Privacy Act of 1974; Notice of Updated Systems of Records, 35690-35692 [E8-14199]
Download as PDF
35690
Federal Register / Vol. 73, No. 122 / Tuesday, June 24, 2008 / Notices
ebenthall on PRODPC60 with NOTICES
procedures that protect the
confidentiality, security, and integrity of
personal information collected from
children; and
(5) the Rule requires operators to
provide reasonable means for the parent
to review the information.
The FTC staff retains its estimate that
roughly 30 new web entrants each year
will fall within the Rule’s coverage and
that, on average, new entrants will
spend approximately 60 hours crafting a
privacy policy, designing mechanisms
to provide the required online privacy
notice and, where applicable, the direct
notice to parents.3 Accordingly, staff
estimates that complying with the
Rule’s disclosure requirements will
require approximately 1,800 hours (30
new web entrants x 60 hours per
entrant). Consistent with prior
estimates, FTC staff estimates that the
time spent on compliance would be
apportioned five to one between legal
(lawyers or similar professionals) and
technical (computer programmers)
personnel. Staff therefore estimates that
lawyers or similar professionals who
craft privacy policies will account for
1,500 of the 1,800 hours required.
Computer programmers responsible for
posting privacy policies and
implementing direct notices and
parental consent mechanisms will
account for the remaining 300 hours.
Website operators that have
previously created or adjusted their sites
to comply with the Rule will incur no
further burden associated with the Rule,
unless they opt to change their policies
and information collection in ways that
will further invoke the Rule’s
provisions. Moreover, staff believes that
existing COPPA-compliant operators
who introduce additional sites beyond
those they already have created will
incur minimal, if any, incremental PRA
burden. This is because such operators
already have been through the start-up
phase and can carry over the results of
that to the new sites they create.
(b) Reporting Requirements for Safe
Harbor Applicants: 100 hours
Operators can comply with the Rule
by meeting the terms of industry selfregulatory guidelines that the
Commission approves after notice and
3 Although staff cannot determine with any
degree of certainty the number of new entrants
potentially subject to the Rule, it believes its
estimate is reasonable. The Commission received no
comments challenging staff’s prior PRA analyses in
its prior requests for renewed clearance for the Rule
or when it most recently sought comment on the
Rule itself (70 FR 21107, 21109, April 22, 2005).
Accordingly, staff retains those estimates for the
instant PRA analysis. For the same reasons, staff
retains its prior estimate of 60 hours per new
entrant.
VerDate Aug<31>2005
12:39 Jun 23, 2008
Jkt 214001
comment.4 While the submission of
industry self-regulatory guidelines to
the agency is voluntary, the Rule
includes specific reporting requirements
that all safe harbor applicants must
provide to receive Commission
approval. Staff retains its estimate that
it would require, on average, 265 hours
per new safe harbor program applicant
to prepare and submit its safe harbor
proposal in accordance with Section
312.10(c) of the Rule. Industry sources
have confirmed that this estimate is
reasonable and advised that all of this
time would be attributable to the efforts
of lawyers. Given that several safe
harbor programs are already available to
website operators, FTC staff believes
that it is unlikely that more than one
additional safe harbor applicant will
submit a request within the next three
years of PRA clearance sought. Thus,
annualized burden attributable to this
requirement would be approximately 85
hours per year (265 hours ÷ 3 years) or,
roughly, 100 hours. Staff believes that
most of the records submitted with a
safe harbor request would be those that
these entities have kept in the ordinary
course of business, and that any
incremental effort associated with
maintaining the results of independent
assessments or other records under
Section 312.10(d)(3) also would be in
the normal course of business. In
accordance with the regulations
implementing the PRA, the burden
estimate excludes effort expended for
these activities. 5 CFR 1320.3(b)(2).
Accordingly, FTC staff estimates that
total burden per year for disclosure
requirements affecting new web entrants
and reporting requirements for safe
harbor applications would be
approximately 2,000 hours, rounded to
the nearest thousand.
