Privacy Act of 1974; U.S. Customs and Border Protection, Automated Targeting System, System of Records, 43650-43656 [E7-15197]

Download as PDF 43650 Federal Register / Vol. 72, No. 150 / Monday, August 6, 2007 / Notices found to improve expression of unstable mRNA by about 500-fold. Similarly this combination of elements led to synergistically elevated levels of HIV–1 Env expression. The function of CTEs and RTEs is conserved in mammalian cells, so this technology is a simple and useful way of obtaining high levels of expression of otherwise poorly expressed genes and can be used in a number of applications such as but not limited to improvements of gene therapy vectors, expression vectors for mammalian cells. Applications: Gene therapy; DNA vaccines; Protein expression. Development Status: In vitro data available. Inventor: Barbara Felber et al. (NCI). Patent Status: U.S. Utility Application No. 10/557,129, filed 16 Nov 2005, from PCT Application No. PCT/US04/15776 filed 19 May 2004, which published as WO2004/113547 on 29 Dec 2004 (HHS Reference No. E–223–2003/1–US–03). Licensing Status: Available for licensing. Licensing Contact: Susan Ano, PhD; 301/435–5515; anos@mail.nih.gov. Collaborative Research Opportunity: The National Cancer Institute Vaccine Branch is seeking statements of capability or interest from parties interested in collaborative research to further develop, evaluate, or commercialize this technology. Please contact John D. Hewes, PhD at 301–435– 3121 or hewesj@mail.nih.gov for more information. determined by the Administrator, SAMHSA, in accordance with Title 5 U.S.C. 552b(c)(6) and 5 U.S.C. App. 2, Section 10(d). Substantive program information, a summary of the meeting and a roster of Council members may be obtained as soon as possible after the meeting, either by accessing the SAMHSA Committee Web site at www.nac.samhsa.gov, or by contacting the CSAT National Advisory Council Executive Secretary, Ms. Cynthia Graham (see contact information below). Committee Name: SAMHSA Center for Substance Abuse Treatment National; Advisory Council. Date/Time/Type: August 23, 2007, from 1 p.m. to 3 p.m.; Closed. Place: SAMHSA Building, 1 Choke Cherry Road, VTC Room, L–1057, Rockville, Maryland 20857. Contact: Cynthia Graham, M.S., Executive Secretary, SAMHSA CSAT National Advisory Council, 1 Choke Cherry Road, Room 5–1035, Rockville, Maryland 20857, Telephone: (240) 276– 1692, Fax: (240) 276–16890, E-mail: cynthia.graham@samhsa.hhs.gov. Dated: July 31, 2007. Steven M. Ferguson, Director, Division of Technology Development and Transfer, Office of Technology Transfer, National Institutes of Health. [FR Doc. E7–15208 Filed 8–3–07; 8:45 am] DEPARTMENT OF HOMELAND SECURITY Dated: July 31, 2007. Toian Vaughn, Committee Management Officer, Substance Abuse and Mental Health, Services Administration. [FR Doc. E7–15217 Filed 8–3–07; 8:45 am] BILLING CODE 4162–20–P Office of the Secretary [DHS–2007–0042] BILLING CODE 4140–01–P Privacy Act of 1974; U.S. Customs and Border Protection, Automated Targeting System, System of Records DEPARTMENT OF HEALTH AND HUMAN SERVICES AGENCY: Privacy Office; Department of Homeland Security. ACTION: Notice of Privacy Act System of Records. Substance Abuse and Mental Health Services Administration sroberts on PROD1PC70 with NOTICES Center for Substance Abuse Treatment; Notice of Meeting Pursuant to Public Law 92–463, notice is hereby given that the Substance Abuse and Mental Health Services Administration (SAMHSA) Center for Substance Abuse Treatment (CSAT) National Advisory Council will meet on August 23, 2007 from 1 p.m. to 3 p.m. via teleconference. The meeting will include review, discussion, and evaluation of grant applications. Therefore, the meeting will be closed to the public as VerDate Aug<31>2005 19:38 Aug 03, 2007 Jkt 211001 SUMMARY: This document is a new System of Records Notice (SORN) for the Automated Targeting System (ATS) and is subject to the Privacy Act of 1974, as amended. ATS is an enforcement screening tool consisting of six separate components, all of which rely substantially on information in the Treasury Enforcement Communications System (TECS). ATS historically was covered by the SORN for TECS. The Department of Homeland Security, U.S. Customs and Border Protection (CBP) published a separate SORN for ATS in the Federal Register on November 2, PO 00000 Frm 00060 Fmt 4703 Sfmt 4703 2006. This SORN did not describe any new collection of information and was intended solely to provide increased notice and transparency to the public about ATS. Based on comments received in response to the November 2, 2006 notice, CBP issues this revised SORN, which responds to those comments, makes certain amendments with regard to the retention period and access provisions of the prior notice, and provides further notice and transparency to the public about the functionality of ATS. TECS is an overarching law enforcement information collection, risk assessment, and information sharing environment. It is also a repository for law enforcement and investigative information. TECS is comprised of several modules that collect, maintain, and evaluate screening data, conduct targeting, and make information available to appropriate officers of the U.S. government. ATS is one of those modules. It is a decision support tool that compares traveler, cargo, and conveyance information against intelligence and other enforcement data by incorporating risk-based targeting scenarios and assessments. As such, ATS allows DHS officers charged with enforcing U.S. law and preventing terrorism and other crimes to effectively and efficiently manage information collected when travelers or goods seek to enter, exit, or transit through the United States. Within ATS there are six separate and distinct components that perform screening of inbound and outbound cargo, conveyances, or travelers. These modules compare information received against CBP’s law enforcement databases, the Federal Bureau of Investigation Terrorist Screening Center’s Terrorist Screening Database (TSDB), information on outstanding wants or warrants, information from other government agencies regarding high-risk parties, and risk-based rules developed by analysts using law enforcement data, intelligence, and past case experience. The modules also facilitate analysis of the screening results of these comparisons. In the case of cargo and conveyances, this screening results in a risk assessment score. In the case of travelers, however, it does not result in a risk assessment score. DATES: The new system of records will be effective September 5, 2007. FOR FURTHER INFORMATION CONTACT: For general questions please contact: Laurence E. Castelli (202–572–8790), Chief, Privacy Act Policy and Procedures Branch, U.S. Customs and Border Protection, Office of E:\FR\FM\06AUN1.SGM 06AUN1 Federal Register / Vol. 72, No. 150 / Monday, August 6, 2007 / Notices International Trade, Mint Annex, 1300 Pennsylvania Ave., NW., Washington, DC 20229. For privacy issues please contact: Hugo Teufel III (703–235– 0780), Chief Privacy Officer, Privacy Office, U.S. Department of Homeland Security, Washington, DC 20528. SUPPLEMENTARY INFORMATION: sroberts on PROD1PC70 with NOTICES Background The System The priority mission of CBP is to prevent terrorists and terrorist weapons from entering the country while facilitating legitimate travel and trade. ATS uses CBP’s law enforcement databases, the Federal Bureau of Investigation Terrorist Screening Center’s Terrorist Screening Database (TSDB), information on outstanding wants or warrants, information from other government agencies regarding high-risk parties, and risk-based rules developed by analysts to assess and identify high-risk cargo, conveyances, and travelers that may pose a greater risk of terrorist or criminal activity and therefore should be subject to further scrutiny or examination. These rules are based on investigatory and law enforcement data, intelligence, and past case experience. Historically, the SORN for the Treasury Enforcement Communications System (TECS) covered ATS. As part of DHS’s updating of its system of records notices and in an effort to provide more detailed information to the traveling public and trade community, DHS has decided to notice ATS as a separate Privacy Act system of records, giving greater visibility into its targeting and screening efforts. TECS is an overarching law enforcement information collection, risk assessment, and information sharing environment. It is also a repository for law enforcement and investigative information. TECS is comprised of several modules that collect, maintain, and evaluate screening data, conduct targeting analysis, and make information available to appropriate officers of the U.S. government. ATS is one of those modules. It is a decisionsupport tool that compares traveler, cargo, and conveyance information against intelligence and other enforcement data by incorporating riskbased targeting scenarios and assessments. As such, ATS allows DHS officers charged with enforcing U.S. law and preventing terrorism and other crime to effectively and efficiently manage information collected when travelers or goods seek to enter, exit, or transit through the United States. Within ATS there are six separate and VerDate Aug<31>2005 19:38 Aug 03, 2007 Jkt 211001 distinct components that perform screening of inbound and outbound cargo, conveyances, or travelers by comparing information received against CBP’s law enforcement databases, the Federal Bureau of Investigation Terrorist Screening Center’s Terrorist Screening Database (TSDB), information on outstanding wants or warrants, information from other government agencies regarding high-risk parties, and risk-based rules developed by analysts based on law enforcement data, intelligence, and past case experience. The modules also facilitate analysis of the screening results of these comparisons. As a legacy organization of CBP, the U.S. Customs Service traditionally employed computerized screening tools to target potentially high-risk cargo entering, exiting, and transiting the United States. ATS originally was designed as a rules-based program to identify such cargo; it did not apply to travelers. Today, ATS includes the following separate components: ATS–N, for screening inbound or imported cargo; ATS–AT, for outbound or exported cargo; ATS–L, for screening private passenger vehicles crossing at land border ports of entry using license plate data; ATS–I, for cooperating with international customs partners in shared cargo screening and supply chain security; ATS–TAP, for assisting tactical units in identifying anomalous trade activity and performing trend analysis; and ATS–P, for screening travelers and conveyances entering the United States in the air, sea, and rail environments. The Privacy Impact Assessment (PIA)— which DHS will publish on its Web site (https://www.dhs.gov/privacy) concurrently with the publication of the SORN in the Federal Register—provides a full discussion of the functional capabilities of ATS and its components. It is worth clarifying here, however, that only the ATS components pertaining to cargo rely on rules-based ‘‘scoring’’ to identify cargo shipments of interest. Travelers identified by risk-based targeting scenarios identified through the ATS–P are not assigned scores. ATS–P became operational in 1999 and is critically important to CBP’s mission. ATS–P allows CBP officers to determine whether a variety of potential risk indicators exist for travelers and/or their itineraries that may warrant additional scrutiny. ATS–P maintains Passenger Name Record (PNR) data, which is data provided to airlines and travel agents by or on behalf of air passengers seeking to book travel. CBP began receiving PNR data voluntarily from air carriers in 1997. Currently, CBP collects this information as part of its PO 00000 Frm 00061 Fmt 4703 Sfmt 4703 43651 border enforcement mission and pursuant to the Aviation and Transportation Security Act of 2001 (ATSA). ATS–P’s screening relies upon information from the following databases: TECS, the Advanced Passenger Information System (APIS), the Non Immigrant Information System (NIIS), the Suspect and Violator Indices (SAVI), and the Department of State visa databases, as well as the PNR information that it maintains. As stated above, unlike in the cargo environment, ATS–P does not use a score to determine an individual’s risk level; instead, ATS–P compares PNR and information in the above-mentioned databases against lookouts and patterns of suspicious activity identified by analysts based upon past investigations and intelligence. This risk assessment is an analysis of the threat-based scenario(s) that a traveler matched when traveling on a given flight. These scenarios are drawn from previous and current law enforcement and intelligence information. This analysis is done in advance of a traveler’s arrival in or departure from the United States and becomes one tool available to DHS officers in identifying illegal activity. In lieu of manual reviews of traveler information and intensive interviews with every traveler arriving in or departing from the United States, ATS– P allows CBP personnel to focus their efforts on potentially high-risk passengers. The Legal Requirements The Privacy Act embodies fair information principles in a statutory framework governing the means by which the United States Government collects, maintains, uses, and disseminates personally identifiable information. The Privacy Act applies to information that is maintained in a ‘‘system of records.’’ A system of records is a group of any records under the control of an agency from which information is retrieved by the name of the individual or by some identifying number, symbol, or other identifying particular assigned to the individual. In the Privacy Act, an individual is defined to encompass U.S. citizens and lawful permanent residents. ATS involves the collection and creation of information that is maintained in a system of records. ATS also stores information on individuals other than U.S. citizens and lawful permanent residents (LPRs). As a matter of administrative policy, where the PII of individuals other than U.S. citizens and LPRs is held in mixed systems (i.e., a system also including U.S. citizen or LPR), DHS will accord E:\FR\FM\06AUN1.SGM 06AUN1 sroberts on PROD1PC70 with NOTICES 43652 Federal Register / Vol. 72, No. 150 / Monday, August 6, 2007 / Notices such PII the fair information principles set forth the Privacy Act. The Privacy Act requires each agency to publish in the Federal Register a description denoting the type and character of each system of records that the agency maintains, and the routine uses that are contained in each system to make agency recordkeeping practices transparent, to notify individuals regarding the uses to which personally identifiable information is put, to assist the individual to more easily find such files within the agency, and to inform the public if any applicable Privacy Act exemptions will be claimed for the system. Access to information in ATS may be provided. However, as discussed further later in this notice, certain records within ATS are exempt from certain provisions of the Privacy Act (specifically, those provisions contained at 5 U.S.C. 552a(c)(3) and (4); (d)(1), (2), (3), and (4); (e)(1), (2), (3), (4)(G) through (I), (5), and (8); (f), and (g)) pursuant to 5 U.S.C. 552a(j)(2) and (k)(2)). Notwithstanding the listed exemptions for the system, individuals, regardless of their citizenship, may make a written request to review and access personal data provided by and regarding the requester, or provided by a booking agent, brokers, or other person on the requester’s behalf, that is collected by CBP and contained in the PNR database stored in the ATS–P, and correct any inaccuracies. Data collected and maintained from air carriers as PNR are listed later in this notice in the ‘‘Categories of Records in the System’’ section of this notice; the listed categories are not specific data elements because each carrier varies its configuration of PNR to meet its business needs. In an effort to provide some consistency in the description of PNR data for the traveling public, CBP has categorized the various data that generally comprise PNR for air carriers into the 19 categories listed in the SORN. The PNR data, upon request, may be provided to the requester in the form in which it was collected from the respective carrier, but may not include certain business confidential information of the air carrier that is also contained in the record, such as use and application of frequent flier miles, internal annotations to the air fare, etc. To obtain access to a requestor’s own PNR, contact the FOIA/PA Branch, Office of Field Operations, U.S. Customs and Border Protection, Room 5.5–C, 1300 Pennsylvania Avenue, NW., Washington, DC 20229 (phone: (202) 344–1850 and fax: (202) 344–2791). Additionally, regardless of their citizenship, individuals who believe VerDate Aug<31>2005 19:38 Aug 03, 2007 Jkt 211001 they have been erroneously denied entry, refused boarding for transportation, or identified for additional screening by CBP may submit a redress request through DHS Traveler Redress Inquiry Program (‘‘TRIP’’). (See 72 FR 2294, January 18, 2007). For further information on the Automated Targeting System and the redress options, please see the accompanying Privacy Impact Assessment for the Automated Targeting System at https:// www.dhs.gov/privacy under ‘‘Privacy Impact Assessment.’’ Redress requests should be sent to: Systems Manager, DHS TRIP, U.S. Department of Homeland Security, Washington, DC. DHS is hereby publishing a description of the system of records referred to as the Automated Targeting System. In accordance with 5 U.S.C. 552a(r), a report concerning this record system has been sent to the Office of Management and Budget and to the Congress. Discussion of Revisions Arising From Public Comments: On November 2, 2006, CBP issued a Privacy Act System of Records Notice for ATS (71 FR 64543). DHS received a number of comments and decided to extend the comment period until December 29, 2006, by Federal Register Notice dated December 8, 2006 (71 FR 71182). A total of 641 comments were received in response to the SORN. After considering these comments, CBP has made the following substantive changes to the previously issued SORN. First, the general retention period for data maintained in ATS is reduced from 40 years to a total of 15 years. CBP has determined that it can continue to uncover and use information relating to terrorism and other serious crimes within this shorter retention period. This retention period is consistent with the retention period currently contained in international agreements entered into by the Department. Furthermore, CBP has limited access to the last eight years of the retention period for PNR data to those users who first obtain supervisory approval to access the archive where the data is maintained. CBP, however, has created an exception to this general retention period such that PNR data, as well as any other data that may be stored in ATS, which becomes associated with active law enforcement activities, and/ or investigations or cases (i.e., specific and credible threats; flights, individuals, and routes of concern; or other defined sets of circumstances) will remain accessible for the life of the law enforcement matter to support that PO 00000 Frm 00062 Fmt 4703 Sfmt 4703 activity and other enforcement activities that may become related. Second, persons whose PNR data has been collected and maintained in ATS– P will have administrative access to that data under the Privacy Act. This data will be available in the same format that it was obtained by CBP (with the exception of business confidential information that may be contained in the record). These individuals will also be able to seek to correct factual inaccuracies contained in their PNR data, as it is maintained by CBP. CBP believes that permitting persons to access and to seek to amend their PNR data will reduce the incidence of potential misidentifications and improve the accuracy of the data within ATS–P. Third, CBP has added the following category to the categories of persons from whom information is obtained: ‘‘Persons who serve as booking agents.’’ Several commenters correctly noted that many in the traveling public utilize the services of booking agents and that booking agents’ identities are included in itinerary information. Fourth, to be consistent with the forthcoming SORN for the Advanced Passenger Information System (APIS), CBP has amended category A to include persons whose international itineraries cause their flight to stop in the United States, either to refuel or to permit a transfer, and crewmembers on flights that overfly or transit through U.S. airspace. Fifth, as stated above, CBP has clarified the categories of PNR data collected and maintained in ATS–P to more accurately reflect the type of data collected from air carriers. Consistent with its particular business needs, each air carrier determines the specific configuration of data elements that ultimately constitute PNR. By providing increased notice of the types of data that may be contained within PNR, CBP seeks to provide the public with a greater understanding of the personal information being maintained in ATS– P. Examples of these categories of PNR, as listed below under ‘‘Categories of Records’’ include: Name, date of issuance ticket, date(s) of travel, PNR locator number, payment information, such as credit card information, and travel agent or travel agency that may have made the reservations for the individual. Lastly, two of the routine uses included in the earlier version of the SORN-those pertaining to using ATS in background checks—are removed. This is necessary because the revised SORN contains a more narrow definition of the purposes for which certain data— E:\FR\FM\06AUN1.SGM 06AUN1 Federal Register / Vol. 72, No. 150 / Monday, August 6, 2007 / Notices specifically, PNR data maintained in ATS–P—will be used. The deleted routine uses did not fit within the scope of these purposes. This discussion of comments addresses revisions made to the SORN published on November 2, 2006. The full comments received address additional issues, such as mission creep, potential economic impact, appropriate applicability of the Privacy Act, constitutionality, and information quality. For a discussion of the full comments received from the November 2, 2006, publication and DHS’ response, please see ‘‘Discussion of Public Comments Received on the Automated Targeting System Privacy Act System of Records Notice’’ on the DHS Web site at https://www.dhs.gov/privacy. SYSTEM NAME: Automated Targeting System (ATS)— CBP. SYSTEM LOCATION: This computer database is located at the CBP National Data Center in Washington, D.C. Computer terminals are located at customhouses, border ports of entry, airport inspection facilities under the jurisdiction of DHS, and other locations at which DHS authorized personnel may be posted to facilitate DHS’s mission. Terminals may also be located at appropriate facilities for other participating government agencies pursuant to agreement. sroberts on PROD1PC70 with NOTICES CATEGORIES OF INDIVIDUALS COVERED BY THE SYSTEM: ATS includes the following separate components: ATS–N, for screening inbound or imported cargo; ATS–AT, for outbound or exported cargo; ATS–L, for screening private passenger vehicles crossing at land border ports of entry by license plate data; ATS–I, for cooperating with international customs partners in shared cargo screening and supply chain security; ATS–TAP, for assisting tactical units in identifying anomalous trade activity and performing trend analysis; and ATS–P, for screening travelers and conveyances entering the United States in the air, sea and rail environments. Collectively, these components handle information relating to the following individuals: A. Persons seeking to enter, exit, or transit through the United States by land, air, or sea. This includes passengers who arrive and depart the United States by air or sea, including those in transit through the United States on route to a foreign destination and crew members who arrive and depart the United States by air or sea, VerDate Aug<31>2005 19:38 Aug 03, 2007 Jkt 211001 including those in transit through the United States on route to a foreign destination, and crew members on aircraft that over fly the United States. B. Persons who engage in any form of trade or other commercial transaction related to the importation or exportation of merchandise. C. Persons who are employed in any capacity related to the transit of merchandise intended to cross the United States border. D. Persons who serve as operators, crew, or passengers on any vessel, vehicle, aircraft, train, or other conveyance that arrives in or departs the United States. E. Persons who serve as booking agents, brokers, or other persons who provide information on behalf of persons seeking to enter, exit, or transit through the United States. CATEGORIES OF RECORDS IN THE SYSTEM: ATS uses CBP’s law enforcement databases, the Federal Bureau of Investigation Terrorist Screening Center’s Terrorist Screening Database (TSDB), information on outstanding wants or warrants, information from other government agencies regarding high-risk parties, and risk-based rules developed by analysts to assess and identify high-risk cargo, conveyances, or travelers that should be subject to further scrutiny or examination. ATS maintains these assessments together with a record of which rules were used to develop the assessment. With the exception of PNR information, discussed below, ATS maintains a pointer or reference to the underlying records from other systems that resulted in a particular assessment. ATS–P, a component of ATS, maintains the PNR information obtained from commercial air carriers and uses that information to assess whether there is a risk associated with any travelers seeking to enter, exit, or pass through the United States. PNR may include some combination of these following categories of information, when available: 1. PNR record locator code. 2. Date of reservation/ issue of ticket. 