Data Breaches, 34395-34401 [07-3085]

Download as PDF Federal Register / Vol. 72, No. 120 / Friday, June 22, 2007 / Rules and Regulations significant economic impact on a substantial number of small entities as they are defined in the Regulatory Flexibility Act. This amendment will not directly affect any small entities. Therefore, this amendment is also exempt pursuant to 5 U.S.C. 605(b) from the initial and final regulatory flexibility analysis requirements of sections 603– 604. Catalog of Federal Domestic Assistance There are no Catalog of Federal Domestic Assistance program numbers for this rule. List of Subjects in 38 CFR Part 2 Authority delegations (Government agencies). Approved: June 15, 2007. Gordon H. Mansfield, Deputy Secretary of Veterans Affairs. For the reasons set forth in the preamble, 38 CFR part 2 is amended as follows: I PART 2—DELEGATIONS OF AUTHORITY 1. The authority citation for part 2 continues to read as follows: I Authority: 5 U.S.C. 302, 552a; 38 U.S.C. 501, 512, 515, 1729, 1729A, 5711; 44 U.S.C. 3702, and as noted in specific sections. 2. Amend § 2.6 by: a. In paragraph (l)(1), removing ‘‘Secretary’’ and adding, in its place, ‘‘Secretary, the Deputy Secretary,’’. I b. Revising paragraph (l)(3). The revision reads as follows: I I § 2.6 Secretary’s delegations of authority to certain officials (38 U.S.C. 512). * * * * * (l) * * * (3) To serve as the Deputy Regulatory Policy Officer, to perform staff functions under the Regulatory Policy Officer, and to perform other delegated functions in accordance with Executive Order 12866. * * * * * [FR Doc. E7–12058 Filed 6–21–07; 8:45 am] BILLING CODE 8320–01–P DEPARTMENT OF VETERANS AFFAIRS 38 CFR Part 75 RIN 2900–AM63 rfrederick on PROD1PC67 with RULES Data Breaches Department of Veterans Affairs. Interim final rule. AGENCY: ACTION: SUMMARY: This document establishes regulations to address data breaches VerDate Aug<31>2005 14:57 Jun 21, 2007 Jkt 211001 regarding sensitive personal information that is processed or maintained by the Department of Veterans Affairs (VA). The regulations implement certain provisions of Title IX of the Veterans Benefits, Health Care, and Information Technology Act of 2006, which require promulgation of these regulations as an interim final rule. DATES: Effective Date: This interim final rule is effective on June 22, 2007. Comments must be received on or before August 21, 2007. ADDRESSES: Written comments may be submitted through www.Regulations.gov; by mail or handdelivery to the Director, Regulations Management (00REG), Department of Veterans Affairs, 810 Vermont Ave., NW., Room 1068, Washington, DC 20420; or by fax to (202) 273–9026. Comments should indicate that they are submitted in response to ‘‘RIN 2900– AM63–Data Breaches.’’ Copies of comments received will be available for public inspection in the Office of Regulation Policy and Management, Room 1063B, between the hours of 8 a.m. and 4:30 p.m. Monday through Friday (except holidays). Please call (202) 273–9515 for an appointment. (This is not a toll-free number.) In addition, during the comment period, comments may be viewed online through the Federal Docket Management System (FDMS) at www.Regulations.gov. FOR FURTHER INFORMATION CONTACT: Terry Simmons, Information Technology Specialist, Office of Information Protection and Risk Management (005T), (202) 461–9217, Department of Veterans Affairs, 810 Vermont Avenue, NW., Washington, DC 20420. (This is not a toll-free number.) SUPPLEMENTARY INFORMATION: This document establishes regulations captioned ‘‘Data Breaches’’ (referred to below as the regulations). The regulations implement 38 U.S.C. 5724 and 5727, which were enacted as part of Title IX of Public Law 109–461, the Veterans Benefits, Health Care, and Information Technology Act of 2006. VA will promulgate regulations to implement 38 U.S.C. 5722 and 5723, which were also enacted as part of Title IX of Public Law 109–461, in a separate rulemaking. The regulations, which follow the statutory framework set out in section 5724, prescribe a mechanism for taking actions in response to a data breach of sensitive personal information. The finding of a data breach of sensitive personal information normally triggers a risk analysis. A risk analysis provides the basis for a determination as to whether individuals subject to a data PO 00000 Frm 00035 Fmt 4700 Sfmt 4700 34395 breach will be given notice of the data breach and any other credit protections services authorized by VA. Under section 5724, VA must provide at least one credit protection service upon a finding that a reasonable risk exists for the potential misuse of sensitive personal information involved in a data breach. Consistent with this authority, the regulations require compliance with notification provisions when such finding occurs. The regulations also require that other credit protection services be provided, if warranted, based on the consideration of specified factors. However, section 5724 does not bar the Secretary from acting promptly to address a data breach without first conducting a risk analysis where the situation dictates. If the information available to the agency indicates that there is an immediate, substantial risk of identity theft of the individuals whose data was the subject of the data breach, the Secretary may notify the record subjects of the breach promptly so that they may take steps to protect themselves, and also may offer them other credit protection services without conducting a risk analysis. Additionally, the Secretary may offer credit protection services to individuals without first performing a risk analysis where a previous risk analysis performed by VA or another Federal agency involving the same or similar data determined that it was appropriate to offer the subject individuals credit protection services, including providing notice of the data breach. Finally, the Secretary may provide an initial notice of the data breach prior to completion of the risk analysis where private entities would be required to provide notice under Federal law if they experienced a data breach involving the same or similar information. In this last situation, the Secretary may provide notice of the breach and subsequently advise individuals whether the agency will offer additional credit protection services upon completion, and consideration of the results, of any risk analysis. Contents of this regulation, including notification of data breaches which may result in harms other than identity theft, should be interpreted to be consistent with OMB Memorandum M–07–16, ‘‘Safeguarding Against and Responding to Breaches of Personally Identifiable Information.’’ The regulations are set forth as Subpart B in new 38 CFR part 75. Subpart A is reserved. Section 75.111 Purpose and Scope The purpose and scope section explains that the regulations implement E:\FR\FM\22JNR1.SGM 22JNR1 34396 Federal Register / Vol. 72, No. 120 / Friday, June 22, 2007 / Rules and Regulations rfrederick on PROD1PC67 with RULES 38 U.S.C. 5724 and 5727 and that the regulations concern actions to address data breaches of sensitive personal information that is processed or maintained by VA. Thus, the regulations apply to sensitive personal information stored on VA computer systems, as well as to VA sensitive information stored on non-VA computer systems for VA, such as by a contractor. VA employees and contractors legally may perform activities for VA and for others. Those duties often require the collection, use and maintenance of sensitive personal information for both VA and for the other entity on a common electronic storage medium, such as a hard drive on a server. In these instances, the VA data are to be partitioned or segregated, such as being stored on separate virtual servers. Various factors may be different for the VA and non-VA data. For example, the data may be different, may have different levels of security or be in different formats. Finally, the legal protections required for the data, as well as the legal responsibilities for the data may be different. Consequently, the regulations apply only to VA data in this situation. The owners of the other, non-VA data residing on a non-VA storage medium that is lost, stolen or improperly accessed are responsible for identifying and complying with the legal requirements that those owners consider applicable to their data. Based on our interpretation of the statutory requirements, we have also added a statement indicating that the regulations do not supersede the requirements imposed by other laws, such as the Privacy Act of 1974, the Administrative Simplification provisions of the Health Insurance Portability and Accountability Act of 1996, the Fair Credit Reporting Act, and implementing regulations of such Acts. Section 75.112 Definitions and Terms So that the full terms would not have to be written out each time they are used in the regulations, ‘‘VA’’ means the Department of Veterans Affairs, and ‘‘Secretary’’ means the Secretary of Veterans Affairs or designee. The following definitions are exactly the same or the same in substance as the corresponding definitions in the authorizing legislation at 38 U.S.C. 5727: ‘‘confidentiality,’’ ‘‘data breach,’’ ‘‘data breach analysis,’’ ‘‘fraud resolution services,’’ ‘‘identity theft,’’ ‘‘identity theft insurance,’’ ‘‘information system,’’ ‘‘integrity,’’ and ‘‘sensitive personal information.’’ The term ‘‘individual’’ is used in the definition of the phrase ‘‘sensitive personal information,’’ but is itself undefined in the statute. We have VerDate Aug<31>2005 14:57 Jun 21, 2007 Jkt 211001 defined ‘‘individual’’ to mean a single human being who is a citizen of the United States, an alien admitted to permanent residence in the United States, a present or former member of the Armed Forces, or any dependent of a present or former member of the Armed Forces. The first two parts of this definition come from the Privacy Act of 1974, 5 U.S.C. 552a(a)(2), and the last two parts come from 38 U.S.C. 5701(a), which specifically provides confidentiality for the names and home addresses of present or former members of the Armed Forces and their dependents. It was apparent during the Congressional hearings after the May 2006 data breach involving the employee hard drive stolen from his home that the Members’ focus was on the possible impact of a data breach on those individuals on whom VA normally maintains individuallyidentified information. The definition of ‘‘individual’’ to include the human beings on whom VA maintains data is consistent with this Congressional concern. The phrase ‘‘unauthorized access * * * incidental to the scope of employment’’ is included in the statutory definition of data breach. We have defined this phrase to have the meaning that we believe was intended by the statutory authority. We defined ‘‘person’’ consistent with its common use when intended to include individuals and entities and consistent with its use in other VA regulations (see 38 CFR 1.460). We defined ‘‘processed or maintained by VA’’ to include all actions by VA regarding sensitive personal information for which VA has responsibility under the statutory authority of 38 U.S.C. 5724 and 5727. Section 75.113 Data Breach Consistent with the definition of ‘‘data breach’’ in the definition section, the regulations provide that a data breach occurs if there is a loss, theft, or other unauthorized access, other than an unauthorized access incidental to the scope of employment, to data containing sensitive personal information, in electronic or printed form, that results in the potential compromise of the confidentiality or integrity of the data. To clarify the scope of the regulations, we explain that the term ‘‘unauthorized access’’ used in the definition of ‘‘data breach’’ includes access to an electronic information system and includes, but is not limited to, viewing, obtaining, or using data containing sensitive personal information in any form or in any VA information system. The phrase ‘‘unauthorized access incidental to the PO 00000 Frm 00036 Fmt 4700 Sfmt 4700 scope of employment’’ includes instances when employees of contractors and other entities need access to VA sensitive information in order to perform a contract or agreement with VA but incidentally obtain access to other VA sensitive information. In accordance with this explanation, an unauthorized access, other than an unauthorized access incidental to the scope of employment, to data containing sensitive personal information, in electronic or printed form, which results in the potential compromise of the confidentiality or