Privacy Act of 1974; System of Records, 47073-47079 [E7-16487]

Download as PDF Federal Register / Vol. 72, No. 162 / Wednesday, August 22, 2007 / Notices supplement to the complaint on August 8, 2007. The complaint, as supplemented, alleges violations of § 337 in the importation into the United States, the sale for importation, and the sale within the United States after importation of certain nitrile rubber gloves by reason of infringement of U.S. Patent No. Re. 35,616. The complaint further alleges that an industry in the United States exists as required by subsection (a)(2) of § 337. The complainant requests that the Commission institute an investigation and, after the investigation, issue a permanent exclusion order and a permanent cease and desist order. ADDRESSES: The complaint, except for any confidential information contained therein, is available for inspection during official business hours (8:45 a.m. to 5:15 p.m.) in the Office of the Secretary, U.S. International Trade Commission, 500 E Street, SW., Room 112, Washington, DC 20436, telephone 202–205–2000. Hearing impaired individuals are advised that information on this matter can be obtained by contacting the Commission’s TDD terminal on 202–205–1810. Persons with mobility impairments who will need special assistance in gaining access to the Commission should contact the Office of the Secretary at 202–205–2000. General information concerning the Commission may also be obtained by accessing its internet server at http:// www.usitc.gov. The public record for this investigation may be viewed on the Commission’s electronic docket (EDIS) at http://www.usitc.gov/secretary/ edis.htm. Vu Q. Bui, Esq., Office of Unfair Import Investigations, U.S. International Trade Commission, telephone (202) 205–2582. FOR FURTHER INFORMATION CONTACT: jlentini on PROD1PC65 with NOTICES Authority: The authority for institution of this investigation is contained in section 337 of the Tariff Act of 1930, as amended, and in section 210.10 of the Commission’s Rules of Practice and Procedure, 19 CFR 210.10 (2006). Scope of Investigation: Having considered the complaint, the U.S. International Trade Commission, on August 15, 2007, ordered that— (1) Pursuant to subsection (b) of section 337 of the Tariff Act of 1930, as amended, an investigation be instituted to determine whether there is a violation of subsection (a)(1)(B) of § 337 in the importation into the United States, the sale for importation, or the sale within the United States after importation of certain nitrile rubber gloves by reason of infringement of one or more of claims 1 and 17–19 of U.S. VerDate Aug<31>2005 16:26 Aug 21, 2007 Jkt 211001 Patent No. Re. 35,616, and whether an industry in the United States exists as required by subsection (a)(2) of § 337; (2) For the purpose of the investigation so instituted, the following are hereby named as parties upon which this notice of investigation shall be served: (a) The complainant is— Tillotson Corporation, d/b/a, Best Manufacturing Company, 579 Edison Street, Menlo, Georgia 30731. (b) The respondents are the following entities alleged to be in violation of section 337, and are the parties upon which the complaint is to be served: Cardinal Health, Inc., 7000 Cardinal Place, Dublin, Ohio 43017. Cardinal Health 200, Inc., 1430 Waukegan Road (MP KB–1A), McGaw Park, Illinois 60085. Cardinal Health Malaysia 211 Sdn. Bhd., Plot 87, Kampung Jawa 11900, Bayan Lepas, Malaysia. Henry Schein, Inc., 135 Duryea Road, Melville, New York 11747. HSI Gloves Inc., 135 Duryea Road, Melville, New York 11747. Latexx Partners Berhad, Pt5054, Jalan Perusahaan 3, Kamunting, Industrial Estate, 34600 Kamunting, Perak, Darul Ridzuan, Malaysia. Medtexx Partners Inc., 102 Engle St. FL2, Englewood, New Jersey 07631. (c) The Commission investigative attorney, party to this investigation, is Vu Q. Bui, Esq., Office of Unfair Import Investigations, U.S. International Trade Commission, 500 E Street, SW., Suite 401, Washington, DC 20436; and (3) For the investigation so instituted, the Honorable Charles E. Bullock is designated as the presiding administrative law judge. (4) The Commission has determined to assign this investigation to Judge Bullock, who is the presiding administrative law judge in Certain Nitrile Gloves, Inv. No. 337–TA–608, in view of the overlapping subject matter in the two investigations. The presiding administrative law judge is authorized to consolidate Inv. No. 337–TA–608 and this investigation if he deems it appropriate. Responses to the complaint and the notice of investigation must be submitted by the named respondents in accordance with section 210.13 of the Commission’s Rules of Practice and Procedure, 19 CFR 210.13. Pursuant to 19 CFR 201.16(d) and 210.13(a), such responses will be considered by the Commission if received not later than 20 days after the date of service by the Commission of the complaint and the notice of investigation. Extensions of time for submitting responses to the complaint and the notice of PO 00000 Frm 00122 Fmt 4703 Sfmt 4703 47073 investigation will not be granted unless good cause therefor is shown. Failure of a respondent to file a timely response to each allegation in the complaint and in this notice may be deemed to constitute a waiver of the right to appear and contest the allegations of the complaint and this notice, and to authorize the administrative law judge and the Commission, without further notice to the respondent, to find the facts to be as alleged in the complaint and this notice and to enter an initial determination and a final determination containing such findings, and may result in the issuance of a limited exclusion order or cease and desist order or both directed against the respondents. Issued: August 16, 2007. By order of the Commission. Marilyn R. Abbott, Secretary. [FR Doc. E7–16432 Filed 8–21–07; 8:45 am] BILLING CODE 7020–02–P DEPARTMENT OF JUSTICE Federal Bureau of Investigation [AAG/A Order No. 028–2007] Privacy Act of 1974; System of Records Federal Bureau of Investigation, DOJ. ACTION: Notice to amend system of records. AGENCY: SUMMARY: The Federal Bureau of Investigation proposes to amend its Terrorist Screening Records System, Justice/FBI–019, maintained by the Terrorist Screening Center, to make several changes to its existing notice. Public comments are invited. DATES: The Privacy Act requires that the public be given 30 days in which to comment on any new or amended uses of information in a system of records. In addition, the Office of Management and Budget (OMB), which has oversight responsibilities under the Act, and the Congress must be given 40 days in which to review major changes to Privacy Act systems. Therefore, the public, OMB, and the Congress are invited to submit written comments on this revised Privacy Act system of records. Please submit any comments by October 1, 2007. ADDRESSES: Address all comments to Kenneth P. Mortensen, Deputy Privacy and Civil Liberties Officer, U.S. Department of Justice, 950 Pennsylvania Ave., NW., Washington, DC 20530, facsimile number (202) 616–9627. E:\FR\FM\22AUN1.SGM 22AUN1 47074 Federal Register / Vol. 72, No. 162 / Wednesday, August 22, 2007 / Notices FOR FURTHER INFORMATION CONTACT: Kenneth P. Mortensen, (202) 514–3853. SUPPLEMENTARY INFORMATION: On July 28, 2005, the Department of Justice, Federal Bureau of Investigation (FBI) published a new Privacy Act System of Records notice, the Terrorist Screening Records System (TSRS), Justice/FBI– 019, to cover records maintained by the Terrorist Screening Center (TSC), the system owner. See 70 FR 43715. Records in the TSRS include the Terrorist Screening Database (TSDB), records in the Encounter Management Application (EMA) that document the operational support TSC provides to agencies that screen for terrorists (‘‘screening agencies’’), and records related to the TSC’s internal quality assurance process to ensure the terrorist data is thorough, accurate and current. The TSC also maintains records related to the resolution of terrorist watchlistrelated redress complaints. The TSC now proposes modifications to the system to expand the scope of the system, and to increase the clarity of the notice. The following explains the proposed modifications: General Changes The previous system notice used the terms ‘‘terrorist screening’’ and ‘‘terrorism screening’’ interchangeably to describe the same process. This notice is being modified so that only the term ‘‘terrorism screening’’ is used, making it consistent with the language in Homeland Security Presidential Directive 6 (HSPD 6). This system notice also makes use of the term Terrorism Information as defined in section 1016 of the Intelligence Reform and Prevention Act of 2004 (Pub. L. 108– 458). jlentini on PROD1PC65 with NOTICES System Location The current system of records notice for Justice/FBI–019 states that the records are located at the TSC, Federal Bureau of Investigation, Washington, DC. The notice has been amended to reflect that records in Justice/FBI–019 may also be located in secondary locations for system back-up and continuity-of-operations purposes. Categories of Individuals The TSC is expanding the categories of individuals covered by this system to cover individuals who are authorized users of the underlying information systems described by this system of records, such as the TSDB and EMA, since audit logs documenting their use will be maintained in connection with the system. Currently, only TSC personnel can perform queries directly against the VerDate Aug<31>2005 16:26 Aug 21, 2007 Jkt 211001 TSDB, EMA, and other internal TSC databases. In the future, the TSC plans to operate a query function permitting authorized individuals from screening agencies or entities to access TSC systems directly from an external location and submit search queries. Collection and maintenance of information through audit logs about authorized users will allow the TSC to monitor who uses TSC information systems for what purpose, in order to ensure compliance with applicable laws and policy. Therefore, the TSC is modifying this system of records notice to account for this fact. Additionally, the TSC is clarifying that this system of records covers all individuals whose names or identifying information is collected to perform a query against TSC information systems, such as TSDB, but who are not necessarily individuals whose information is generally maintained as terrorist information in the TSDB. For example, in certain instances, individuals’ names are queried directly against the TSDB or EMA to see if there is a possible record match and, if there is not, their names may be retained in an audit trail that records the activity of authorized users of TSC information systems. The system notice is being modified to make clear that these individuals’ information is also included in this system of records. The TSC is adding a new category to cover individuals who accompany or travel with a person when that person is an actual match to a known or suspected terrorist identity in the TSDB and when the TSC or screening agency or entity identifies that person as such during a terrorism screening process. The TSC collects this information in the course of encounters with known or suspected terrorists. For example, an encounter can include times when an individual was in the car along with a person matching an identity in the TSDB during a traffic stop by state or local law enforcement officers. TSC maintains this information about such individuals in EMA and not in the TSDB, and shares it as appropriate with other agencies for law enforcement and intelligence purposes consistent with the routine uses of this system of records. Categories of Records The TSC is adding new categories of records to cover audit logs for TSC systems, and archived records and record histories for the TSDB and other TSC systems. As discussed above, audit log records allow the TSC to monitor who uses TSC systems for what purpose in order to PO 00000 Frm 00123 Fmt 4703 Sfmt 4703 ensure compliance with applicable laws and policy. A TSDB record history is a log of any previous changes to the current version of a TSDB record. Archived TSDB records are TSDB records that pertain to individuals who are no longer eligible for inclusion in the TSDB, because those individuals no longer meet the criteria for inclusion in the