Labor costs: Labor costs are derived
by applying appropriate hourly cost
figures to the burden hours described
above. Staff conservatively assumes
hourly rates of $150 and $35,
respectively, for lawyers or similar
professionals and computer
programmers.5 Based on these inputs,
4 See Section 312.10(c). Approved self-regulatory
guidelines can be found on the FTC’s website at
(https://www.ftc.gov/privacy/privacyinitiatives/
childrens_shp.html.)
5 FTC staff estimates average legal costs at $150
per hour, which is roughly midway between Bureau
of Labor Statistics (BLS) mean hourly wages shown
for attorneys (approximately $55) in the most recent
whole-year data available online (2006) and what
staff believes may more generally reflect hourly
attorney costs ($250) associated with Commission
information collection activities. The $35 estimate
for computer programmers is also conservatively
based on the most recent whole-year data available
online from the BLS (2006 National Compensation
Survey and 2006 Occupational Employment and
Wage Statistics).
PO 00000
Frm 00059
Fmt 4703
Sfmt 4703
staff further estimates that associated
annual labor costs for new entrants
would be $235,000 [(1,500 hours x $150
per hour for legal) + (300 hours x $35
per hour for computer programmers)]
and $15,000 for safe harbor applicants
(100 hours per year x $150 per hour), for
a total labor cost of $250,000.
Non-labor costs: Because websites
will already be equipped with the
computer equipment and software
necessary to comply with the Rule’s
notice requirements, the sole costs
incurred by the websites are the
aforementioned estimated labor costs.
Similarly, industry members should
already have in place the means to
retain and store the records that must be
kept under the Rule’s safe harbor
recordkeeping provisions, because they
are likely to have been keeping these
records independent of the Rule.
David C. Shonka,
Acting General Counsel.
[FR Doc. E8–14148 Filed 6–23–08: 8:45 am]
BILLING CODE 6750–01–S
GENERAL SERVICES
ADMINISTRATION
Privacy Act of 1974; Notice of Updated
Systems of Records
General Services
Administration.
ACTION: Notice.
AGENCY:
SUMMARY: GSA reviewed its Privacy Act
systems to ensure that they are relevant,
necessary, accurate, up-to-date, covered
by the appropriate legal or regulatory
authority, and compliant with OMB M–
07–16. This notice is an updated
Privacy Act system of records notice.
DATES: Effective July 24, 2008.
FOR FURTHER INFORMATION CONTACT: Call
or e-mail the GSA Privacy Act Officer:
telephone 202–208–1317; e-mail
gsa.privacyact@gsa.gov.
GSA Privacy Act Officer
(CIB), General Services Administration,
1800 F Street, NW., Washington, DC
20405.
ADDRESSES:
GSA
undertook and completed an agencywide review of its Privacy Act systems
of records. As a result of the review,
GSA is publishing an updated Privacy
Act system of records notice. The
revised system notice clarifies the
authorities and practices regarding the
collection and maintenance of
information, but does not change
individuals’ rights to access or amend
their records in the system of records.
The updated system notice also
SUPPLEMENTARY INFORMATION:
E:\FR\FM\24JNN1.SGM
24JNN1
Federal Register / Vol. 73, No. 122 / Tuesday, June 24, 2008 / Notices
includes the new requirement from
OMB Memorandum M–07–16 regarding
a new routine use that allows agencies
to disclose information in connection
with a response and remedial efforts in
the event of a data breach.
AUTHORITY FOR MAINTENANCE OF THE SYSTEM:
Dated: June 12, 2008.
Cheryl M. Paige,
Director, Office of Information Management.
PURPOSE:
GSA/CIO–1
SYSTEM NAME:
Enterprise Level Identity Verification
System (ELIVS).