integrity of the data, constitutes a data breach. Also, in § 75.113, we note that VA interprets data breach to include circumstances in which a user misuses sensitive personal information to which he or she has authorized access. To help interested individuals understand our view of what is not included in the definition of data breach, and, consequently, what is not subject to the provisions of the regulations, we have added an example in § 75.113(a) to illustrate when an occurrence constitutes an unauthorized access incidental to the scope of employment. The following is a specific example of unauthorized access that is incidental to employment and therefore does not constitute a data breach. Contractor A has a contract to perform service 1 for VA. The contractor needs access to sensitive personal information to perform the contract. Contractor B also has a contract to perform service 2 for which contractor B needs access to sensitive personal information in order to perform the contract. The sensitive data in each contract is substantially the same, e.g., VA beneficiary demographic information for different groups of beneficiaries. Both contractors have complied with all applicable security and privacy requirements to access and use the data to perform each contract. A VA employee inadvertently provides contractor B with a CD with the encrypted data that contractor A needs to perform its contract. At the same time, the employee inadvertently also provides in a separate communication the password to decrypt the file. Contractor B opens the encrypted file, realizes that the sensitive personal information in the file is not the data that it needs to perform contract 2. Contractor B immediately closes and properly re-encrypts the data file and returns the CD to the appropriate VA official. Contractor B did not retain a copy of the data on the CD. Contractor B’s access to the data file needed by Contractor A is an inadvertent unauthorized viewing of sensitive E:\FR\FM\22JNR1.SGM 22JNR1 Federal Register / Vol. 72, No. 120 / Friday, June 22, 2007 / Rules and Regulations rfrederick on PROD1PC67 with RULES personal information by a person acting on behalf of VA and therefore is not a data breach. We also have added examples in § 75.113(b) to illustrate when an occurrence would not be one ‘‘that results in the potential compromise of the confidentiality or integrity of the data.’’ The addition of the clause ‘‘that results in the potential compromise of the confidentiality or integrity of the data’’ could not have been intended to mean zero percent possibility of creating a compromise of the confidentiality or integrity of the data, since such zero percent possibility would have applied if the clause had not been added. In our view, in order to trigger the need for a risk analysis, the added clause is appropriately interpreted to mean that a loss, theft, or other unauthorized access to data containing sensitive personal information that has even a minimal possibility of compromising the confidentiality or integrity of data constitutes a data breach and the examples reflect this conclusion. The following is another concrete example of an event that does not constitute a data breach. An employee is transporting a CD containing an encrypted flat file containing sensitive personal information. The file is encrypted using a software program that has been certified by the National Institute of Standards and Technology (NIST) as complying with the most recent security standards and certification of cryptographic modules. The vehicle in which the employee is riding crashes through a bridge railing and falls into a river. The car and the CD are recovered, and it is determined that the CD is destroyed. The likelihood that the CD will be recovered is minimal, and if recovered, the encryption would not permit access to the data. Therefore, there is no possibility of compromising the confidentiality or integrity of the data, and accordingly, this is not a data breach. Section 75.114 Accelerated Response If the information available to the agency when VA learns of the data breach indicates that there is an immediate, substantial risk of identity theft for individuals as a result of the data breach, prior to completing a risk analysis, the Secretary may promptly notify the record subjects of the breach, and/or offer them other credit protection services as the Secretary determines in the exercise of his or her discretion what would be likely to assist the record subjects in preventing, or mitigating the results of, identity theft based on the compromised VA sensitive personal VerDate Aug<31>2005 14:57 Jun 21, 2007 Jkt 211001 information. Additionally, Secretary may provide initial notice of the data breach without, or prior to completion of, a risk analysis where private entities would be required to provide notice under Federal law if they experienced a data breach involving the same or similar information. In such cases, the Secretary may provide notice of the breach and subsequently advise individuals whether the agency will offer additional credit protection services upon completion and consideration of the results of the risk analysis. The agency will provide the notice and/or other credit protection services under this section in accordance with §§ 75.117 and 75.118 of these regulations. Section 75.115 Risk Analysis Under 38 U.S.C. 5724, VA must ensure that, as soon as possible after a data breach, a non-VA entity or the VA Office of Inspector General conducts an independent risk analysis of the data breach (which under 38 U.S.C. 5724 may include data mining as necessary to obtain relevant information) to determine the level of risk for potential misuse of sensitive personal information. To provide information that the Secretary will use in making determinations required under the regulations, this section requires that the risk analysis address identified factors relating to risks and potential harms. Section 75.116 Secretary Determination Under 38 U.S.C. 5724, VA must consider the findings of each risk analysis and determine, based on criteria in the regulation, whether a reasonable risk exists for the potential misuse of sensitive personal information involved in a data breach. Consistent with the statutory intent, this section indicates that VA will take no further action under the regulations upon a finding that such a reasonable risk does not exist. Also, consistent with the statutory intent, this section indicates that VA will take further action as provided under the regulations (discussed below) upon a finding that a data breach of sensitive personal information poses a reasonable risk of potential misuse. Section 75.117 Notification To implement 38 U.S.C. 5724, we are establishing procedures for notifying individuals whose sensitive personal information are subject to a reasonable risk for potential misuse from a data breach. Under this statutory provision, we have authority to provide PO 00000 Frm 00037 Fmt 4700 Sfmt 4700 34397 notification once there is a finding that a reasonable risk exists for the potential misuse of any sensitive personal information involved in the data breach. The regulations reflect our view that the notification procedures should be utilized whenever this threshold determination is made by the Secretary. Paragraph (a) includes the information that we believe should be provided to affected individuals to ensure that they understand what has happened and what they can expect from VA with regard to other credit protection services. Under paragraph (a), affected individuals will receive letters sent via first-class mail explaining the circumstances of the data breach and possible responses for such individuals. We believe that this is an effective means of providing information. However, paragraph (b) contains alternative means of providing information if we are unable to contact an affected individual by mail. Further, paragraph (c) clarifies that VA will also provide notification using a quicker method, such as notification by telephone, when there is a possible imminent misuse of sensitive personal information due to a data breach. However, we have also included information in paragraph (d) explaining that in determining when to provide notification, we will consider lawful requests, from other Federal agencies, for the delay of notifications in order to prevent interference with the conduct of an investigation or efforts to recover the data. Section 75.118 Other Credit Protection Services Under 38 U.S.C. 5724, VA may provide other credit protection services to individuals found to be subject to a reasonable risk for the potential misuse of any sensitive personal information because of a data breach. VA is specifically authorized to provide credit monitoring, data breach analysis, fraud resolution services, and identity theft insurance. Accordingly, the Secretary may offer one or more of the following if warranted based on considerations specified below: • One year of credit monitoring services consisting of automatic daily monitoring of at least 3 relevant credit bureau reports (this is a standard credit monitoring policy); • Data breach analysis; • Fraud resolutions services, including writing dispute letters, initiating fraud alerts and credit freezes, to assist affected individuals to bring matters to resolution; and/or • One year of identity theft insurance with $20,000.00 coverage at $0 E:\FR\FM\22JNR1.SGM 22JNR1 34398 Federal Register / Vol. 72, No. 120 / Friday, June 22, 2007 / Rules and Regulations deductible (this is a standard identity theft insurance policy). The determination by the Secretary regarding whether any or all of these credit protection services will be offered to individuals subject to a data breach will depend on the particular facts in a case. Accordingly, we have established the following considerations for helping to determine what credit protection services will be offered to individuals subject to a data breach: • The data elements involved; • The number of individuals affected or potentially affected; • The likelihood that sensitive personal information will be or has been compromised (made accessible to and usable by unauthorized persons); • The risk of harm to the affected individuals; and • The ability to prevent or mitigate the risk of harm by offering credit protection services. Pursuant to authority in 38 U.S.C. 5724, the regulations also provide that VA will obtain data mining and data breach analyses services, as appropriate, to obtain information relevant for making determinations under this subpart. Section 75.119 Finality of Secretary Determination Under 38 U.S.C. 5724, the Secretary is required to make various determinations concerning a particular data breach incident. Any determination made by the Secretary under this subpart will be considered a final agency decision. Solicitation of Comments VA solicits comments on the following matters. VA will consider comments on all provisions of this Interim Final Rule received during the 60-day public comment period. rfrederick on PROD1PC67 with RULES Section 75.115 Risk Analysis VA solicits comments on use of data mining as necessary for the development of relevant information to assist in preparation of risk analysis following a data breach. In particular, we seek comments on the purposes for which data mining would be appropriate and acceptable uses of the information resulting from data mining. Section 75.117 Notification We are considering not providing written notification if the Secretary determines that the data breach incident has been widely disseminated through the media. Specifically, we are soliciting comment on the following possible draft provision: (e) Notwithstanding other provisions of this section, the Secretary may forgo VerDate Aug<31>2005 14:57 Jun 21, 2007 Jkt 211001 notification by first-class mail upon a determination that the information in paragraphs (a)(1) through (a)(5) of this section has been widely disseminated through the media, a mailing would virtually duplicate information that has already been provided to individuals subject to a data breach, and the agency can determine with reasonable certainty all of the affected individuals have received actual notice of (1) the data breach and (2) their inclusion in the affected class of individuals. In determining whether media dissemination has already provided adequate notice to affected individuals, the Secretary will also consider media coverage at the national level, and, where the data breach is limited to individuals within a particular, defined geographic area