3. Date(s) of intended travel. 4. Name(s) . 5. Available frequent flier and benefit information (i.e., free tickets, upgrades, etc.). 6. Other names on PNR, including number of travelers on PNR. 7. All available contact information (including originator of reservation). 8. All available payment/billing information (e.g. credit card number). 9. Travel itinerary for specific PNR. 10. Travel agency/travel agent. PO 00000 Frm 00063 Fmt 4703 Sfmt 4703 43653 11. Code share information (e.g., when one air carrier sells seats on another air carrier’s flight). 12. Split/divided information (e.g., when one PNR contains a reference to another PNR). 13. Travel status of passenger (including confirmations and check-in status). 14. Ticketing information, including ticket number, one way tickets and Automated Ticket Fare Quote (ATFQ) fields. 15. Baggage information. 16. Seat information, including seat number. 17. General remarks including Other Service Indicated (OSI), Special Service Indicated (SSI) and Supplemental Service Request (SSR) information. 18. Any collected APIS information (e.g., Advance Passenger Information (API) that is initially captured by an air carrier within its PNR, such as passport number, date of birth and gender). 19. All historical changes to the PNR listed in numbers 1 to 18. Not all air carriers maintain the same sets of information for PNR, and a particular individual’s PNR likely will not include information for all possible categories. In addition, PNR does not routinely include information that could directly indicate the racial or ethnic origin, political opinions, religious or philosophical beliefs, trade union membership, health, or sex life of the individual. To the extent PNR does include terms that reveal such personal matters, DHS employs an automated system that filters certain of these terms and only uses this information in exceptional circumstances. AUTHORITY FOR MAINTENANCE OF THE SYSTEM: 19 U.S.C. 482, 1461, 1496, and 1581– 82, 8 U.S.C 1357, Title VII of Public Law 104–208, 49 U.S.C. 44909, and the ‘‘Security and Accountability for Every Port Act of 2006’’ (SAFE Port Act) (Pub. L. 109–347). PURPOSES FOR PNR IN ATS–P: (a) To prevent and combat terrorism and related crimes; (b) To prevent and combat other serious crimes, including organized crime, that are transnational in nature; (c) To prevent flight from warrants or custody for crimes described in (a) and (b) above; (d) Wherever necessary for the protection of the vital interests of a data subject or other persons; (e) In any criminal judicial proceedings; or (f) As otherwise required by law. E:\FR\FM\06AUN1.SGM 06AUN1 43654 Federal Register / Vol. 72, No. 150 / Monday, August 6, 2007 / Notices PURPOSES OF ATS (EXCEPT PNR IN ATS–P): In addition to those purposes listed above for PNR in ATS–P: (a) To perform targeting of individuals, including passengers and crew, focusing CBP resources by identifying persons who may pose a risk to border security or public safety, may be a terrorist or suspected terrorist, or may otherwise be engaged in activity in violation of U.S. law. (b) To perform a risk-based assessment of conveyances and cargo to focus CBP’s resources for inspection and examination and enhance CBP’s ability to identify potential violations of U.S. law, possible terrorist threats, and other threats to border security; and (c) To otherwise assist in the enforcement of the laws enforced or administered by DHS, including those related to counterterrorism. sroberts on PROD1PC70 with NOTICES ROUTINE USES OF RECORDS MAINTAINED IN THE VARIOUS COMPONENTS OF ATS, INCLUDING CATEGORIES OF USERS AND THE PURPOSES OF SUCH USES: In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. 552a(b)(3). DHS only discloses information to those authorities who have a legal purpose to use the data, intend to use the information consistent with the purpose for which CBP collects it or for another legally required function, such as GAO oversight and ongoing IT maintenance, and has sufficient capability to protect and safeguard it. Under these limits, data may be disclosed as a routine use in the following manner: A. To appropriate Federal, state, local, tribal, or foreign governmental agencies or multilateral governmental organizations responsible for investigating or prosecuting the violations of, or for enforcing or implementing, a statute, rule, regulation, order, or license, where CBP believes the information would assist enforcement of applicable civil or criminal laws; B. To Federal and foreign government intelligence or counterterrorism agencies or components where CBP becomes aware of an indication of a threat or potential threat to national or international security, or where such use is to assist in anti-terrorism efforts and disclosure is appropriate to the proper performance of the official duties of the person making the disclosure; C. To an organization or individual in either the public or private sector, either foreign or domestic, where there is a VerDate Aug<31>2005 19:38 Aug 03, 2007 Jkt 211001 reason to believe that the recipient is or could become the target of a particular terrorist activity or conspiracy, or where the information is relevant to the protection of life, property, or other vital interests of a data subject and such disclosure is proper and consistent with the official duties of the person making the disclosure; D. To appropriate Federal, state, local, tribal, or foreign governmental agencies or multilateral governmental organizations for the purpose of protecting the vital interests of a data subject or other persons, including to assist such agencies or organizations in preventing exposure to or transmission of a communicable or quarantinable disease or to combat other significant public health threats; appropriate notice will be provided of any identified health threat or risk; E. To a court, magistrate, or administrative tribunal in the course of presenting evidence, including disclosures to opposing counsel or witnesses in the course of civil discovery, litigation, or settlement negotiations, or in response to a subpoena, or in connection with criminal law proceedings; F. To third parties during the course of a law enforcement investigation to the extent necessary to obtain information pertinent to the investigation, provided disclosure is appropriate in the proper performance of the official duties of the officer making the disclosure. G. To an agency, organization, or individual for the purposes of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function; H. To a Congressional office, for the record of an individual in response to an inquiry from that Congressional office made at the request of the individual to whom the record pertains; I. To contractors, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for the Federal government, when necessary to accomplish an agency function related to this system of records, in compliance with the Privacy Act of 1974, as amended; J. To the U.S. Department of Justice (including U.S. Attorney offices) or other Federal agency conducting litigation or in proceedings before any court, adjudicative or administrative body, when it is necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation: (a) DHS, or (b) any PO 00000 Frm 00064 Fmt 4703 Sfmt 4703 employee of DHS in his/her official capacity, or (c) any employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent said employee, or (d) the United States or any agency thereof; K. To the National Archives and Records Administration or other Federal government agencies pursuant to records management inspections being conducted under the authority of 44 U.S.C. Sections 2904 and 2906; L. To appropriate Federal, state, local, tribal, or foreign governmental agencies or multilateral governmental organizations where CBP is aware of a need to utilize relevant data for purposes of testing new technology and systems designed to enhance ATS; M. To appropriate agencies, entities, and persons when (1) It is suspected or confirmed that the security or confidentiality of information in the system of records has been compromised; (2) DHS has determined that as a result of the suspected or confirmed compromise there is a risk of harm to economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other systems or programs (whether maintained by DHS or another agency or entity) that rely upon the compromised information; and (3) the disclosure is made to such agencies, entities, and persons when reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm. POLICIES AND PRACTICES FOR STORING, RETRIEVING, ACCESSING, RETAINING, AND DISPOSING OF RECORDS IN THE SYSTEM STORAGE: The data is stored electronically at the National Data Center for current data and offsite at an alternative data storage facility for historical logs and system backups. RETRIEVABILITY: The data is retrievable by name or personal identifier from an electronic database. SAFEGUARDS: All records are protected from unauthorized access through appropriate administrative, physical, and technical safeguards. These safeguards include all of the following: restricting access to those with a ‘‘need to know’’; using locks, alarm devices, and passwords; compartmentalizing databases; auditing software; and encrypting data communications. ATS also monitors source systems for changes to the source data. The system E:\FR\FM\06AUN1.SGM 06AUN1 Federal Register / Vol. 72, No. 150 / Monday, August 6, 2007 / Notices manager, in addition, has the capability to maintain system back-ups for the purpose of supporting continuity of operations and the discrete need to isolate and copy specific data access transactions for the purpose of conducting security incident investigations. ATS information is secured in full compliance with the requirements of the Federal Information Security Management Act (FISMA) and the DHS IT Security Program Handbook. This handbook establishes a comprehensive information security program. USE AND CONTROL: CBP maintains full access for a limited number of authorized personnel to all information contained within ATS. Authorized personnel receive thorough background investigations and extensive training on CBP security and privacy policies on the appropriate use of ATS information. These individuals are trained to review the risk assessments and background information to identify individuals who may likely pose a risk. To ensure that ATS is being accessed and used appropriately, audit logs are also created and reviewed routinely by CBP’s Office of Internal Affairs to ensure integrity of the system and process. Access to the risk assessment results and related rules is restricted to a limited number of authorized government personnel who have gone through extensive training on the appropriate use of this information and CBP policies, including for security and privacy. These All individuals are specifically trained to review the risk assessments and background information to identify individuals who may likely pose a risk. sroberts on PROD1PC70 