Privacy Act of 1974; Notice of Updated Systems of Records, 22380-22381 [E8-8886]
Download as PDF
22380
Federal Register / Vol. 73, No. 81 / Friday, April 25, 2008 / Notices
notification of or access to records
covered by this Notice, an individual
should provide his/her full name, date
of birth, agency name, and work
location. An individual requesting
notification of records in person must
provide identity documents sufficient to
satisfy the custodian of the records that
the requester is entitled to access, such
as a government-issued photo ID.
RECORD ACCESS PROCEDURES:
Same as Notification Procedure above.
CONTESTING RECORD PROCEDURES:
Same as Notification Procedure above.
State clearly and concisely the
information being contested, the reasons
for contesting it, and the proposed
amendment to the information sought.
revised system notices indicates a
change in authorities or practices
regarding the collection and
maintenance of information. Nor do the
changes impact individuals’ rights to
access or amend their records in the
systems of records. The updated system
notices also includes the new
requirement from OMB Memorandum
M–07–16 regarding a new routine use
that allows agencies to disclose
information in connection with a
response and remedial efforts in the
event of a data breach.
Dated: April 16, 2008.
Cheryl M. Paige,
Director, Office ofInformation Management.
GSA/GOVT–5
SYSTEM NAME:
RECORD SOURCE CATEGORIES:
Employee, contractor, or applicant;
sponsoring agency; former sponsoring
agency; other Federal agencies; contract
employer; former employer.
Access Certificates for Electronic
Services (ACES).
SYSTEM LOCATION:
GENERAL SERVICES
ADMINISTRATION
System records are maintained for the
General Services Administration (GSA)
by contractors at various physical
locations. A complete list of locations is
available from: Administrative
Contracting Officer, FEDCAC, Federal
Technology Service, General Services
Administration, 7th and D Streets, SW.,
Room 5060, Washington, DC 20407;
telephone (202) 708–6099.
Privacy Act of 1974; Notice of Updated
Systems of Records
CATEGORIES OF INDIVIDUALS COVERED BY THE
SYSTEM:
EXEMPTIONS CLAIMED FOR THE SYSTEM:
None.
[FR Doc. E8–8884 Filed 4–24–08; 8:45 am]
BILLING CODE 6820–34–P
General Services
Administration.
ACTION: Notice.
AGENCY:
SUMMARY: GSA reviewed its Privacy Act
systems to ensure that they are relevant,
necessary, accurate, up-to-date, covered
by the appropriate legal or regulatory
authority, and in response to OMB M–
07–16. This notice is a compilation of
updated Privacy Act system of record
notices.
DATES:
Effective May 27, 2008.
Call
or e-mail the GSA Privacy Act Officer:
telephone 202–208–1317; e-mail
gsa.privacyact@gsa.gov.
FOR FURTHER INFORMATION CONTACT:
GSA Privacy Act Officer
(CIB), General Services Administration,
1800 F Street NW., Washington, DC
20405.
ADDRESSES:
GSA
undertook and completed an agency
wide review of its Privacy Act systems
of records. As a result of the review GSA
is publishing updated Privacy Act
systems of records notices. Rather than
make numerous piecemeal revisions,
GSA is republishing updated notices for
one of its systems. Nothing in the
sroberts on PROD1PC70 with NOTICES
SUPPLEMENTARY INFORMATION:
VerDate Aug<31>2005
21:24 Apr 24, 2008
Jkt 214001
Individuals covered are persons who
have applied for the issuance of a digital
signature certificate under the ACES
program; have had their certificates
amended, renewed, replaced,
suspended, revoked, or denied; have
used their certificates to electronically
make contact with, retrieve information
from, or submit information to an
automated information system of a
participating agency; have requested
access to ACES records under the
Freedom of Information Act (FOIA) or
Privacy Act; and have corresponded
with GSA or its ACES contractors
concerning ACES services.
CATEGORIES OF RECORDS IN THE SYSTEM:
The system contains information
needed to establish and verify the
identity of ACES users, to maintain the
system, and to establish accountability
and audit controls. System records
include:
a. Applications for the issuance,
amendment, renewal, replacement, or
revocation of digital signature
certificates under the ACES program,
including evidence provided by
applicants or proof of identity and
authority, and sources used to verify an
applicant’s identify and authority.
