Privacy Act of 1974; Notice of Updated Systems of Records, 22377-22380 [E8-8884]

Download as PDF sroberts on PROD1PC70 with NOTICES Federal Register / Vol. 73, No. 81 / Friday, April 25, 2008 / Notices prosecuting, enforcing, or carrying out a statute, rule, regulation, or order, where an agency becomes aware of a violation or potential violation of civil or criminal law or regulation. b. To an appeal, grievance, or formal complaints examiner; equal employment opportunity investigator; arbitrator; or other official engaged in investigating, or settling a grievance, complaint, or appeal filed by an individual who is the subject of the record. c. To officials of labor organizations recognized under Public Law 95–454, when necessary to their duties of exclusive representation on personnel policies, practices, and matters affecting working conditions. d. To another Federal agency in connection with the hiring or retention of an employee; the issuance of a security clearance; the reporting of an investigation; clarifying a job; the letting of a contract; or the issuance of a grant, license, or other benefit to the extent that the information is relevant and necessary to a decision. e. To the Office of Personnel Management (OPM), the Office of Management and Budget (OMB), the Government Accountability Office (GAO) or other Federal agency when the information is required for program evaluation purposes. f. To a Member of Congress or staff on behalf of and at the request of the individual who is the subject of the record. g. To the National Archives and Records Administration (NARA) for records management purposes. h. To an expert, consultant, or contractor in the performance of a Federal duty to which the information is relevant, including issuance of charge cards. i. To GSA in the form of listings, reports, and records of all transportation related transactions, including refunds and adjustments, by the contractor to enable audits of transportation related charges to the Government. j. To GSA contract agents assigned to participating agencies for billing of purchase expenses. k. To agency finance offices for debt collection purposes. l. To appropriate agencies, entities, and persons when (1) the Agency suspects or has confirmed that the security or confidentiality of information in the system of records has been compromised; (2) the Agency has determined that as a result of the suspected or confirmed compromise there is a risk of harm to economic or property interests, identity theft or fraud, or harm to the security or VerDate Aug<31>2005 20:20 Apr 24, 2008 Jkt 214001 integrity of this system or other systems or programs (whether maintained by GSA or another agency or entity) that rely upon the compromised information; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with GSA’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm. POLICIES AND PRACTICES FOR STORING, RETRIEVING, ACCESSING, RETAINING, AND DISPOSING OF SYSTEM RECORDS: STORAGE: Information may be collected on paper or electronically and may be stored on paper or on electronic media, as appropriate. RETRIEVABILITY: Records may be retrieved by name, Social Security Number, credit card number, and/or other personal identifier or appropriate type of designation. SAFEGUARDS: System records are safeguarded in accordance with the requirements of the Privacy Act, the Computer Security Act, and OMB Circular A–130. Technical, administrative, and personnel security measures are implemented to ensure confidentiality and integrity of the system data stored, processed, and transmitted. Paper records are stored in secure cabinets or rooms. Electronic records are protected by passwords and other appropriate security measures. RETENTION AND DISPOSAL: Disposition of records is according to the National Archives and Records Administration (NARA) guidelines, as set forth in the handbook, GSA Records Maintenance and Disposition System (OAD P 1820.2A and CIO P 1820.1), authorized GSA records schedules, and by individual agencies. SYSTEM MANAGER AND ADDRESS: Director, Office of Commercial Acquisition (FC), General Services Administration, 1901 South Bell Street, Arlington VA 22202. Also, officials responsible for individual agency purchase card programs using the SmartPay system. NOTIFICATION PROCEDURE: Individuals may obtain information about their records from the purchase charge card program manager of the agency for which they transact purchases. RECORD ACCESS PROCEDURES: Requests from individuals for access to their records should be addressed to PO 00000 Frm 00057 Fmt 4703 Sfmt 4703 22377 their agency’s purchase charge card program manager or to the finance office of the agency for which the individual transacts purchases. CONTESTING RECORD PROCEDURES: Individuals may access their records, contest the contents, and appeal determinations according to their agency’s rules. RECORD SOURCE CATEGORIES: Information is obtained from individuals submitting charge card applications, monthly contractor reports, purchase records, managers, other agencies, non-Federal sources such as private firms, and other agency systems containing information pertaining to the purchase charge card program. [FR Doc. E8–8883 Filed 4–24–08; 8:45 am] BILLING CODE 6820–34–P GENERAL SERVICES ADMINISTRATION Privacy Act of 1974; Notice of Updated Systems of Records General Services Administration. ACTION: Notice. AGENCY: SUMMARY: GSA reviewed its