with NOTICES RETENTION AND DISPOSAL: Records in this system will be retained and disposed of in accordance with a records schedule to be approved by the National Archives and Records Administration. ATS both collects information directly, and derives other information from various systems. To the extent information is collected from other systems, data is retained in accordance with the record retention requirements of those systems. The retention period for data maintained in ATS will not exceed fifteen years, after which time it will be deleted, except as noted below. The retention period for PNR, which is contained only in ATS–P, will be subject to the following further access restrictions: ATS–P users will have general access to PNR for seven years, after which time the PNR data will be VerDate Aug<31>2005 19:38 Aug 03, 2007 Jkt 211001 moved to dormant, non-operational status. PNR data in dormant status will be retained for eight years and may be accessed only with approval of a senior DHS official designated by the Secretary of Homeland Security and only in response to an identifiable case, threat, or risk. Such limited access and use for older PNR strikes a reasonable balance between protecting this information and allowing CBP to continue to identify potential high-risk travelers. Notwithstanding the foregoing, information maintained only in ATS that is linked to active law enforcement lookout records, CBP matches to enforcement activities, and/or investigations or cases (i.e., specific and credible threats; flights, individuals, and routes of concern; or other defined sets of circumstances) will remain accessible for the life of the law enforcement matter to support that activity and other enforcement activities that may become related. It is important to note that the justification for a fifteen year retention period is based on CBP’s law enforcement and security functions at the border. This retention period is based on CBP’s historical encounters with suspected terrorists and other criminals, as well as the broader expertise of the law enforcement and intelligence communities. It is well known, for example, that potential terrorists may make multiple visits to the United States in advance of performing an attack. It is over the course of time and multiple visits that a potential risk becomes clear. Passenger records including historical records are essential in assisting CBP Officers with their risk-based screening of travel indicators and identifying potential links between known and previously unidentified terrorist facilitators. Analyzing these records for these purposes allows CBP to continue to effectively identify suspect travel patterns and irregularities. SYSTEM MANAGER(S) AND ADDRESS: Executive Director, National Targeting and Security, Office of Field Operations, U.S. Customs and Border Protection, Ronald Reagan Building and Director, Targeting and Analysis, Systems Program Office, Office of Information Technology, U.S. Customs and Border Protection. PUBLIC RECORD ACCESS/REDRESS PROCEDURES: DHS policy allows persons (including foreign nationals) to access and redress under the Privacy Act to raw PNR data maintained in ATS–P. The PNR data, upon request, may be provided to the requester in the form in which it was PO 00000 Frm 00065 Fmt 4703 Sfmt 4703 43655 collected from the respective carrier, but may not include certain business confidential information of the air carrier that is also contained in the record, such as . This access does not extend to other information in ATS obtained from official sources (which are covered under separate SORNs) or that is created by CBP, such as the targeting rules and screening results, which are law enforcement sensitive information and are exempt from certain provisions of the Privacy Act. For other information in this system of records, individuals generally may not seek access for purposes of determining if the system contains records pertaining to a particular individual or person. (See 5 U.S.C. 552a (e)(4)(G) and (f)(1)). Individuals, regardless of nationality, may seek access to records about themselves in accordance with the Freedom of Information Act. In addition, DHS policy allows persons, including foreign nationals, to seek access under the Privacy Act to raw PNR data submitted to ATS–P. Requests for access to personally identifiable information contained in PNR that was provided by the requestor or by someone else on behalf of the requestor, regarding the requestor, may be submitted to the FOIA/PA Unit, Office of Field Operations, U.S. Customs and Border Protection, Room 5.50C, 1300 Pennsylvania Avenue, NW., Washington, DC 20229 (phone: (202) 344–1850 and fax: (202) 344–2791). Requests should conform to the requirements of 6 CFR Part 5, which provides the rules for requesting access to Privacy Act records maintained by DHS. The envelope and letter should be clearly marked ‘‘Privacy Act Access Request.’’ The request should include a general description of the records sought and must include the requester’s full name, current address, and date and place of birth. The request must be signed and either notarized or submitted under penalty of perjury. CBP notes that ATS is a decisionsupport tool that compares various databases, but does not actively collect the information in those respective databases, except for PNR. When an individual is seeking redress for other information analyzed in ATS, such redress is properly accomplished by referring to the databases that directly collect that information. If individuals are uncertain what agency handles the information, they may seek redress through the DHS Traveler Redress Program (‘‘TRIP’’). See 72 FR 2294, dated January 18, 2007. Individuals who believe they have been improperly denied entry, refused boarding for transportation, or identified for E:\FR\FM\06AUN1.SGM 06AUN1 43656 Federal Register / Vol. 72, No. 150 / Monday, August 6, 2007 / Notices additional screening by CBP may submit a redress request through TRIP. TRIP is a single point of contact for individuals who have inquiries or seek resolution regarding difficulties they experienced during their travel screening at transportation hubs—like airports and train stations or crossing U.S. borders. Through TRIP, a traveler can request correction of erroneous PNR data stored in ATS–P and other data stored in other DHS databases through one application. Additionally, for further information on ATS and the redress options please see the accompanying PIA for ATS published on the DHS website at www.dhs.gov/privacy. Redress requests should be sent to: DHS Traveler Redress Inquiry Program (TRIP), 601 South 12th Street, TSA–901, Arlington, VA 22202– 4220 or online at https://www.dhs.gov/ trip and at https://www.dhs.gov. Additionally, a traveler may seek redress from CBP at the time of the border crossing. CONTESTING RECORD PROCEDURES: Individuals may seek redress and/or contest a record through several different means, all of which will be handled in the same fashion. If the individual is aware the information is specifically handled by CBP, requests may be sent directly to CBP at the FOIA/ PA Unit, Office of Field Operations, U.S. Customs and Border Protection, Room 5.5–C, 1300 Pennsylvania Avenue, NW., Washington, DC 20229 (phone: (202) 344–1850 and fax: (202) 344–2791). If the individual is uncertain what agency is responsible for maintaining the information, redress requests may be sent to DHS TRIP at DHS Traveler Redress Inquiry Program (TRIP), 601 South 12th Street, TSA–901, Arlington, VA 22202–4220 or online at https://www.dhs.gov/trip. sroberts on PROD1PC70 with NOTICES RECORD SOURCE CATEGORIES: The system contains information derived from other law enforcement systems operated by DHS and federal, state, local, tribal, or foreign government agencies, which collected the underlying data from individuals and public entities directly. The system also contains information collected from carriers that operate vessels, vehicles, aircraft, and/or trains that enter or exit the United States. In addition, the cargo modules (ATSInbound and Outbound) employ information collected from third party data aggregators. VerDate Aug<31>2005 19:38 Aug 03, 2007 Jkt 211001 EXEMPTIONS CLAIMED FOR THE SYSTEM: Pursuant to 6 CFR Part 5, Appendix C, certain records and information in this system are exempt from 5 U.S.C. 552a(c)(3) and (4); (d)(1), (2), (3), and (4); (e)(1), (2), (3), (4)(G) through (I), (e)(5), and (8); (f), and (g) of the Privacy Act pursuant to 5 U.S.C. 552a(j)(2) and (k)(2)). With respect to ATS–P module, exempt records are the risk assessment analyses and business confidential information received in the PNR from the air and vessel carriers. No exemption shall be asserted regarding PNR data about the requester, obtained from either the requester or by a booking agent, brokers, or another person on the requester’s behalf. This information, upon request, may be provided to the requester in the form in which it was collected from the respective carrier, but may not include certain business confidential information of the air carrier that is also contained in the record. For other ATS modules the only information maintained in ATS is the risk assessment analyses and a pointer to the data from the source system of records. Dated: July 31, 2007. Hugo Teufel III, Chief Privacy Officer. [FR Doc. E7–15197 Filed 8–1–07; 11:51 am] BILLING CODE 4410–10–P DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Quarterly IRS Interest Rates Used in Calculating Interest on Overdue Accounts and Refunds on Customs Duties U.S. Customs and Border Protection, Department of Homeland Security. ACTION: General notice. AGENCY: SUMMARY: This notice advises the public of the quarterly Internal Revenue Service interest rates used to calculate interest on overdue accounts (underpayments) and refunds (overpayments) of customs duties. For the calendar quarter beginning July 1, 2007, the interest rates for overpayments will remain at 7 percent for corporations and 8 percent for non-corporations, and the interest rate for underpayments will remain at 8 percent. This notice is published for the convenience of the PO 00000 Frm 00066 Fmt 4703 Sfmt 4703 importing public and U.S. Customs and Border Protection personnel. DATES: Effective Date: July 1, 2007. FOR FURTHER INFORMATION CONTACT: Ron Wyman, Revenue Division, Collection and Refunds Branch, 6650 Telecom Drive, Suite #100, Indianapolis, Indiana 46278; telephone (317) 614–4516. SUPPLEMENTARY INFORMATION: Background Pursuant to 19 U.S.C. 1505 and Treasury Decision 85–93, published in the Federal Register on May 29, 1985 (50 FR 21832), the interest rate paid on applicable overpayments or underpayments of customs duties must be in accordance with the Internal Revenue Code rate established under 26 U.S.C. 6621 and 6622. Section 6621 was amended (at paragraph (a)(1)(B) by the Internal Revenue Service Restructuring and Reform Act of 1998, Pub. L. Law 105–206, 112 Stat. 685) to provide different interest rates applicable to overpayments: One for corporations and one for non-corporations. The interest rates are based on the Federal short-term rate and determined by the Internal Revenue Service (IRS) on behalf of the Secretary of the Treasury on a quarterly basis. The rates effective for a quarter are determined during the first-month period of the previous quarter. In Revenue Ruling 2007–39, the IRS determined the rates of interest for the calendar quarter beginning July 1, 2007, and ending September 30, 2007. The interest rate paid to the Treasury for underpayments will be the Federal short-term rate (5%) plus three percentage points (3%) for a total of eight percent (8%). For corporate overpayments, the rate is the Federal short-term rate (5%) plus two percentage points (2%) for a total of seven percent (7%). For overpayments made by non-corporations, the rate is the Federal short-term rate (5%) plus three percentage points (3%) for a total of eight percent (8%). These interest rates are subject to change for the calendar quarter beginning October 1, 2007, and ending December 31, 2007. For the convenience of the importing public and U.S. Customs and Border Protection personnel the following list of IRS interest rates used, covering the period from before July of 1974 to date, to calculate interest on overdue accounts and refunds of customs duties, is published in summary format. E:\FR\FM\06AUN1.SGM 06AUN1