TSDB as a known or suspected terrorist. The TSC retains these records in an archive that is logically separate from other TSDB data and may be accessed only by a limited number of TSC personnel who have undergone specialized training on the sensitivity of these records and the permissible reasons for access. Pursuant to TSC policy, archived TSDB records may only be accessed for the following purposes: (1) Redress, (2) litigation, (3) quality assurance (e.g., to determine if a record correction is required to an existing record in a TSC or other agency system), (4) to respond to requests from oversight bodies and auditors, and to perform internal audits, (5) to evaluate TSC performance and data in the event of another terrorist attack or attempted attack, and to support any related investigation, and (6) when access is otherwise required by law (e.g., Freedom of Information Act (FOIA) request). Archived TSDB records are not used or made available for any watchlisting purposes. The search function for the TSDB archive requires that prior to accessing the TSDB archive authorized TSC personnel must identify an approved purpose with information supporting the need for access. This information is maintained in a detailed audit log, which is routinely reviewed by TSC compliance personnel. Additionally, the TSC is modifying other descriptions of categories of records to clarify the types of information held in the TSC systems. The TSC is adding language to clarify that records of encounters may include information about individuals who accompany or travel with a person when that person is an actual match to a known or suspected terrorist identity in the TSDB and the TSC or screening agency or entity identifies that person as such during a terrorism screening process. The TSC is also modifying Item (a) To add ‘‘photograph’’ as a specific type of identifying data that may be contained in the TSRS. While a photograph may be considered a biometric, which is already listed in Item (a), TSC is listing photographs as a separate item to ensure clarity. The TSC is modifying Item (b) By changing the term ‘‘agency’’ to ‘‘entity’’ to reflect that entities other than a E:\FR\FM\22AUN1.SGM 22AUN1 Federal Register / Vol. 72, No. 162 / Wednesday, August 22, 2007 / Notices federal government agency may engage in terrorism screening. Item (b) is also being modified by removing the language ‘‘terrorist encounters’’ and replacing it with ‘‘encounters with known or suspected terrorists,’’ which is a more precise characterization, because Item (a) in the Categories of Individuals defines the phrase ‘‘known or suspected terrorists.’’ The TSC is also modifying Item (c) to make clear that TSRS may also include references to or information from other relevant databases that contain terrorism information, in the event such databases are not considered law enforcement or intelligence databases. jlentini on PROD1PC65 with NOTICES Authority for Maintenance of the System The TSC is adding the following legal authorities: the National Security Act of 1947, as amended; the Intelligence Reform and Terrorism Prevention Act of 2004, Pub. L. 108–458, 18 Stat. 3638 (December 17, 2004); and Executive Order 13388, ‘‘Further Strengthening the Sharing of Terrorism Information to Protect Americans,’’ (October 25, 2005). TSC is removing the reference to Executive Order 13356, which has been superseded by Executive Order 13388. Also, the TSC is adding language to provide notice that in the event that the TSC’s continuity-of-operations plans are invoked, the agency that assumes TSC operational functions will have the authority to administer the Terrorist Screening Records System as necessary to carry out those functions and will act consistent with the obligations required by the Privacy Act of 1974 in the maintenance of TSRS as a Privacy Act System of Records. Purpose Statement Consistent with the changes discussed above regarding auditing of TSC data systems, the TSC is expanding the purpose of the system of records to clarify that one purpose is to conduct appropriate oversight of the proper use of TSC data systems. The language in Item (e) Is being modified to add the quoted language below to more accurately reflect TSC’s mission, as set forth in HSPD 6, to provide support for private sector screening processes ‘‘that have a substantial bearing on homeland security.’’ The language in Item (f) is being modified to remove the word ‘‘agency’s’’ and insert the word ‘‘authorized’’ preceding the term ‘‘screening process’’ to more accurately describe the type of screening TSC may perform. The word ‘‘agency’’ was removed because not all terrorism screening is necessarily VerDate Aug<31>2005 16:26 Aug 21, 2007 Jkt 211001 performed by a federal government agency. The word ‘‘authorized’’ was added because all terrorism screening processes using TSC data must be authorized by the TSC pursuant to the standard articulated in HSPD 6. The language in Item (g) Is being changed to add the word ‘‘organizations’’ to the list of entities and individuals that may receive information about encounters with known or suspected terrorists. This change is intended to better reflect the ongoing efforts by the federal government to increase sharing of intelligence, law enforcement and terrorism information with the State and local governments, fusion centers, and critical infrastructure owners and operators, consistent with the privacy protections required by the Privacy Act and as articulated in this notice. The language in Item (h) is being changed by removing the word ‘‘repeatedly’’ from the phrase ‘‘to assist persons repeatedly misidentified during a terrorism screening process.’’ This change is intended to clarify that an individual does not have to be misidentified more than once for the TSC to act to provide assistance through a redress process or other means. Conforming changes are being made to the notice to remove the word ‘‘repeatedly’’ from Routine Uses B, F, and G, and the categories of individuals (Item (d)). Routine Uses Routine Use B listed for Justice/FBI– 019 permits disclosure of information to various entities in order to, among other things ‘‘provide appropriate notifications of a positive terrorist encounter or a threat related to the encounter.’’ The TSC is modifying this language to clarify that the TSC may notify an entity of not only a positive match to the terrorist watchlist, but also a negative or inconclusive match. Also, the TSC is modifying this Routine Use to include ‘‘private sector entities with a substantial bearing on homeland security’’ as described in HSPD–6 as potential recipients of information. Finally, the TSC is modifying the language in purpose (2) of this Routine Use to make clear that a positive encounter means an encounter with an individual who is identified in the TSDB, and to clarify purpose (3) of this Routine Use by adding the modifiers ‘‘known or suspected’’ to the terms ‘‘terrorist’’ and ‘‘threat related to the encounter.’’ Routine Use D permits disclosure of information for the development, testing, or modification of information technology systems used or intended to PO 00000 Frm 00124 Fmt 4703 Sfmt 4703 47075 be used during or in support of the screening process, but indicates TSC will use de-identified data whenever possible. The TSC is modifying the language of this Routine Use to clarify that ‘‘de-identified data’’ means data that cannot be used to derive an individual’s identity and to note that deidentified data will be used to the extent practicable and possible. Routine Use E permits disclosure of information to various agencies or entities to assist in the coordination of terrorist threat awareness, assessment, analysis, or response. The TSC is modifying this language to include private sector entities in the list of entities that may receive information from TSRS for these purposes. This change is intended to better reflect the ongoing efforts by the federal government to increase sharing of intelligence, law enforcement, terrorism and threat information with State fusion centers and the private sector, such as critical infrastructure and key resource owners and operators, consistent with the privacy protections required by the Privacy Act. Routine Use H permits disclosure of information in support of authorized audit or oversight operations of the DOJ, including FBI and TSC, or any agency engaged in or providing information used for terrorism screening supported by the TSC. The TSC is modifying this Routine Use to include authorized security operations as a permissible purpose for sharing information, thereby allowing the TSC to disclose information to the investigating entity in the context of a security-related investigation or inquiry, such as a personnel investigation or inquiry into a breach of data security. Additionally, the TSC is expanding the scope of this Routine Use by adding language that would allow disclosure if the subject of the security, audit, or oversight operation was not a Federal agency but an organization or individual that was engaged in or providing information used for terrorism screening that is supported by the TSC. These changes will allow the TSC to disclose information to support any oversight efforts into TSC-related activities. Routine Use K permits disclosure of information to a governmental entity lawfully engaged in collecting law enforcement, law enforcement intelligence, or national security intelligence information for law enforcement or intelligence purposes. TSC is modifying this Routine Use by changing ‘‘national security intelligence information’’ to ‘‘national security information’’ and ‘‘national intelligence,’’ which are terms defined E:\FR\FM\22AUN1.SGM 22AUN1 47076 Federal Register / Vol. 72, No. 162 / Wednesday, August 22, 2007 / Notices by Executive Order 12958, as amended, and the Intelligence Reform and Terrorism Prevention Act amendments to the National Security Act of 1947, respectively. Also, the TSC is specifying counterterrorism as one of the purposes for which information may be disclosed under this Routine Use, which is consistent with TSC’s counterterrorism mission. The Department of Justice previously published a notice modifying all of the Department’s systems of records, including TSRS, to include a routine use to permit the disclosure of information to appropriate persons and entities for purposes of response and remedial efforts in the event that there has been a breach of the data contained in the Department’s systems of records. See 72 FR 3410 (Jan. 25, 2007). The TSC is adding new Routine Use L to this notice to reflect this change. Retention and Disposal Although TSC is a multi-agency organization, the FBI administers TSC. Recently, the FBI obtained approval from the National Archives and Records Administration for its request for records disposition authority for records created and maintained by the TSC. The TSC is modifying this language to provide information on the approved retention periods for TSC records described in Justice/FBI–019. For records maintained in the Terrorist Screening Database (TSDB), active records are maintained for 99 years and inactive (archived) records are maintained for 50 years. Encounter Management Application (EMA) records, which document positive, negative, and inconclusive screening encounters with individuals in the TSDB, are maintained for 99 years. TSC maintains EMA records on negative encounters, i.e., a person who is initially identified as a possible match to a TSDB identity but ultimately determined not to be a match, in order to expedite future screening of those individuals and to support the redress process. Records of redress inquiries and quality assurance matters are maintained for at least six years. Audit logs are maintained for 25 years and records of user audits are maintained for ten years. jlentini on PROD1PC65 with NOTICES Contesting Record Procedures The TSC is adding language to this section to refer individuals to the TSC’s public Web site for additional information on the redress process and the procedures for filing a complaint related to terrorism screening. VerDate Aug<31>2005 16:26 Aug 21, 2007 Jkt 211001 Record Source Categories The TSC is modifying this section to include ‘‘private sector entities engaged in terrorism screening’’ as a record source category. This change is being made to reflect that the TSC may receive information for screening from the private sector in support of the TSC’s mission, as set forth in HSPD 6, to support ‘‘private sector screening processes that have a substantial bearing on homeland security.’’ Public Comments Invited Public comments are invited on all aspects of the revised system notice, including the retention periods for records and the new categories of individuals and records. See ADDRESSES section above for information on how to submit comments. In accordance with 5 U.S.C. 552a(r), the Department of Justice has provided a report of this amended system of records to the Office of Management and Budget and to Congress. Dated: August 14, 2007. Lee J. Lofthus, Assistant Attorney General for Administration. JUSTICE/FBI–019 SYSTEM NAME: Terrorist Screening Records System (TSRS). SECURITY CLASSIFICATION: Classified, unclassified (law enforcement sensitive). SYSTEM LOCATION: Records described in this notice are maintained at the Terrorist Screening Center, Federal Bureau of Investigation, Washington, D.C., and at facilities operated by other government entities for terrorism screening, system back-up, and continuity of operations purposes. CATEGORIES OF INDIVIDUALS COVERED BY THE SYSTEM: a. Individuals known or appropriately suspected to be or have been engaged in conduct constituting, in preparation for, in aid of, or related to terrorism (‘‘known or suspected terrorists’’); b. Individuals who are the subject of queries against TSC information systems; c. Individuals identified during a terrorism screening process as a possible identity match to a known or suspected terrorist and other individuals who accompany or travel with such individuals; d. Individuals who are misidentified as a possible identity match to a known or suspected terrorist (‘‘misidentified persons’’); PO 00000 Frm 00125 Fmt 4703 Sfmt 4703 e. Individuals about whom a terrorist watchlist-related redress inquiry has been made; and f. Individuals whose information is collected and maintained for information system user auditing and security purposes, such as individuals who are authorized users of TSC information systems. CATEGORIES OF RECORDS IN THE SYSTEM: a. Identifying information, such as name, date of birth, place of birth, biometrics, photographs, passport and/ or drivers license information, and other available identifying particulars used to compare the identity of an individual being screened with a known or suspected terrorist, including audit records containing this information; b. Information about encounters with individuals covered by this system, such as date, location, screening entity, analysis, associated individuals, and results (positive or negative identity match), and, for encounters with known or suspected terrorists only, other entities notified and details of any law enforcement, intelligence, or other operational response; c. For known or suspected terrorists, in addition to the categories of records listed above, references to and/or information from other government law enforcement and intelligence databases, or other relevant databases that may contain terrorism information; d. For misidentified persons, in addition to the categories of records listed above, additional identifying information that will be used during screening only for the purpose of distinguishing them from a known or suspected terrorist who has similar identifying characteristics (such as name and date of birth); e. For redress matters, in addition to the categories of records listed above, information provided by individuals or their representatives, information provided by the screening agency, and internal work papers and other documents related to researching and resolving the matter; f. Information collected and compiled to maintain an audit trail of the activity of authorized users of TSC information systems, such as user name/ID, date/ time, search query and results data, user activity information (e.g., record retrieval, modification, or deletion data), and record numbers; and, g. Archived records and record histories from the Terrorist Screening Database, Encounter Management Application, and other TSC data systems that are part of the TSRS. E:\FR\FM\22AUN1.SGM 22AUN1 Federal Register / Vol. 72, No. 162 / Wednesday, August 22, 2007 / Notices AUTHORITY FOR MAINTENANCE OF THE SYSTEM: Homeland Security Presidential Directive-6, ‘‘Integration and Use of Screening Information to Protect Against Terrorism’’ (Sept. 16, 2003); Executive Order 13388, Further Strengthening the Sharing of Terrorism Information to Protect Americans,’’ (October 25, 2005); the Intelligence Reform and Terrorism Prevention Act of 2004, Pub. L. 108–458; the National Security Act of 1947, as amended; and 28 U.S.C. 533. In the event that the TSC’s continuity-of-operations plans are invoked, the agency that assumes TSC operational functions will have the authority to administer the Terrorist Screening Records System as necessary to carry out those functions. jlentini on PROD1PC65 with NOTICES PURPOSE(S): a. To implement the U.S. Government’s National Strategy for Homeland Security and Homeland Security Presidential Directive-6, to identify potential terrorist threats, to uphold and enforce the law, and to ensure public safety. b. To consolidate the government’s approach to terrorism screening and provide for the appropriate and lawful use of terrorist information in screening processes. c. To maintain current, accurate and thorough terrorist information in a consolidated terrorist screening database and determine which terrorism screening processes will use each entry in the database. d. To ensure that appropriate information possessed by State, local, territorial, and tribal governments, which is lawfully available to the Federal Government, is considered in determinations made by the TSC as to whether a person is a match to a known or suspected terrorist. e. To host mechanisms and make terrorism information available to support appropriate domestic, and foreign terrorism screening processes, and private-sector screening processes that have a substantial bearing on homeland security. f. To provide continual operational support to assist in the identification of persons screened and to facilitate an appropriate and lawful response when a known or suspected terrorist is identified in an authorized screening process. g. To provide appropriate government officials, agencies, or organizations with information about encounters with known or suspected terrorists. h. To assist persons misidentified during a terrorism screening process and to assist screening agencies or entities in responding to individual VerDate Aug<31>2005 16:26 Aug 21, 2007 Jkt 211001 complaints about the screening process (redress). i. To oversee the proper use, maintenance, and security of TSC data systems and TSC personnel. ROUTINE USES OF RECORDS MAINTAINED IN THE SYSTEM, INCLUDING CATEGORIES OF USERS AND THE PURPOSES OF SUCH USES: In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, the records or information in this system may be disclosed as a routine use, under 5 U.S.C. 552a(b)(3), in accordance with blanket routine uses established for FBI record systems. See Blanket Routine Uses (BRU) Applicable to More Than One FBI Privacy Act System of Records, Justice/FBI–BRU, published on June 22, 2001 at 66 FR 33558 and amended on February 14, 2005 at 70 FR 7513. In addition, as routine uses specific to this system, the TSC may disclose relevant system records to the following persons or entities and under the circumstances or for the purposes described below, to the extent such disclosures are compatible with the purpose for which the information was collected. (Routine uses are not meant to be mutually exclusive and may overlap in some cases.) A. To those federal agencies that have agreed to provide support to TSC for purposes of ensuring the continuity of TSC operations. B. To federal, state, local, tribal, territorial, foreign, multinational or other public agencies or entities, to entities regulated by any such agency or entity, and to owners/operators of critical infrastructure or private sector entities with a substantial bearing on homeland security and their agents, contractors or representatives, for the following purposes: (1) For use in and in support of terrorism screening authorized by the U.S. Government, (2) to provide appropriate notifications of the results of terrorism screening using information from the Terrorist Screening Database or a threat related to a positive encounter with an individual identified in the Terrorist Screening Database, (3) to facilitate any appropriate law enforcement or other response (e.g., medical and containment response to a biological hazard) to a known or suspected terrorist or a threat related to the encounter, and (4) to assist persons misidentified during a screening process. C. To any person, organization, or governmental entity in order to notify them of a serious terrorist threat for the purpose of guarding against or responding to such a threat. PO 00000 Frm 00126 Fmt 4703 Sfmt 4703 47077 D. To federal, state, local, tribal, territorial, foreign, or multinational agencies or entities, or other organizations that are engaged in, or are planning to engage in terrorism screening authorized by the U.S. Government, for the purpose of the development, testing, or modification of information technology systems used or intended to be used during or in support of the screening process; whenever practicable, however, TSC, to the extent possible, will substitute anonymized or de-identified data, such that the identity of the individual cannot be derived from the data. E. To federal, state, local, tribal, territorial, foreign, multinational agencies or entities, or private sector entities to assist in coordination of terrorist threat awareness, assessment, analysis or response. F. To any person or entity in either the public or private sector, domestic or foreign, where reasonably necessary to elicit information or cooperation from the recipient for use by the TSC in the performance of an authorized function, such as obtaining information from data sources as to the thoroughness, accuracy, currency, or reliability of the data provided so that the TSC may review the quality and integrity of its records for quality assurance or redress purposes, and may also assist persons misidentified during a screening process. G. To any federal, state, local, tribal, territorial, foreign or multinational agency, task force, or other entity or person that receives information from the U.S. Government for terrorism screening purposes, in order to facilitate TSC’s or the recipient’s review, maintenance, and correction of TSC data for quality assurance or redress purposes, and to assist persons misidentified during a screening process. H. To any agency, organization or person for the purposes of (1) performing authorized security, audit, or oversight operations of the DOJ, FBI, TSC, or any agency, organization, or person engaged in or providing information used for terrorism screening that is supported by the TSC, and (2) meeting related reporting requirements. I. To a former employee of the TSC or a former contractor supporting the TSC for purposes of: Responding to an official inquiry by a federal, state, or local government entity or professional licensing authority, in accordance with any applicable government regulations; or facilitating communications with a former employee/contractor that may be necessary for personnel-related or other official purposes where the TSC E:\FR\FM\22AUN1.SGM 22AUN1 47078 Federal Register / Vol. 72, No. 162 / Wednesday, August 22, 2007 / Notices requires information and/or consultation assistance from the former employee/contractor regarding a matter within that person’s former area of responsibility. J. To any criminal, civil, or regulatory law enforcement authority (whether federal, state, local, territorial, tribal, multinational or foreign) where the information is relevant to the recipient entity’s law enforcement responsibilities. K. To a governmental entity lawfully engaged in collecting law enforcement, law enforcement intelligence, national security information, national intelligence, or terrorism information for law enforcement, intelligence, or counterterrorism purposes. L. To appropriate