PO 00000
Frm 00060
Fmt 4703
Sfmt 4703
b. Certificates issued.
c. Certificates denied, suspended, and
revoked, including reasons for denial,
suspension, and revocation.
d. A list of currently valid certificates.
e. A list of currently invalid
certificates.
f. A file of individuals requesting
access and those granted access to ACES
information under FOIA or the Privacy
Act.
g. A file of individuals requesting
access and those granted access for
reasons other than FOIA or the Privacy
Act.
h. A record of validation transactions
attempted on digital signature
certificates issued by the system.
i. A record of validation transactions
completed on digital signature
certificates issued by the system.
AUTHORITY FOR MAINTENANCE OF THE SYSTEM:
Section 5124(b) of the Clinger-Cohen
Act of 1996, 40 U.S.C. 1424, which
provides authority for GSA to develop
and facilitate governmentwide
electronic commerce resources and
services, and the Paperwork Reduction
Act, 44 U.S.C. 3501, et. seq., which
provides authority for GSA to manage
Federal information resources.
PURPOSE:
To establish and maintain an
electronic system to facilitate secure,
on-line communication between Federal
automated information systems and the
public, using digital signature
technologies to authenticate and verify
identity.
ROUTINE USES OF THE SYSTEM RECORDS,
INCLUDING CATEGORIES OF USERS AND THEIR
PURPOSES FOR USING THE SYSTEM:
Information from this system may be
disclosed as a routine use:
a. To GSA ACES program contractors
to compile and maintain documentation
on applicants for proofing applicants’
identity and their authority to access
information system applications of
participating agencies.
b. To GSA ACES program contractors
to establish and maintain
documentation on information sources
for verifying applicants’ identities.
c. To Federal agencies participating in
the ACES program to determine the
validity of applicants’ digital signature
certificates in an on-line, near real time
environment.
d. To GSA, participating Federal
agencies, and ACES contractors, for
ensuring proper management, ensuring
data accuracy, and evaluation of the
system.
e. To Federal, State, local or foreign
agencies responsible for investigating,
E:\FR\FM\25APN1.SGM
25APN1
Federal Register / Vol. 73, No. 81 / Friday, April 25, 2008 / Notices
sroberts on PROD1PC70 with NOTICES
prosecuting, enforcing, or carrying out a
statute, rule, regulation, or order when
GSA becomes aware of a violation or
potential violation of civil or criminal
law or regulation.
f. To a member of Congress or to a
congressional staff member in response
to a request from the person who is the
subject of the record.
g. To an expert, consultant, or
contractor of GSA in the performance of
a Federal duty to which the information
is relevant.
h. To appropriate agencies, entities,
and persons when (1) the Agency
suspects or has confirmed that the
security or confidentiality of
information in the system of records has
been compromised; (2) the Agency has
determined that as a result of the
suspected or confirmed compromise
there is a risk of harm to economic or
property interests, identity theft or
fraud, or harm to the security or
integrity of this system or other systems
or programs (whether maintained by
GSA or another agency or entity) that
rely upon the compromised
information; and (3) the disclosure
made to such agencies, entities, and
persons is reasonably necessary to assist
in connection with GSA’s efforts to
respond to the suspected or confirmed
compromise and prevent, minimize, or
remedy such harm.
i. To a Federal agency in connection
with the hiring or retention of an
employee; the issuance of a security
clearance; the reporting of an
investigation; the letting of a contract; or
the issuance of a grant, license, or other
benefit to the extent that the information
is relevant and necessary to a decision.
j. To the Office of Personnel
Management (OPM), the Office of
Management and Budget (OMB), or the
Government Accountability Office
(GAO) when the information is required
for program evaluation purposes.
k. To an expert, consultant, or
contractor of GSA in the performance of
a Federal duty to which the information
is relevant.
l. To the National Archives and
Records Administration (NARA) for
records management purposes.
Disclosure to consumer reporting
agencies: Disclosure of system records
to consumer reporting systems is not
permitted.
POLICIES AND PRACTICES FOR STORING,
RETRIEVING, ACCESSING, RETAINING, AND
DISPOSING OF SYSTEM RECORDS:
STORAGE:
All records are stored by GSA ACES
contractors or by GSA as hard copy
documents and/or on electronic media.
VerDate Aug<31>2005
21:24 Apr 24, 2008
Jkt 214001
RETRIEVABILITY:
Records are retrievable by a personal
identifier or by other appropriate type of
designation approved by GSA and made
available to ACES participants at the
time of their application for ACES
services.