SYSTEM LOCATION:
ELIVS comprises a Web based
application and data is maintained in a
secure server facility at GSA Central
Office, located at 1800 F Street, NW.,
Washington, DC 20405. Additionally,
some fingerprint data may be located in
GSA facilities where staffed fingerprint
collection stations (Live Scan system)
have been established to handle the
contractor Personal Identity Verification
(PIV) process. Contact the System
Manager for additional information.
CATEGORIES OF INDIVIDUALS COVERED BY THE
SYSTEM:
Individuals who require routine
access to agency facilities and
information technology systems,
including:
a. Federal employees.
b. Contractors.
c. Child care workers and other
temporary workers with similar access
requirements.
The system does not apply to
occasional visitors or short-term guests,
to whom GSA facilities may issue local
Facility Access Cards (FAC).
ebenthall on PRODPC60 with NOTICES
CATEGORIES OF RECORDS IN THE SYSTEM:
The system contains information
needed for issuing and maintaining
HSPD–12 credentials and also access
privilege information. Records may
include:
• Employee/contractor/other worker
full name
• Social Security Number (SSN)
• Date of birth
• Facial Image
• Fingerprints (within the Live Scan
systems)
• Organization/office of assignment
• Company/agency name
• Telephone number
• ID card issuance and expiration
dates
• ID card number
• Emergency responder designation
• Home address and work location
• Contract and supervisor
information
VerDate Aug<31>2005
12:39 Jun 23, 2008
Jkt 214001
5 U.S.C. 301, 40 U.S.C. 121, 40 U.S.C.
582, 40 U.S.C. 3101, 44 U.S.C. 3501, 44
U.S.C. 3506, 44 U.S.C. 3602, E.O. 9397,
and Homeland Security Presidential
Directive 12 (HSPD–12).
The primary purposes of the system
are:
To act as an authoritative source for
GSA identities including employees,
contractors, and other workers to verify
that all persons requiring routine access
to GSA facilities or using GSA
information resources have sufficient
background investigations and are
permitted access, to track and manage
HSPD–12 ID cards issued to persons
who have routine access to GSA
facilities and information systems, and
to provide reports of identity data for
administrative and staff offices to
efficiently track and manage contractors.
ROUTINE USES OF THE SYSTEM RECORDS,
INCLUDING CATEGORIES OF USERS AND THEIR
PURPOSE FOR USING THE SYSTEM:
System information may be accessed
and used by:
a. GSA Personnel when needed for
official business, including the Security
Office, HSPD–12 Points of Contacts, and
designated analysts and managers for
official business; PIV card requesting
officials and Human Resource Officers
to track, verify, and update identity
information of GSA personnel; and
Regional Credential Officers (RCOs) to
issue and track PIV ID cards;
b. To verify suitability of an employee
or contractor before granting access to
specific resources;
c. To disclose information to agency
staff and administrative offices who may
restructure the data for management
purposes;
d. An authoritative source of
identities for Active Directory and Lotus
Notes and other GSA systems;
e. In any legal proceeding, where
pertinent, to which GSA is a party
before a court or administrative body;
f. To authorized officials engaged in
investigating or settling a grievance,
complaint, or appeal filed by an
individual who is the subject of the
record.
g. To a Federal, state, local, foreign, or
tribal agency in connection with the
hiring or retention of an employee; the
issuance of a security clearance; the
reporting of an investigation; the letting
of a contract; or the issuance of a grant,
license, or other benefit to the extent
that the information is relevant and
necessary to a decision;
h. To the Office of Personnel
Management (OPM), the Office of
PO 00000
Frm 00060
Fmt 4703
Sfmt 4703
35691
Management and Budget (OMB), or the
Government Accountability Office
(GAO) when the information is required
for program evaluation purposes;
i. To a Member of Congress or staff on
behalf of and at the request of the
individual who is the subject of the
record;
j. To an expert, consultant, or
contractor of GSA in the performance of
a Federal duty to which the information
is relevant;
k. To the National Archives and
Records Administration (NARA) for
records management purposes;
l. To appropriate agencies, entities,
and persons when (1) the Agency
suspects or has confirmed that the
security or confidentiality of
information in the system of records has
been compromised; (2) the Agency has
determined that as a result of the
suspected or confirmed compromise
there is a risk of harm to economic or
property interests, identity theft or
fraud, or harm to the security or
integrity of this system or other systems
or programs (whether maintained by
GSA or another agency or entity) that
rely upon the compromised
information; and (3) the disclosure
made to such agencies, entities, and
persons is reasonably necessary to assist
in connection with GSA’s efforts to
respond to the suspected or confirmed
compromise and prevent, minimize, or
remedy such harm.