Agencies

[Federal Register Volume 72, Number 150 (Monday, August 6, 2007)]
[Notices]
[Pages 43650-43656]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: E7-15197]


=======================================================================
-----------------------------------------------------------------------

DEPARTMENT OF HOMELAND SECURITY

Office of the Secretary

[DHS-2007-0042]


Privacy Act of 1974; U.S. Customs and Border Protection, 
Automated Targeting System, System of Records

AGENCY: Privacy Office; Department of Homeland Security.

ACTION: Notice of Privacy Act System of Records.

-----------------------------------------------------------------------

SUMMARY: This document is a new System of Records Notice (SORN) for the 
Automated Targeting System (ATS) and is subject to the Privacy Act of 
1974, as amended. ATS is an enforcement screening tool consisting of 
six separate components, all of which rely substantially on information 
in the Treasury Enforcement Communications System (TECS). ATS 
historically was covered by the SORN for TECS. The Department of 
Homeland Security, U.S. Customs and Border Protection (CBP) published a 
separate SORN for ATS in the Federal Register on November 2, 2006. This 
SORN did not describe any new collection of information and was 
intended solely to provide increased notice and transparency to the 
public about ATS. Based on comments received in response to the 
November 2, 2006 notice, CBP issues this revised SORN, which responds 
to those comments, makes certain amendments with regard to the 
retention period and access provisions of the prior notice, and 
provides further notice and transparency to the public about the 
functionality of ATS.
    TECS is an overarching law enforcement information collection, risk 
assessment, and information sharing environment. It is also a 
repository for law enforcement and investigative information. TECS is 
comprised of several modules that collect, maintain, and evaluate 
screening data, conduct targeting, and make information available to 
appropriate officers of the U.S. government. ATS is one of those 
modules. It is a decision support tool that compares traveler, cargo, 
and conveyance information against intelligence and other enforcement 
data by incorporating risk-based targeting scenarios and assessments. 
As such, ATS allows DHS officers charged with enforcing U.S. law and 
preventing terrorism and other crimes to effectively and efficiently 
manage information collected when travelers or goods seek to enter, 
exit, or transit through the United States.
    Within ATS there are six separate and distinct components that 
perform screening of inbound and outbound cargo, conveyances, or 
travelers. These modules compare information received against CBP's law 
enforcement databases, the Federal Bureau of Investigation Terrorist 
Screening Center's Terrorist Screening Database (TSDB), information on 
outstanding wants or warrants, information from other government 
agencies regarding high-risk parties, and risk-based rules developed by 
analysts using law enforcement data, intelligence, and past case 
experience. The modules also facilitate analysis of the screening 
results of these comparisons. In the case of cargo and conveyances, 
this screening results in a risk assessment score. In the case of 
travelers, however, it does not result in a risk assessment score.

DATES: The new system of records will be effective September 5, 2007.

FOR FURTHER INFORMATION CONTACT: For general questions please contact: 
Laurence E. Castelli (202-572-8790), Chief, Privacy Act Policy and 
Procedures Branch, U.S. Customs and Border Protection, Office of

[[Page 43651]]

International Trade, Mint Annex, 1300 Pennsylvania Ave., NW., 
Washington, DC 20229. For privacy issues please contact: Hugo Teufel 
III (703-235-0780), Chief Privacy Officer, Privacy Office, U.S. 
Department of Homeland Security, Washington, DC 20528.

SUPPLEMENTARY INFORMATION: 

Background

The System

    The priority mission of CBP is to prevent terrorists and terrorist 
weapons from entering the country while facilitating legitimate travel 
and trade. ATS uses CBP's law enforcement databases, the Federal Bureau 
of Investigation Terrorist Screening Center's Terrorist Screening 
Database (TSDB), information on outstanding wants or warrants, 
information from other government agencies regarding high-risk parties, 
and risk-based rules developed by analysts to assess and identify high-
risk cargo, conveyances, and travelers that may pose a greater risk of 
terrorist or criminal activity and therefore should be subject to 
further scrutiny or examination. These rules are based on investigatory 
and law enforcement data, intelligence, and past case experience. 
Historically, the SORN for the Treasury Enforcement Communications 
System (TECS) covered ATS. As part of DHS's updating of its system of 
records notices and in an effort to provide more detailed information 
to the traveling public and trade community, DHS has decided to notice 
ATS as a separate Privacy Act system of records, giving greater 
visibility into its targeting and screening efforts.
    TECS is an overarching law enforcement information collection, risk 
assessment, and information sharing environment. It is also a 
repository for law enforcement and investigative information. TECS is 
comprised of several modules that collect, maintain, and evaluate 
screening data, conduct targeting analysis, and make information 
available to appropriate officers of the U.S. government. ATS is one of 
those modules. It is a decision-support tool that compares traveler, 
cargo, and conveyance information against intelligence and other 
enforcement data by incorporating risk-based targeting scenarios and 
assessments. As such, ATS allows DHS officers charged with enforcing 
U.S. law and preventing terrorism and other crime to effectively and 
efficiently manage information collected when travelers or goods seek 
to enter, exit, or transit through the United States. Within ATS there 
are six separate and distinct components that perform screening of 
inbound and outbound cargo, conveyances, or travelers by comparing 
information received against CBP's law enforcement databases, the 
Federal Bureau of Investigation Terrorist Screening Center's Terrorist 
Screening Database (TSDB), information on outstanding wants or 
warrants, information from other government agencies regarding high-
risk parties, and risk-based rules developed by analysts based on law 
enforcement data, intelligence, and past case experience. The modules 
also facilitate analysis of the screening results of these comparisons.
    As a legacy organization of CBP, the U.S. Customs Service 
traditionally employed computerized screening tools to target 
potentially high-risk cargo entering, exiting, and transiting the 
United States. ATS originally was designed as a rules-based program to 
identify such cargo; it did not apply to travelers. Today, ATS includes 
the following separate components: ATS-N, for screening inbound or 
imported cargo; ATS-AT, for outbound or exported cargo; ATS-L, for 
screening private passenger vehicles crossing at land border ports of 
entry using license plate data; ATS-I, for cooperating with 
international customs partners in shared cargo screening and supply 
chain security; ATS-TAP, for assisting tactical units in identifying 
anomalous trade activity and performing trend analysis; and ATS-P, for 
screening travelers and conveyances entering the United States in the 
air, sea, and rail environments. The Privacy Impact Assessment (PIA)--
which DHS will publish on its Web site (https://www.dhs.gov/privacy) 
concurrently with the publication of the SORN in the Federal Register--
provides a full discussion of the functional capabilities of ATS and 
its components. It is worth clarifying here, however, that only the ATS 
components pertaining to cargo rely on rules-based ``scoring'' to 
identify cargo shipments of interest. Travelers identified by risk-
based targeting scenarios identified through the ATS-P are not assigned 
scores.
    ATS-P became operational in 1999 and is critically important to 
CBP's mission. ATS-P allows CBP officers to determine whether a variety 
of potential risk indicators exist for travelers and/or their 
itineraries that may warrant additional scrutiny. ATS-P maintains 
Passenger Name Record (PNR) data, which is data provided to airlines 
and travel agents by or on behalf of air passengers seeking to book 
travel. CBP began receiving PNR data voluntarily from air carriers in 
1997. Currently, CBP collects this information as part of its border 
enforcement mission and pursuant to the Aviation and Transportation 
Security Act of 2001 (ATSA).
    ATS-P's screening relies upon information from the following 
databases: TECS, the Advanced Passenger Information System (APIS), the 
Non Immigrant Information System (NIIS), the Suspect and Violator 
Indices (SAVI), and the Department of State visa databases, as well as 
the PNR information that it maintains. As stated above, unlike in the 
cargo environment, ATS-P does not use a score to determine an 
individual's risk level; instead, ATS-P compares PNR and information in 
the above-mentioned databases against lookouts and patterns of 
suspicious activity identified by analysts based upon past 
investigations and intelligence. This risk assessment is an analysis of 
the threat-based scenario(s) that a traveler matched when traveling on 
a given flight. These scenarios are drawn from previous and current law 
enforcement and intelligence information. This analysis is done in 
advance of a traveler's arrival in or departure from the United States 
and becomes one tool available to DHS officers in identifying illegal 
activity. In lieu of manual reviews of traveler information and 
intensive interviews with every traveler arriving in or departing from 
the United States, ATS-P allows CBP personnel to focus their efforts on 
potentially high-risk passengers.