SAFEGUARDS:
System records are safeguarded in
accordance with the requirements of the
Privacy Act, the Computer Security Act,
and OMB Circular A–130, Appendices I
and III. Technical, administrative, and
personnel security measures are
implemented to ensure confidentiality
and integrity of the system data stored,
processed, and transmitted. The ACES
System Security Plan, approved by GSA
for each ACES contractor, provides for
inspections, testing, continuity of
operations, and technical certification of
security safeguards. GSA accredits and
annually re-accredits each contractor
system prior to its operation.
RETENTION AND DISPOSAL:
System records are retained and
disposed of according to GSA records
maintenance and disposition schedules
and the requirements of the National
Archives and Records Administration.
SYSTEM MANAGER AND ADDRESS:
Administrative Contracting Officer,
FEDCAC, Federal Technology Service,
General Services Administration, Room
5060, 7th and D Streets, SW.,
Washington, DC 20407.
NOTIFICATION PROCEDURE:
Inquiries from individuals should be
addressed to the system manager.
Applicants for digital signature
certificates will be notified by the GSA
ACES contractor which facilitates
individual access to the relevant Federal
agency database as follows:
a. Each applicant will be provided, on
a Government-approved form that can
be retained by the individual applicant,
the principal purposes of the ACES
program; the authority for collecting the
information; the fact that participation
is voluntary; the fact that identity and
authority information must be provided
and verified before a certificate will be
issued; the fact that the information
provided is covered by the Privacy Act
and the Computer Security Act; the
routine uses that will be made of the
information being provided; the
limitations on the uses of the
information being provided; the
procedures to be followed for requesting
access to the individual’s own records;
and the possible consequences of failing
to provide all or part of the required
information or intentionally providing
false information.
PO 00000
Frm 00061
Fmt 4703
Sfmt 4703
22381
b. Written notification in response to
an individual’s request to be advised if
the system contains a record pertaining
to him/her.
c. Written notification to an
individual when any record on the
individual is made available to any
person under compulsory legal process
when such process becomes a matter of
public record.
d. Written notification of the right to
appeal to GSA by any individual on any
dispute concerning the accuracy of his/
her record.
RECORD ACCESS PROCEDURE:
GSA ACES contractors will provide
notification of, access to, review of, or
copies of an individual’s record upon
his/her request as required by the
Privacy Act.
CONTESTING RECORD PROCEDURE:
GSA ACES contractors will amend an
individual’s record upon his/her written
request, as required by the Privacy Act
and GSA’s implementing regulations, 41
CFR part 105–64. If the ACES contractor
determines that an amendment is
inappropriate, the contractor shall
submit the request to the System
Manager for a determination by GSA
whether to grant or deny the request for
amendment and direct response to the
requester.
RECORD SOURCES CATEGORIES:
The sources for information in the
system are the individuals who apply
for digital signature certificates, GSA
ACES contractors using independent
sources to verify identities, and internal
system transactions designed to gather
and maintain data needed to manage
and evaluate the ACES program.
[FR Doc. E8–8886 Filed 4–24–08; 8:45 am]
BILLING CODE 6820–34–P
GENERAL SERVICES
ADMINISTRATION
Privacy Act of 1974; Notice of Updated
Systems of Records
General Services
Administration.
ACTION: Notice.
AGENCY:
SUMMARY: GSA reviewed its Privacy Act
systems to ensure that they are relevant,
necessary, accurate, up-to-date, covered
by the appropriate legal or regulatory
authority, and in response to OMB M–
07–16. This notice is a compilation of
updated Privacy Act system of record
notices.
DATES: Effective May 27, 2008.
FOR FURTHER INFORMATION CONTACT: Call
or e-mail the GSA Privacy Act Officer:
E:\FR\FM\25APN1.SGM
25APN1
Agencies
[Federal Register Volume 73, Number 81 (Friday, April 25, 2008)]
[Notices]
[Pages 22380-22381]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: E8-8886]
-----------------------------------------------------------------------
GENERAL SERVICES ADMINISTRATION
Privacy Act of 1974; Notice of Updated Systems of Records
AGENCY: General Services Administration.
ACTION: Notice.
-----------------------------------------------------------------------
SUMMARY: GSA reviewed its Privacy Act systems to ensure that they are
relevant, necessary, accurate, up-to-date, covered by the appropriate
legal or regulatory authority, and in response to OMB M-07-16. This
notice is a compilation of updated Privacy Act system of record
notices.
DATES: Effective May 27, 2008.
FOR FURTHER INFORMATION CONTACT: Call or e-mail the GSA Privacy Act
Officer: telephone 202-208-1317; e-mail gsa.privacyact@gsa.gov.
ADDRESSES: GSA Privacy Act Officer (CIB), General Services
Administration, 1800 F Street NW., Washington, DC 20405.