POLICIES AND PRACTICES FOR STORING,
RETRIEVING, ACCESSING, RETAINING, AND
DISPOSING RECORDS IN THE SYSTEM:
STORAGE:
Computer records are stored on a
secure server and accessed over the web
using encryption software. Paper
records, when created, are kept in file
folders and cabinets in secure rooms.
The Live Scan systems are kept in
secure locations with limited access to
authorized personnel only.
RETRIEVABILITY:
Records are retrievable by a
combination of first name and last
name. Group records are retrieved by
organizational code.
SAFEGUARDS:
Computer records are protected by a
password system. Paper records are
stored in locked metal containers or in
secured rooms when not in use.
Information is released to authorized
officials based on their need to know.
RETENTION AND DISPOSAL:
Records are disposed of as specified
in the handbook, GSA Records
Maintenance and Disposition System
(CIO P 1820.1).
E:\FR\FM\24JNN1.SGM
24JNN1
35692
Federal Register / Vol. 73, No. 122 / Tuesday, June 24, 2008 / Notices
SYSTEM MANAGER AND ADDRESS:
Program Manager, HSPD–12 Program
Management Office, General Services
Administration, 1800 F Street, NW.,
Room 2208 Washington, DC 20405.
NOTIFICATION PROCEDURE:
An individual can determine if this
system contains a record pertaining to
him/her by sending a request in writing,
signed, to the System Manager at the
above address. When requesting
notification of or access to records
covered by this notice, an individual
should provide his/her full name, date
of birth, region/office, and work
location. An individual requesting
notification of records in person must
provide identity documents sufficient to
satisfy the custodian of the records that
the requester is entitled to access, such
as a government-issued photo ID.
CONTESTING RECORD PROCEDURES:
Rules for contesting the content of a
record and appealing a decision are
contained in 41 CFR 105–64.
RECORD SOURCES CATEGORIES:
The sources for information in the
system are the individuals about whom
the records are maintained, the
supervisors of those individuals,
existing GSA systems, sponsoring
agency, former sponsoring agency, other
Federal agencies, contract employer,
former employer, and the U.S. Office of
Personnel Management (OPM).
[FR Doc. E8–14199 Filed 6–23–08; 8:45 am]
BILLING CODE 6820–34–P
DEPARTMENT OF HEALTH AND
HUMAN SERVICES
Agency for Healthcare Research and
Quality
Agency Information Collection
Activities: Proposed Collection;
Comment Request
Agency for Healthcare Research
and Quality, HHS.
ACTION: Notice.
AGENCY:
This notice announces the
intention of the Agency for Healthcare
Research and Quality (AHRQ) to request
that the Office of Management and
Budget (OMB) approve the proposed
information collection project:
‘‘Assessing the Impact of the Patient
Safety Improvement Corps (PSIC)
Training Program.’’ In accordance with
ebenthall on PRODPC60 with NOTICES
SUMMARY:
VerDate Aug<31>2005
12:39 Jun 23, 2008
Jkt 214001
the Paperwork Reduction Act of 1995,
44 U.S.C. 3506(c)(2)(A), AHRQ invites
the public to comment on this proposed
information collection.
This proposed information collection
was previously published in the Federal
Register on April 16th, 2008 and
allowed 60 days for public comment. No
comments were received. The purpose
of this notice is to allow an additional
30 days for public comment.