The Legal Requirements

    The Privacy Act embodies fair information principles in a statutory 
framework governing the means by which the United States Government 
collects, maintains, uses, and disseminates personally identifiable 
information. The Privacy Act applies to information that is maintained 
in a ``system of records.'' A system of records is a group of any 
records under the control of an agency from which information is 
retrieved by the name of the individual or by some identifying number, 
symbol, or other identifying particular assigned to the individual. In 
the Privacy Act, an individual is defined to encompass U.S. citizens 
and lawful permanent residents. ATS involves the collection and 
creation of information that is maintained in a system of records. ATS 
also stores information on individuals other than U.S. citizens and 
lawful permanent residents (LPRs). As a matter of administrative 
policy, where the PII of individuals other than U.S. citizens and LPRs 
is held in mixed systems (i.e., a system also including U.S. citizen or 
LPR), DHS will accord

[[Page 43652]]

such PII the fair information principles set forth the Privacy Act.
    The Privacy Act requires each agency to publish in the Federal 
Register a description denoting the type and character of each system 
of records that the agency maintains, and the routine uses that are 
contained in each system to make agency recordkeeping practices 
transparent, to notify individuals regarding the uses to which 
personally identifiable information is put, to assist the individual to 
more easily find such files within the agency, and to inform the public 
if any applicable Privacy Act exemptions will be claimed for the 
system.
    Access to information in ATS may be provided. However, as discussed 
further later in this notice, certain records within ATS are exempt 
from certain provisions of the Privacy Act (specifically, those 
provisions contained at 5 U.S.C. 552a(c)(3) and (4); (d)(1), (2), (3), 
and (4); (e)(1), (2), (3), (4)(G) through (I), (5), and (8); (f), and 
(g)) pursuant to 5 U.S.C. 552a(j)(2) and (k)(2)). Notwithstanding the 
listed exemptions for the system, individuals, regardless of their 
citizenship, may make a written request to review and access personal 
data provided by and regarding the requester, or provided by a booking 
agent, brokers, or other person on the requester's behalf, that is 
collected by CBP and contained in the PNR database stored in the ATS-P, 
and correct any inaccuracies. Data collected and maintained from air 
carriers as PNR are listed later in this notice in the ``Categories of 
Records in the System'' section of this notice; the listed categories 
are not specific data elements because each carrier varies its 
configuration of PNR to meet its business needs. In an effort to 
provide some consistency in the description of PNR data for the 
traveling public, CBP has categorized the various data that generally 
comprise PNR for air carriers into the 19 categories listed in the 
SORN. The PNR data, upon request, may be provided to the requester in 
the form in which it was collected from the respective carrier, but may 
not include certain business confidential information of the air 
carrier that is also contained in the record, such as use and 
application of frequent flier miles, internal annotations to the air 
fare, etc.
    To obtain access to a requestor's own PNR, contact the FOIA/PA 
Branch, Office of Field Operations, U.S. Customs and Border Protection, 
Room 5.5-C, 1300 Pennsylvania Avenue, NW., Washington, DC 20229 (phone: 
(202) 344-1850 and fax: (202) 344-2791). Additionally, regardless of 
their citizenship, individuals who believe they have been erroneously 
denied entry, refused boarding for transportation, or identified for 
additional screening by CBP may submit a redress request through DHS 
Traveler Redress Inquiry Program (``TRIP''). (See 72 FR 2294, January 
18, 2007). For further information on the Automated Targeting System 
and the redress options, please see the accompanying Privacy Impact 
Assessment for the Automated Targeting System at https://www.dhs.gov/
privacy under ``Privacy Impact Assessment.'' Redress requests should be 
sent to: Systems Manager, DHS TRIP, U.S. Department of Homeland 
Security, Washington, DC.
    DHS is hereby publishing a description of the system of records 
referred to as the Automated Targeting System. In accordance with 5 
U.S.C. 552a(r), a report concerning this record system has been sent to 
the Office of Management and Budget and to the Congress.
Discussion of Revisions Arising From Public Comments:
    On November 2, 2006, CBP issued a Privacy Act System of Records 
Notice for ATS (71 FR 64543). DHS received a number of comments and 
decided to extend the comment period until December 29, 2006, by 
Federal Register Notice dated December 8, 2006 (71 FR 71182). A total 
of 641 comments were received in response to the SORN. After 
considering these comments, CBP has made the following substantive 
changes to the previously issued SORN. First, the general retention 
period for data maintained in ATS is reduced from 40 years to a total 
of 15 years. CBP has determined that it can continue to uncover and use 
information relating to terrorism and other serious crimes within this 
shorter retention period.
    This retention period is consistent with the retention period 
currently contained in international agreements entered into by the 
Department. Furthermore, CBP has limited access to the last eight years 
of the retention period for PNR data to those users who first obtain 
supervisory approval to access the archive where the data is 
maintained. CBP, however, has created an exception to this general 
retention period such that PNR data, as well as any other data that may 
be stored in ATS, which becomes associated with active law enforcement 
activities, and/or investigations or cases (i.e., specific and credible 
threats; flights, individuals, and routes of concern; or other defined 
sets of circumstances) will remain accessible for the life of the law 
enforcement matter to support that activity and other enforcement 
activities that may become related.
    Second, persons whose PNR data has been collected and maintained in 
ATS-P will have administrative access to that data under the Privacy 
Act. This data will be available in the same format that it was 
obtained by CBP (with the exception of business confidential 
information that may be contained in the record). These individuals 
will also be able to seek to correct factual inaccuracies contained in 
their PNR data, as it is maintained by CBP. CBP believes that 
permitting persons to access and to seek to amend their PNR data will 
reduce the incidence of potential misidentifications and improve the 
accuracy of the data within ATS-P.
    Third, CBP has added the following category to the categories of 
persons from whom information is obtained: ``Persons who serve as 
booking agents.'' Several commenters correctly noted that many in the 
traveling public utilize the services of booking agents and that 
booking agents' identities are included in itinerary information.
    Fourth, to be consistent with the forthcoming SORN for the Advanced 
Passenger Information System (APIS), CBP has amended category A to 
include persons whose international itineraries cause their flight to 
stop in the United States, either to refuel or to permit a transfer, 
and crewmembers on flights that overfly or transit through U.S. 
airspace.
    Fifth, as stated above, CBP has clarified the categories of PNR 
data collected and maintained in ATS-P to more accurately reflect the 
type of data collected from air carriers. Consistent with its 
particular business needs, each air carrier determines the specific 
configuration of data elements that ultimately constitute PNR. By 
providing increased notice of the types of data that may be contained 
within PNR, CBP seeks to provide the public with a greater 
understanding of the personal information being maintained in ATS-P. 
Examples of these categories of PNR, as listed below under ``Categories 
of Records'' include: Name, date of issuance ticket, date(s) of travel, 
PNR locator number, payment information, such as credit card 
information, and travel agent or travel agency that may have made the 
reservations for the individual.
    Lastly, two of the routine uses included in the earlier version of 
the SORN-those pertaining to using ATS in background checks--are 
removed. This is necessary because the revised SORN contains a more 
narrow definition of the purposes for which certain data--

[[Page 43653]]

specifically, PNR data maintained in ATS-P--will be used. The deleted 
routine uses did not fit within the scope of these purposes.
    This discussion of comments addresses revisions made to the SORN 
published on November 2, 2006. The full comments received address 
additional issues, such as mission creep, potential economic impact, 
appropriate applicability of the Privacy Act, constitutionality, and 
information quality. For a discussion of the full comments received 
from the November 2, 2006, publication and DHS' response, please see 
``Discussion of Public Comments Received on the Automated Targeting 
System Privacy Act System of Records Notice'' on the DHS Web site at 
https://www.dhs.gov/privacy.
SYSTEM NAME:
    Automated Targeting System (ATS)--CBP.

SYSTEM LOCATION:
    This computer database is located at the CBP National Data Center 
in Washington, D.C. Computer terminals are located at customhouses, 
border ports of entry, airport inspection facilities under the 
jurisdiction of DHS, and other locations at which DHS authorized 
personnel may be posted to facilitate DHS's mission. Terminals may also 
be located at appropriate facilities for other participating government 
agencies pursuant to agreement.