Privacy Act systems to ensure that they are relevant, necessary, accurate, up-to-date, covered by the appropriate legal or regulatory authority, and in response to OMB M– 07–16. This notice is a compilation of updated Privacy Act system of record notices. DATES: Effective May 27, 2008. Call or e-mail the GSA Privacy Act Officer: Telephone 202–208–1317; e-mail gsa.privacyact@gsa.gov. FOR FURTHER INFORMATION CONTACT: GSA Privacy Act Officer (CIB), General Services Administration, 1800 F Street, NW., Washington, DC 20405. ADDRESSES: GSA undertook and completed an agency wide review of its Privacy Act systems of records. As a result of the review GSA is publishing updated Privacy Act systems of records notices. Rather than make numerous piecemeal revisions, GSA is republishing updated notices for one of its systems. Nothing in the revised system notices indicates a change in authorities or practices regarding the collection and maintenance of information. Nor do the changes impact individuals’ rights to access or amend their records in the systems of records. The updated system SUPPLEMENTARY INFORMATION: E:\FR\FM\25APN1.SGM 25APN1 22378 Federal Register / Vol. 73, No. 81 / Friday, April 25, 2008 / Notices notices also include the new requirement from OMB Memorandum M–07–16 regarding a new routine use that allows agencies to disclose information in connection with a response and remedial efforts in the event of a data breach. Dated: April 16, 2008. Cheryl M. Paige, Director, Office of Information Management. GSA/GOVT–7 SYSTEM NAME: Personal Identity Verification Identity Management System (PIV IDMS). SECURITY CLASSIFICATION: Sensitive but unclassified. SYSTEM LOCATION: Records covered by this system are maintained by a contractor at the contractor’s site. CATEGORIES OF INDIVIDUALS COVERED BY THE SYSTEM: The PIV IDMS records will cover all participating agency employees, contractors and their employees, consultants, and volunteers who require routine, long-term access to federal facilities, information technology systems, and networks. The system also includes individuals authorized to perform or use services provided in agency facilities (e.g., Credit Union, Fitness Center, etc.). At their discretion, participating Federal agencies may include short-term employees and contractors in the PIV program and, therefore, inclusion in the PIV IDMS. Federal agencies shall make risk-based decisions to determine whether to issue PIV cards and require prerequisite background checks for short-term employees and contractors. The system does not apply to occasional visitors or short-term guests. GSA and participating agencies will issue temporary identification and credentials for this purpose. sroberts on PROD1PC70 with NOTICES CATEGORIES OF RECORDS IN THE SYSTEM: Enrollment records maintained in the PIV IDMS on individuals applying for the PIV program and a PIV credential through the GSA HSPD–12 managed service include the following data fields: Full name; Social Security Number; Applicant ID number, date of birth; current address; digital color photograph; fingerprints; biometric template (two fingerprints); organization/office of assignment; employee affiliation; work e-mail address; work telephone number(s); office address; copies of identity source documents; employee status; military status; foreign national status; federal VerDate Aug<31>2005 20:20 Apr 24, 2008 Jkt 214001 emergency response official status; law enforcement official status; results of background check; Government agency code; and PIV card issuance location. Records in the PIV IDMS needed for credential management for enrolled individuals in the PIV program include: PIV card serial number; digital certificate(s) serial number; PIV card issuance and expiration dates; PIV card PIN; Cardholder Unique Identifier (CHUID); and card management keys. Agencies may also choose to collect the following data at PIV enrollment which would also be maintained in the PIV IDMS: Physical characteristics (e.g., height, weight, and eye and hair color). Individuals enrolled in the PIV managed service will be issued a PIV card. The PIV card contains the following mandatory visual personally identifiable information: Name, photograph, employee affiliation, organizational affiliation, PIV card expiration date, agency card serial number, and colorcoding for employee affiliation. Agencies may choose to have the following optional personally identifiable information printed on the card: Cardholder physical characteristics (height, weight, and eye and hair color). The card also contains an integrated circuit chip which is encoded with the following mandatory data elements which comprise the standard data model for PIV logical credentials: PIV card PIN, cardholder unique identifier (CHUID), PIV authentication digital certificate, and two fingerprint biometric templates. The PIV data model may be optionally extended by agencies to include the following logical credentials: Digital certificate for digital signature, digital certificate for key management, card authentication keys, and card management system keys. All PIV logical credentials can only be read by machine. AUTHORITY FOR MAINTENANCE OF THE SYSTEM: 5 U.S.C. 301; Federal Information Security Management Act (Pub. L. 107– 296, Sec. 3544); E-Government Act (Pub. L. 107–347, Sec. 203); Paperwork Reduction Act of 1995 (44 U.S.C. 3501 et al.) and Government Paperwork Elimination Act (Pub. L. 105–277, 44 U.S.C. 3504); Homeland Security Presidential Directive 12 (HSPD–12), Policy for a Common Identification Standard for Federal Employees and Contractors, August 27, 2004; Federal Property and Administrative Services Act of 1949, as amended. PURPOSES: The primary purposes of the system are: To ensure the safety and security of PO 00000 Frm 00058 Fmt 4703 Sfmt 4703 Federal facilities, systems, or information, and of facility occupants and users; to provide for interoperability and trust in allowing physical access to individuals entering Federal facilities; and to allow logical access to Federal information systems, networks, and resources on a government-wide basis. ROUTINE USES OF RECORDS MAINTAINED IN THE SYSTEM INCLUDING CATEGORIES OF USERS AND THE PURPOSES OF SUCH USES: In addition to those disclosures generally permitted under 5 U.S.C. Section 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside GSA as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows: a. To the Department of Justice (DOJ) when: (1) The agency or any component thereof; or (2) any employee of the agency in his or her official capacity; (3) any employee of the agency in his or her individual capacity where agency or the Department of Justice has agreed to represent the employee; or (4) the United States Government is a party to litigation or has an interest in such litigation, and by careful review, the agency determines that the records are both relevant and necessary to the litigation and the use of such records by DOJ and is therefore deemed by the agency to be for a purpose compatible with the purpose for which the agency collected the records. b. To a court or adjudicative body in a proceeding when: (1) The agency or any component thereof; (2) any employee of the agency in his or her official capacity; (3) any employee of the agency in his or her individual capacity where the agency or the Department of Justice has agreed to represent the employee; or (4) the United States Government is a party to litigation or has an interest in such litigation, and by careful review, the agency determines that the records are both relevant and necessary to the litigation and the use of such records and is therefore deemed by the agency to be for a purpose that is compatible with the purpose for which the agency collected the records. c. Except as noted on Forms SF 85, SF 85–P, and SF 86, when a record on its face, or in conjunction with other records, indicates a violation or potential violation of law, whether civil, criminal, or regulatory in nature, and whether arising by general statute or particular program statute, or by regulation, rule, or order issued pursuant thereto, disclosure may be made to the appropriate public authority, whether Federal, foreign, State, local, or tribal, or otherwise, E:\FR\FM\25APN1.SGM 25APN1 sroberts on PROD1PC70 with NOTICES Federal Register / Vol. 73, No. 81 / Friday, April 25, 2008 / Notices responsible for enforcing, investigating or prosecuting such violation or charged with enforcing or implementing the statute, or rule, regulation, or order issued pursuant thereto, if the information disclosed is relevant to any enforcement, regulatory, investigative or prosecutorial responsibility of the receiving entity. d. To a Member of Congress or to a Congressional staff member in response to an inquiry of the Congressional office made at the written request of the constituent about whom the record is maintained. e. To the National Archives and Records Administration (NARA) or to the General Services Administration for records management inspections conducted under 44 U.S.C. 2904 and 2906. f. To agency contractors, grantees, or volunteers who have been engaged to assist the agency in the performance of a contract service, grant, cooperative agreement, or other activity related to this system of records and who need to have access to the records in order to perform their activity. Recipients shall be required to comply with the requirements of the Privacy Act of 1974, as amended, 5 U.S.C. 552a, the Federal Information Security Management Act (Pub. L. 107–296), and associated OMB policies, standards and guidance from the National Institute of Standards and Technology, and the General Services Administration. g. To a Federal agency, State, local, foreign, or tribal or other public authority, on request, in connection with the hiring or retention of an employee, the issuance or retention of a security clearance, the letting of a contract, or the issuance or retention of a license, grant, or other benefit, to the extent that the information is relevant and necessary to the requesting agency’s decision. h. To the Office of Management and Budget (OMB) when necessary to the review of private relief legislation pursuant to OMB Circular No. A–19. i. To a Federal, State, or local agency, or other appropriate entities or individuals, or through established liaison channels to selected foreign governments, in order to enable an intelligence agency to carry out its responsibilities under the National Security Act of 1947, as amended; the CIA Act of 1949, as amended; Executive Order 12333 or any successor order; and applicable national security directives, or classified implementing procedures approved by the Attorney General and promulgated pursuant to such statutes, orders, or Directives. VerDate Aug<31>2005 20:20 Apr 24, 2008 Jkt 214001 j. To designated