or areas, the media coverage in that area. The Secretary will further consider the extent of the accuracy of media coverage, frequency of repetition of such media coverage (number of articles or frequency of publications or broadcasts), and the variety of media outlets carrying such media coverage. Potential Procedures for Appeals or Reconsiderations of Decisions Made Under Subpart B Public Law 109–461 was silent regarding appeals or reconsiderations of decisions made under Section 902 Department of Veterans Affairs Information Security Programs and Requirements. VA solicits comments on potential procedures for appeals and reconsiderations. Administrative Procedure Act This rule is exempt from the prior notice and comment and delayed effective date provisions of 5 U.S.C. 553 for good cause because they are unnecessary based on the statutory mandate in 38 U.S.C. 5724 to publish this document as an interim final rule. 5 U.S.C. 553(b)(B), (d)(3). Unfunded Mandates The Unfunded Mandates Reform Act of 1995 requires, at 2 U.S.C. 1532, that agencies prepare an assessment of anticipated costs and benefits before issuing any rule that may result in expenditure by State, local, and tribal governments, in the aggregate, or by the private sector, of $100 million or more (adjusted annually for inflation) in any given year. This rule would have no such effect on State, local, and tribal governments or the private sector. Paperwork Reduction Act This document contains no provisions constituting a collection of information under the Paperwork Reduction Act of 1995 (44 U.S.C. 3501–3521). Executive Order 12866 Executive Order 12866 directs agencies to assess all costs and benefits of available regulatory alternatives and, PO 00000 Frm 00038 Fmt 4700 Sfmt 4700 when regulation is necessary, to select regulatory approaches that maximize net benefits (including potential economic, environmental, public health and safety, and other advantages; distributive impacts; and equity). The Executive Order classifies a ‘‘significant regulatory action,’’ requiring review by the Office of Management and Budget (OMB) unless OMB waives such review, as any regulatory action that is likely to result in a rule that may: (1) Have an annual effect on the economy of $100 million or more or adversely affect in a material way the economy, a sector of the economy, productivity, competition, jobs, the environment, public health or safety, or State, local, or tribal governments or communities; (2) create a serious inconsistency or otherwise interfere with an action taken or planned by another agency; (3) materially alter the budgetary impact of entitlements, grants, user fees, or loan programs or the rights and obligations of recipients thereof; or (4) raise novel legal or policy issues arising out of legal mandates, the President’s priorities, or the principles set forth in the Executive Order. The economic, interagency, budgetary, legal, and policy implications of this interim final rule have been examined and it has been determined to be a significant regulatory action under the Executive Order because it is likely to result in a rule that may raise novel legal or policy issues arising out of legal mandates, the President’s priorities, or the principles set forth in the Executive Order. Regulatory Flexibility Act The provisions of the Regulatory Flexibility Act (5 U.S.C. 601–612) do not apply to this interim final rule because the provisions of 38 U.S.C. 5724 require that this document be promulgated as an interim final rule, and, consequently, a notice of proposed rulemaking was not required for the rule. 5 U.S.C. 603–604. Catalog of Federal Domestic Assistance Numbers There are no Catalog of Federal Domestic Assistance numbers and titles for this rule. List of Subjects in 38 CFR Part 75 Administrative practice and procedure, Credit monitoring, Data breach, Data breach analysis, Data mining, Fraud alerts, Identity theft insurance, Information, Notification, Risk analysis, Security measures. E:\FR\FM\22JNR1.SGM 22JNR1 Federal Register / Vol. 72, No. 120 / Friday, June 22, 2007 / Rules and Regulations Approved: June 13, 2007. Gordon H. Mansfield, Deputy Secretary of Veterans Affairs. For reasons set forth in the preamble, VA is amending 38 CFR chapter I by adding part 75 to read as follows: I PART 75—INFORMATION SECURITY MATTERS Subpart A—[Reserved] Subpart B—Data Breaches Sec. 75.111 Purpose and scope. 75.112 Definitions and terms. 75.113 Data breach. 75.114 Accelerated response. 75.115 Risk analysis. 75.116 Secretary determination. 75.117 Notification. 75.118 Other credit protection services. 75.119 Finality of Secretary determination. Authority: 38 U.S.C. 501, 5724, 5727, 7906. Subpart A—[Reserved] Subpart B—Data Breaches § 75.111 Purpose and scope. This subpart implements provisions of 38 U.S.C. 5724 and 5727, which are set forth in Title IX of the Veterans Benefits, Health Care, and Information Technology Act of 2006. It only concerns actions to address a data breach regarding sensitive personal information that is processed or maintained by VA. This subpart does not supersede the requirements imposed by other laws, such as the Privacy Act of 1974, the Administrative Simplification provisions of the Health Insurance Portability and Accountability Act of 1996, the Fair Credit Reporting Act, and implementing regulations of such Acts. (Authority: 38 U.S.C. 501, 5724, 5727) rfrederick on PROD1PC67 with RULES § 75.112 Definitions and terms. For purposes of this subpart: Confidentiality means preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information. Data breach means the loss or theft of, or other unauthorized access to, other than an unauthorized access incidental to the scope of employment, data containing sensitive personal information, in electronic or printed form, that results in the potential compromise of the confidentiality or integrity of the data. Data breach analysis means the process used to determine if a data breach has resulted in the misuse of sensitive personal information. Fraud resolution services means services to assist an individual in the VerDate Aug<31>2005 14:57 Jun 21, 2007 Jkt 211001 process of recovering and rehabilitating the credit of the individual after the individual experiences identity theft. Identity theft has the meaning given such term under section 603 of the Fair Credit Reporting Act (15 U.S.C. 1681a). Identity theft insurance means any insurance policy that pays benefits for costs, including travel costs, notary fees, and postage costs, lost wages, and legal fees and expenses associated with efforts to correct and ameliorate the effects and results of identity theft of the insured individual. Individual means a single human being who is a citizen of the United States, an alien admitted to permanent residence in the United States, a present or former member of the Armed Forces, or any dependent of a present or former member of the Armed Forces. Information system means a discrete set of information resources organized for the collection, processing, maintenance, use, sharing, dissemination, or disposition of information, whether automated or manual. Integrity means guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity. Logical data access means the ability of a person to translate the data for misuse. This can lead to inappropriate access to lost, stolen or improperly obtained data. Person means an individual; partnership; corporation; Federal, State, or local government agency; or any other legal entity. Processed or maintained by VA means created, stored, transmitted, or manipulated by VA personnel or by a person acting on behalf of VA, including a contractor or other organization or any level of subcontractor or other suborganization. Secretary means the Secretary of Veterans Affairs or designee. Sensitive personal information, with respect to an individual, means any information about the individual maintained by an agency, including the following: (1) Education, financial transactions, medical history, and criminal or employment history. (2) Information that can be used to distinguish or trace the individual’s identity, including name, Social Security number, date and place of birth, mother’s maiden name, or biometric records. Unauthorized access incidental to the scope of employment means access, in accordance with VA data security and confidentiality policies and practices, PO 00000 Frm 00039 Fmt 4700 Sfmt 4700 34399 that is a by-product or result of a permitted use of the data, that is inadvertent and cannot reasonably be prevented, and that is limited in nature. VA means the Department of Veterans Affairs. (Authority: 38 U.S.C. 501, 5724, 5727) § 75.113 Data breach. Consistent with the definition of data breach in § 75.112 of this subpart, a data breach occurs under this subpart if there is a loss or theft of, or other unauthorized access to, other than an unauthorized access incidental to the scope of employment, data containing sensitive personal information, in electronic or printed form, that results in the potential compromise of the confidentiality or integrity of the data. The term ‘‘unauthorized access’’ used in the definition of ‘‘data breach’’ includes access to an electronic information system and includes, but is not limited to, viewing, obtaining, or using data containing sensitive personal information in any form or in any VA information system. The phrase ‘‘unauthorized access incidental to the scope of employment’’ includes instances when employees of contractors and other entities need access to VA sensitive information in order to perform a contract or agreement with VA but incidentally obtain access to other VA sensitive information. Accordingly, an unauthorized access, other than an unauthorized access incidental to the scope of employment, to data containing sensitive personal information, in electronic or printed form, that results in the potential compromise of the confidentiality or integrity of the data, constitutes a data breach. In addition to these circumstances, VA also interprets data breach to include circumstances in which a user misuses sensitive personal information to which he or she has authorized access. The following circumstances do not constitute a data breach and, consequently, are not subject to the provisions of this subpart: (a) An unauthorized access to data containing sensitive personal information that was determined by the Secretary to be incidental to the scope of employment, such as an inadvertent unauthorized viewing of sensitive personal information by a VA employee or a person acting on behalf of VA. (b) A loss, theft, or other unauthorized access to data containing sensitive personal information that the Secretary determined to have no possibility of compromising the confidentiality or integrity of the data, such as the inability of compromising the E:\FR\FM\22JNR1.SGM 22JNR1 34400 Federal Register / Vol. 72, No. 120 / Friday, June 22, 2007 / Rules and Regulations confidentiality or integrity of the data because of encryption or the inadvertent disclosure to another entity that is required to provide the same or a similar level of protection for the data under statutory or regulatory authority. (Authority: 38 U.S.C. 501, 5724, 5727) rfrederick on PROD1PC67 with RULES § 75.114 Accelerated response. (a) The Secretary, in the exercise of his or her discretion, may provide notice to records subjects of a data breach and/or offer them other credit protection services prior to the completion of a risk analysis if: (1) The Secretary determines, based on the information available to the agency when it learns of the data breach, that there is an immediate, substantial risk of identity theft of the individuals whose data was the subject of the data breach, and providing timely notice may enable the record subjects to promptly take steps to protect themselves, and/or the offer of other credit protection services will assist in timely mitigation of possible harm to individuals from the data breach; or (2) Private entities would be required to provide notice under Federal law if they experienced a data breach involving the same or similar information. (3) In situations described in paragraphs (a)(1) or (a)(2) of this section, the Secretary may provide notice of the breach prior to completion of a risk analysis, and subsequently advise individuals whether the agency will offer additional credit protection services upon completion, and consideration of the results, of the risk analysis, if the Secretary directs that one be completed. (b) In determining whether to promptly notify individuals