Privacy Act of 1974; Report of a New System of Records, 47812-47817 [2010-19536]
Download as PDF
47812
Federal Register / Vol. 75, No. 152 / Monday, August 9, 2010 / Notices
TRANSACTION GRANTED EARLY TERMINATION—Continued
ET date
Trans No.
20100881
20100882
21–JUL–10 ..................................................................................
20100886
20100892
22–JUL–10 ..................................................................................
20100856
20100863
20100878
20100880
20100891
20100896
23–JUL–10 ..................................................................................
20100868
20100895
20100899
20100903
20100906
20100908
20100916
20100918
FOR FURTHER INFORMATION CONTACT:
Sandra M. Peay, Contact Representative,
sroberts on DSKD5P82C1PROD with NOTICES
Or
G
G
G
G
G
G
G
G
G
G
G
G
G
G
G
G
Y
Y
Y
G
G
G
G
G
G
G
G
G
G
G
G
G
G
G
G
G
G
G
G
G
G
G
G
G
G
G
G
G
G
G
G
G
G
G
G
By Direction of the Commission.
Donald S. Clark,
Secretary.
[FR Doc. 2010–19361 Filed 8–6–10; 8:45 am]
Renee Chapman, Contact
Representative.
Federal Trade Commission, Premerger
Notification Office, Bureau of
Competition, Room H–303,
Washington, DC 20580, (202) 326–
3100.
VerDate Mar<15>2010
ET req
status
17:01 Aug 06, 2010
Jkt 220001
BILLING CODE 6750–01–M
PO 00000
Party name
Greenpium, Inc.
POSCO.
Daewoo International Corporation.
Daewoo International Corporation.
Sanofi-Aventis.
Metabolex, Inc.
Metabolex, Inc.
Wayzata Opportunities Fund, LLC.
Entegra Power Group LLC.
Gila River Power, L.P.
Avon Products, Inc.
Gerald A. Kelly, Jr. and Bonnie C. Kelly.
Silpada Designs, Inc.
Marfrig Alimentos S.A.
LGB Keystone LLC.
Keystone Foods Intermediate LLC.
Ocwen Financial Corporation.
Barclays PLC.
BCRE.
Biovail Corporation.
Valeant Pharmaceuticals International.
Valeant Pharmaceuticals International.
GTCR Fund IX/A, L.P.
UCB S.A.
UCB, Inc.
Communications Infrastructure Investments, LLC.
American Fiber Systems Holding Corp.
American Fiber Systems Holding Corp.
Roper Industries, Inc.
ITN Holdings, LLC.
iTradeNetwork, Inc.
Anchorage Capital Partners Offshore, Limited.
Hampton Roads Bankshares, Inc.
Hampton Roads Bankshares, Inc.
AIF VII Euro Holdings, L.P.
Carib Holdings, Inc.
Carib Holdings, Inc.
Crown Castle International Corp.
NewPath Networks, Inc.
NewPath Networks, Inc.
PPL Corporation.
E. ON AG.
E. ON U.S. LLC.
JSC Atomredmetzoloto.
Uranium One, Inc.
Uranium One, Inc.
ZM Capital, L.P.
Alloy, Inc.
Alloy, Inc.
DCP Midstream Partners, L.P.
UGI Corporation.
Atlantic Energy, Inc.
Bank of America Corporation.
Sentinel Capital Partners Ill, L.P.
Strategic Partners Holdings, Inc.
DEPARTMENT OF HEALTH AND
HUMAN SERVICES
Office of Security and Strategic
Information
Privacy Act of 1974; Report of a New
System of Records
Office of the Assistant
Secretary for Administration and
Management.
AGENCY:
Frm 00058
Fmt 4703
Sfmt 4703
E:\FR\FM\09AUN1.SGM
09AUN1
Federal Register / Vol. 75, No. 152 / Monday, August 9, 2010 / Notices
Notice of a New Privacy Act
System of Records.
ACTION:
In accordance with the
requirements of the Privacy Act of 1974,
the Department of Health and Human
Services is establishing a new system of
records entitled, ‘‘Facility and Resource
Access Control Records,’’ System No.