agency personnel for controlled access to specific records for the purposes of performing authorized audit or authorized oversight and administrative functions. All access is controlled systematically through authentication using PIV credentials based on access and authorization rules for specific audit and administrative functions. k. To the Office of Personnel Management (OPM), the Office of Management and Budget (OMB), the Government Accountability Office (GAO), or other Federal agency in accordance with the agency’s responsibility for evaluation of Federal personnel management. l. To the Federal Bureau of Investigation for the FBI National Criminal History check. m. To a Federal, State, or local agency, or other appropriate entities or individuals, or through established liaison channels to selected foreign governments, in order to enable an intelligence agency to carry out its responsibilities under the National Security Act of 1947 as amended; the CIA Act of 1949 as amended; Executive Order 12333 or any successor order; and applicable national security directives, or classified implementing procedures approved by the Attorney General and promulgated pursuant to such statutes, orders or directives. n. To appropriate agencies, entities, and persons when (1) the Agency suspects or has confirmed that the security or confidentiality of information in the system of records has been compromised; (2) the Agency has determined that as a result of the suspected or confirmed compromise there is a risk of harm to economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other systems or programs (whether maintained by GSA or another agency or entity) that rely upon the compromised information; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with GSA’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm. POLICIES AND PRACTICES FOR STORING, RETRIEVING, ACCESSING, RETAINING AND DISPOSING OF RECORDS IN THE SYSTEM: STORAGE: Records are stored in electronic media and in paper files. RETRIEVABILITY: Records may be retrieved by name of the individual, Cardholder Unique PO 00000 Frm 00059 Fmt 4703 Sfmt 4703 22379 Identification Number, Applicant ID, Social Security Number, and/or by any other unique individual identifier. SAFEGUARDS: Consistent with the requirements of the Federal Information Security Management Act (Pub. L. 107–296), and associated OMB policies, standards and guidance from the National Institute of Standards and Technology, and the General Services Administration, the GSA HSPD–12 managed service office protects all records from unauthorized access through appropriate administrative, physical, and technical safeguards. Access is restricted on a ‘‘need to know’’ basis, utilization of PIV Card access, secure VPN for Web access, and locks on doors and approved storage containers. Buildings have security guards and secured doors. All entrances are monitored through electronic surveillance equipment. The hosting facility is supported by 24/7 onsite hosting and network monitoring by trained technical staff. Physical security controls include: Indoor and outdoor security monitoring and surveillance; badge and picture ID access screening; biometric access screening. Personally identifiable information is safeguarded and protected in conformance with all Federal statutory and OMB guidance requirements. All access has role-based restrictions, and individuals with access privileges have undergone vetting and suitability screening. All data is encrypted in transit. While it is not contemplated, any system records stored on mobile computers or mobile devices will be encrypted. GSA maintains an audit trail and performs random periodic reviews to identify unauthorized access. Persons given roles in the PIV process must be approved by the Government and complete training specific to their roles to ensure they are knowledgeable about how to protect personally identifiable information. RETENTION AND DISPOSAL: Disposition of records will be according to NARA disposition authority N1–269–06–1 (pending). SYSTEM MANAGER AND ADDRESS: Director, HSPD–12 Managed Service Office, Federal Acquisition Service (FAS), General Services Administration, Suite 911, 2011 Crystal Drive, Arlington, VA 22202. NOTIFICATION PROCEDURE: A request for access to records in this system may be made by writing to the System Manager. When requesting E:\FR\FM\25APN1.SGM 25APN1 22380 Federal Register / Vol. 73, No. 81 / Friday, April 25, 2008 / Notices notification of or access to records covered by this Notice, an individual should provide his/her full name, date of birth, agency name, and work location. An individual requesting notification of records in person must provide identity documents sufficient to satisfy the custodian of the records that the requester is entitled to access, such as a government-issued photo ID. RECORD ACCESS PROCEDURES: Same as Notification Procedure above. CONTESTING RECORD PROCEDURES: Same as Notification Procedure above. State clearly and concisely the information being contested, the reasons for contesting it, and the proposed amendment to the information sought. revised system notices indicates a change in authorities or practices regarding the collection and maintenance of information. Nor do the changes impact individuals’ rights to access or amend their records in the systems of records. The updated system notices also includes the new requirement from OMB Memorandum