoring is to verify that a
species delisted due to recovery remains
secure from risk of extinction after it no
longer has the protections of the Act. In
keeping with that mandate, we
developed this Monitoring Plan in
cooperation with the States of Alabama,
Kentucky, and Tennessee. We are
responsible for compliance with section
4(g) and must remain actively engaged
in all phases of the post-delisting
monitoring.
The Draft Post-delisting Monitoring
Plan for Eggert’s sunflower was
available for public comment from
August 18, 2005 through September 19,
2005 (70 FR 48577). The only response
we received was from the State of
Tennessee, which supported the plan.
Since we had no additional information
provided to us during the comment
period, we have finalized the Post-
PO 00000
Frm 00076
Fmt 4703
Sfmt 4703
delisting Monitoring Plan with no
changes from the draft.
The Monitoring Plan is designed to
track the population status of Eggert’s
sunflower by using information
routinely collected by our partners on a
yearly basis as well as a total population
census during the second and fifth years
of the monitoring period for the 27
populations that occur on public lands.
We will also annually evaluate the
effectiveness of the Cooperative
Management Agreements in protecting
Eggert’s sunflower populations on these
public lands.
If we determine at the end of the 5year post-delisting monitoring period
that ‘‘recovered’’ status is still
appropriate and factors that led to the
listing of Eggert’s sunflower, or any new
factors, remain sufficiently reduced or
eliminated, monitoring may be reduced
or terminated. If data show that the
species is declining or if one or more
factors that have the potential to cause
a decline are identified, we will
continue monitoring beyond the 5-year
period and may modify the Monitoring
Plan based on an evaluation of the
results of the initial Monitoring Plan, or
reinitiate listing if necessary.
Author
The primary author of this proposed
rule is Geoff Call (see ADDRESSES
section).
Authority
The authority for this action is the
Endangered Species Act of 1973 (16
U.S.C. 1531 et seq.).
Dated: December 19, 2006.
Cynthia K. Dohner,
Acting Regional Director, Southeast Region.
[FR Doc. E7–4367 Filed 3–9–07; 8:45 am]
BILLING CODE 4310–55–P
DEPARTMENT OF THE INTERIOR
Fish and Wildlife Service
Buck Island, Green Cay, and Sandy
Point National Wildlife Refuges in the
U.S. Virgin Islands
Fish and Wildlife Service,
Interior.
ACTION: Notice of intent to prepare a
comprehensive conservation plan and
environmental assessment; request for
comments.
AGENCY:
SUMMARY: We, the Fish and Wildlife
Service, intend to gather information
necessary to prepare a comprehensive
conservation plan and associated
environmental documents for Buck
Island, Green Cay, and Sandy Point
E:\FR\FM\12MRN1.SGM
12MRN1
Agencies
[Federal Register Volume 72, Number 47 (Monday, March 12, 2007)]
[Notices]
[Pages 11043-11046]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: E7-4414]
-----------------------------------------------------------------------
DEPARTMENT OF THE INTERIOR
Office of the Secretary
Privacy Act of 1974, as Amended; Amendment of an Existing System
of Records
AGENCY: Office of the Secretary, Department of the Interior.
ACTION: Proposed amendment of an existing system of records.
-----------------------------------------------------------------------
SUMMARY: In accordance with the Privacy Act of 1974 (5 U.S.C. 552a),
the Office of the Secretary is issuing public notice of its intent to
amend an existing Privacy Act system of records notice, Interior, OS-
01, ``Computerized ID Security System,'' to implement Homeland Security
Presidential Directive 12 (HSPD-12) and to clarify its interpretation
of 5 U.S.C. 6106. HSPD-12 requires federal agencies to use a common
identification credential for both logical and physical access to
federally controlled facilities and information systems. Accordingly,
the National Business Center, within the Office of the Secretary of the
Department of the Interior, is integrating its computerized smart-card
physical security system with the identity management system which
automates the process of issuing credentials to all Departmental
employees, contractors, volunteers and other individuals who require
regular, ongoing access to agency facilities, systems and networks
based on sound criteria to verify an individual's identity, that are
strongly resistant to fraud, tampering, counterfeiting, and terrorist
exploitation, and that provide for rapid, electronic authentification
of personal identity, by a provider whose reliability has been
established through an official accreditation process. It is also
expanding the coverage of this system to include all locations,
Departmentwide, both Federal buildings and Federally-leased space,
where paper-based physical security logs and registers have been
established, in addition to or in place of smart-card access control
systems. For this reason, it is renaming and renumbering this Privacy
Act system notice as Interior, DOI-46: ``HSPD-12: Physical Security
Files.''