CATEGORIES OF INDIVIDUALS COVERED BY THE SYSTEM:
    ATS includes the following separate components: ATS-N, for 
screening inbound or imported cargo; ATS-AT, for outbound or exported 
cargo; ATS-L, for screening private passenger vehicles crossing at land 
border ports of entry by license plate data; ATS-I, for cooperating 
with international customs partners in shared cargo screening and 
supply chain security; ATS-TAP, for assisting tactical units in 
identifying anomalous trade activity and performing trend analysis; and 
ATS-P, for screening travelers and conveyances entering the United 
States in the air, sea and rail environments.
    Collectively, these components handle information relating to the 
following individuals:
    A. Persons seeking to enter, exit, or transit through the United 
States by land, air, or sea. This includes passengers who arrive and 
depart the United States by air or sea, including those in transit 
through the United States on route to a foreign destination and crew 
members who arrive and depart the United States by air or sea, 
including those in transit through the United States on route to a 
foreign destination, and crew members on aircraft that over fly the 
United States.
    B. Persons who engage in any form of trade or other commercial 
transaction related to the importation or exportation of merchandise.
    C. Persons who are employed in any capacity related to the transit 
of merchandise intended to cross the United States border.
    D. Persons who serve as operators, crew, or passengers on any 
vessel, vehicle, aircraft, train, or other conveyance that arrives in 
or departs the United States.
    E. Persons who serve as booking agents, brokers, or other persons 
who provide information on behalf of persons seeking to enter, exit, or 
transit through the United States.

CATEGORIES OF RECORDS IN THE SYSTEM:
    ATS uses CBP's law enforcement databases, the Federal Bureau of 
Investigation Terrorist Screening Center's Terrorist Screening Database 
(TSDB), information on outstanding wants or warrants, information from 
other government agencies regarding high-risk parties, and risk-based 
rules developed by analysts to assess and identify high-risk cargo, 
conveyances, or travelers that should be subject to further scrutiny or 
examination. ATS maintains these assessments together with a record of 
which rules were used to develop the assessment. With the exception of 
PNR information, discussed below, ATS maintains a pointer or reference 
to the underlying records from other systems that resulted in a 
particular assessment.
    ATS-P, a component of ATS, maintains the PNR information obtained 
from commercial air carriers and uses that information to assess 
whether there is a risk associated with any travelers seeking to enter, 
exit, or pass through the United States. PNR may include some 
combination of these following categories of information, when 
available:
    1. PNR record locator code.
    2. Date of reservation/ issue of ticket.
    3. Date(s) of intended travel.
    4. Name(s) .
    5. Available frequent flier and benefit information (i.e., free 
tickets, upgrades, etc.).
    6. Other names on PNR, including number of travelers on PNR.
    7. All available contact information (including originator of 
reservation).
    8. All available payment/billing information (e.g. credit card 
number).
    9. Travel itinerary for specific PNR.
    10. Travel agency/travel agent.
    11. Code share information (e.g., when one air carrier sells seats 
on another air carrier's flight).
    12. Split/divided information (e.g., when one PNR contains a 
reference to another PNR).
    13. Travel status of passenger (including confirmations and check-
in status).
    14. Ticketing information, including ticket number, one way tickets 
and Automated Ticket Fare Quote (ATFQ) fields.
    15. Baggage information.
    16. Seat information, including seat number.
    17. General remarks including Other Service Indicated (OSI), 
Special Service Indicated (SSI) and Supplemental Service Request (SSR) 
information.
    18. Any collected APIS information (e.g., Advance Passenger 
Information (API) that is initially captured by an air carrier within 
its PNR, such as passport number, date of birth and gender).
    19. All historical changes to the PNR listed in numbers 1 to 18.
    Not all air carriers maintain the same sets of information for PNR, 
and a particular individual's PNR likely will not include information 
for all possible categories. In addition, PNR does not routinely 
include information that could directly indicate the racial or ethnic 
origin, political opinions, religious or philosophical beliefs, trade 
union membership, health, or sex life of the individual. To the extent 
PNR does include terms that reveal such personal matters, DHS employs 
an automated system that filters certain of these terms and only uses 
this information in exceptional circumstances.

AUTHORITY FOR MAINTENANCE OF THE SYSTEM:
    19 U.S.C. 482, 1461, 1496, and 1581-82, 8 U.S.C 1357, Title VII of 
Public Law 104-208, 49 U.S.C. 44909, and the ``Security and 
Accountability for Every Port Act of 2006'' (SAFE Port Act) (Pub. L. 
109-347).

PURPOSES FOR PNR IN ATS-P:
    (a) To prevent and combat terrorism and related crimes;
    (b) To prevent and combat other serious crimes, including organized 
crime, that are transnational in nature;
    (c) To prevent flight from warrants or custody for crimes described 
in (a) and (b) above;
    (d) Wherever necessary for the protection of the vital interests of 
a data subject or other persons;
    (e) In any criminal judicial proceedings; or
    (f) As otherwise required by law.

[[Page 43654]]

PURPOSES OF ATS (EXCEPT PNR IN ATS-P):
    In addition to those purposes listed above for PNR in ATS-P:
    (a) To perform targeting of individuals, including passengers and 
crew, focusing CBP resources by identifying persons who may pose a risk 
to border security or public safety, may be a terrorist or suspected 
terrorist, or may otherwise be engaged in activity in violation of U.S. 
law.
    (b) To perform a risk-based assessment of conveyances and cargo to 
focus CBP's resources for inspection and examination and enhance CBP's 
ability to identify potential violations of U.S. law, possible 
terrorist threats, and other threats to border security; and
    (c) To otherwise assist in the enforcement of the laws enforced or 
administered by DHS, including those related to counterterrorism.

ROUTINE USES OF RECORDS MAINTAINED IN THE VARIOUS COMPONENTS OF ATS, 
INCLUDING CATEGORIES OF USERS AND THE PURPOSES OF SUCH USES:
    In addition to those disclosures generally permitted under 5 U.S.C. 
552a(b) of the Privacy Act, all or a portion of the records or 
information contained in this system may be disclosed outside DHS as a 
routine use pursuant to 5 U.S.C. 552a(b)(3). DHS only discloses 
information to those authorities who have a legal purpose to use the 
data, intend to use the information consistent with the purpose for 
which CBP collects it or for another legally required function, such as 
GAO oversight and ongoing IT maintenance, and has sufficient capability 
to protect and safeguard it. Under these limits, data may be disclosed 
as a routine use in the following manner:
    A. To appropriate Federal, state, local, tribal, or foreign 
governmental agencies or multilateral governmental organizations 
responsible for investigating or prosecuting the violations of, or for 
enforcing or implementing, a statute, rule, regulation, order, or 
license, where CBP believes the information would assist enforcement of 
applicable civil or criminal laws;
    B. To Federal and foreign government intelligence or 
counterterrorism agencies or components where CBP becomes aware of an 
indication of a threat or potential threat to national or international 
security, or where such use is to assist in anti-terrorism efforts and 
disclosure is appropriate to the proper performance of the official 
duties of the person making the disclosure;
    C. To an organization or individual in either the public or private 
sector, either foreign or domestic, where there is a reason to believe 
that the recipient is or could become the target of a particular 
terrorist activity or conspiracy, or where the information is relevant 
to the protection of life, property, or other vital interests of a data 
subject and such disclosure is proper and consistent with the official 
duties of the person making the disclosure;
    D. To appropriate Federal, state, local, tribal, or foreign 
governmental agencies or multilateral governmental organizations for 
the purpose of protecting the vital interests of a data subject or 
other persons, including to assist such agencies or organizations in 
preventing exposure to or transmission of a communicable or 
quarantinable disease or to combat other significant public health 
threats; appropriate notice will be provided of any identified health 
threat or risk;
    E. To a court, magistrate, or administrative tribunal in the course 
of presenting evidence, including disclosures to opposing counsel or 
witnesses in the course of civil discovery, litigation, or settlement 
negotiations, or in response to a subpoena, or in connection with 
criminal law proceedings;
    F. To third parties during the course of a law enforcement 
investigation to the extent necessary to obtain information pertinent 
to the investigation, provided disclosure is appropriate in the proper 
performance of the official duties of the officer making the 
disclosure.

    G. To an agency, organization, or individual for the purposes of 
performing audit or oversight operations as authorized by law, but only 
such information as is necessary and relevant to such audit or 
oversight function;
    H. To a Congressional office, for the record of an individual in 
response to an inquiry from that Congressional office made at the 
request of the individual to whom the record pertains;
    I. To contractors, grantees, experts, consultants, and others 
performing or working on a contract, service, grant, cooperative 
agreement, or other assignment for the Federal government, when 
necessary to accomplish an agency function related to this system of 
records, in compliance with the Privacy Act of 1974, as amended;
    J. To the U.S. Department of Justice (including U.S. Attorney 
offices) or other Federal agency conducting litigation or in 
proceedings before any court, adjudicative or administrative body, when 
it is necessary to the litigation and one of the following is a party 
to the litigation or has an interest in such litigation: (a) DHS, or 
(b) any employee of DHS in his/her official capacity, or (c) any 
employee of DHS in his/her individual capacity where DOJ or DHS has 
agreed to represent said employee, or (d) the United States or any 
agency thereof;
    K. To the National Archives and Records Administration or other 
Federal government agencies pursuant to records management inspections 
being conducted under the authority of 44 U.S.C. Sections 2904 and 
2906;
    L. To appropriate Federal, state, local, tribal, or foreign 
governmental agencies or multilateral governmental organizations where 
CBP is aware of a need to utilize relevant data for purposes of testing 
new technology and systems designed to enhance ATS;
    M. To appropriate agencies, entities, and persons when (1) It is 
suspected or confirmed that the security or confidentiality of 
information in the system of records has been compromised; (2) DHS has 
determined that as a result of the suspected or confirmed compromise 
there is a risk of harm to economic or property interests, identity 
theft or fraud, or harm to the security or integrity of this system or 
other systems or programs (whether maintained by DHS or another agency 
or entity) that rely upon the compromised information; and (3) the 
disclosure is made to such agencies, entities, and persons when 
reasonably necessary to assist in connection with DHS's efforts to 
respond to the suspected or confirmed compromise and prevent, minimize, 
or remedy such harm.

POLICIES AND PRACTICES FOR STORING, RETRIEVING, ACCESSING, RETAINING, 
AND DISPOSING OF RECORDS IN THE SYSTEM
STORAGE:
    The data is stored electronically at the National Data Center for 
current data and offsite at an alternative data storage facility for 
historical logs and system backups.