M–07–16 regarding a new routine use that allows agencies to disclose information in connection with a response and remedial efforts in the event of a data breach. Dated: April 16, 2008. Cheryl M. Paige, Director, Office ofInformation Management. GSA/GOVT–5 SYSTEM NAME: RECORD SOURCE CATEGORIES: Employee, contractor, or applicant; sponsoring agency; former sponsoring agency; other Federal agencies; contract employer; former employer. Access Certificates for Electronic Services (ACES). SYSTEM LOCATION: GENERAL SERVICES ADMINISTRATION System records are maintained for the General Services Administration (GSA) by contractors at various physical locations. A complete list of locations is available from: Administrative Contracting Officer, FEDCAC, Federal Technology Service, General Services Administration, 7th and D Streets, SW., Room 5060, Washington, DC 20407; telephone (202) 708–6099. Privacy Act of 1974; Notice of Updated Systems of Records CATEGORIES OF INDIVIDUALS COVERED BY THE SYSTEM: EXEMPTIONS CLAIMED FOR THE SYSTEM: None. [FR Doc. E8–8884 Filed 4–24–08; 8:45 am] BILLING CODE 6820–34–P General Services Administration. ACTION: Notice. AGENCY: SUMMARY: GSA reviewed its Privacy Act systems to ensure that they are relevant, necessary, accurate, up-to-date, covered by the appropriate legal or regulatory authority, and in response to OMB M– 07–16. This notice is a compilation of updated Privacy Act system of record notices. DATES: Effective May 27, 2008. Call or e-mail the GSA Privacy Act Officer: telephone 202–208–1317; e-mail gsa.privacyact@gsa.gov. FOR FURTHER INFORMATION CONTACT: GSA Privacy Act Officer (CIB), General Services Administration, 1800 F Street NW., Washington, DC 20405. ADDRESSES: GSA undertook and completed an agency wide review of its Privacy Act systems of records. As a result of the review GSA is publishing updated Privacy Act systems of records notices. Rather than make numerous piecemeal revisions, GSA is republishing updated notices for one of its systems. Nothing in the sroberts on PROD1PC70 with NOTICES SUPPLEMENTARY INFORMATION: VerDate Aug<31>2005 21:24 Apr 24, 2008 Jkt 214001 Individuals covered are persons who have applied for the issuance of a digital signature certificate under the ACES program; have had their certificates amended, renewed, replaced, suspended, revoked, or denied; have used their certificates to electronically make contact with, retrieve information from, or submit information to an automated information system of a participating agency; have requested access to ACES records under the Freedom of Information Act (FOIA) or Privacy Act; and have corresponded with GSA or its ACES contractors concerning ACES services. CATEGORIES OF RECORDS IN THE SYSTEM: The system contains information needed to establish and verify the identity of ACES users, to maintain the system, and to establish accountability and audit controls. System records include: a. Applications for the issuance, amendment, renewal, replacement, or revocation of digital signature certificates under the ACES program, including evidence provided by applicants or proof of identity and authority, and sources used to verify an applicant’s identify and authority. PO 00000 Frm 00060 Fmt 4703 Sfmt 4703 b. Certificates issued. c. Certificates denied, suspended, and revoked, including reasons for denial, suspension, and revocation. d. A list of currently valid certificates. e. A list of currently invalid certificates. f. A file of individuals requesting access and those granted access to ACES information under FOIA or the Privacy Act. g. A file of individuals requesting access and those granted access for reasons other than FOIA or the Privacy Act. h. A record of validation transactions attempted on digital signature certificates issued by the system. i. A record of validation transactions completed on digital signature certificates issued by the system. AUTHORITY FOR MAINTENANCE OF THE SYSTEM: Section 5124(b) of the Clinger-Cohen Act of 1996, 40 U.S.C. 1424, which provides authority for GSA to develop and facilitate governmentwide electronic commerce resources and services, and the Paperwork Reduction Act, 44 U.S.C. 3501, et. seq., which provides authority for GSA to manage Federal information resources. PURPOSE: To establish and maintain an electronic system to facilitate secure, on-line communication between Federal automated information systems and the public, using digital signature technologies to authenticate and verify identity. ROUTINE USES OF THE SYSTEM RECORDS, INCLUDING CATEGORIES OF USERS AND THEIR PURPOSES FOR USING THE SYSTEM: Information from this system may be disclosed as a routine use: a. To GSA ACES program contractors to compile and maintain documentation on applicants for proofing applicants’ identity and their authority to access information system applications of participating agencies. b. To GSA ACES program contractors to establish and maintain documentation on information sources for verifying applicants’ identities. c. To Federal agencies participating in the ACES program to determine the validity of applicants’ digital signature certificates in an on-line, near real time environment. d. To GSA, participating Federal agencies, and ACES contractors, for ensuring proper management, ensuring data accuracy, and evaluation of the system. e. To Federal, State, local or foreign agencies responsible for investigating, E:\FR\FM\25APN1.SGM 25APN1