09–90–0777. This notice implements in
part Homeland Security Presidential
Directive 12 (HSPD–12), ‘‘Policy for a
Common Identification Standard for
Federal Employees and Contractors’’ of
August 27, 2004. HSPD–12 requires all
employees, contractors, and others who
will be granted regular access to federal
facilities for more than six months to
undergo a background investigation to
determine suitability and to be issued a
Personal Identity Verification (PIV) Card
(i.e. an identification badge). The
purpose of the program is to enhance
access controls to federal facilities to
improve security. The badge stores the
individual’s name, employing
organization, the badge issuer, the badge
serial number, the expiration date, a
picture of the badge holder, two
fingerprints, and four encryption keys
that may be used by the PIV card holder,
when properly activated, in association
with federal information technology
resources. The Facility and Resource
Access Control Records comprise
information about the issuance of
Personal Identity Verification (PIV)
cards, PIV card holders (e.g. employees,
contractors), other individuals who
require regular access to HHS facilities
or resources, and the use of PIV cards
to access facilities or resources. The
Facility and Resource Access Control
Records also include information about
occasional visitors and short-term guests
who do not carry PIV cards but to whom
HHS will issue temporary credentials.
DATES: Effective Date: The new system
of records will be effective on the date
of publication of this notice, with the
exception of the routine uses, which
will become effective on September 8,
2010. We may defer implementation of
this system or one or more of the routine
use statements listed below if we
receive comments that persuade us to
do so.
DATES: Comments are due by September
8, 2010.
ADDRESSES: Address comments to HHS
Privacy Act Officer, Mary E. Switzer
Building, Department of Health and
Human Services, 330 ‘‘C’’ Street, SW.,
Washington, DC 20201, or via electronic
mail to HSPD12-privacy at hhs.gov.
Comments will be available for public
viewing in the public reading room
located at the same address, or on our
sroberts on DSKD5P82C1PROD with NOTICES
SUMMARY:
VerDate Mar<15>2010
17:01 Aug 06, 2010
Jkt 220001
Web site at https://www.hhs.gov. To
review comments in person, please call
the Division of Freedom of Information
and Privacy at 202–690–7453 for an
appointment.
FOR FURTHER INFORMATION CONTACT: Ms.
Maya A. Bernstein, Office of the
Assistant Secretary for Planning and
Evaluation, 200 Independence Avenue,
SW., Room 434E, Washington, DC
20201, via e-mail at
maya.bernstein@hhs.gov, or via
telephone at 202/690–7100.
SUPPLEMENTARY INFORMATION: The
Facility and Resource Access Control
Records enhance HHS’ security and
permit the Department to comply with
Homeland Security Presidential
Directive 12 (HSPD–12), ‘‘Policy for a
Common Identification Standard for
Federal Employees and Contractors.’’
This Presidential mandate requires all
government employees, contractors, and
certain other individuals to use new
identification badges, known as
Personal Identity Verification (PIV)
cards, as their singular form of
identification when accessing
government buildings, facilities, or
information technology systems. The
PIV card will enhance security, increase
government efficiency, reduce identity
fraud, and protect personal privacy.
Before obtaining a PIV card, each
employee or contractor must undergo a
standardized security credentialing
process, including background
investigations, to ensure safety of HHS
facilities and the people who work in
them. The PIV card system places
modern card readers at the entrances of
HHS facilities that allow
interoperability with all federal agencies
and ensure that entry of employees,
contractors, and other regular visitors is
strictly authorized. Leveraging cuttingedge technologies such as fingerprint
recognition and single sign-on
capabilities, this technology will reduce
identity fraud and ensure only
authorized users can access essential
information. Finally, by protecting
employees, facilities, and information,
the PIV card guards the government
resources that provide critical services
to the American people.
The PIV card will store the holder’s
name, employing organization, the
badge issuer, the badge serial number,
the expiration date, a picture of the
badge holder, two fingerprints, and
encryption keys that may be activated
for access to information technology
resources, if needed. It will not store
other identifying information such as
social security number or birth date. An
associated database will store similar
information in order to verify that
PO 00000
Frm 00059
Fmt 4703
Sfmt 4703
47813
individuals entering federal buildings or
using other federal resources, such as
information technology (IT) systems, are
properly authorized for that access. In
addition, the database will be used to
verify the ability of other agencies’ PIV
card holders to enter HHS facilities or
use HHS resources.
Although HHS will not issue PIV
cards to occasional visitors, information
about occasional visitors will be
maintained as part of the Facility and
Resource Access Control Records. Some
of these visitors may be required to
undergo brief criminal history checks,
depending on the reason for their visit
and how often they enter our facilities
or use our (IT) systems. The Facility and
Resource Access Control Records
includes that information.
Routine Uses
In addition to the collection, use, and
disclosure of information described in
the statute itself, the Privacy Act
permits HHS to establish disclosures to
non-HHS entities that are not already
identified by statute, and do not require
the individual record subject’s consent,
by using an administrative process.