agencies, entities, and persons when (1) the Department of Justice suspects or has confirmed that the security or confidentiality of information in the system of records has been compromised; (2) the Department of Justice has determined that as a result of the suspected or confirmed compromise there is a risk of harm to economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other systems or programs (whether maintained by the Department or another agency or entity) that rely upon the compromised information; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with the Department of Justice’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm. DISCLOSURE TO CONSUMER REPORTING AGENCIES: None. POLICIES AND PRACTICES FOR STORING, RETRIEVING, ACCESSING, RETAINING, AND DISPOSING OF RECORDS IN THE SYSTEM: STORAGE: Records in this system are stored in paper and/or electronic format. Electronic storage is on servers, CD– ROMs, DVD–ROMs, and magnetic tapes. Physical security protections include guards and locked facilities requiring badges and passwords for access. Records are accessed only by authorized government personnel and contractors and are protected by appropriate physical and technological safeguards to prevent unauthorized access. All Federal employees and contractors assigned to the TSC must hold an appropriate security clearance, sign a non-disclosure agreement, and undergo privacy and security training. RETENTION AND DISPOSAL: Records in this system will be retained and disposed of in accordance with the records schedule approved by the National Archives and Records Administration. For records maintained in the Terrorist Screening Database, active records are maintained for 99 years and inactive (archived) records are maintained for 50 years. Records of possible encounters with individuals on the Terrorist Screening Database are maintained for 99 years. Records of redress inquiries and quality assurance matters are maintained for at least six years. Audit logs are maintained for 25 years and records of user audits are maintained for ten years. SYSTEM MANAGER(S) AND ADDRESS: Director, Terrorist Screening Center, Federal Bureau of Investigation, FBI Headquarters, 935 Pennsylvania Avenue, NW., Washington, DC 20535– 0001. NOTIFICATION PROCEDURE: Because this system contains classified intelligence and law enforcement information related to the government’s counterterrorism, law enforcement, and intelligence programs, records in this system have been exempted from notification, access, and amendment to the extent permitted by subsections (j) and (k) of the Privacy Act. Requests for notification should be addressed to the FBI at the address and according to the requirements set forth below under the heading ‘‘Record Access Procedures.’’ RETRIEVABILITY: RECORD ACCESS PROCEDURES: jlentini on PROD1PC65 with NOTICES Records in this system are typically retrieved by individual name, date of birth, passport number, and other identifying data, including unique identifying numbers assigned by the TSC or other government agencies. SAFEGUARDS: All records are maintained in a secure government facility with access limited to only authorized personnel or authorized and escorted visitors. VerDate Aug<31>2005 16:26 Aug 21, 2007 Jkt 211001 Because this system contains classified intelligence and law enforcement information related to the government’s counterterrorism, law enforcement and intelligence programs, records in this system have been exempted from notification, access, and amendment to the extent permitted by subsections (j) and (k) of the Privacy Act. A request for access to a nonexempt record shall be made in writing PO 00000 Frm 00127 Fmt 4703 Sfmt 4703 with the envelope and the letter clearly marked ‘‘Privacy Act Request.’’ Include in the request your full name and complete address. The requester must sign the request; and, to verify it, the signature must be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. You may submit any other identifying data you wish to furnish to assist in making a proper search of the system. Requests for access to information must be addressed to the Record Information Dissemination Section, Federal Bureau of Investigation, 935 Pennsylvania Avenue, NW., Washington, DC 20535–0001. CONTESTING RECORD PROCEDURES: Because this system contains classified intelligence and law enforcement information related to the government’s counterterrorism, law enforcement and intelligence programs, records in this system are exempt from notification, access, and amendment to the extent permitted by subsections (j) and (k) of the Privacy Act (5 U.S.C. 552a). Requests for amendment should be addressed to the FBI at the address and according to the requirements set forth above under the heading ‘‘Record Access Procedures.’’ If, however, individuals are experiencing repeated delays or difficulties during a government screening process and believe that this might be related to terrorist watch list information, they may contact the Federal agency that is conducting the screening process in question (‘‘screening agency’’). The screening agency is in the best position to determine if a particular problem relates to a terrorist watch list entry or is due to some other cause, such as a criminal history, an immigration violation or random screening. Some individuals also experience repeated delays during screening because their names and/or other identifying data, such as dates of birth, are similar to those of known or suspected terrorists. These individuals, referred to as ‘‘misidentified persons,’’ often believe that they themselves are on a terrorist watch list, when in fact they only bear a similarity in name or other identifier to an individual on the list. Most screening agencies have or are developing procedures to expedite the clearance of misidentified persons during screening. By contacting the screening agency with a complaint, individuals will be able to take advantage of the procedures available to help misidentified persons and others experiencing screening problems. Check the agency’s E:\FR\FM\22AUN1.SGM 22AUN1 Federal Register / Vol. 72, No. 162 / Wednesday, August 22, 2007 / Notices Information in this system is obtained from individuals covered by the system, public sources, agencies and private sector entities conducting terrorism screening, law enforcement and intelligence agency record systems, government databases, and foreign governments. Paperwork Reduction Act of 1995 (PRA95) [44 U.S.C. 3506(c)(2)(A)]. This program helps to ensure that requested data can be provided in the desired format, reporting burden (time and financial resources) is minimized, collection instruments are clearly understood, and the impact of collection requirements on respondents can be properly assessed. Currently, the Employment Standards Administration is soliciting comments concerning the proposed collection: Application for Continuation of Death Benefit for Student (LS–266). A copy of the proposed information collection request can be obtained by contacting the office listed below in the addresses section of this Notice. DATES: Written comments must be submitted to the office listed in the addresses section below on or before October 22, 2007. ADDRESSES: Ms. Hazel M. Bell, U.S. Department of Labor, 200 Constitution Ave., NW., Room S–3201, Washington, DC 20210, telephone (202) 693–0418, fax (202) 693–1451, E-mail bell.hazel@dol.gov. Please use only one method of transmission for comments (mail, fax, or E-mail). SUPPLEMENTARY INFORMATION: EXEMPTIONS CLAIMED FOR THE SYSTEM I. Background requirements for submitting complaints but, at a minimum, individuals should describe in as much detail as possible the problem they are having, including dates and locations of screening, and provide sufficient information to identify themselves, such as full name, citizenship status, and date and place of birth. The TSC assists the screening agency in resolving any screening complaints that may relate to terrorist watch list information, but does not receive or respond to individual complaints directly. However, if TSC receives any such complaints, TSC will forward them to the appropriate screening agency. Additional information about the redress process and how to file a complaint with a screening agency is available on TSC’s Web site at http:// www.fbi.gov/terrorinfo/counterrorism/ redress.htm. RECORD SOURCE CATEGORIES The Attorney General has exempted this system from subsections (c)(3) and (4), (d)(1), (2), (3) and (4), (e)(1), (2), (3), (5) and (8), and (g) of the Privacy Act pursuant to 5 U.S.C. 552a(j) and (k). These exemptions apply only to the extent that information in the system is subject to exemption pursuant to 5 U.S.C. 552a(j) and (k). Rules have been promulgated in accordance with the requirements of 5 U.S.C. 553(b), (c) and (e). [FR Doc. E7–16487 Filed 8–21–07; 8:45 am] BILLING CODE 4410–02–P DEPARTMENT OF LABOR Employment Standards Administration Proposed Collection; Comment Request ACTION: Notice. II. Review Focus The Department of Labor, as part of its continuing effort to reduce paperwork and respondent burden, conducts a preclearance consultation program to provide the general public and Federal agencies with an opportunity to comment on proposed and/or continuing collections of information in accordance with the jlentini on PROD1PC65 with NOTICES SUMMARY: VerDate Aug<31>2005 16:26 Aug 21, 2007 The Office of Workers’ Compensation Programs (OWCP) administers the Longshore and Harbor Workers’ Compensation Act. The Act provides for continuation of death benefits for a child or certain other surviving dependents after the age of 18 (to age 23) if the dependent qualifies as a student as defined in Section 2 (18) of the Act. Regulation 20 CFR 702.121 addresses the use of forms for the reporting of required information. The LS–266 is submitted by the parent or guardian of the dependent for whom continuation of benefits is sought. The statements contained on the form must be verified by an official of the educational institution. The information is used by the Department of Labor to determine whether a continuation of the benefits is justified. This information collection is currently approved for use through December 31, 2007. Jkt 211001 The Department of Labor is particularly interested in comments which: • Evaluate whether the proposed collection of information is necessary for the proper performance of the functions of the agency, including whether the information will have practical utility; PO 00000 Frm 00128 Fmt 4703 Sfmt 4703 47079 • Evaluate the accuracy of the agency’s estimate of the burden of the proposed collection of information, including the validity of the methodology and assumptions used; • Enhance the quality, utility and clarity of the information to be collected; and • Minimize the burden of the collection of information on those who are to respond, including through the use of appropriate automated, electronic, mechanical, or other technological collection techniques or other forms of information technology, e.g., permitting electronic submissions of responses. III. Current Actions The Department of Labor seeks the approval of the extension of this information collection in order to ensure that eligible dependents may continue to receive benefits to which they are entitled. Type of Review: Extension. Agency: Employment Standards Administration. Title: Application for Continuation of Death Benefits for Student. OMB Number: 1215–0073. Agency Number: LS–266. Affected Public: Individuals or households; Business or other for-profit. Total Respondents: 43. Total Annual responses: 43. Time per Response: 30 minutes. Estimated Total Burden Hours: 22. Frequency: On occasion. Total Burden Cost (capital/startup): $0. Total Burden Cost (operating/ maintenance): $0. Comments submitted in response to this notice will be summarized and/or included in the request for Office of Management and Budget approval of the information collection request; they will also become a matter of public record. Dated: August 16, 2007. Hazel M. Bell, Acting Chief, Branch of Management Review and Internal Control, Division of Financial Management, Office of Management, Administration and Planning, Employment Standards Administration. [FR Doc. E7–16533 Filed 8–21–07; 8:45 am] BILLING CODE 4510–CF–P E:\FR\FM\22AUN1.SGM 22AUN1