and/or offer them other credit protection services under paragraph (a)(1) of this section, the Secretary shall make the decision based upon the totality of the circumstances and information available to the Secretary at the time of the decision, including whether providing notice and offering other credit protection services would be likely to assist record subjects in preventing, or mitigating the results of, identity theft based on the compromised VA sensitive personal information. The Secretary’s exercise of this discretion will be based on good cause, including consideration of the following factors: (1) The nature and content of the lost, stolen or improperly accessed data, e.g., the data elements involved, such as name, social security number, date of birth; (2) The ability of an unauthorized party to use the lost, stolen or VerDate Aug<31>2005 14:57 Jun 21, 2007 Jkt 211001 improperly accessed data, either by itself or with data or applications generally available, to commit identity theft or otherwise misuse the data to the disadvantage of the record subjects, if able to access and use the data; (3) Ease of logical data access to the lost, stolen or improperly accessed data in light of the degree of protection for the data, e.g., unencrypted, plain text; (4) Ease of physical access to the lost, stolen or improperly accessed data, e.g., the degree to which the data is readily available to unauthorized access, such as being in a dumpster readily accessible by members of the general public; (5) The format of the lost, stolen or improperly accessed data, e.g., in a standard electronic format, such as ASCII, or in paper; (6) Evidence indicating that the lost, stolen or improperly accessed data may have been the target of unlawful acquisition; and (7) Evidence that the same or similar data had been acquired from other sources improperly and used for identity theft. (c) VA will provide notice and/or other credit protection services under this section as provided in §§ 75.117 and 75.118. (Authority: 38 U.S.C. 501, 5724, 5727) § 75.115 Risk analysis. If a data breach involving sensitive personal information that is processed or maintained by VA occurs and the Secretary has not determined under § 75.114 that an accelerated response is appropriate, the Secretary shall ensure that, as soon as possible after the data breach, a non-VA entity with relevant expertise in data breach assessment and risk analysis or VA’s Office of Inspector General conducts an independent risk analysis of the data breach. The preparation of the risk analysis may include data mining if necessary for the development of relevant information. The risk analysis shall include a finding with supporting rationale concerning whether the circumstances create a reasonable risk that sensitive personal information potentially may be misused. If the risk analysis concludes that the data breach presents a reasonable risk for the potential misuse of sensitive personal information, the risk analysis must also contain operational recommendations for responding to the data breach. Each risk analysis, regardless of findings and operational recommendations, shall also address all relevant information concerning the data breach, including the following: (a) Nature of the event (loss, theft, unauthorized access). PO 00000 Frm 00040 Fmt 4700 Sfmt 4700 (b) Description of the event, including: (1) Date of occurrence; (2) Data elements involved, including any personally identifiable information, such as full name, social security number, date of birth, home address, account number, disability code; (3) Number of individuals affected or potentially affected; (4) Individuals or groups affected or potentially affected; (5) Ease of logical data access to the lost, stolen or improperly accessed data in light of the degree of protection for the data, e.g., unencrypted, plain text; (6) Time the data has been out of VA control; (7) The likelihood that the sensitive personal information will or has been compromised (made accessible to and usable by unauthorized persons); and (8) Known misuses of data containing sensitive personal information, if any. (c) Assessment of the potential harm to the affected individuals. (d) Data breach analysis, as appropriate. (Authority: 38 U.S.C. 501, 5724, 5727) § 75.116 Secretary determination. (a) Upon receipt of a risk analysis prepared under this subpart, the Secretary will consider the findings and other information contained in the risk analysis to determine whether the data breach caused a reasonable risk for the potential misuse of sensitive personal information. If the Secretary finds that such a reasonable risk does not exist, the Secretary will take no further action under this subpart. However, if the Secretary finds that such a reasonable risk exists, the Secretary will take responsive action as specified in this subpart based on the potential harms to individuals subject to a data breach. (b) In determining whether the data breach resulted in a reasonable risk for the potential misuse of the compromised sensitive personal information, the Secretary shall consider all factors that the Secretary, in his or her discretion, considers relevant to the decision, including: (1) The likelihood that the sensitive personal information will be or has been made accessible to and usable by unauthorized persons; (2) Known misuses, if any, of the same or similar sensitive personal information; (3) Any assessment of the potential harm to the affected individuals provided in the risk analysis; (4) Whether the credit protection services that VA may offer under 38 U.S.C. 5724 may assist record subjects in avoiding or mitigating the results of E:\FR\FM\22JNR1.SGM 22JNR1 Federal Register / Vol. 72, No. 120 / Friday, June 22, 2007 / Rules and Regulations identity theft based on the VA sensitive personal information that had been compromised; (5) Whether private entities are required under Federal law to offer credit protection services to individuals if the same or similar data of the private entities had been similarly compromised; and (6) The recommendations, if any, concerning the offer of, or benefits to be derived from, credit protection services in this case that are in the risk analysis report. (Authority: 38 U.S.C. 501, 5724, 5727) rfrederick on PROD1PC67 with RULES § 75.117 Notification. (a) With respect to individuals found under this subpart by the Secretary to be subject to a reasonable risk for the potential misuse of any sensitive personal information, the Secretary will promptly provide written notification by first-class mail to the individual (or the next of kin if the individual is deceased) at the last known address of the individual. The notification may be sent in one or more mailings as information is available and will include the following: (1) A brief description of what happened, including the date[s] of the data breach and of its discovery if known; (2) To the extent possible, a description of the types of personal information that were involved in the data breach (e.g., full name, Social Security number, date of birth, home address, account number, disability code); (3) A brief description of what the agency is doing to investigate the breach, to mitigate losses, and to protect against any further breach of the data; (4) Contact procedures for those wishing to ask questions or learn additional information, which will include a toll-free telephone number, an e-mail address, Web site, and/or postal address; (5) Steps individuals should take to protect themselves from the risk of identity theft, including steps to obtain fraud alerts (alerts of any key changes to such reports and on demand personal access to credit reports and scores), if appropriate, and instruction for obtaining other credit protection services offered under this subpart; and (6) A statement whether the information was encrypted or protected by other means, when determined such information would be beneficial and would not compromise the security of the system. (b) In those instances where there is insufficient, or out-of-date contact information that precludes direct VerDate Aug<31>2005 14:57 Jun 21, 2007 Jkt 211001 written notification to an individual subject to a data breach, a substitute form of notice may be provided, such as a conspicuous posting on the home page of VA’s Web site and notification in major print and broadcast media, including major media in geographic areas where the affected individuals likely reside. Such a notice in media will include a toll-free phone number where an individual can learn whether or not his or her personal information is possibly included in the data breach. (c) In those cases deemed by the Secretary to require urgency because of possible imminent misuse of sensitive personal information, the Secretary, in addition to notification under paragraph (a) of this section, may provide information to individuals by telephone or other means, as appropriate. (d) Notwithstanding other provisions in this section, notifications may be delayed upon lawful requests, from other Federal agencies, for the delay of notifications in order to protect data or computer resources from further compromise or to prevent interference with the conduct of an investigation or efforts to recover the data. A lawful request is one made in writing by the entity or VA component responsible for the investigation or data recovery efforts that may be adversely affected by providing notification. Any lawful request for delay in notification must state an estimated date after which the requesting entity believes that notification will not adversely affect the conduct of the investigation or efforts to recover the data. However, any delay should not exacerbate risk or harm to any affected individual(s). Decisions to delay notification should be made by the Secretary. (Authority: 38 U.S.C. 501, 5724, 5727) § 75.118 Other credit protection services. (a) With respect to individuals found under this subpart by the Secretary to be subject to a reasonable risk for the potential misuse of any sensitive personal information under this subpart, the Secretary may offer one or more of the following as warranted based on considerations specified in paragraph (b) of this section: (1) One year of credit monitoring services consisting of automatic daily monitoring of at least 3 relevant credit bureau reports; (2) Data breach analysis; (3) Fraud resolution services, including writing dispute letters, initiating fraud alerts and credit freezes, to assist affected individuals to bring matters to resolution; and/or PO 00000 Frm 00041 Fmt 4700 Sfmt 4700 34401 (4) One year of identity theft insurance with $20,000.00 coverage at $0 deductible. (b) Consistent with the requirements of the Fair Credit Reporting Act (15 U.S.C. 1681 et seq.) as interpreted and applied by the Federal Trade Commission, the notice to the individual offering other credit protection services will explain how the individual may obtain the services, including the information required to be submitted by the individual to obtain the services, and the time period within which the individual must act to take advantage of the credit protection services offered. (c) In determining whether any or all of the credit protection services specified in paragraph (a) of this section will be offered to individuals subject to a data breach, the Secretary will consider the following: (1) The data elements involved; (2) The number of individuals affected or potentially affected; (3) The likelihood the sensitive personal information will be or has been made accessible to and usable by unauthorized persons; (4) The risk of potential harm to the affected individuals; and (5) The ability to mitigate the risk of harm. (c) The Secretary will take action to obtain data mining and data breach analyses services, as appropriate, to obtain information relevant for making determinations under this subpart. (Authority: 38 U.S.C. 501, 5724, 5727) § 75.119 Finality of Secretary determination. A determination made by the Secretary under this subpart will be a final agency decision. [FR Doc. 07–3085 Filed 6–20–07: 9:50 am] BILLING CODE 8320–01–P ENVIRONMENTAL PROTECTION AGENCY 40 CFR Part 180 [EPA–HQ–OPP–2006–0523; FRL–8133–6] Thiamethoxam; Pesticide Tolerance Environmental Protection Agency (EPA). ACTION: Final rule. AGENCY: SUMMARY: This regulation establishes tolerances for combined residues of thiamethoxam and its metabolite (CGA– 322704) in or on artichoke, globe; caneberry subgroup 13-A, hop, dried cones; grape; grape, raisin; brassica, E:\FR\FM\22JNR1.SGM 22JNR1