These disclosures are known as ‘‘routine
uses,’’ and are permitted to be
established if they are ‘‘compatible with
the purpose’’ for which the information
was collected, and if the agency
publishes them in the Federal Register
for 30 days in advance. Both identifiable
and non-identifiable data may be
disclosed under a routine use. This
notice includes routine uses for the new
system, and they are described below.
Most of the routine uses fall into
standard categories that are common to
most systems of records across the
government. These include (1)
disclosure to the Department of Justice
(DOJ) when DOJ represents HHS, our
employees, or the government in
litigation, and they need to have access
to the records to perform that function.
If such a case goes to court, another
routine use (2) permits the records to be
disclosed in evidence before a federal
court or appropriate adjudicative body.
There is a disclosure (3) permitted when
a record in this system of records or in
combination with other records
indicates a violation of law — we turn
them over to the appropriate law
enforcement entity in order to maintain
the integrity of the program and ensure
trust in the system. Another routine use
(4) permits disclosure for intelligence
and national security purposes,
especially since the system manages
information about persons that have
access to federal facilities and federal
information technology systems that has
E:\FR\FM\09AUN1.SGM
09AUN1
sroberts on DSKD5P82C1PROD with NOTICES
47814
Federal Register / Vol. 75, No. 152 / Monday, August 9, 2010 / Notices
been recognized by the President as a
homeland security issue.
The routine use disclosure to an
individual Member of Congress (5)
permits the Department to cooperate
with a Member of Congress seeking
information on behalf of a constituent
(as opposed to the Committees of
jurisdiction performing oversight) with
a matter that involves these records. If
the request is in writing, and we obtain
a copy of the request, we will assume
the constituent’s consent for the
Member to obtain records on a
constituent’s behalf even if a formal
authorization is not included, so that
the Department and the Member can
better serve our citizens. However, the
Member would get no more access to
the record than that to which the
constituent is entitled.
The sixth routine use (6) permits the
National Archives and Records
Administration to carry out records
management functions.
Where HHS engages a contractor to
carry out a function related to this
system of records, routine use (7)
permits disclosure to those individuals
who require access to the records in
order to perform the contracted work,
and we will require the contractor to
comply with the Privacy Act. Another
routine use (8) permits disclosure to
contractors or other agencies for the
purpose of assisting the Department in
responding to a suspected or confirmed
data breach.
When an individual submits an
application for a background
investigation, the individual normally
signs an authorization permitting
records to be obtained by the
investigator from almost any source.
Occasionally, after an individual has
moved to another job or contract, if
negative information should come to
light relevant to another entity’s
decision about the suitability of the
individual, a routine use (9) allows HHS
to notify the other entity merely that we
have relevant information. It is expected
that the other entity, if interested in
pursuing the matter, would present a
written authorization on which HHS
could rely to disclose more detailed
records. However, the disclosed
information will be limited to that
which is reliable enough for such a
referral.
Finally, one routine use is particular
to the PIV card system and allows the
program to function as it is intended.
HSPD–12 directs that, eventually, all
PIV card holders should, in most cases,
be able to visit other federal facilities
and, if appropriate, use other agencies’
computer resources, by presenting the
PIV card. This system of records also
VerDate Mar<15>2010
17:01 Aug 06, 2010
Jkt 220001
describes information about visitors to
HHS who have a PIV card from another
agency. Therefore, this system of
records also comprises information
about those visitors, their entry and exit
times, and summary information about
them. A routine use (10) permits HHS
to notify another federal agency if a PIV
card is expired or no longer valid.
Safeguards
HHS has safeguards in place for
authorized users and monitors such
users to ensure against excessive or
unauthorized use. Personnel having
access to the system have been trained
in the Privacy Act and information
security requirements. Employees who
maintain records in this system are
instructed not to release data until the
intended recipient agrees to implement
appropriate management, operational
and technical safeguards sufficient to
protect the confidentiality, integrity and
availability of the information and
information systems and to prevent
unauthorized access.
This system will conform to all
applicable federal laws and regulations
and federal and HHS policies and
standards as they relate to information
security and data privacy. These laws
and regulations may apply but are not
limited to: the Privacy Act of 1974; the
Federal Information Security
Management Act of 2002; the Computer
Fraud and Abuse Act of 1986; the
Health Insurance Portability and
Accountability Act of 1996; the E–
Government Act of 2002, and the
Clinger-Cohen Act of 1996 Circular A–
130, Management of Federal Resources,
Appendix III, Security of Federal
Automated Information Resources also
applies. Federal, and HHS policies and
standards include but are not limited to:
all pertinent National Institute of
Standards and Technology publications
and the HHS Information Systems
Program Handbook.