DATES: Effective Date: 5 U.S.C. 552a(e)(11) requires that the public be
provided a 30-day period in which to comment on the agency's intended
use of the information in the system of records. The Office of
Management and Budget, in its Circular A-130, requires an additional
10-day period (for a total of 40 days) in which to make these comments.
Any persons interested in commenting on this proposed amendment may do
so by submitting comments in writing to the Office of the Secretary
Privacy Act Officer, Sue Ellen Sloca, U.S. Department of the Interior,
MS-120 SIB, 1951 Constitution Avenue, NW., Washington, DC 20240, or by
e-mail to Sue--Ellen--Sloca@nbc.gov. Comments received within 40 days
of publication in the Federal Register will be considered. The system
will be effective as proposed at the end of the comment period unless
comments are received which would require a contrary determination. The
Department will publish a revised notice if changes are made based upon
a review of comments received.
FOR FURTHER INFORMATION CONTACT: David VanderWeele, Security
Specialist, NBC Security Services, MS-1229 MIB, 1849 C St., NW.,
Washington, DC 20240, or by e-mail to David--A--Vanderweele@nbc.gov.
SUPPLEMENTARY INFORMATION: In this notice, the Department of the
Interior (DOI) is amending Interior, OS-01, ``Computerized ID Security
System'' to implement HSPD-12, and is renaming and renumbering it as
Interior, DOI-46: ``HSPD-12: Physical Security Files.'' In the process,
it is expanding the categories of individuals covered by the system to
include all individuals who have access to DOI facilities, and the
categories of records covered by the system notice to include
additional personal identity verification (PIV) data such as
fingerprints. It is also clarifying its interpretation of 5 U.S.C. 6106
by deleting the note that follows the list of the routine uses of the
records maintained in the system. This note concerned disclosures
within DOI of data pertaining to the date and time of entry and exit of
an agency employee working in the District of Columbia.
Accordingly, the Department of the Interior proposes to amend the
system notice for Interior, OS-01, ``Computerized ID Security System''
in its entirety to read as follows:
Dated: March 7, 2007.
Sue Ellen Sloca,
Office of the Secretary Privacy Act Officer.
INTERIOR/DOI-46
SYSTEM NAME:
HSPD-12: Physical Security Files--Interior, DOI-46.
SYSTEM LOCATION:
(1) Data covered by this system are maintained at the following
main locations:
(a) U.S. Department of the Interior, Office of the Secretary,
National Business Center, Computer Center, 1849 C Street, NW.,
Washington, DC 20240; and
(b) U.S. Department of the Interior, Office of the Secretary,
National Business Center, 7301 W. Mansfield Ave., MS D-2130, Denver, CO
80235-2300.
(2) Portions of the data covered by this system are also maintained
at other Department of the Interior locations, both Federal buildings
and Federally-leased space, where staffed guard stations have been
established in facilities that have installed a smart card ID system,
and/or paper-based physical security logs and registers, as well as the
physical security office(s) of those locations. A list of these
locations (as applicable to each bureau) is maintained by each bureau's
Security Manager, whose address is provided under item (2) in System
Manager and Address, below.
CATEGORIES OF INDIVIDUALS COVERED BY THE SYSTEM:
(1) Individuals who require regular, ongoing access to Departmental
facilities, including Departmental employees, contractors, students,
interns, volunteers, affiliates, and individuals formerly in any of
these positions. The system also includes individuals authorized to
perform or use services provided in Departmental facilities (e.g.,
Credit Union, Fitness Center, etc.) NOTE: All of these individuals are
required to have HSPD-12 compliant credentials issued from the National
Business Center, within the Office of the Secretary of the Department
of the Interior, if they are employed by DOI for more than 180 days.
(2) Individuals who have been issued HSPD-12 compliant credentials
from
[[Page 11044]]
other Federal agencies who require access to Departmental facilities.