Agencies

[Federal Register Volume 72, Number 120 (Friday, June 22, 2007)]
[Rules and Regulations]
[Pages 34395-34401]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 07-3085]


-----------------------------------------------------------------------

DEPARTMENT OF VETERANS AFFAIRS

38 CFR Part 75

RIN 2900-AM63


Data Breaches

AGENCY: Department of Veterans Affairs.

ACTION: Interim final rule.

-----------------------------------------------------------------------

SUMMARY: This document establishes regulations to address data breaches 
regarding sensitive personal information that is processed or 
maintained by the Department of Veterans Affairs (VA). The regulations 
implement certain provisions of Title IX of the Veterans Benefits, 
Health Care, and Information Technology Act of 2006, which require 
promulgation of these regulations as an interim final rule.

DATES: Effective Date: This interim final rule is effective on June 22, 
2007. Comments must be received on or before August 21, 2007.

ADDRESSES: Written comments may be submitted through 
www.Regulations.gov; by mail or hand-delivery to the Director, 
Regulations Management (00REG), Department of Veterans Affairs, 810 
Vermont Ave., NW., Room 1068, Washington, DC 20420; or by fax to (202) 
273-9026. Comments should indicate that they are submitted in response 
to ``RIN 2900-AM63-Data Breaches.'' Copies of comments received will be 
available for public inspection in the Office of Regulation Policy and 
Management, Room 1063B, between the hours of 8 a.m. and 4:30 p.m. 
Monday through Friday (except holidays). Please call (202) 273-9515 for 
an appointment. (This is not a toll-free number.) In addition, during 
the comment period, comments may be viewed online through the Federal 
Docket Management System (FDMS) at www.Regulations.gov.

FOR FURTHER INFORMATION CONTACT: Terry Simmons, Information Technology 
Specialist, Office of Information Protection and Risk Management 
(005T), (202) 461-9217, Department of Veterans Affairs, 810 Vermont 
Avenue, NW., Washington, DC 20420. (This is not a toll-free number.)

SUPPLEMENTARY INFORMATION: This document establishes regulations 
captioned ``Data Breaches'' (referred to below as the regulations). The 
regulations implement 38 U.S.C. 5724 and 5727, which were enacted as 
part of Title IX of Public Law 109-461, the Veterans Benefits, Health 
Care, and Information Technology Act of 2006. VA will promulgate 
regulations to implement 38 U.S.C. 5722 and 5723, which were also 
enacted as part of Title IX of Public Law 109-461, in a separate 
rulemaking.
    The regulations, which follow the statutory framework set out in 
section 5724, prescribe a mechanism for taking actions in response to a 
data breach of sensitive personal information. The finding of a data 
breach of sensitive personal information normally triggers a risk 
analysis. A risk analysis provides the basis for a determination as to 
whether individuals subject to a data breach will be given notice of 
the data breach and any other credit protections services authorized by 
VA. Under section 5724, VA must provide at least one credit protection 
service upon a finding that a reasonable risk exists for the potential 
misuse of sensitive personal information involved in a data breach. 
Consistent with this authority, the regulations require compliance with 
notification provisions when such finding occurs. The regulations also 
require that other credit protection services be provided, if 
warranted, based on the consideration of specified factors.
    However, section 5724 does not bar the Secretary from acting 
promptly to address a data breach without first conducting a risk 
analysis where the situation dictates. If the information available to 
the agency indicates that there is an immediate, substantial risk of 
identity theft of the individuals whose data was the subject of the 
data breach, the Secretary may notify the record subjects of the breach 
promptly so that they may take steps to protect themselves, and also 
may offer them other credit protection services without conducting a 
risk analysis. Additionally, the Secretary may offer credit protection 
services to individuals without first performing a risk analysis where 
a previous risk analysis performed by VA or another Federal agency 
involving the same or similar data determined that it was appropriate 
to offer the subject individuals credit protection services, including 
providing notice of the data breach. Finally, the Secretary may provide 
an initial notice of the data breach prior to completion of the risk 
analysis where private entities would be required to provide notice 
under Federal law if they experienced a data breach involving the same 
or similar information. In this last situation, the Secretary may 
provide notice of the breach and subsequently advise individuals 
whether the agency will offer additional credit protection services 
upon completion, and consideration of the results, of any risk 
analysis.
    Contents of this regulation, including notification of data 
breaches which may result in harms other than identity theft, should be 
interpreted to be consistent with OMB Memorandum M-07-16, 
``Safeguarding Against and Responding to Breaches of Personally 
Identifiable Information.'' The regulations are set forth as Subpart B 
in new 38 CFR part 75. Subpart A is reserved.

Section 75.111 Purpose and Scope

    The purpose and scope section explains that the regulations 
implement

[[Page 34396]]

38 U.S.C. 5724 and 5727 and that the regulations concern actions to 
address data breaches of sensitive personal information that is 
processed or maintained by VA. Thus, the regulations apply to sensitive 
personal information stored on VA computer systems, as well as to VA 
sensitive information stored on non-VA computer systems for VA, such as 
by a contractor. VA employees and contractors legally may perform 
activities for VA and for others. Those duties often require the 
collection, use and maintenance of sensitive personal information for 
both VA and for the other entity on a common electronic storage medium, 
such as a hard drive on a server. In these instances, the VA data are 
to be partitioned or segregated, such as being stored on separate 
virtual servers. Various factors may be different for the VA and non-VA 
data. For example, the data may be different, may have different levels 
of security or be in different formats. Finally, the legal protections 
required for the data, as well as the legal responsibilities for the 
data may be different. Consequently, the regulations apply only to VA 
data in this situation. The owners of the other, non-VA data residing 
on a non-VA storage medium that is lost, stolen or improperly accessed 
are responsible for identifying and complying with the legal 
requirements that those owners consider applicable to their data.
    Based on our interpretation of the statutory requirements, we have 
also added a statement indicating that the regulations do not supersede 
the requirements imposed by other laws, such as the Privacy Act of 
1974, the Administrative Simplification provisions of the Health 
Insurance Portability and Accountability Act of 1996, the Fair Credit 
Reporting Act, and implementing regulations of such Acts.

Section 75.112 Definitions and Terms

    So that the full terms would not have to be written out each time 
they are used in the regulations, ``VA'' means the Department of 
Veterans Affairs, and ``Secretary'' means the Secretary of Veterans 
Affairs or designee.
    The following definitions are exactly the same or the same in 
substance as the corresponding definitions in the authorizing 
legislation at 38 U.S.C. 5727: ``confidentiality,'' ``data breach,'' 
``data breach analysis,'' ``fraud resolution services,'' ``identity 
theft,'' ``identity theft insurance,'' ``information system,'' 
``integrity,'' and ``sensitive personal information.''
    The term ``individual'' is used in the definition of the phrase 
``sensitive personal information,'' but is itself undefined in the 
statute. We have defined ``individual'' to mean a single human being 
who is a citizen of the United States, an alien admitted to permanent 
residence in the United States, a present or former member of the Armed 
Forces, or any dependent of a present or former member of the Armed 
Forces. The first two parts of this definition come from the Privacy 
Act of 1974, 5 U.S.C. 552a(a)(2), and the last two parts come from 38 
U.S.C. 5701(a), which specifically provides confidentiality for the 
names and home addresses of present or former members of the Armed 
Forces and their dependents. It was apparent during the Congressional 
hearings after the May 2006 data breach involving the employee hard 
drive stolen from his home that the Members' focus was on the possible 
impact of a data breach on those individuals on whom VA normally 
maintains individually-identified information. The definition of 
``individual'' to include the human beings on whom VA maintains data is 
consistent with this Congressional concern.
    The phrase ``unauthorized access * * * incidental to the scope of 
employment'' is included in the statutory definition of data breach. We 
have defined this phrase to have the meaning that we believe was 
intended by the statutory authority.
    We defined ``person'' consistent with its common use when intended 
to include individuals and entities and consistent with its use in 
other VA regulations (see 38 CFR 1.460).
    We defined ``processed or maintained by VA'' to include all actions 
by VA regarding sensitive personal information for which VA has 
responsibility under the statutory authority of 38 U.S.C. 5724 and 
5727.