SUPPLEMENTARY INFORMATION: GSA undertook and completed an agency wide
review of its Privacy Act systems of records. As a result of the review
GSA is publishing updated Privacy Act systems of records notices.
Rather than make numerous piecemeal revisions, GSA is republishing
updated notices for one of its systems. Nothing in the revised system
notices indicates a change in authorities or practices regarding the
collection and maintenance of information. Nor do the changes impact
individuals' rights to access or amend their records in the systems of
records. The updated system notices also includes the new requirement
from OMB Memorandum M-07-16 regarding a new routine use that allows
agencies to disclose information in connection with a response and
remedial efforts in the event of a data breach.
Dated: April 16, 2008.
Cheryl M. Paige,
Director, Office ofInformation Management.
GSA/GOVT-5
SYSTEM NAME:
Access Certificates for Electronic Services (ACES).
SYSTEM LOCATION:
System records are maintained for the General Services
Administration (GSA) by contractors at various physical locations. A
complete list of locations is available from: Administrative
Contracting Officer, FEDCAC, Federal Technology Service, General
Services Administration, 7th and D Streets, SW., Room 5060, Washington,
DC 20407; telephone (202) 708-6099.
CATEGORIES OF INDIVIDUALS COVERED BY THE SYSTEM:
Individuals covered are persons who have applied for the issuance
of a digital signature certificate under the ACES program; have had
their certificates amended, renewed, replaced, suspended, revoked, or
denied; have used their certificates to electronically make contact
with, retrieve information from, or submit information to an automated
information system of a participating agency; have requested access to
ACES records under the Freedom of Information Act (FOIA) or Privacy
Act; and have corresponded with GSA or its ACES contractors concerning
ACES services.
CATEGORIES OF RECORDS IN THE SYSTEM:
The system contains information needed to establish and verify the
identity of ACES users, to maintain the system, and to establish
accountability and audit controls. System records include:
a. Applications for the issuance, amendment, renewal, replacement,
or revocation of digital signature certificates under the ACES program,
including evidence provided by applicants or proof of identity and
authority, and sources used to verify an applicant's identify and
authority.
b. Certificates issued.
c. Certificates denied, suspended, and revoked, including reasons
for denial, suspension, and revocation.
d. A list of currently valid certificates.
e. A list of currently invalid certificates.
f. A file of individuals requesting access and those granted access
to ACES information under FOIA or the Privacy Act.
g. A file of individuals requesting access and those granted access
for reasons other than FOIA or the Privacy Act.
h. A record of validation transactions attempted on digital
signature certificates issued by the system.
i. A record of validation transactions completed on digital
signature certificates issued by the system.
AUTHORITY FOR MAINTENANCE OF THE SYSTEM:
Section 5124(b) of the Clinger-Cohen Act of 1996, 40 U.S.C. 1424,
which provides authority for GSA to develop and facilitate
governmentwide electronic commerce resources and services, and the
Paperwork Reduction Act, 44 U.S.C. 3501, et. seq., which provides
authority for GSA to manage Federal information resources.
PURPOSE:
To establish and maintain an electronic system to facilitate
secure, on-line communication between Federal automated information
systems and the public, using digital signature technologies to
authenticate and verify identity.
ROUTINE USES OF THE SYSTEM RECORDS, INCLUDING CATEGORIES OF USERS AND
THEIR PURPOSES FOR USING THE SYSTEM:
Information from this system may be disclosed as a routine use:
a. To GSA ACES program contractors to compile and maintain
documentation on applicants for proofing applicants' identity and their
authority to access information system applications of participating
agencies.
b. To GSA ACES program contractors to establish and maintain
documentation on information sources for verifying applicants'
identities.
c. To Federal agencies participating in the ACES program to
determine the validity of applicants' digital signature certificates in
an on-line, near real time environment.
d. To GSA, participating Federal agencies, and ACES contractors,
for ensuring proper management, ensuring data accuracy, and evaluation
of the system.
e. To Federal, State, local or foreign agencies responsible for
investigating,
[[Page 22381]]
prosecuting, enforcing, or carrying out a statute, rule, regulation, or
order when GSA becomes aware of a violation or potential violation of
civil or criminal law or regulation.
f. To a member of Congress or to a congressional staff member in
response to a request from the person who is the subject of the record.
g. To an expert, consultant, or contractor of GSA in the
performance of a Federal duty to which the information is relevant.