(3) Visitors and other individuals who require infrequent access to
Department facilities including services provided in Departmental
facilities (e.g., Departmental Museum, Indian Arts and Crafts Shop,
etc.)
CATEGORIES OF RECORDS IN THE SYSTEM:
(1) Records maintained on individuals issued HSPD-12 compliant
credentials by the Department and by other Federal agencies include the
following data fields: full name, Social Security Number; date of
birth; signature; image (photograph); fingerprints; hair color; eye
color; height; weight; home address; work address; e-mail address;
agency affiliation (i.e., employee, contractor, volunteer, etc.);
telephone number; personal identity verification (PIV) card issue and
expiration dates; personal identification number (PIN); results of
background investigation; PIV request form; PIV registrar approval
signature; PIV card serial number; emergency responder designation;
copies of ``I-9'' documents (e.g., driver's license, passport, birth
certificate, etc.) used to verify identification or information derived
from those documents such as document title, document issuing
authority, document number, or document expiration date; level of
national security clearance and expiration date; computer system user
name; user access and permission rights, authentication certificates;
and digital signature information.
(2) Records maintained on visitors and other individuals who
require infrequent access to Department facilities include the
following data fields: Full name, signature; image (photograph), Social
Security Number (or one of the following: Driver's License number,
``Green Card'' number, Visa number, or other ID number), images of
relevant ID document(s), U.S. Citizenship (yes or no/logical data
field), date of entry, time of entry, location of entry, time of exit,
location of exit, purpose for entry, agency point of contact, company
name, security access category, and access status.
AUTHORITY FOR MAINTENANCE OF THE SYSTEM:
5 U.S.C. 301; Federal Information Security Act (Pub. L. 104-106,
sec. 5113); Electronic Government Act (Pub. L. 104-347, sec. 203); the
Paperwork Reduction Act of 1995 (44 U.S.C. 3501); the Government
Paperwork Elimination Act (Pub. L. 105-277, 44 U.S.C. 3504); Homeland
Security Presidential Directive 12, Policy for a Common Identification
Standard for Federal Employees and Contractors, August 27, 2004;
Federal Property and Administrative Act of 1949, as amended; 5 U.S.C.
301; and Presidential Memorandum on Upgrading Security at Federal
Facilities, June 28, 1995.
ROUTINE USES OF RECORDS MAINTAINED IN THE SYSTEM, INCLUDING CATEGORIES
OF USERS AND THE PURPOSES OF SUCH USES:
The primary purposes of the system are:
(1) To ensure the safety and security of DOI facilities and their
occupants in which the system is installed.
(2) To verify that all persons entering DOI facilities or other
Government facilities with smart card systems are authorized to enter
them.
(3) To verify that all persons entering DOI facilities or other
Government facilities without smart cards are authorized to enter them.
Note: This system interfaces with the Department's identify
management system and personnel security files, covered by Interior/
DOI-45, ``HSPD-12: Identity Management System and Personnel Security
Files.''
Disclosures outside the Department of the Interior may be made:
(1) To an expert, consultant, or contractor (including employees of
the contractor) of DOI that performs, on DOI's behalf, services
requiring access to these records.
(2) To the Federal Protective Service and appropriate Federal,
State, local or foreign agencies responsible for investigating
emergency response situations or investigating or prosecuting the
violation of or for enforcing or implementing a statute, rule,
regulation, order or license, when DOI becomes aware of a violation or
potential violation of a statute, rule, regulation, order or license.
(3) To another agency with a similar HSPD-12 (PIV/smart card)
system when a person with identification credentials issued by the
Department desires access to that agency's facilities.