Section 75.113 Data Breach

    Consistent with the definition of ``data breach'' in the definition 
section, the regulations provide that a data breach occurs if there is 
a loss, theft, or other unauthorized access, other than an unauthorized 
access incidental to the scope of employment, to data containing 
sensitive personal information, in electronic or printed form, that 
results in the potential compromise of the confidentiality or integrity 
of the data. To clarify the scope of the regulations, we explain that 
the term ``unauthorized access'' used in the definition of ``data 
breach'' includes access to an electronic information system and 
includes, but is not limited to, viewing, obtaining, or using data 
containing sensitive personal information in any form or in any VA 
information system. The phrase ``unauthorized access incidental to the 
scope of employment'' includes instances when employees of contractors 
and other entities need access to VA sensitive information in order to 
perform a contract or agreement with VA but incidentally obtain access 
to other VA sensitive information. In accordance with this explanation, 
an unauthorized access, other than an unauthorized access incidental to 
the scope of employment, to data containing sensitive personal 
information, in electronic or printed form, which results in the 
potential compromise of the confidentiality or integrity of the data, 
constitutes a data breach. Also, in Sec.  75.113, we note that VA 
interprets data breach to include circumstances in which a user misuses 
sensitive personal information to which he or she has authorized 
access.
    To help interested individuals understand our view of what is not 
included in the definition of data breach, and, consequently, what is 
not subject to the provisions of the regulations, we have added an 
example in Sec.  75.113(a) to illustrate when an occurrence constitutes 
an unauthorized access incidental to the scope of employment.
    The following is a specific example of unauthorized access that is 
incidental to employment and therefore does not constitute a data 
breach. Contractor A has a contract to perform service 1 for VA. The 
contractor needs access to sensitive personal information to perform 
the contract. Contractor B also has a contract to perform service 2 for 
which contractor B needs access to sensitive personal information in 
order to perform the contract. The sensitive data in each contract is 
substantially the same, e.g., VA beneficiary demographic information 
for different groups of beneficiaries. Both contractors have complied 
with all applicable security and privacy requirements to access and use 
the data to perform each contract. A VA employee inadvertently provides 
contractor B with a CD with the encrypted data that contractor A needs 
to perform its contract. At the same time, the employee inadvertently 
also provides in a separate communication the password to decrypt the 
file. Contractor B opens the encrypted file, realizes that the 
sensitive personal information in the file is not the data that it 
needs to perform contract 2. Contractor B immediately closes and 
properly re-encrypts the data file and returns the CD to the 
appropriate VA official. Contractor B did not retain a copy of the data 
on the CD. Contractor B's access to the data file needed by Contractor 
A is an inadvertent unauthorized viewing of sensitive

[[Page 34397]]

personal information by a person acting on behalf of VA and therefore 
is not a data breach.
    We also have added examples in Sec.  75.113(b) to illustrate when 
an occurrence would not be one ``that results in the potential 
compromise of the confidentiality or integrity of the data.'' The 
addition of the clause ``that results in the potential compromise of 
the confidentiality or integrity of the data'' could not have been 
intended to mean zero percent possibility of creating a compromise of 
the confidentiality or integrity of the data, since such zero percent 
possibility would have applied if the clause had not been added. In our 
view, in order to trigger the need for a risk analysis, the added 
clause is appropriately interpreted to mean that a loss, theft, or 
other unauthorized access to data containing sensitive personal 
information that has even a minimal possibility of compromising the 
confidentiality or integrity of data constitutes a data breach and the 
examples reflect this conclusion.
    The following is another concrete example of an event that does not 
constitute a data breach. An employee is transporting a CD containing 
an encrypted flat file containing sensitive personal information. The 
file is encrypted using a software program that has been certified by 
the National Institute of Standards and Technology (NIST) as complying 
with the most recent security standards and certification of 
cryptographic modules. The vehicle in which the employee is riding 
crashes through a bridge railing and falls into a river. The car and 
the CD are recovered, and it is determined that the CD is destroyed. 
The likelihood that the CD will be recovered is minimal, and if 
recovered, the encryption would not permit access to the data. 
Therefore, there is no possibility of compromising the confidentiality 
or integrity of the data, and accordingly, this is not a data breach.

Section 75.114 Accelerated Response

    If the information available to the agency when VA learns of the 
data breach indicates that there is an immediate, substantial risk of 
identity theft for individuals as a result of the data breach, prior to 
completing a risk analysis, the Secretary may promptly notify the 
record subjects of the breach, and/or offer them other credit 
protection services as the Secretary determines in the exercise of his 
or her discretion what would be likely to assist the record subjects in 
preventing, or mitigating the results of, identity theft based on the 
compromised VA sensitive personal information. Additionally, Secretary 
may provide initial notice of the data breach without, or prior to 
completion of, a risk analysis where private entities would be required 
to provide notice under Federal law if they experienced a data breach 
involving the same or similar information. In such cases, the Secretary 
may provide notice of the breach and subsequently advise individuals 
whether the agency will offer additional credit protection services 
upon completion and consideration of the results of the risk analysis. 
The agency will provide the notice and/or other credit protection 
services under this section in accordance with Sec. Sec.  75.117 and 
75.118 of these regulations.

Section 75.115 Risk Analysis

    Under 38 U.S.C. 5724, VA must ensure that, as soon as possible 
after a data breach, a non-VA entity or the VA Office of Inspector 
General conducts an independent risk analysis of the data breach (which 
under 38 U.S.C. 5724 may include data mining as necessary to obtain 
relevant information) to determine the level of risk for potential 
misuse of sensitive personal information. To provide information that 
the Secretary will use in making determinations required under the 
regulations, this section requires that the risk analysis address 
identified factors relating to risks and potential harms.

Section 75.116 Secretary Determination

    Under 38 U.S.C. 5724, VA must consider the findings of each risk 
analysis and determine, based on criteria in the regulation, whether a 
reasonable risk exists for the potential misuse of sensitive personal 
information involved in a data breach. Consistent with the statutory 
intent, this section indicates that VA will take no further action 
under the regulations upon a finding that such a reasonable risk does 
not exist. Also, consistent with the statutory intent, this section 
indicates that VA will take further action as provided under the 
regulations (discussed below) upon a finding that a data breach of 
sensitive personal information poses a reasonable risk of potential 
misuse.

Section 75.117 Notification

    To implement 38 U.S.C. 5724, we are establishing procedures for 
notifying individuals whose sensitive personal information are subject 
to a reasonable risk for potential misuse from a data breach. Under 
this statutory provision, we have authority to provide notification 
once there is a finding that a reasonable risk exists for the potential 
misuse of any sensitive personal information involved in the data 
breach. The regulations reflect our view that the notification 
procedures should be utilized whenever this threshold determination is 
made by the Secretary.
    Paragraph (a) includes the information that we believe should be 
provided to affected individuals to ensure that they understand what 
has happened and what they can expect from VA with regard to other 
credit protection services. Under paragraph (a), affected individuals 
will receive letters sent via first-class mail explaining the 
circumstances of the data breach and possible responses for such 
individuals. We believe that this is an effective means of providing 
information. However, paragraph (b) contains alternative means of 
providing information if we are unable to contact an affected 
individual by mail. Further, paragraph (c) clarifies that VA will also 
provide notification using a quicker method, such as notification by 
telephone, when there is a possible imminent misuse of sensitive 
personal information due to a data breach. However, we have also 
included information in paragraph (d) explaining that in determining 
when to provide notification, we will consider lawful requests, from 
other Federal agencies, for the delay of notifications in order to 
prevent interference with the conduct of an investigation or efforts to 
recover the data.

Section 75.118 Other Credit Protection Services

    Under 38 U.S.C. 5724, VA may provide other credit protection 
services to individuals found to be subject to a reasonable risk for 
the potential misuse of any sensitive personal information because of a 
data breach. VA is specifically authorized to provide credit 
monitoring, data breach analysis, fraud resolution services, and 
identity theft insurance. Accordingly, the Secretary may offer one or 
more of the following if warranted based on considerations specified 
below:
     One year of credit monitoring services consisting of 
automatic daily monitoring of at least 3 relevant credit bureau reports 
(this is a standard credit monitoring policy);
     Data breach analysis;
     Fraud resolutions services, including writing dispute 
letters, initiating fraud alerts and credit freezes, to assist affected 
individuals to bring matters to resolution; and/or
     One year of identity theft insurance with $20,000.00 
coverage at $0

[[Page 34398]]

deductible (this is a standard identity theft insurance policy).
    The determination by the Secretary regarding whether any or all of 
these credit protection services will be offered to individuals subject 
to a data breach will depend on the particular facts in a case. 
Accordingly, we have established the following considerations for 
helping to determine what credit protection services will be offered to 
individuals subject to a data breach:
     The data elements involved;
     The number of individuals affected or potentially 
affected;
     The likelihood that sensitive personal information will be 
or has been compromised (made accessible to and usable by unauthorized 
persons);
     The risk of harm to the affected individuals; and
     The ability to prevent or mitigate the risk of harm by 
offering credit protection services.
    Pursuant to authority in 38 U.S.C. 5724, the regulations also 
provide that VA will obtain data mining and data breach analyses 
services, as appropriate, to obtain information relevant for making 
determinations under this subpart.

Section 75.119 Finality of Secretary Determination

    Under 38 U.S.C. 5724, the Secretary is required to make various 
determinations concerning a particular data breach incident. Any 
determination made by the Secretary under this subpart will be 
considered a final agency decision.

Solicitation of Comments

    VA solicits comments on the following matters. VA will consider 
comments on all provisions of this Interim Final Rule received during 
the 60-day public comment period.

Section 75.115 Risk Analysis

    VA solicits comments on use of data mining as necessary for the 
development of relevant information to assist in preparation of risk 
analysis following a data breach. In particular, we seek comments on 
the purposes for which data mining would be appropriate and acceptable 
uses of the information resulting from data mining.

Section 75.117 Notification

    We are considering not providing written notification if the 
Secretary determines that the data breach incident has been widely 
disseminated through the media. Specifically, we are soliciting comment 
on the following possible draft provision:

    (e) Notwithstanding other provisions of this section, the 
Secretary may forgo notification by first-class mail upon a 
determination that the information in paragraphs (a)(1) through 
(a)(5) of this section has been widely disseminated through the 
media, a mailing would virtually duplicate information that has 
already been provided to individuals subject to a data breach, and 
the agency can determine with reasonable certainty all of the 
affected individuals have received actual notice of (1) the data 
breach and (2) their inclusion in the affected class of individuals. 
In determining whether media dissemination has already provided 
adequate notice to affected individuals, the Secretary will also 
consider media coverage at the national level, and, where the data 
breach is limited to individuals within a particular, defined 
geographic area or areas, the media coverage in that area. The 
Secretary will further consider the extent of the accuracy of media 
coverage, frequency of repetition of such media coverage (number of 
articles or frequency of publications or broadcasts), and the 
variety of media outlets carrying such media coverage.

Potential Procedures for Appeals or Reconsiderations of Decisions Made 
Under Subpart B

    Public Law 109-461 was silent regarding appeals or reconsiderations 
of decisions made under Section 902 Department of Veterans Affairs 
Information Security Programs and Requirements. VA solicits comments on 
potential procedures for appeals and reconsiderations.