RETRIEVABILITY:
    The data is retrievable by name or personal identifier from an 
electronic database.

SAFEGUARDS:
    All records are protected from unauthorized access through 
appropriate administrative, physical, and technical safeguards. These 
safeguards include all of the following: restricting access to those 
with a ``need to know''; using locks, alarm devices, and passwords; 
compartmentalizing databases; auditing software; and encrypting data 
communications.
    ATS also monitors source systems for changes to the source data. 
The system

[[Page 43655]]

manager, in addition, has the capability to maintain system back-ups 
for the purpose of supporting continuity of operations and the discrete 
need to isolate and copy specific data access transactions for the 
purpose of conducting security incident investigations. ATS information 
is secured in full compliance with the requirements of the Federal 
Information Security Management Act (FISMA) and the DHS IT Security 
Program Handbook. This handbook establishes a comprehensive information 
security program.

USE AND CONTROL:
    CBP maintains full access for a limited number of authorized 
personnel to all information contained within ATS. Authorized personnel 
receive thorough background investigations and extensive training on 
CBP security and privacy policies on the appropriate use of ATS 
information. These individuals are trained to review the risk 
assessments and background information to identify individuals who may 
likely pose a risk. To ensure that ATS is being accessed and used 
appropriately, audit logs are also created and reviewed routinely by 
CBP's Office of Internal Affairs to ensure integrity of the system and 
process.
    Access to the risk assessment results and related rules is 
restricted to a limited number of authorized government personnel who 
have gone through extensive training on the appropriate use of this 
information and CBP policies, including for security and privacy. These 
All individuals are specifically trained to review the risk assessments 
and background information to identify individuals who may likely pose 
a risk.

RETENTION AND DISPOSAL:
    Records in this system will be retained and disposed of in 
accordance with a records schedule to be approved by the National 
Archives and Records Administration. ATS both collects information 
directly, and derives other information from various systems. To the 
extent information is collected from other systems, data is retained in 
accordance with the record retention requirements of those systems.
    The retention period for data maintained in ATS will not exceed 
fifteen years, after which time it will be deleted, except as noted 
below. The retention period for PNR, which is contained only in ATS-P, 
will be subject to the following further access restrictions: ATS-P 
users will have general access to PNR for seven years, after which time 
the PNR data will be moved to dormant, non-operational status. PNR data 
in dormant status will be retained for eight years and may be accessed 
only with approval of a senior DHS official designated by the Secretary 
of Homeland Security and only in response to an identifiable case, 
threat, or risk. Such limited access and use for older PNR strikes a 
reasonable balance between protecting this information and allowing CBP 
to continue to identify potential high-risk travelers. Notwithstanding 
the foregoing, information maintained only in ATS that is linked to 
active law enforcement lookout records, CBP matches to enforcement 
activities, and/or investigations or cases (i.e., specific and credible 
threats; flights, individuals, and routes of concern; or other defined 
sets of circumstances) will remain accessible for the life of the law 
enforcement matter to support that activity and other enforcement 
activities that may become related.
    It is important to note that the justification for a fifteen year 
retention period is based on CBP's law enforcement and security 
functions at the border. This retention period is based on CBP's 
historical encounters with suspected terrorists and other criminals, as 
well as the broader expertise of the law enforcement and intelligence 
communities. It is well known, for example, that potential terrorists 
may make multiple visits to the United States in advance of performing 
an attack. It is over the course of time and multiple visits that a 
potential risk becomes clear. Passenger records including historical 
records are essential in assisting CBP Officers with their risk-based 
screening of travel indicators and identifying potential links between 
known and previously unidentified terrorist facilitators. Analyzing 
these records for these purposes allows CBP to continue to effectively 
identify suspect travel patterns and irregularities.

SYSTEM MANAGER(S) AND ADDRESS:
    Executive Director, National Targeting and Security, Office of 
Field Operations, U.S. Customs and Border Protection, Ronald Reagan 
Building and Director, Targeting and Analysis, Systems Program Office, 
Office of Information Technology, U.S. Customs and Border Protection.

PUBLIC RECORD ACCESS/REDRESS PROCEDURES:
    DHS policy allows persons (including foreign nationals) to access 
and redress under the Privacy Act to raw PNR data maintained in ATS-P. 
The PNR data, upon request, may be provided to the requester in the 
form in which it was collected from the respective carrier, but may not 
include certain business confidential information of the air carrier 
that is also contained in the record, such as . This access does not 
extend to other information in ATS obtained from official sources 
(which are covered under separate SORNs) or that is created by CBP, 
such as the targeting rules and screening results, which are law 
enforcement sensitive information and are exempt from certain 
provisions of the Privacy Act. For other information in this system of 
records, individuals generally may not seek access for purposes of 
determining if the system contains records pertaining to a particular 
individual or person. (See 5 U.S.C. 552a (e)(4)(G) and (f)(1)).
    Individuals, regardless of nationality, may seek access to records 
about themselves in accordance with the Freedom of Information Act. In 
addition, DHS policy allows persons, including foreign nationals, to 
seek access under the Privacy Act to raw PNR data submitted to ATS-P. 
Requests for access to personally identifiable information contained in 
PNR that was provided by the requestor or by someone else on behalf of 
the requestor, regarding the requestor, may be submitted to the FOIA/PA 
Unit, Office of Field Operations, U.S. Customs and Border Protection, 
Room 5.50C, 1300 Pennsylvania Avenue, NW., Washington, DC 20229 (phone: 
(202) 344-1850 and fax: (202) 344-2791). Requests should conform to the 
requirements of 6 CFR Part 5, which provides the rules for requesting 
access to Privacy Act records maintained by DHS. The envelope and 
letter should be clearly marked ``Privacy Act Access Request.'' The 
request should include a general description of the records sought and 
must include the requester's full name, current address, and date and 
place of birth. The request must be signed and either notarized or 
submitted under penalty of perjury.
    CBP notes that ATS is a decision-support tool that compares various 
databases, but does not actively collect the information in those 
respective databases, except for PNR. When an individual is seeking 
redress for other information analyzed in ATS, such redress is properly 
accomplished by referring to the databases that directly collect that 
information. If individuals are uncertain what agency handles the 
information, they may seek redress through the DHS Traveler Redress 
Program (``TRIP''). See 72 FR 2294, dated January 18, 2007. Individuals 
who believe they have been improperly denied entry, refused boarding 
for transportation, or identified for

[[Page 43656]]

additional screening by CBP may submit a redress request through TRIP. 
TRIP is a single point of contact for individuals who have inquiries or 
seek resolution regarding difficulties they experienced during their 
travel screening at transportation hubs--like airports and train 
stations or crossing U.S. borders. Through TRIP, a traveler can request 
correction of erroneous PNR data stored in ATS-P and other data stored 
in other DHS databases through one application. Additionally, for 
further information on ATS and the redress options please see the 
accompanying PIA for ATS published on the DHS website at www.dhs.gov/
privacy. Redress requests should be sent to: DHS Traveler Redress 
Inquiry Program (TRIP), 601 South 12th Street, TSA-901, Arlington, VA 
22202-4220 or online at https://www.dhs.gov/trip and at https://
www.dhs.gov.
    Additionally, a traveler may seek redress from CBP at the time of 
the border crossing.

CONTESTING RECORD PROCEDURES:
    Individuals may seek redress and/or contest a record through 
several different means, all of which will be handled in the same 
fashion. If the individual is aware the information is specifically 
handled by CBP, requests may be sent directly to CBP at the FOIA/PA 
Unit, Office of Field Operations, U.S. Customs and Border Protection, 
Room 5.5-C, 1300 Pennsylvania Avenue, NW., Washington, DC 20229 (phone: 
(202) 344-1850 and fax: (202) 344-2791). If the individual is uncertain 
what agency is responsible for maintaining the information, redress 
requests may be sent to DHS TRIP at DHS Traveler Redress Inquiry 
Program (TRIP), 601 South 12th Street, TSA-901, Arlington, VA 22202-
4220 or online at https://www.dhs.gov/trip.

RECORD SOURCE CATEGORIES:
    The system contains information derived from other law enforcement 
systems operated by DHS and federal, state, local, tribal, or foreign 
government agencies, which collected the underlying data from 
individuals and public entities directly.
    The system also contains information collected from carriers that 
operate vessels, vehicles, aircraft, and/or trains that enter or exit 
the United States. In addition, the cargo modules (ATS-Inbound and 
Outbound) employ information collected from third party data 
aggregators.

EXEMPTIONS CLAIMED FOR THE SYSTEM:
    Pursuant to 6 CFR Part 5, Appendix C, certain records and 
information in this system are exempt from 5 U.S.C. 552a(c)(3) and (4); 
(d)(1), (2), (3), and (4); (e)(1), (2), (3), (4)(G) through (I), 
(e)(5), and (8); (f), and (g) of the Privacy Act pursuant to 5 U.S.C. 
552a(j)(2) and (k)(2)). With respect to ATS-P module, exempt records 
are the risk assessment analyses and business confidential information 
received in the PNR from the air and vessel carriers. No exemption 
shall be asserted regarding PNR data about the requester, obtained from 
either the requester or by a booking agent, brokers, or another person 
on the requester's behalf. This information, upon request, may be 
provided to the requester in the form in which it was collected from 
the respective carrier, but may not include certain business 
confidential information of the air carrier that is also contained in 
the record. For other ATS modules the only information maintained in 
ATS is the risk assessment analyses and a pointer to the data from the 
source system of records.

    Dated: July 31, 2007.
Hugo Teufel III,
Chief Privacy Officer.
 [FR Doc. E7-15197 Filed 8-1-07; 11:51 am]
BILLING CODE 4410-10-P
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.