Agencies

[Federal Register Volume 72, Number 162 (Wednesday, August 22, 2007)]
[Notices]
[Pages 47073-47079]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: E7-16487]


=======================================================================
-----------------------------------------------------------------------

DEPARTMENT OF JUSTICE

Federal Bureau of Investigation

[AAG/A Order No. 028-2007]


Privacy Act of 1974; System of Records

AGENCY: Federal Bureau of Investigation, DOJ.

ACTION: Notice to amend system of records.

-----------------------------------------------------------------------

SUMMARY: The Federal Bureau of Investigation proposes to amend its 
Terrorist Screening Records System, Justice/FBI-019, maintained by the 
Terrorist Screening Center, to make several changes to its existing 
notice. Public comments are invited.

DATES: The Privacy Act requires that the public be given 30 days in 
which to comment on any new or amended uses of information in a system 
of records. In addition, the Office of Management and Budget (OMB), 
which has oversight responsibilities under the Act, and the Congress 
must be given 40 days in which to review major changes to Privacy Act 
systems. Therefore, the public, OMB, and the Congress are invited to 
submit written comments on this revised Privacy Act system of records. 
Please submit any comments by October 1, 2007.

ADDRESSES: Address all comments to Kenneth P. Mortensen, Deputy Privacy 
and Civil Liberties Officer, U.S. Department of Justice, 950 
Pennsylvania Ave., NW., Washington, DC 20530, facsimile number (202) 
616-9627.

[[Page 47074]]


FOR FURTHER INFORMATION CONTACT: Kenneth P. Mortensen, (202) 514-3853.

SUPPLEMENTARY INFORMATION: On July 28, 2005, the Department of Justice, 
Federal Bureau of Investigation (FBI) published a new Privacy Act 
System of Records notice, the Terrorist Screening Records System 
(TSRS), Justice/FBI-019, to cover records maintained by the Terrorist 
Screening Center (TSC), the system owner. See 70 FR 43715. Records in 
the TSRS include the Terrorist Screening Database (TSDB), records in 
the Encounter Management Application (EMA) that document the 
operational support TSC provides to agencies that screen for terrorists 
(``screening agencies''), and records related to the TSC's internal 
quality assurance process to ensure the terrorist data is thorough, 
accurate and current. The TSC also maintains records related to the 
resolution of terrorist watchlist-related redress complaints.
    The TSC now proposes modifications to the system to expand the 
scope of the system, and to increase the clarity of the notice. The 
following explains the proposed modifications:

General Changes

    The previous system notice used the terms ``terrorist screening'' 
and ``terrorism screening'' interchangeably to describe the same 
process. This notice is being modified so that only the term 
``terrorism screening'' is used, making it consistent with the language 
in Homeland Security Presidential Directive 6 (HSPD 6). This system 
notice also makes use of the term Terrorism Information as defined in 
section 1016 of the Intelligence Reform and Prevention Act of 2004 
(Pub. L. 108-458).

System Location

    The current system of records notice for Justice/FBI-019 states 
that the records are located at the TSC, Federal Bureau of 
Investigation, Washington, DC. The notice has been amended to reflect 
that records in Justice/FBI-019 may also be located in secondary 
locations for system back-up and continuity-of-operations purposes.

Categories of Individuals

    The TSC is expanding the categories of individuals covered by this 
system to cover individuals who are authorized users of the underlying 
information systems described by this system of records, such as the 
TSDB and EMA, since audit logs documenting their use will be maintained 
in connection with the system.
    Currently, only TSC personnel can perform queries directly against 
the TSDB, EMA, and other internal TSC databases. In the future, the TSC 
plans to operate a query function permitting authorized individuals 
from screening agencies or entities to access TSC systems directly from 
an external location and submit search queries. Collection and 
maintenance of information through audit logs about authorized users 
will allow the TSC to monitor who uses TSC information systems for what 
purpose, in order to ensure compliance with applicable laws and policy. 
Therefore, the TSC is modifying this system of records notice to 
account for this fact.
    Additionally, the TSC is clarifying that this system of records 
covers all individuals whose names or identifying information is 
collected to perform a query against TSC information systems, such as 
TSDB, but who are not necessarily individuals whose information is 
generally maintained as terrorist information in the TSDB. For example, 
in certain instances, individuals' names are queried directly against 
the TSDB or EMA to see if there is a possible record match and, if 
there is not, their names may be retained in an audit trail that 
records the activity of authorized users of TSC information systems. 
The system notice is being modified to make clear that these 
individuals' information is also included in this system of records.
    The TSC is adding a new category to cover individuals who accompany 
or travel with a person when that person is an actual match to a known 
or suspected terrorist identity in the TSDB and when the TSC or 
screening agency or entity identifies that person as such during a 
terrorism screening process. The TSC collects this information in the 
course of encounters with known or suspected terrorists. For example, 
an encounter can include times when an individual was in the car along 
with a person matching an identity in the TSDB during a traffic stop by 
state or local law enforcement officers. TSC maintains this information 
about such individuals in EMA and not in the TSDB, and shares it as 
appropriate with other agencies for law enforcement and intelligence 
purposes consistent with the routine uses of this system of records.