Administrative Procedure Act

    This rule is exempt from the prior notice and comment and delayed 
effective date provisions of 5 U.S.C. 553 for good cause because they 
are unnecessary based on the statutory mandate in 38 U.S.C. 5724 to 
publish this document as an interim final rule. 5 U.S.C. 553(b)(B), 
(d)(3).

Unfunded Mandates

    The Unfunded Mandates Reform Act of 1995 requires, at 2 U.S.C. 
1532, that agencies prepare an assessment of anticipated costs and 
benefits before issuing any rule that may result in expenditure by 
State, local, and tribal governments, in the aggregate, or by the 
private sector, of $100 million or more (adjusted annually for 
inflation) in any given year. This rule would have no such effect on 
State, local, and tribal governments or the private sector.

Paperwork Reduction Act

    This document contains no provisions constituting a collection of 
information under the Paperwork Reduction Act of 1995 (44 U.S.C. 3501-
3521).

Executive Order 12866

    Executive Order 12866 directs agencies to assess all costs and 
benefits of available regulatory alternatives and, when regulation is 
necessary, to select regulatory approaches that maximize net benefits 
(including potential economic, environmental, public health and safety, 
and other advantages; distributive impacts; and equity). The Executive 
Order classifies a ``significant regulatory action,'' requiring review 
by the Office of Management and Budget (OMB) unless OMB waives such 
review, as any regulatory action that is likely to result in a rule 
that may: (1) Have an annual effect on the economy of $100 million or 
more or adversely affect in a material way the economy, a sector of the 
economy, productivity, competition, jobs, the environment, public 
health or safety, or State, local, or tribal governments or 
communities; (2) create a serious inconsistency or otherwise interfere 
with an action taken or planned by another agency; (3) materially alter 
the budgetary impact of entitlements, grants, user fees, or loan 
programs or the rights and obligations of recipients thereof; or (4) 
raise novel legal or policy issues arising out of legal mandates, the 
President's priorities, or the principles set forth in the Executive 
Order.
    The economic, interagency, budgetary, legal, and policy 
implications of this interim final rule have been examined and it has 
been determined to be a significant regulatory action under the 
Executive Order because it is likely to result in a rule that may raise 
novel legal or policy issues arising out of legal mandates, the 
President's priorities, or the principles set forth in the Executive 
Order.

Regulatory Flexibility Act

    The provisions of the Regulatory Flexibility Act (5 U.S.C. 601-612) 
do not apply to this interim final rule because the provisions of 38 
U.S.C. 5724 require that this document be promulgated as an interim 
final rule, and, consequently, a notice of proposed rulemaking was not 
required for the rule. 5 U.S.C. 603-604.

Catalog of Federal Domestic Assistance Numbers

    There are no Catalog of Federal Domestic Assistance numbers and 
titles for this rule.

List of Subjects in 38 CFR Part 75

    Administrative practice and procedure, Credit monitoring, Data 
breach, Data breach analysis, Data mining, Fraud alerts, Identity theft 
insurance, Information, Notification, Risk analysis, Security measures.


[[Page 34399]]


    Approved: June 13, 2007.
Gordon H. Mansfield,
Deputy Secretary of Veterans Affairs.

0
For reasons set forth in the preamble, VA is amending 38 CFR chapter I 
by adding part 75 to read as follows:

PART 75--INFORMATION SECURITY MATTERS

Subpart A--[Reserved]
Subpart B--Data Breaches
Sec.
75.111 Purpose and scope.
75.112 Definitions and terms.
75.113 Data breach.
75.114 Accelerated response.
75.115 Risk analysis.
75.116 Secretary determination.
75.117 Notification.
75.118 Other credit protection services.
75.119 Finality of Secretary determination.

    Authority: 38 U.S.C. 501, 5724, 5727, 7906.

Subpart A--[Reserved]

Subpart B--Data Breaches


Sec.  75.111  Purpose and scope.

    This subpart implements provisions of 38 U.S.C. 5724 and 5727, 
which are set forth in Title IX of the Veterans Benefits, Health Care, 
and Information Technology Act of 2006. It only concerns actions to 
address a data breach regarding sensitive personal information that is 
processed or maintained by VA. This subpart does not supersede the 
requirements imposed by other laws, such as the Privacy Act of 1974, 
the Administrative Simplification provisions of the Health Insurance 
Portability and Accountability Act of 1996, the Fair Credit Reporting 
Act, and implementing regulations of such Acts.

(Authority: 38 U.S.C. 501, 5724, 5727)

Sec.  75.112  Definitions and terms.

    For purposes of this subpart:
    Confidentiality means preserving authorized restrictions on access 
and disclosure, including means for protecting personal privacy and 
proprietary information.
    Data breach means the loss or theft of, or other unauthorized 
access to, other than an unauthorized access incidental to the scope of 
employment, data containing sensitive personal information, in 
electronic or printed form, that results in the potential compromise of 
the confidentiality or integrity of the data.
    Data breach analysis means the process used to determine if a data 
breach has resulted in the misuse of sensitive personal information.
    Fraud resolution services means services to assist an individual in 
the process of recovering and rehabilitating the credit of the 
individual after the individual experiences identity theft.
    Identity theft has the meaning given such term under section 603 of 
the Fair Credit Reporting Act (15 U.S.C. 1681a).
    Identity theft insurance means any insurance policy that pays 
benefits for costs, including travel costs, notary fees, and postage 
costs, lost wages, and legal fees and expenses associated with efforts 
to correct and ameliorate the effects and results of identity theft of 
the insured individual.
    Individual means a single human being who is a citizen of the 
United States, an alien admitted to permanent residence in the United 
States, a present or former member of the Armed Forces, or any 
dependent of a present or former member of the Armed Forces.
    Information system means a discrete set of information resources 
organized for the collection, processing, maintenance, use, sharing, 
dissemination, or disposition of information, whether automated or 
manual.
    Integrity means guarding against improper information modification 
or destruction, and includes ensuring information non-repudiation and 
authenticity.
    Logical data access means the ability of a person to translate the 
data for misuse. This can lead to inappropriate access to lost, stolen 
or improperly obtained data.
    Person means an individual; partnership; corporation; Federal, 
State, or local government agency; or any other legal entity.
    Processed or maintained by VA means created, stored, transmitted, 
or manipulated by VA personnel or by a person acting on behalf of VA, 
including a contractor or other organization or any level of 
subcontractor or other suborganization.
    Secretary means the Secretary of Veterans Affairs or designee.
    Sensitive personal information, with respect to an individual, 
means any information about the individual maintained by an agency, 
including the following:
    (1) Education, financial transactions, medical history, and 
criminal or employment history.
    (2) Information that can be used to distinguish or trace the 
individual's identity, including name, Social Security number, date and 
place of birth, mother's maiden name, or biometric records.
    Unauthorized access incidental to the scope of employment means 
access, in accordance with VA data security and confidentiality 
policies and practices, that is a by-product or result of a permitted 
use of the data, that is inadvertent and cannot reasonably be 
prevented, and that is limited in nature.
    VA means the Department of Veterans Affairs.


(Authority: 38 U.S.C. 501, 5724, 5727)

Sec.  75.113  Data breach.

    Consistent with the definition of data breach in Sec.  75.112 of 
this subpart, a data breach occurs under this subpart if there is a 
loss or theft of, or other unauthorized access to, other than an 
unauthorized access incidental to the scope of employment, data 
containing sensitive personal information, in electronic or printed 
form, that results in the potential compromise of the confidentiality 
or integrity of the data. The term ``unauthorized access'' used in the 
definition of ``data breach'' includes access to an electronic 
information system and includes, but is not limited to, viewing, 
obtaining, or using data containing sensitive personal information in 
any form or in any VA information system. The phrase ``unauthorized 
access incidental to the scope of employment'' includes instances when 
employees of contractors and other entities need access to VA sensitive 
information in order to perform a contract or agreement with VA but 
incidentally obtain access to other VA sensitive information. 
Accordingly, an unauthorized access, other than an unauthorized access 
incidental to the scope of employment, to data containing sensitive 
personal information, in electronic or printed form, that results in 
the potential compromise of the confidentiality or integrity of the 
data, constitutes a data breach. In addition to these circumstances, VA 
also interprets data breach to include circumstances in which a user 
misuses sensitive personal information to which he or she has 
authorized access. The following circumstances do not constitute a data 
breach and, consequently, are not subject to the provisions of this 
subpart:
    (a) An unauthorized access to data containing sensitive personal 
information that was determined by the Secretary to be incidental to 
the scope of employment, such as an inadvertent unauthorized viewing of 
sensitive personal information by a VA employee or a person acting on 
behalf of VA.
    (b) A loss, theft, or other unauthorized access to data containing 
sensitive personal information that the Secretary determined to have no 
possibility of compromising the confidentiality or integrity of the 
data, such as the inability of compromising the

[[Page 34400]]

confidentiality or integrity of the data because of encryption or the 
inadvertent disclosure to another entity that is required to provide 
the same or a similar level of protection for the data under statutory 
or regulatory authority.

(Authority: 38 U.S.C. 501, 5724, 5727)

Sec.  75.114  Accelerated response.