DATES: Comments on this notice must be
received by July 24, 2008.
ADDRESSES: Written comments should
be submitted to: AHRQTs OMB Desk
Officer by fax at (202) 395–6974
(attention: AHRQ’s desk officer) or by email at OIRA_submission@omb.eop.gov
(attention: AHRQ’s desk officer).
Copies of the proposed collection
plans, data collection instruments, and
specific details on the estimated burden
can be obtained from the AHRQ Reports
Clearance Officer.
FOR FURTHER INFORMATION CONTACT:
Doris Lefkowitz, AHRQ Reports
Clearance Officer, (301) 427–1477, or by
e-mail at doris.letkowitz(2iahrg.hhs.gov.
SUPPLEMENTARY INFORMATION:
Proposed Project
Assessing the Impact of the Patient
Safety Improvement Corps (PSIC)
Training Program
AHRQ proposes to assess the impact
of the PSIC training program. This threeweek program was designed and
implemented by AHRQ and the
Veteran’s Administration’s (VA)
National Center for Patient Safety
(NCPS) to improve patient safety by
training participants in various patient
safety concepts, tools, information, and
techniques. The PSIC program
represents a new approach to training
for AHRQ by focusing on disseminating
patient safety information and building
skill sets to ultimately foster a national
network of individuals who support,
promote, and speak a common language
of patient safety. Participants have
included representatives from State
health departments, hospitals and
health systems, Quality Improvement
Organizations, and a very small number
of other types of organizations. AHRQ
will use an independent contractor to
conduct the assessment of the PSIC
training program. The goal of the
assessment is to determine the extent to
which the PSIC concepts, tools,
information, and techniques have been
used on the job by training participants
PO 00000
Frm 00061
Fmt 4703
Sfmt 4703
and successfully disseminated within
and beyond the participating
organizations, local areas, regions, and
states. AHRQ is assessing the PSIC
program pursuant to its authority under
42 U.S.C. 299(b) and 42 U.S.C. 299a(a)
to evaluate its strategies for improving
health care quality.
The assessment involves two Webbased questionnaires to examine posttraining activities and patient safety
outcomes of the training from multiple
perspectives. One questionnaire is
directed to training participants while
the other is directed to leaders of the
organizations from which the training
participants were selected.
Questionnaires will focus on the
following topics: (1) Post-PSIC activities
(including how PSIC material has been
utilized in their home organizations,
types of patient safety activities
conducted post-PSIC, and number of
people trained in some or all aspects of
PSIC since their attendance); (2) barriers
to and facilitators of the use of PSIC in
the workplace; and (3) perceived
outcomes of PSIC participation (e.g.,
improved patient safety; improved
patient safety processes, standards, or
policies; improved investigative and
analytical processes and selection and
implementation of patient safety
interventions; improved patient safety
culture; improved communications).
Method of Collection
All training participants and
organizational leaders from
participating organizations will be
invited to respond to their
corresponding Web-based
questionnaire. Invitations will be sent
via e-mail, using contact information
previously collected by AHRQ and
NCPS. Standard non response follow-up
techniques, such as two reminder emails that include the link to the
questionnaire, will be used. Individuals
and organizations will be assured of the
privacy of their responses.
Estimated Annual Respondent Burden
Exhibit 1 shows the estimated
annualized burden hours for the
respondent’s time to participate in the
study. The training participant
questionnaire is estimated to require 30
minutes to complete and the
organizational leader questionnaire is
estimated to require 15 minutes to
complete, resulting in a total burden of
169 hours.
E:\FR\FM\24JNN1.SGM
24JNN1
Agencies
[Federal Register Volume 73, Number 122 (Tuesday, June 24, 2008)]
[Notices]
[Pages 35690-35692]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: E8-14199]
=======================================================================
-----------------------------------------------------------------------
GENERAL SERVICES ADMINISTRATION
Privacy Act of 1974; Notice of Updated Systems of Records
AGENCY: General Services Administration.