(4) (a) To any of the following entities or individuals, when the
circumstances set forth in paragraph (b) are met:
(i) The U.S. Department of Justice (DOJ);
(ii) A court or an adjudicative or other administrative body;
(iii) A party in litigation before a court or an adjudicative or
other administrative body; or
(iv) Any DOI employee acting in his or her individual capacity if
DOI or DOJ has agreed to represent that employee or pay for private
representation of the employee;
(b) When:
(i) One of the following is a party to the proceeding or has an
interest in the proceeding:
(A) DOI or any component of DOI;
(B) Any other Federal agency appearing before the Office of
Hearings and Appeals;
(C) Any DOI employee acting in his or her official capacity;
(D) Any DOI employee acting in his or her individual capacity if
DOI or DOJ has agreed to represent that employee or pay for private
representation of the employee;
(E) The United States, when DOJ determines that DOI is likely to be
affected by the proceeding; and
(ii) DOI deems the disclosure to be:
(A) Relevant and necessary to the proceeding; and
(B) Compatible with the purpose for which the records were
compiled.
(5) To a congressional office in response to a written inquiry that
an individual covered by the system, or the heir of such individual if
the covered individual is deceased, has made to the congressional
office about the individual.
(6) To an official of another Federal agency to provide information
needed in the performance of official duties related to reconciling or
reconstructing data files, in support of the functions for which the
records were collected and maintained.
(7) To representatives of the General Services Administration or
the National Archives and Records Administration to conduct records
management inspections under the authority of 44 U.S.C. 2903 and 2904.
(8) To another agency with a similar HSPD-12 (PIV/smart card)
system when it controls access to facilities occupied by the agency.
(9) To appropriate agencies, entities, and persons when:
(a) It is suspected or confirmed that the security or
confidentiality of information in the system of records has been
compromised; and
(b) The Department has determined that as a result of the suspected
or confirmed compromise there is a risk of harm to economic or property
interest, identity theft or fraud, or harm to the security or integrity
of this system or other systems or programs (whether maintained by the
Department or another agency or entity) that rely upon the compromised
information; and
(c) The disclosure is made to such agencies, entities and persons
who are reasonably necessary to assist in connection with the
Department's efforts to respond to the suspected or confirmed
compromise and prevent, minimize, or remedy such harm.
[[Page 11045]]
POLICIES AND PRACTICES FOR STORING, RETRIEVING, ACCESSING, RETAINING,
AND DISPOSING OF RECORDS IN THE SYSTEM:
STORAGE:
Records are stored in electronic media and in paper files.
RETRIEVABILITY:
Records are retrievable by name, Social Security Number, other ID
number, image (photograph), fingerprint, organization/office of
assignment, agency point of contact, company name, security access,
category, date of entry, time of entry, location of entry, time of
exit, location of exit, ID security card issue date, ID security card
expiration date, and ID security card serial number.
SAFEGUARDS:
Access to records covered by the system will be permitted only to
authorized personnel in accordance with requirements found in the
Departmental Privacy Act regulations (43 CFR 2.51). Paper records are
stored in locked file cabinets in a secure area. Electronic records are
maintained with safeguards meeting the requirements of 43 CFR 2.51 for
automated records, which conform to Office of Management and Budget and
Departmental guidelines reflecting the implementation of the Federal
Information Security Management Act. The computer servers in which
records are stored are located in computer facilities that are secured
by alarm systems and off-master key access. The computer servers
themselves are password-protected. Access granted to individuals at
guard stations is password-protected; each person granted access to the
system at guard stations must be individually authorized to use the
system. A Privacy Act Warning Notice appears on the monitor screen when
records containing information on individuals are first displayed. Data
exchanged between the servers and the client PCs at the guard stations
and badging office are encrypted. Backup tapes are stored in a locked
and controlled room in a secure, off-site location. A Privacy Impact
Assessment was completed to ensure that Privacy Act requirements and
personally identifiable information safeguard requirements are met.
RETENTION AND DISPOSAL:
Records relating to persons covered by this system are retained in
accordance with General Records Schedule 18, Item No. 17. Unless
retained for specific, ongoing security investigations:
(1) Records relating to individuals other than employees are
destroyed two years after ID security card expiration date.
(2) Records relating to date and time of entry and exit of
employees are destroyed two years after date of entry and exit.
(3) All other records relating to employees are destroyed two years
after ID security card expiration date.
SYSTEM MANAGER(S) AND ADDRESS:
(1) Security Manager, Physical Security Office, Division of
Employee and Public Services, National Business Center, MS-1224, 1849 C
Street, NW, Washington, DC 20240.
(2) Bureau Physical Security Managers:
(a) Bureau of Indian Affairs: Indian Affairs Homeland Security
Coordinator, 1849 C St., NW., Mail Stop 4160 MIB, Washington, DC 20240.