Agencies

[Federal Register Volume 73, Number 81 (Friday, April 25, 2008)]
[Notices]
[Pages 22377-22380]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: E8-8884]


-----------------------------------------------------------------------

GENERAL SERVICES ADMINISTRATION


Privacy Act of 1974; Notice of Updated Systems of Records

AGENCY: General Services Administration.

ACTION: Notice.

-----------------------------------------------------------------------

SUMMARY: GSA reviewed its Privacy Act systems to ensure that they are 
relevant, necessary, accurate, up-to-date, covered by the appropriate 
legal or regulatory authority, and in response to OMB M-07-16. This 
notice is a compilation of updated Privacy Act system of record 
notices.

DATES: Effective May 27, 2008.

FOR FURTHER INFORMATION CONTACT: Call or e-mail the GSA Privacy Act 
Officer: Telephone 202-208-1317; e-mail gsa.privacyact@gsa.gov.

ADDRESSES: GSA Privacy Act Officer (CIB), General Services 
Administration, 1800 F Street, NW., Washington, DC 20405.

SUPPLEMENTARY INFORMATION: GSA undertook and completed an agency wide 
review of its Privacy Act systems of records. As a result of the review 
GSA is publishing updated Privacy Act systems of records notices. 
Rather than make numerous piecemeal revisions, GSA is republishing 
updated notices for one of its systems. Nothing in the revised system 
notices indicates a change in authorities or practices regarding the 
collection and maintenance of information. Nor do the changes impact 
individuals' rights to access or amend their records in the systems of 
records. The updated system

[[Page 22378]]

notices also include the new requirement from OMB Memorandum M-07-16 
regarding a new routine use that allows agencies to disclose 
information in connection with a response and remedial efforts in the 
event of a data breach.

    Dated: April 16, 2008.
Cheryl M. Paige,
Director, Office of Information Management.
GSA/GOVT-7

SYSTEM NAME:
    Personal Identity Verification Identity Management System (PIV 
IDMS).

SECURITY CLASSIFICATION:
    Sensitive but unclassified.

SYSTEM LOCATION:
    Records covered by this system are maintained by a contractor at 
the contractor's site.

CATEGORIES OF INDIVIDUALS COVERED BY THE SYSTEM:
    The PIV IDMS records will cover all participating agency employees, 
contractors and their employees, consultants, and volunteers who 
require routine, long-term access to federal facilities, information 
technology systems, and networks. The system also includes individuals 
authorized to perform or use services provided in agency facilities 
(e.g., Credit Union, Fitness Center, etc.).
    At their discretion, participating Federal agencies may include 
short-term employees and contractors in the PIV program and, therefore, 
inclusion in the PIV IDMS. Federal agencies shall make risk-based 
decisions to determine whether to issue PIV cards and require 
prerequisite background checks for short-term employees and 
contractors. The system does not apply to occasional visitors or short-
term guests. GSA and participating agencies will issue temporary 
identification and credentials for this purpose.

CATEGORIES OF RECORDS IN THE SYSTEM:
    Enrollment records maintained in the PIV IDMS on individuals 
applying for the PIV program and a PIV credential through the GSA HSPD-
12 managed service include the following data fields: Full name; Social 
Security Number; Applicant ID number, date of birth; current address; 
digital color photograph; fingerprints; biometric template (two 
fingerprints); organization/office of assignment; employee affiliation; 
work e-mail address; work telephone number(s); office address; copies 
of identity source documents; employee status; military status; foreign 
national status; federal emergency response official status; law 
enforcement official status; results of background check; Government 
agency code; and PIV card issuance location. Records in the PIV IDMS 
needed for credential management for enrolled individuals in the PIV 
program include: PIV card serial number; digital certificate(s) serial 
number; PIV card issuance and expiration dates; PIV card PIN; 
Cardholder Unique Identifier (CHUID); and card management keys. 
Agencies may also choose to collect the following data at PIV 
enrollment which would also be maintained in the PIV IDMS: Physical 
characteristics (e.g., height, weight, and eye and hair color). 
Individuals enrolled in the PIV managed service will be issued a PIV 
card. The PIV card contains the following mandatory visual personally 
identifiable information: Name, photograph, employee affiliation, 
organizational affiliation, PIV card expiration date, agency card 
serial number, and color-coding for employee affiliation. Agencies may 
choose to have the following optional personally identifiable 
information printed on the card: Cardholder physical characteristics 
(height, weight, and eye and hair color). The card also contains an 
integrated circuit chip which is encoded with the following mandatory 
data elements which comprise the standard data model for PIV logical 
credentials: PIV card PIN, cardholder unique identifier (CHUID), PIV 
authentication digital certificate, and two fingerprint biometric 
templates. The PIV data model may be optionally extended by agencies to 
include the following logical credentials: Digital certificate for 
digital signature, digital certificate for key management, card 
authentication keys, and card management system keys. All PIV logical 
credentials can only be read by machine.

AUTHORITY FOR MAINTENANCE OF THE SYSTEM:
    5 U.S.C. 301; Federal Information Security Management Act (Pub. L. 
107-296, Sec. 3544); E-Government Act (Pub. L. 107-347, Sec. 203); 
Paperwork Reduction Act of 1995 (44 U.S.C. 3501 et al.) and Government 
Paperwork Elimination Act (Pub. L. 105-277, 44 U.S.C. 3504); Homeland 
Security Presidential Directive 12 (HSPD-12), Policy for a Common 
Identification Standard for Federal Employees and Contractors, August 
27, 2004; Federal Property and Administrative Services Act of 1949, as 
amended.