ACTION: Notice.
-----------------------------------------------------------------------
SUMMARY: GSA reviewed its Privacy Act systems to ensure that they are
relevant, necessary, accurate, up-to-date, covered by the appropriate
legal or regulatory authority, and compliant with OMB M-07-16. This
notice is an updated Privacy Act system of records notice.
DATES: Effective July 24, 2008.
FOR FURTHER INFORMATION CONTACT: Call or e-mail the GSA Privacy Act
Officer: telephone 202-208-1317; e-mail gsa.privacyact@gsa.gov.
ADDRESSES: GSA Privacy Act Officer (CIB), General Services
Administration, 1800 F Street, NW., Washington, DC 20405.
SUPPLEMENTARY INFORMATION: GSA undertook and completed an agency-wide
review of its Privacy Act systems of records. As a result of the
review, GSA is publishing an updated Privacy Act system of records
notice. The revised system notice clarifies the authorities and
practices regarding the collection and maintenance of information, but
does not change individuals' rights to access or amend their records in
the system of records. The updated system notice also
[[Page 35691]]
includes the new requirement from OMB Memorandum M-07-16 regarding a
new routine use that allows agencies to disclose information in
connection with a response and remedial efforts in the event of a data
breach.
Dated: June 12, 2008.
Cheryl M. Paige,
Director, Office of Information Management.
GSA/CIO-1
SYSTEM NAME:
Enterprise Level Identity Verification System (ELIVS).
SYSTEM LOCATION:
ELIVS comprises a Web based application and data is maintained in a
secure server facility at GSA Central Office, located at 1800 F Street,
NW., Washington, DC 20405. Additionally, some fingerprint data may be
located in GSA facilities where staffed fingerprint collection stations
(Live Scan system) have been established to handle the contractor
Personal Identity Verification (PIV) process. Contact the System
Manager for additional information.
CATEGORIES OF INDIVIDUALS COVERED BY THE SYSTEM:
Individuals who require routine access to agency facilities and
information technology systems, including:
a. Federal employees.
b. Contractors.
c. Child care workers and other temporary workers with similar
access requirements.
The system does not apply to occasional visitors or short-term
guests, to whom GSA facilities may issue local Facility Access Cards
(FAC).
CATEGORIES OF RECORDS IN THE SYSTEM:
The system contains information needed for issuing and maintaining
HSPD-12 credentials and also access privilege information. Records may
include:
Employee/contractor/other worker full name
Social Security Number (SSN)
Date of birth
Facial Image
Fingerprints (within the Live Scan systems)
Organization/office of assignment
Company/agency name
Telephone number
ID card issuance and expiration dates
ID card number
Emergency responder designation
Home address and work location
Contract and supervisor information
AUTHORITY FOR MAINTENANCE OF THE SYSTEM:
5 U.S.C. 301, 40 U.S.C. 121, 40 U.S.C. 582, 40 U.S.C. 3101, 44
U.S.C. 3501, 44 U.S.C. 3506, 44 U.S.C. 3602, E.O. 9397, and Homeland
Security Presidential Directive 12 (HSPD-12).
PURPOSE:
The primary purposes of the system are:
To act as an authoritative source for GSA identities including
employees, contractors, and other workers to verify that all persons
requiring routine access to GSA facilities or using GSA information
resources have sufficient background investigations and are permitted
access, to track and manage HSPD-12 ID cards issued to persons who have
routine access to GSA facilities and information systems, and to
provide reports of identity data for administrative and staff offices
to efficiently track and manage contractors.