h. To appropriate agencies, entities, and persons when (1) the
Agency suspects or has confirmed that the security or confidentiality
of information in the system of records has been compromised; (2) the
Agency has determined that as a result of the suspected or confirmed
compromise there is a risk of harm to economic or property interests,
identity theft or fraud, or harm to the security or integrity of this
system or other systems or programs (whether maintained by GSA or
another agency or entity) that rely upon the compromised information;
and (3) the disclosure made to such agencies, entities, and persons is
reasonably necessary to assist in connection with GSA's efforts to
respond to the suspected or confirmed compromise and prevent, minimize,
or remedy such harm.
i. To a Federal agency in connection with the hiring or retention
of an employee; the issuance of a security clearance; the reporting of
an investigation; the letting of a contract; or the issuance of a
grant, license, or other benefit to the extent that the information is
relevant and necessary to a decision.
j. To the Office of Personnel Management (OPM), the Office of
Management and Budget (OMB), or the Government Accountability Office
(GAO) when the information is required for program evaluation purposes.
k. To an expert, consultant, or contractor of GSA in the
performance of a Federal duty to which the information is relevant.
l. To the National Archives and Records Administration (NARA) for
records management purposes.
Disclosure to consumer reporting agencies: Disclosure of system
records to consumer reporting systems is not permitted.
POLICIES AND PRACTICES FOR STORING, RETRIEVING, ACCESSING, RETAINING,
AND DISPOSING OF SYSTEM RECORDS:
STORAGE:
All records are stored by GSA ACES contractors or by GSA as hard
copy documents and/or on electronic media.
RETRIEVABILITY:
Records are retrievable by a personal identifier or by other
appropriate type of designation approved by GSA and made available to
ACES participants at the time of their application for ACES services.
SAFEGUARDS:
System records are safeguarded in accordance with the requirements
of the Privacy Act, the Computer Security Act, and OMB Circular A-130,
Appendices I and III. Technical, administrative, and personnel security
measures are implemented to ensure confidentiality and integrity of the
system data stored, processed, and transmitted. The ACES System
Security Plan, approved by GSA for each ACES contractor, provides for
inspections, testing, continuity of operations, and technical
certification of security safeguards. GSA accredits and annually re-
accredits each contractor system prior to its operation.
RETENTION AND DISPOSAL:
System records are retained and disposed of according to GSA
records maintenance and disposition schedules and the requirements of
the National Archives and Records Administration.
SYSTEM MANAGER AND ADDRESS:
Administrative Contracting Officer, FEDCAC, Federal Technology
Service, General Services Administration, Room 5060, 7th and D Streets,
SW., Washington, DC 20407.
NOTIFICATION PROCEDURE:
Inquiries from individuals should be addressed to the system
manager. Applicants for digital signature certificates will be notified
by the GSA ACES contractor which facilitates individual access to the
relevant Federal agency database as follows:
a. Each applicant will be provided, on a Government-approved form
that can be retained by the individual applicant, the principal
purposes of the ACES program; the authority for collecting the
information; the fact that participation is voluntary; the fact that
identity and authority information must be provided and verified before
a certificate will be issued; the fact that the information provided is
covered by the Privacy Act and the Computer Security Act; the routine
uses that will be made of the information being provided; the
limitations on the uses of the information being provided; the
procedures to be followed for requesting access to the individual's own
records; and the possible consequences of failing to provide all or
part of the required information or intentionally providing false
information.
b. Written notification in response to an individual's request to
be advised if the system contains a record pertaining to him/her.
c. Written notification to an individual when any record on the
individual is made available to any person under compulsory legal
process when such process becomes a matter of public record.
d. Written notification of the right to appeal to GSA by any
individual on any dispute concerning the accuracy of his/her record.
RECORD ACCESS PROCEDURE:
GSA ACES contractors will provide notification of, access to,
review of, or copies of an individual's record upon his/her request as
required by the Privacy Act.
CONTESTING RECORD PROCEDURE:
GSA ACES contractors will amend an individual's record upon his/her
written request, as required by the Privacy Act and GSA's implementing
regulations, 41 CFR part 105-64. If the ACES contractor determines that
an amendment is inappropriate, the contractor shall submit the request
to the System Manager for a determination by GSA whether to grant or
deny the request for amendment and direct response to the requester.
RECORD SOURCES CATEGORIES:
The sources for information in the system are the individuals who
apply for digital signature certificates, GSA ACES contractors using
independent sources to verify identities, and internal system
transactions designed to gather and maintain data needed to manage and
evaluate the ACES program.
[FR Doc. E8-8886 Filed 4-24-08; 8:45 am]
BILLING CODE 6820-34-P