Categories of Records

    The TSC is adding new categories of records to cover audit logs for 
TSC systems, and archived records and record histories for the TSDB and 
other TSC systems.
    As discussed above, audit log records allow the TSC to monitor who 
uses TSC systems for what purpose in order to ensure compliance with 
applicable laws and policy. A TSDB record history is a log of any 
previous changes to the current version of a TSDB record.
    Archived TSDB records are TSDB records that pertain to individuals 
who are no longer eligible for inclusion in the TSDB, because those 
individuals no longer meet the criteria for inclusion in the TSDB as a 
known or suspected terrorist. The TSC retains these records in an 
archive that is logically separate from other TSDB data and may be 
accessed only by a limited number of TSC personnel who have undergone 
specialized training on the sensitivity of these records and the 
permissible reasons for access.
    Pursuant to TSC policy, archived TSDB records may only be accessed 
for the following purposes: (1) Redress, (2) litigation, (3) quality 
assurance (e.g., to determine if a record correction is required to an 
existing record in a TSC or other agency system), (4) to respond to 
requests from oversight bodies and auditors, and to perform internal 
audits, (5) to evaluate TSC performance and data in the event of 
another terrorist attack or attempted attack, and to support any 
related investigation, and (6) when access is otherwise required by law 
(e.g., Freedom of Information Act (FOIA) request). Archived TSDB 
records are not used or made available for any watchlisting purposes. 
The search function for the TSDB archive requires that prior to 
accessing the TSDB archive authorized TSC personnel must identify an 
approved purpose with information supporting the need for access. This 
information is maintained in a detailed audit log, which is routinely 
reviewed by TSC compliance personnel.
    Additionally, the TSC is modifying other descriptions of categories 
of records to clarify the types of information held in the TSC systems.
    The TSC is adding language to clarify that records of encounters 
may include information about individuals who accompany or travel with 
a person when that person is an actual match to a known or suspected 
terrorist identity in the TSDB and the TSC or screening agency or 
entity identifies that person as such during a terrorism screening 
process.
    The TSC is also modifying Item (a) To add ``photograph'' as a 
specific type of identifying data that may be contained in the TSRS. 
While a photograph may be considered a biometric, which is already 
listed in Item (a), TSC is listing photographs as a separate item to 
ensure clarity.
    The TSC is modifying Item (b) By changing the term ``agency'' to 
``entity'' to reflect that entities other than a

[[Page 47075]]

federal government agency may engage in terrorism screening. Item (b) 
is also being modified by removing the language ``terrorist 
encounters'' and replacing it with ``encounters with known or suspected 
terrorists,'' which is a more precise characterization, because Item 
(a) in the Categories of Individuals defines the phrase ``known or 
suspected terrorists.''
    The TSC is also modifying Item (c) to make clear that TSRS may also 
include references to or information from other relevant databases that 
contain terrorism information, in the event such databases are not 
considered law enforcement or intelligence databases.

Authority for Maintenance of the System

    The TSC is adding the following legal authorities: the National 
Security Act of 1947, as amended; the Intelligence Reform and Terrorism 
Prevention Act of 2004, Pub. L. 108-458, 18 Stat. 3638 (December 17, 
2004); and Executive Order 13388, ``Further Strengthening the Sharing 
of Terrorism Information to Protect Americans,'' (October 25, 2005). 
TSC is removing the reference to Executive Order 13356, which has been 
superseded by Executive Order 13388.
    Also, the TSC is adding language to provide notice that in the 
event that the TSC's continuity-of-operations plans are invoked, the 
agency that assumes TSC operational functions will have the authority 
to administer the Terrorist Screening Records System as necessary to 
carry out those functions and will act consistent with the obligations 
required by the Privacy Act of 1974 in the maintenance of TSRS as a 
Privacy Act System of Records.

Purpose Statement

    Consistent with the changes discussed above regarding auditing of 
TSC data systems, the TSC is expanding the purpose of the system of 
records to clarify that one purpose is to conduct appropriate oversight 
of the proper use of TSC data systems.
    The language in Item (e) Is being modified to add the quoted 
language below to more accurately reflect TSC's mission, as set forth 
in HSPD 6, to provide support for private sector screening processes 
``that have a substantial bearing on homeland security.''
    The language in Item (f) is being modified to remove the word 
``agency's'' and insert the word ``authorized'' preceding the term 
``screening process'' to more accurately describe the type of screening 
TSC may perform. The word ``agency'' was removed because not all 
terrorism screening is necessarily performed by a federal government 
agency. The word ``authorized'' was added because all terrorism 
screening processes using TSC data must be authorized by the TSC 
pursuant to the standard articulated in HSPD 6.
    The language in Item (g) Is being changed to add the word 
``organizations'' to the list of entities and individuals that may 
receive information about encounters with known or suspected 
terrorists. This change is intended to better reflect the ongoing 
efforts by the federal government to increase sharing of intelligence, 
law enforcement and terrorism information with the State and local 
governments, fusion centers, and critical infrastructure owners and 
operators, consistent with the privacy protections required by the 
Privacy Act and as articulated in this notice.
    The language in Item (h) is being changed by removing the word 
``repeatedly'' from the phrase ``to assist persons repeatedly 
misidentified during a terrorism screening process.'' This change is 
intended to clarify that an individual does not have to be 
misidentified more than once for the TSC to act to provide assistance 
through a redress process or other means. Conforming changes are being 
made to the notice to remove the word ``repeatedly'' from Routine Uses 
B, F, and G, and the categories of individuals (Item (d)).

Routine Uses

    Routine Use B listed for Justice/FBI-019 permits disclosure of 
information to various entities in order to, among other things 
``provide appropriate notifications of a positive terrorist encounter 
or a threat related to the encounter.'' The TSC is modifying this 
language to clarify that the TSC may notify an entity of not only a 
positive match to the terrorist watchlist, but also a negative or 
inconclusive match. Also, the TSC is modifying this Routine Use to 
include ``private sector entities with a substantial bearing on 
homeland security'' as described in HSPD-6 as potential recipients of 
information. Finally, the TSC is modifying the language in purpose (2) 
of this Routine Use to make clear that a positive encounter means an 
encounter with an individual who is identified in the TSDB, and to 
clarify purpose (3) of this Routine Use by adding the modifiers ``known 
or suspected'' to the terms ``terrorist'' and ``threat related to the 
encounter.''
    Routine Use D permits disclosure of information for the 
development, testing, or modification of information technology systems 
used or intended to be used during or in support of the screening 
process, but indicates TSC will use de-identified data whenever 
possible. The TSC is modifying the language of this Routine Use to 
clarify that ``de-identified data'' means data that cannot be used to 
derive an individual's identity and to note that de-identified data 
will be used to the extent practicable and possible.
    Routine Use E permits disclosure of information to various agencies 
or entities to assist in the coordination of terrorist threat 
awareness, assessment, analysis, or response. The TSC is modifying this 
language to include private sector entities in the list of entities 
that may receive information from TSRS for these purposes. This change 
is intended to better reflect the ongoing efforts by the federal 
government to increase sharing of intelligence, law enforcement, 
terrorism and threat information with State fusion centers and the 
private sector, such as critical infrastructure and key resource owners 
and operators, consistent with the privacy protections required by the 
Privacy Act.
    Routine Use H permits disclosure of information in support of 
authorized audit or oversight operations of the DOJ, including FBI and 
TSC, or any agency engaged in or providing information used for 
terrorism screening supported by the TSC. The TSC is modifying this 
Routine Use to include authorized security operations as a permissible 
purpose for sharing information, thereby allowing the TSC to disclose 
information to the investigating entity in the context of a security-
related investigation or inquiry, such as a personnel investigation or 
inquiry into a breach of data security. Additionally, the TSC is 
expanding the scope of this Routine Use by adding language that would 
allow disclosure if the subject of the security, audit, or oversight 
operation was not a Federal agency but an organization or individual 
that was engaged in or providing information used for terrorism 
screening that is supported by the TSC. These changes will allow the 
TSC to disclose information to support any oversight efforts into TSC-
related activities.
    Routine Use K permits disclosure of information to a governmental 
entity lawfully engaged in collecting law enforcement, law enforcement 
intelligence, or national security intelligence information for law 
enforcement or intelligence purposes. TSC is modifying this Routine Use 
by changing ``national security intelligence information'' to 
``national security information'' and ``national intelligence,'' which 
are terms defined

[[Page 47076]]

by Executive Order 12958, as amended, and the Intelligence Reform and 
Terrorism Prevention Act amendments to the National Security Act of 
1947, respectively. Also, the TSC is specifying counterterrorism as one 
of the purposes for which information may be disclosed under this 
Routine Use, which is consistent with TSC's counterterrorism mission.
    The Department of Justice previously published a notice modifying 
all of the Department's systems of records, including TSRS, to include 
a routine use to permit the disclosure of information to appropriate 
persons and entities for purposes of response and remedial efforts in 
the event that there has been a breach of the data contained in the 
Department's systems of records. See 72 FR 3410 (Jan. 25, 2007). The 
TSC is adding new Routine Use L to this notice to reflect this change.