    (a) The Secretary, in the exercise of his or her discretion, may 
provide notice to records subjects of a data breach and/or offer them 
other credit protection services prior to the completion of a risk 
analysis if:
    (1) The Secretary determines, based on the information available to 
the agency when it learns of the data breach, that there is an 
immediate, substantial risk of identity theft of the individuals whose 
data was the subject of the data breach, and providing timely notice 
may enable the record subjects to promptly take steps to protect 
themselves, and/or the offer of other credit protection services will 
assist in timely mitigation of possible harm to individuals from the 
data breach; or
    (2) Private entities would be required to provide notice under 
Federal law if they experienced a data breach involving the same or 
similar information.
    (3) In situations described in paragraphs (a)(1) or (a)(2) of this 
section, the Secretary may provide notice of the breach prior to 
completion of a risk analysis, and subsequently advise individuals 
whether the agency will offer additional credit protection services 
upon completion, and consideration of the results, of the risk 
analysis, if the Secretary directs that one be completed.
    (b) In determining whether to promptly notify individuals and/or 
offer them other credit protection services under paragraph (a)(1) of 
this section, the Secretary shall make the decision based upon the 
totality of the circumstances and information available to the 
Secretary at the time of the decision, including whether providing 
notice and offering other credit protection services would be likely to 
assist record subjects in preventing, or mitigating the results of, 
identity theft based on the compromised VA sensitive personal 
information. The Secretary's exercise of this discretion will be based 
on good cause, including consideration of the following factors:
    (1) The nature and content of the lost, stolen or improperly 
accessed data, e.g., the data elements involved, such as name, social 
security number, date of birth;
    (2) The ability of an unauthorized party to use the lost, stolen or 
improperly accessed data, either by itself or with data or applications 
generally available, to commit identity theft or otherwise misuse the 
data to the disadvantage of the record subjects, if able to access and 
use the data;
    (3) Ease of logical data access to the lost, stolen or improperly 
accessed data in light of the degree of protection for the data, e.g., 
unencrypted, plain text;
    (4) Ease of physical access to the lost, stolen or improperly 
accessed data, e.g., the degree to which the data is readily available 
to unauthorized access, such as being in a dumpster readily accessible 
by members of the general public;
    (5) The format of the lost, stolen or improperly accessed data, 
e.g., in a standard electronic format, such as ASCII, or in paper;
    (6) Evidence indicating that the lost, stolen or improperly 
accessed data may have been the target of unlawful acquisition; and
    (7) Evidence that the same or similar data had been acquired from 
other sources improperly and used for identity theft.
    (c) VA will provide notice and/or other credit protection services 
under this section as provided in Sec. Sec.  75.117 and 75.118.

(Authority: 38 U.S.C. 501, 5724, 5727)

Sec.  75.115  Risk analysis.

    If a data breach involving sensitive personal information that is 
processed or maintained by VA occurs and the Secretary has not 
determined under Sec.  75.114 that an accelerated response is 
appropriate, the Secretary shall ensure that, as soon as possible after 
the data breach, a non-VA entity with relevant expertise in data breach 
assessment and risk analysis or VA's Office of Inspector General 
conducts an independent risk analysis of the data breach. The 
preparation of the risk analysis may include data mining if necessary 
for the development of relevant information. The risk analysis shall 
include a finding with supporting rationale concerning whether the 
circumstances create a reasonable risk that sensitive personal 
information potentially may be misused. If the risk analysis concludes 
that the data breach presents a reasonable risk for the potential 
misuse of sensitive personal information, the risk analysis must also 
contain operational recommendations for responding to the data breach. 
Each risk analysis, regardless of findings and operational 
recommendations, shall also address all relevant information concerning 
the data breach, including the following:
    (a) Nature of the event (loss, theft, unauthorized access).
    (b) Description of the event, including:
    (1) Date of occurrence;
    (2) Data elements involved, including any personally identifiable 
information, such as full name, social security number, date of birth, 
home address, account number, disability code;
    (3) Number of individuals affected or potentially affected;
    (4) Individuals or groups affected or potentially affected;
    (5) Ease of logical data access to the lost, stolen or improperly 
accessed data in light of the degree of protection for the data, e.g., 
unencrypted, plain text;
    (6) Time the data has been out of VA control;
    (7) The likelihood that the sensitive personal information will or 
has been compromised (made accessible to and usable by unauthorized 
persons); and
    (8) Known misuses of data containing sensitive personal 
information, if any.
    (c) Assessment of the potential harm to the affected individuals.
    (d) Data breach analysis, as appropriate.

(Authority: 38 U.S.C. 501, 5724, 5727)

Sec.  75.116  Secretary determination.

    (a) Upon receipt of a risk analysis prepared under this subpart, 
the Secretary will consider the findings and other information 
contained in the risk analysis to determine whether the data breach 
caused a reasonable risk for the potential misuse of sensitive personal 
information. If the Secretary finds that such a reasonable risk does 
not exist, the Secretary will take no further action under this 
subpart. However, if the Secretary finds that such a reasonable risk 
exists, the Secretary will take responsive action as specified in this 
subpart based on the potential harms to individuals subject to a data 
breach.
    (b) In determining whether the data breach resulted in a reasonable 
risk for the potential misuse of the compromised sensitive personal 
information, the Secretary shall consider all factors that the 
Secretary, in his or her discretion, considers relevant to the 
decision, including:
    (1) The likelihood that the sensitive personal information will be 
or has been made accessible to and usable by unauthorized persons;
    (2) Known misuses, if any, of the same or similar sensitive 
personal information;
    (3) Any assessment of the potential harm to the affected 
individuals provided in the risk analysis;
    (4) Whether the credit protection services that VA may offer under 
38 U.S.C. 5724 may assist record subjects in avoiding or mitigating the 
results of

[[Page 34401]]

identity theft based on the VA sensitive personal information that had 
been compromised;
    (5) Whether private entities are required under Federal law to 
offer credit protection services to individuals if the same or similar 
data of the private entities had been similarly compromised; and
    (6) The recommendations, if any, concerning the offer of, or 
benefits to be derived from, credit protection services in this case 
that are in the risk analysis report.

(Authority: 38 U.S.C. 501, 5724, 5727)

Sec.  75.117  Notification.

    (a) With respect to individuals found under this subpart by the 
Secretary to be subject to a reasonable risk for the potential misuse 
of any sensitive personal information, the Secretary will promptly 
provide written notification by first-class mail to the individual (or 
the next of kin if the individual is deceased) at the last known 
address of the individual. The notification may be sent in one or more 
mailings as information is available and will include the following:
    (1) A brief description of what happened, including the date[s] of 
the data breach and of its discovery if known;
    (2) To the extent possible, a description of the types of personal 
information that were involved in the data breach (e.g., full name, 
Social Security number, date of birth, home address, account number, 
disability code);
    (3) A brief description of what the agency is doing to investigate 
the breach, to mitigate losses, and to protect against any further 
breach of the data;
    (4) Contact procedures for those wishing to ask questions or learn 
additional information, which will include a toll-free telephone 
number, an e-mail address, Web site, and/or postal address;
    (5) Steps individuals should take to protect themselves from the 
risk of identity theft, including steps to obtain fraud alerts (alerts 
of any key changes to such reports and on demand personal access to 
credit reports and scores), if appropriate, and instruction for 
obtaining other credit protection services offered under this subpart; 
and
    (6) A statement whether the information was encrypted or protected 
by other means, when determined such information would be beneficial 
and would not compromise the security of the system.
    (b) In those instances where there is insufficient, or out-of-date 
contact information that precludes direct written notification to an 
individual subject to a data breach, a substitute form of notice may be 
provided, such as a conspicuous posting on the home page of VA's Web 
site and notification in major print and broadcast media, including 
major media in geographic areas where the affected individuals likely 
reside. Such a notice in media will include a toll-free phone number 
where an individual can learn whether or not his or her personal 
information is possibly included in the data breach.
    (c) In those cases deemed by the Secretary to require urgency 
because of possible imminent misuse of sensitive personal information, 
the Secretary, in addition to notification under paragraph (a) of this 
section, may provide information to individuals by telephone or other 
means, as appropriate.
    (d) Notwithstanding other provisions in this section, notifications 
may be delayed upon lawful requests, from other Federal agencies, for 
the delay of notifications in order to protect data or computer 
resources from further compromise or to prevent interference with the 
conduct of an investigation or efforts to recover the data. A lawful 
request is one made in writing by the entity or VA component 
responsible for the investigation or data recovery efforts that may be 
adversely affected by providing notification. Any lawful request for 
delay in notification must state an estimated date after which the 
requesting entity believes that notification will not adversely affect 
the conduct of the investigation or efforts to recover the data. 
However, any delay should not exacerbate risk or harm to any affected 
individual(s). Decisions to delay notification should be made by the 
Secretary.


(Authority: 38 U.S.C. 501, 5724, 5727)

Sec.  75.118  Other credit protection services.

    (a) With respect to individuals found under this subpart by the 
Secretary to be subject to a reasonable risk for the potential misuse 
of any sensitive personal information under this subpart, the Secretary 
may offer one or more of the following as warranted based on 
considerations specified in paragraph (b) of this section:
    (1) One year of credit monitoring services consisting of automatic 
daily monitoring of at least 3 relevant credit bureau reports;
    (2) Data breach analysis;
    (3) Fraud resolution services, including writing dispute letters, 
initiating fraud alerts and credit freezes, to assist affected 
individuals to bring matters to resolution; and/or
    (4) One year of identity theft insurance with $20,000.00 coverage 
at $0 deductible.
    (b) Consistent with the requirements of the Fair Credit Reporting 
Act (15 U.S.C. 1681 et seq.) as interpreted and applied by the Federal 
Trade Commission, the notice to the individual offering other credit 
protection services will explain how the individual may obtain the 
services, including the information required to be submitted by the 
individual to obtain the services, and the time period within which the 
individual must act to take advantage of the credit protection services 
offered.
    (c) In determining whether any or all of the credit protection 
services specified in paragraph (a) of this section will be offered to 
individuals subject to a data breach, the Secretary will consider the 
following:
    (1) The data elements involved;
    (2) The number of individuals affected or potentially affected;
    (3) The likelihood the sensitive personal information will be or 
has been made accessible to and usable by unauthorized persons;
    (4) The risk of potential harm to the affected individuals; and
    (5) The ability to mitigate the risk of harm.
    (c) The Secretary will take action to obtain data mining and data 
breach analyses services, as appropriate, to obtain information 
relevant for making determinations under this subpart.


(Authority: 38 U.S.C. 501, 5724, 5727)

Sec.  75.119  Finality of Secretary determination.

    A determination made by the Secretary under this subpart will be a 
final agency decision.

[FR Doc. 07-3085 Filed 6-20-07: 9:50 am]
BILLING CODE 8320-01-P
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.