(b) Bureau of Indian Education: Indian Affairs Homeland Security
Coordinator, 1849 C St., NW., Mail Stop 4160 MIB, Washington, DC 20240.
(c) Bureau of Land Management: Chief Security and Intelligence,
Bureau of Land Management, Office of Law Enforcement and Security, 1620
L Street, NW., Washington, DC 20036.
(d) Bureau of Reclamation: Reclamation Security Officer, Bureau of
Reclamation, P.O. Box 25007, Denver, CO 80225.
(e) Minerals Management Service: IT Specialist, Minerals Management
Service, 381 Elden Street, Mail Stop 2050, Herndon, VA 20170.
(f) National Park Service: Law Enforcement, Security and Emergency
Service Manager, National Park Service, Security and Intelligence
Branch, 1201 I (Eye) St., NW., 10th Floor, Washington, DC 20005.
(g) Office of Surface Mining, Reclamation and Enforcement: Security
Officer, Office of Surface Mining, Reclamation and Enforcement, 1951
Constitution Ave., NW., Mail Stop 344 SIB, Washington, DC 20240.
(h) Office of the Inspector General: Support Services Supervisor,
Office of the Inspector General, 12030 Sunrise Valley Drive, Suite 350,
Mail Stop 5341, Reston, VA 20191.
(i) Office of the Secretary/National Business Center: Office of the
Secretary/National Business Center: Security Manager, National Business
Center, Mail Stop 1224 MIB, 1849 C St., NW., Washington, DC 20240.
(j) Office of the Solicitor: Director of Administrative Services,
Division of Administration, Office of the Solicitor, 1849 C St., NW.,
Mail Stop 6556 MIB, Washington, DC 20240.
(k) U.S. Fish and Wildlife Service: Security and Emergency Manager,
U.S. Fish and Wildlife Service, 4401 N. Fairfax Dr., Arlington, VA
22203.
(l) U.S. Geological Survey: Bureau Security Manager, U.S.
Geological Survey, 250 National Center, 12201 Sunrise Valley Drive,
Reston, VA 20192.
NOTIFICATION PROCEDURE:
An individual requesting notification of the existence of records
on himself or herself maintained at either of the two main system
locations should address his/her request to the Security Manager
identified in (1), above. A request for notification of the existence
of physical security records located at any other location should be
addressed to the appropriate Bureau Security Manager identified in (2),
above. The request must be in writing, signed by the requester, and
include the requester's bureau and office affiliation and the address
of the facility to which the requester needed access to facilitate
location of the applicable records. (See 43 CFR 2.60.)
RECORD ACCESS PROCEDURE:
An individual requesting access to records maintained on himself or
maintained at either of the two main system locations should address
his/her request to the Security Manager identified in (1), above. A
request for access to physical security records located at any other
location should be addressed to the appropriate Bureau Security Manager
identified in (2), above. The request must be in writing, signed by the
requester, and include the requester's bureau and office affiliation
and the address of the facility to which the requester needed access to
facilitate location of the applicable records. (See 43 CFR 2.63.)
CONTESTING RECORDS PROCEDURE:
An individual requesting amendment of a record maintained on
himself or herself at either of the two main system locations should
address his/her request to the Security Manager identified in (1),
above. A request for amendment of physical security records located at
any other location should be addressed to the appropriate Bureau
Security Manager identified in (2), above. The request must be in
writing, signed by the requester, and include the requester's bureau
and office affiliation and the address of the facility to which the
requester needed access to facilitate location of the applicable
records. (See 43 CFR 2.71.)
RECORD SOURCE CATEGORIES:
Information is obtained from individuals covered by the system,
[[Page 11046]]
supervisors, and designated approving officials, as well as records
supplied by the National Business Center's identity management system,
other Federal agencies issuing HSPD-12 compliant cards, and HSPD-12
compliant cards carried by individuals seeking access to Departmental
and other Federal facilities occupied by agency employees.
EXEMPTIONS CLAIMED FOR THE SYSTEM:
None.
[FR Doc. E7-4414 Filed 3-9-07; 8:45 am]
BILLING CODE 4310-RK-P