Retention and Disposal

    Although TSC is a multi-agency organization, the FBI administers 
TSC. Recently, the FBI obtained approval from the National Archives and 
Records Administration for its request for records disposition 
authority for records created and maintained by the TSC. The TSC is 
modifying this language to provide information on the approved 
retention periods for TSC records described in Justice/FBI-019. For 
records maintained in the Terrorist Screening Database (TSDB), active 
records are maintained for 99 years and inactive (archived) records are 
maintained for 50 years. Encounter Management Application (EMA) 
records, which document positive, negative, and inconclusive screening 
encounters with individuals in the TSDB, are maintained for 99 years. 
TSC maintains EMA records on negative encounters, i.e., a person who is 
initially identified as a possible match to a TSDB identity but 
ultimately determined not to be a match, in order to expedite future 
screening of those individuals and to support the redress process. 
Records of redress inquiries and quality assurance matters are 
maintained for at least six years. Audit logs are maintained for 25 
years and records of user audits are maintained for ten years.

Contesting Record Procedures

    The TSC is adding language to this section to refer individuals to 
the TSC's public Web site for additional information on the redress 
process and the procedures for filing a complaint related to terrorism 
screening.

Record Source Categories

    The TSC is modifying this section to include ``private sector 
entities engaged in terrorism screening'' as a record source category. 
This change is being made to reflect that the TSC may receive 
information for screening from the private sector in support of the 
TSC's mission, as set forth in HSPD 6, to support ``private sector 
screening processes that have a substantial bearing on homeland 
security.''

Public Comments Invited

    Public comments are invited on all aspects of the revised system 
notice, including the retention periods for records and the new 
categories of individuals and records. See ADDRESSES section above for 
information on how to submit comments.
    In accordance with 5 U.S.C. 552a(r), the Department of Justice has 
provided a report of this amended system of records to the Office of 
Management and Budget and to Congress.

    Dated: August 14, 2007.
Lee J. Lofthus,
Assistant Attorney General for Administration.
JUSTICE/FBI-019

System name:
    Terrorist Screening Records System (TSRS).

Security classification:
    Classified, unclassified (law enforcement sensitive).

System location:
    Records described in this notice are maintained at the Terrorist 
Screening Center, Federal Bureau of Investigation, Washington, D.C., 
and at facilities operated by other government entities for terrorism 
screening, system back-up, and continuity of operations purposes.

Categories of individuals covered by the system:
    a. Individuals known or appropriately suspected to be or have been 
engaged in conduct constituting, in preparation for, in aid of, or 
related to terrorism (``known or suspected terrorists'');
    b. Individuals who are the subject of queries against TSC 
information systems;
    c. Individuals identified during a terrorism screening process as a 
possible identity match to a known or suspected terrorist and other 
individuals who accompany or travel with such individuals;
    d. Individuals who are misidentified as a possible identity match 
to a known or suspected terrorist (``misidentified persons'');
    e. Individuals about whom a terrorist watchlist-related redress 
inquiry has been made; and
    f. Individuals whose information is collected and maintained for 
information system user auditing and security purposes, such as 
individuals who are authorized users of TSC information systems.

Categories of records in the system:
    a. Identifying information, such as name, date of birth, place of 
birth, biometrics, photographs, passport and/or drivers license 
information, and other available identifying particulars used to 
compare the identity of an individual being screened with a known or 
suspected terrorist, including audit records containing this 
information;
    b. Information about encounters with individuals covered by this 
system, such as date, location, screening entity, analysis, associated 
individuals, and results (positive or negative identity match), and, 
for encounters with known or suspected terrorists only, other entities 
notified and details of any law enforcement, intelligence, or other 
operational response;
    c. For known or suspected terrorists, in addition to the categories 
of records listed above, references to and/or information from other 
government law enforcement and intelligence databases, or other 
relevant databases that may contain terrorism information;
    d. For misidentified persons, in addition to the categories of 
records listed above, additional identifying information that will be 
used during screening only for the purpose of distinguishing them from 
a known or suspected terrorist who has similar identifying 
characteristics (such as name and date of birth);
    e. For redress matters, in addition to the categories of records 
listed above, information provided by individuals or their 
representatives, information provided by the screening agency, and 
internal work papers and other documents related to researching and 
resolving the matter;
    f. Information collected and compiled to maintain an audit trail of 
the activity of authorized users of TSC information systems, such as 
user name/ID, date/time, search query and results data, user activity 
information (e.g., record retrieval, modification, or deletion data), 
and record numbers; and,
    g. Archived records and record histories from the Terrorist 
Screening Database, Encounter Management Application, and other TSC 
data systems that are part of the TSRS.

[[Page 47077]]

Authority for maintenance of the system:
    Homeland Security Presidential Directive-6, ``Integration and Use 
of Screening Information to Protect Against Terrorism'' (Sept. 16, 
2003); Executive Order 13388, Further Strengthening the Sharing of 
Terrorism Information to Protect Americans,'' (October 25, 2005); the 
Intelligence Reform and Terrorism Prevention Act of 2004, Pub. L. 108-
458; the National Security Act of 1947, as amended; and 28 U.S.C. 533. 
In the event that the TSC's continuity-of-operations plans are invoked, 
the agency that assumes TSC operational functions will have the 
authority to administer the Terrorist Screening Records System as 
necessary to carry out those functions.

Purpose(s):
    a. To implement the U.S. Government's National Strategy for 
Homeland Security and Homeland Security Presidential Directive-6, to 
identify potential terrorist threats, to uphold and enforce the law, 
and to ensure public safety.
    b. To consolidate the government's approach to terrorism screening 
and provide for the appropriate and lawful use of terrorist information 
in screening processes.
    c. To maintain current, accurate and thorough terrorist information 
in a consolidated terrorist screening database and determine which 
terrorism screening processes will use each entry in the database.
    d. To ensure that appropriate information possessed by State, 
local, territorial, and tribal governments, which is lawfully available 
to the Federal Government, is considered in determinations made by the 
TSC as to whether a person is a match to a known or suspected 
terrorist.
    e. To host mechanisms and make terrorism information available to 
support appropriate domestic, and foreign terrorism screening 
processes, and private-sector screening processes that have a 
substantial bearing on homeland security.
    f. To provide continual operational support to assist in the 
identification of persons screened and to facilitate an appropriate and 
lawful response when a known or suspected terrorist is identified in an 
authorized screening process.
    g. To provide appropriate government officials, agencies, or 
organizations with information about encounters with known or suspected 
terrorists.
    h. To assist persons misidentified during a terrorism screening 
process and to assist screening agencies or entities in responding to 
individual complaints about the screening process (redress).
    i. To oversee the proper use, maintenance, and security of TSC data 
systems and TSC personnel.