PURPOSES:
    The primary purposes of the system are: To ensure the safety and 
security of Federal facilities, systems, or information, and of 
facility occupants and users; to provide for interoperability and trust 
in allowing physical access to individuals entering Federal facilities; 
and to allow logical access to Federal information systems, networks, 
and resources on a government-wide basis.

ROUTINE USES OF RECORDS MAINTAINED IN THE SYSTEM INCLUDING CATEGORIES 
OF USERS AND THE PURPOSES OF SUCH USES:
    In addition to those disclosures generally permitted under 5 U.S.C. 
Section 552a(b) of the Privacy Act, all or a portion of the records or 
information contained in this system may be disclosed outside GSA as a 
routine use pursuant to 5 U.S.C. 552a(b)(3) as follows:
    a. To the Department of Justice (DOJ) when: (1) The agency or any 
component thereof; or (2) any employee of the agency in his or her 
official capacity; (3) any employee of the agency in his or her 
individual capacity where agency or the Department of Justice has 
agreed to represent the employee; or (4) the United States Government 
is a party to litigation or has an interest in such litigation, and by 
careful review, the agency determines that the records are both 
relevant and necessary to the litigation and the use of such records by 
DOJ and is therefore deemed by the agency to be for a purpose 
compatible with the purpose for which the agency collected the records.
    b. To a court or adjudicative body in a proceeding when: (1) The 
agency or any component thereof; (2) any employee of the agency in his 
or her official capacity; (3) any employee of the agency in his or her 
individual capacity where the agency or the Department of Justice has 
agreed to represent the employee; or (4) the United States Government 
is a party to litigation or has an interest in such litigation, and by 
careful review, the agency determines that the records are both 
relevant and necessary to the litigation and the use of such records 
and is therefore deemed by the agency to be for a purpose that is 
compatible with the purpose for which the agency collected the records.
    c. Except as noted on Forms SF 85, SF 85-P, and SF 86, when a 
record on its face, or in conjunction with other records, indicates a 
violation or potential violation of law, whether civil, criminal, or 
regulatory in nature, and whether arising by general statute or 
particular program statute, or by regulation, rule, or order issued 
pursuant thereto, disclosure may be made to the appropriate public 
authority, whether Federal, foreign, State, local, or tribal, or 
otherwise,

[[Page 22379]]

responsible for enforcing, investigating or prosecuting such violation 
or charged with enforcing or implementing the statute, or rule, 
regulation, or order issued pursuant thereto, if the information 
disclosed is relevant to any enforcement, regulatory, investigative or 
prosecutorial responsibility of the receiving entity.
    d. To a Member of Congress or to a Congressional staff member in 
response to an inquiry of the Congressional office made at the written 
request of the constituent about whom the record is maintained.
    e. To the National Archives and Records Administration (NARA) or to 
the General Services Administration for records management inspections 
conducted under 44 U.S.C. 2904 and 2906.
    f. To agency contractors, grantees, or volunteers who have been 
engaged to assist the agency in the performance of a contract service, 
grant, cooperative agreement, or other activity related to this system 
of records and who need to have access to the records in order to 
perform their activity. Recipients shall be required to comply with the 
requirements of the Privacy Act of 1974, as amended, 5 U.S.C. 552a, the 
Federal Information Security Management Act (Pub. L. 107-296), and 
associated OMB policies, standards and guidance from the National 
Institute of Standards and Technology, and the General Services 
Administration.
    g. To a Federal agency, State, local, foreign, or tribal or other 
public authority, on request, in connection with the hiring or 
retention of an employee, the issuance or retention of a security 
clearance, the letting of a contract, or the issuance or retention of a 
license, grant, or other benefit, to the extent that the information is 
relevant and necessary to the requesting agency's decision.
    h. To the Office of Management and Budget (OMB) when necessary to 
the review of private relief legislation pursuant to OMB Circular No. 
A-19.
    i. To a Federal, State, or local agency, or other appropriate 
entities or individuals, or through established liaison channels to 
selected foreign governments, in order to enable an intelligence agency 
to carry out its responsibilities under the National Security Act of 
1947, as amended; the CIA Act of 1949, as amended; Executive Order 
12333 or any successor order; and applicable national security 
directives, or classified implementing procedures approved by the 
Attorney General and promulgated pursuant to such statutes, orders, or 
Directives.
    j. To designated agency personnel for controlled access to specific 
records for the purposes of performing authorized audit or authorized 
oversight and administrative functions. All access is controlled 
systematically through authentication using PIV credentials based on 
access and authorization rules for specific audit and administrative 
functions.
    k. To the Office of Personnel Management (OPM), the Office of 
Management and Budget (OMB), the Government Accountability Office 
(GAO), or other Federal agency in accordance with the agency's 
responsibility for evaluation of Federal personnel management.
    l. To the Federal Bureau of Investigation for the FBI National 
Criminal History check.
    m. To a Federal, State, or local agency, or other appropriate 
entities or individuals, or through established liaison channels to 
selected foreign governments, in order to enable an intelligence agency 
to carry out its responsibilities under the National Security Act of 
1947 as amended; the CIA Act of 1949 as amended; Executive Order 12333 
or any successor order; and applicable national security directives, or 
classified implementing procedures approved by the Attorney General and 
promulgated pursuant to such statutes, orders or directives.
    n. To appropriate agencies, entities, and persons when (1) the 
Agency suspects or has confirmed that the security or confidentiality 
of information in the system of records has been compromised; (2) the 
Agency has determined that as a result of the suspected or confirmed 
compromise there is a risk of harm to economic or property interests, 
identity theft or fraud, or harm to the security or integrity of this 
system or other systems or programs (whether maintained by GSA or 
another agency or entity) that rely upon the compromised information; 
and (3) the disclosure made to such agencies, entities, and persons is 
reasonably necessary to assist in connection with GSA's efforts to 
respond to the suspected or confirmed compromise and prevent, minimize, 
or remedy such harm.