ROUTINE USES OF THE SYSTEM RECORDS, INCLUDING CATEGORIES OF USERS AND
THEIR PURPOSE FOR USING THE SYSTEM:
System information may be accessed and used by:
a. GSA Personnel when needed for official business, including the
Security Office, HSPD-12 Points of Contacts, and designated analysts
and managers for official business; PIV card requesting officials and
Human Resource Officers to track, verify, and update identity
information of GSA personnel; and Regional Credential Officers (RCOs)
to issue and track PIV ID cards;
b. To verify suitability of an employee or contractor before
granting access to specific resources;
c. To disclose information to agency staff and administrative
offices who may restructure the data for management purposes;
d. An authoritative source of identities for Active Directory and
Lotus Notes and other GSA systems;
e. In any legal proceeding, where pertinent, to which GSA is a
party before a court or administrative body;
f. To authorized officials engaged in investigating or settling a
grievance, complaint, or appeal filed by an individual who is the
subject of the record.
g. To a Federal, state, local, foreign, or tribal agency in
connection with the hiring or retention of an employee; the issuance of
a security clearance; the reporting of an investigation; the letting of
a contract; or the issuance of a grant, license, or other benefit to
the extent that the information is relevant and necessary to a
decision;
h. To the Office of Personnel Management (OPM), the Office of
Management and Budget (OMB), or the Government Accountability Office
(GAO) when the information is required for program evaluation purposes;
i. To a Member of Congress or staff on behalf of and at the request
of the individual who is the subject of the record;
j. To an expert, consultant, or contractor of GSA in the
performance of a Federal duty to which the information is relevant;
k. To the National Archives and Records Administration (NARA) for
records management purposes;
l. To appropriate agencies, entities, and persons when (1) the
Agency suspects or has confirmed that the security or confidentiality
of information in the system of records has been compromised; (2) the
Agency has determined that as a result of the suspected or confirmed
compromise there is a risk of harm to economic or property interests,
identity theft or fraud, or harm to the security or integrity of this
system or other systems or programs (whether maintained by GSA or
another agency or entity) that rely upon the compromised information;
and (3) the disclosure made to such agencies, entities, and persons is
reasonably necessary to assist in connection with GSA's efforts to
respond to the suspected or confirmed compromise and prevent, minimize,
or remedy such harm.
POLICIES AND PRACTICES FOR STORING, RETRIEVING, ACCESSING, RETAINING,
AND DISPOSING RECORDS IN THE SYSTEM:
STORAGE:
Computer records are stored on a secure server and accessed over
the web using encryption software. Paper records, when created, are
kept in file folders and cabinets in secure rooms. The Live Scan
systems are kept in secure locations with limited access to authorized
personnel only.
RETRIEVABILITY:
Records are retrievable by a combination of first name and last
name. Group records are retrieved by organizational code.
SAFEGUARDS:
Computer records are protected by a password system. Paper records
are stored in locked metal containers or in secured rooms when not in
use. Information is released to authorized officials based on their
need to know.
RETENTION AND DISPOSAL:
Records are disposed of as specified in the handbook, GSA Records
Maintenance and Disposition System (CIO P 1820.1).
[[Page 35692]]
SYSTEM MANAGER AND ADDRESS:
Program Manager, HSPD-12 Program Management Office, General
Services Administration, 1800 F Street, NW., Room 2208 Washington, DC
20405.
NOTIFICATION PROCEDURE:
An individual can determine if this system contains a record
pertaining to him/her by sending a request in writing, signed, to the
System Manager at the above address. When requesting notification of or
access to records covered by this notice, an individual should provide
his/her full name, date of birth, region/office, and work location. An
individual requesting notification of records in person must provide
identity documents sufficient to satisfy the custodian of the records
that the requester is entitled to access, such as a government-issued
photo ID.
CONTESTING RECORD PROCEDURES:
Rules for contesting the content of a record and appealing a
decision are contained in 41 CFR 105-64.
RECORD SOURCES CATEGORIES:
The sources for information in the system are the individuals about
whom the records are maintained, the supervisors of those individuals,
existing GSA systems, sponsoring agency, former sponsoring agency,
other Federal agencies, contract employer, former employer, and the
U.S. Office of Personnel Management (OPM).
[FR Doc. E8-14199 Filed 6-23-08; 8:45 am]
BILLING CODE 6820-34-P