Routine uses of records maintained in the system, including categories 
of users and the purposes of such uses:
    In addition to those disclosures generally permitted under 5 U.S.C. 
552a(b) of the Privacy Act, the records or information in this system 
may be disclosed as a routine use, under 5 U.S.C. 552a(b)(3), in 
accordance with blanket routine uses established for FBI record 
systems. See Blanket Routine Uses (BRU) Applicable to More Than One FBI 
Privacy Act System of Records, Justice/FBI-BRU, published on June 22, 
2001 at 66 FR 33558 and amended on February 14, 2005 at 70 FR 7513. In 
addition, as routine uses specific to this system, the TSC may disclose 
relevant system records to the following persons or entities and under 
the circumstances or for the purposes described below, to the extent 
such disclosures are compatible with the purpose for which the 
information was collected. (Routine uses are not meant to be mutually 
exclusive and may overlap in some cases.)
    A. To those federal agencies that have agreed to provide support to 
TSC for purposes of ensuring the continuity of TSC operations.
    B. To federal, state, local, tribal, territorial, foreign, 
multinational or other public agencies or entities, to entities 
regulated by any such agency or entity, and to owners/operators of 
critical infrastructure or private sector entities with a substantial 
bearing on homeland security and their agents, contractors or 
representatives, for the following purposes: (1) For use in and in 
support of terrorism screening authorized by the U.S. Government, (2) 
to provide appropriate notifications of the results of terrorism 
screening using information from the Terrorist Screening Database or a 
threat related to a positive encounter with an individual identified in 
the Terrorist Screening Database, (3) to facilitate any appropriate law 
enforcement or other response (e.g., medical and containment response 
to a biological hazard) to a known or suspected terrorist or a threat 
related to the encounter, and (4) to assist persons misidentified 
during a screening process.
    C. To any person, organization, or governmental entity in order to 
notify them of a serious terrorist threat for the purpose of guarding 
against or responding to such a threat.
    D. To federal, state, local, tribal, territorial, foreign, or 
multinational agencies or entities, or other organizations that are 
engaged in, or are planning to engage in terrorism screening authorized 
by the U.S. Government, for the purpose of the development, testing, or 
modification of information technology systems used or intended to be 
used during or in support of the screening process; whenever 
practicable, however, TSC, to the extent possible, will substitute 
anonymized or de-identified data, such that the identity of the 
individual cannot be derived from the data.
    E. To federal, state, local, tribal, territorial, foreign, 
multinational agencies or entities, or private sector entities to 
assist in coordination of terrorist threat awareness, assessment, 
analysis or response.
    F. To any person or entity in either the public or private sector, 
domestic or foreign, where reasonably necessary to elicit information 
or cooperation from the recipient for use by the TSC in the performance 
of an authorized function, such as obtaining information from data 
sources as to the thoroughness, accuracy, currency, or reliability of 
the data provided so that the TSC may review the quality and integrity 
of its records for quality assurance or redress purposes, and may also 
assist persons misidentified during a screening process.
    G. To any federal, state, local, tribal, territorial, foreign or 
multinational agency, task force, or other entity or person that 
receives information from the U.S. Government for terrorism screening 
purposes, in order to facilitate TSC's or the recipient's review, 
maintenance, and correction of TSC data for quality assurance or 
redress purposes, and to assist persons misidentified during a 
screening process.
    H. To any agency, organization or person for the purposes of (1) 
performing authorized security, audit, or oversight operations of the 
DOJ, FBI, TSC, or any agency, organization, or person engaged in or 
providing information used for terrorism screening that is supported by 
the TSC, and (2) meeting related reporting requirements.
    I. To a former employee of the TSC or a former contractor 
supporting the TSC for purposes of: Responding to an official inquiry 
by a federal, state, or local government entity or professional 
licensing authority, in accordance with any applicable government 
regulations; or facilitating communications with a former employee/
contractor that may be necessary for personnel-related or other 
official purposes where the TSC

[[Page 47078]]

requires information and/or consultation assistance from the former 
employee/contractor regarding a matter within that person's former area 
of responsibility.
    J. To any criminal, civil, or regulatory law enforcement authority 
(whether federal, state, local, territorial, tribal, multinational or 
foreign) where the information is relevant to the recipient entity's 
law enforcement responsibilities.
    K. To a governmental entity lawfully engaged in collecting law 
enforcement, law enforcement intelligence, national security 
information, national intelligence, or terrorism information for law 
enforcement, intelligence, or counterterrorism purposes.
    L. To appropriate agencies, entities, and persons when (1) the 
Department of Justice suspects or has confirmed that the security or 
confidentiality of information in the system of records has been 
compromised; (2) the Department of Justice has determined that as a 
result of the suspected or confirmed compromise there is a risk of harm 
to economic or property interests, identity theft or fraud, or harm to 
the security or integrity of this system or other systems or programs 
(whether maintained by the Department or another agency or entity) that 
rely upon the compromised information; and (3) the disclosure made to 
such agencies, entities, and persons is reasonably necessary to assist 
in connection with the Department of Justice's efforts to respond to 
the suspected or confirmed compromise and prevent, minimize, or remedy 
such harm.

Disclosure to consumer reporting agencies:
    None.

Policies and practices for storing, retrieving, accessing, retaining, 
and disposing of records in the system:
Storage:
    Records in this system are stored in paper and/or electronic 
format. Electronic storage is on servers, CD[ndash']ROMs, DVD-ROMs, and 
magnetic tapes.

Retrievability:
    Records in this system are typically retrieved by individual name, 
date of birth, passport number, and other identifying data, including 
unique identifying numbers assigned by the TSC or other government 
agencies.

Safeguards:
    All records are maintained in a secure government facility with 
access limited to only authorized personnel or authorized and escorted 
visitors. Physical security protections include guards and locked 
facilities requiring badges and passwords for access. Records are 
accessed only by authorized government personnel and contractors and 
are protected by appropriate physical and technological safeguards to 
prevent unauthorized access. All Federal employees and contractors 
assigned to the TSC must hold an appropriate security clearance, sign a 
non-disclosure agreement, and undergo privacy and security training.

Retention and disposal:
    Records in this system will be retained and disposed of in 
accordance with the records schedule approved by the National Archives 
and Records Administration. For records maintained in the Terrorist 
Screening Database, active records are maintained for 99 years and 
inactive (archived) records are maintained for 50 years. Records of 
possible encounters with individuals on the Terrorist Screening 
Database are maintained for 99 years. Records of redress inquiries and 
quality assurance matters are maintained for at least six years. Audit 
logs are maintained for 25 years and records of user audits are 
maintained for ten years.

System manager(s) and address:
    Director, Terrorist Screening Center, Federal Bureau of 
Investigation, FBI Headquarters, 935 Pennsylvania Avenue, NW., 
Washington, DC 20535-0001.

Notification procedure:
    Because this system contains classified intelligence and law 
enforcement information related to the government's counterterrorism, 
law enforcement, and intelligence programs, records in this system have 
been exempted from notification, access, and amendment to the extent 
permitted by subsections (j) and (k) of the Privacy Act.
    Requests for notification should be addressed to the FBI at the 
address and according to the requirements set forth below under the 
heading ``Record Access Procedures.''

Record access procedures:
    Because this system contains classified intelligence and law 
enforcement information related to the government's counterterrorism, 
law enforcement and intelligence programs, records in this system have 
been exempted from notification, access, and amendment to the extent 
permitted by subsections (j) and (k) of the Privacy Act. A request for 
access to a non-exempt record shall be made in writing with the 
envelope and the letter clearly marked ``Privacy Act Request.'' Include 
in the request your full name and complete address. The requester must 
sign the request; and, to verify it, the signature must be notarized or 
submitted under 28 U.S.C. 1746, a law that permits statements to be 
made under penalty of perjury as a substitute for notarization. You may 
submit any other identifying data you wish to furnish to assist in 
making a proper search of the system. Requests for access to 
information must be addressed to the Record Information Dissemination 
Section, Federal Bureau of Investigation, 935 Pennsylvania Avenue, NW., 
Washington, DC 20535-0001.

Contesting record procedures:
    Because this system contains classified intelligence and law 
enforcement information related to the government's counterterrorism, 
law enforcement and intelligence programs, records in this system are 
exempt from notification, access, and amendment to the extent permitted 
by subsections (j) and (k) of the Privacy Act (5 U.S.C. 552a). Requests 
for amendment should be addressed to the FBI at the address and 
according to the requirements set forth above under the heading 
``Record Access Procedures.''
    If, however, individuals are experiencing repeated delays or 
difficulties during a government screening process and believe that 
this might be related to terrorist watch list information, they may 
contact the Federal agency that is conducting the screening process in 
question (``screening agency''). The screening agency is in the best 
position to determine if a particular problem relates to a terrorist 
watch list entry or is due to some other cause, such as a criminal 
history, an immigration violation or random screening. Some individuals 
also experience repeated delays during screening because their names 
and/or other identifying data, such as dates of birth, are similar to 
those of known or suspected terrorists. These individuals, referred to 
as ``misidentified persons,'' often believe that they themselves are on 
a terrorist watch list, when in fact they only bear a similarity in 
name or other identifier to an individual on the list. Most screening 
agencies have or are developing procedures to expedite the clearance of 
misidentified persons during screening.
    By contacting the screening agency with a complaint, individuals 
will be able to take advantage of the procedures available to help 
misidentified persons and others experiencing screening problems. Check 
the agency's

[[Page 47079]]

requirements for submitting complaints but, at a minimum, individuals 
should describe in as much detail as possible the problem they are 
having, including dates and locations of screening, and provide 
sufficient information to identify themselves, such as full name, 
citizenship status, and date and place of birth. The TSC assists the 
screening agency in resolving any screening complaints that may relate 
to terrorist watch list information, but does not receive or respond to 
individual complaints directly. However, if TSC receives any such 
complaints, TSC will forward them to the appropriate screening agency.
    Additional information about the redress process and how to file a 
complaint with a screening agency is available on TSC's Web site at 
http://www.fbi.gov/terrorinfo/counterrorism/redress.htm.

Record Source Categories
    Information in this system is obtained from individuals covered by 
the system, public sources, agencies and private sector entities 
conducting terrorism screening, law enforcement and intelligence agency 
record systems, government databases, and foreign governments.

Exemptions Claimed for the System
    The Attorney General has exempted this system from subsections 
(c)(3) and (4), (d)(1), (2), (3) and (4), (e)(1), (2), (3), (5) and 
(8), and (g) of the Privacy Act pursuant to 5 U.S.C. 552a(j) and (k). 
These exemptions apply only to the extent that information in the 
system is subject to exemption pursuant to 5 U.S.C. 552a(j) and (k). 
Rules have been promulgated in accordance with the requirements of 5 
U.S.C. 553(b), (c) and (e).

[FR Doc. E7-16487 Filed 8-21-07; 8:45 am]
BILLING CODE 4410-02-P