POLICIES AND PRACTICES FOR STORING, RETRIEVING, ACCESSING, RETAINING 
AND DISPOSING OF RECORDS IN THE SYSTEM:
STORAGE:
    Records are stored in electronic media and in paper files.

RETRIEVABILITY:
    Records may be retrieved by name of the individual, Cardholder 
Unique Identification Number, Applicant ID, Social Security Number, 
and/or by any other unique individual identifier.

SAFEGUARDS:
    Consistent with the requirements of the Federal Information 
Security Management Act (Pub. L. 107-296), and associated OMB policies, 
standards and guidance from the National Institute of Standards and 
Technology, and the General Services Administration, the GSA HSPD-12 
managed service office protects all records from unauthorized access 
through appropriate administrative, physical, and technical safeguards. 
Access is restricted on a ``need to know'' basis, utilization of PIV 
Card access, secure VPN for Web access, and locks on doors and approved 
storage containers. Buildings have security guards and secured doors. 
All entrances are monitored through electronic surveillance equipment. 
The hosting facility is supported by 24/7 onsite hosting and network 
monitoring by trained technical staff. Physical security controls 
include: Indoor and outdoor security monitoring and surveillance; badge 
and picture ID access screening; biometric access screening. Personally 
identifiable information is safeguarded and protected in conformance 
with all Federal statutory and OMB guidance requirements. All access 
has role-based restrictions, and individuals with access privileges 
have undergone vetting and suitability screening. All data is encrypted 
in transit. While it is not contemplated, any system records stored on 
mobile computers or mobile devices will be encrypted. GSA maintains an 
audit trail and performs random periodic reviews to identify 
unauthorized access. Persons given roles in the PIV process must be 
approved by the Government and complete training specific to their 
roles to ensure they are knowledgeable about how to protect personally 
identifiable information.

RETENTION AND DISPOSAL:
    Disposition of records will be according to NARA disposition 
authority N1-269-06-1 (pending).

SYSTEM MANAGER AND ADDRESS:
    Director, HSPD-12 Managed Service Office, Federal Acquisition 
Service (FAS), General Services Administration, Suite 911, 2011 Crystal 
Drive, Arlington, VA 22202.

NOTIFICATION PROCEDURE:
    A request for access to records in this system may be made by 
writing to the System Manager. When requesting

[[Page 22380]]

notification of or access to records covered by this Notice, an 
individual should provide his/her full name, date of birth, agency 
name, and work location. An individual requesting notification of 
records in person must provide identity documents sufficient to satisfy 
the custodian of the records that the requester is entitled to access, 
such as a government-issued photo ID.

RECORD ACCESS PROCEDURES:
    Same as Notification Procedure above.

CONTESTING RECORD PROCEDURES:
    Same as Notification Procedure above. State clearly and concisely 
the information being contested, the reasons for contesting it, and the 
proposed amendment to the information sought.

RECORD SOURCE CATEGORIES:
    Employee, contractor, or applicant; sponsoring agency; former 
sponsoring agency; other Federal agencies; contract employer; former 
employer.

EXEMPTIONS CLAIMED FOR THE SYSTEM:
    None.
[FR Doc. E8-8884 Filed 4-24-08; 8:45 am]
BILLING CODE 6820-34-P
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.