Dated: July 26, 2010.
RADM Arthur J. Lawrence,
Director, Office of Security and Strategic
Information.
SYSTEM NO. 09–90–0777
SYSTEM NAME:
‘‘Facility and Resource Access Control
Records’’.
SECURITY CLASSIFICATION:
Most identity records are not
classified. However, in some cases,
records of certain individuals, or
portions of some records, may be
classified in the interest of national
security.
PO 00000
Frm 00060
Fmt 4703
Sfmt 4703
SYSTEM LOCATION:
Data covered by this system are
maintained at the following locations:
Department of Health and Human
Services (HHS), Office of the Secretary,
200 Independence Avenue, SW.,
Washington, DC 20201; HHS Operating
Divisions and regional offices around
the country; Qwest Datacenter in
Sterling, Virginia; and the Qwest
CyberCenter in Highlands Ranch,
Colorado. Some data covered by this
system will be accessed at HHS
locations, both federal buildings and
federally-leased space, and at the
physical security office(s) or computer
security offices of those locations.
CATEGORIES OF INDIVIDUALS COVERED BY THE
SYSTEM:
(1) Individuals who require or are
under consideration to obtain regular,
ongoing access to HHS facilities,
information technology systems, or
information classified in the interest of
national security, such as applicants for
employment or contracts with HHS,
federal employees, tribal members,
contractors, students, interns,
volunteers, affiliates such as individuals
authorized to perform or use services
provided in HHS facilities (e.g., HEW
Credit Union, fitness center, etc.) and
individuals formerly in any of these
positions. (2) PIV card holders from
other agencies who visit HHS facilities
or use HHS computer systems. (3)
Occasional visitors or short-term
employees or guests who do not carry
PIV cards and do not require certificates
for using encryption with a Public Key
Infrastructure (PKI), to whom HHS will
issue temporary identification and low
assurance credentials.
CATEGORIES OF RECORDS IN THE SYSTEM:
(1) Records maintained on individuals
issued credentials by HHS include the
following: Full name, Social Security
number; date and place of birth;
citizenship; signature; image
(photograph); fingerprints; hair color;
eye color; height; weight; sex; race;
scars, marks, or tattoos; organization/
office of assignment, location and
contact information; PIV card issue and
expiration dates; personal identification
number (PIN); PIV request form; PIV
sponsor, enrollment, registrar and
issuance information; PIV card serial
number; emergency responder
designation; foreign national designator;
contractor designator; information
derived from documents used to verify
identity such as document title, issuing
authority, or expiration date; position
sensitivity; level of national security
clearance and expiration date; computer
system user name; user access and
E:\FR\FM\09AUN1.SGM
09AUN1
Federal Register / Vol. 75, No. 152 / Monday, August 9, 2010 / Notices
permission rights; authentication
certificates; digital signature
information; employment category;
position title; dates, times, and locations
of entries and exits.
(2) HHS maintains the following
categories of records about PIV card
holders from other agencies entering
HHS facilities or using HHS systems:
Name, PIV card serial number; dates,
times, and locations of entries and exits;
organization name; level of national
security clearance and expiration date;
digital signature information; computer
networks, applications, and data
accessed.
(3) HHS maintains the following
categories of records about occasional
visitors and short term guests: name,
photograph, date and time of entry and
exit, facility to which admitted, and
name of person visiting.
AUTHORITY FOR MAINTENANCE OF THE SYSTEM:
5 U.S.C. 301; Information Technology
Management Reform Act of 1996 (Pub.
L. 104–106, sec. 5113); Electronic
Government Act (Pub. L. 104–347, sec.
203); Paperwork Reduction Act of 1995
(44 U.S.C. ch. 35); Government
Paperwork Elimination Act (Pub. L.
105–277, sec. 1701, 44 U.S.C. 3504);
Homeland Security Presidential
Directive (HSPD) 12, Policy for a
Common Identification Standard for
Federal Employees and Contractors,
Aug. 27, 2004; Federal Property and
Administrative Act of 1949, as
amended.
PURPOSE(S) OF THE SYSTEM:
The primary purposes of the system of
records are to (1) Ensure the safety and
security of HHS facilities, systems, or
information, and our occupants and
users; (2) to verify that all persons
entering federal facilities, using federal
information resources, or accessing
classified information are authorized to
do so; and (3) to track and control PIV
cards and other identity credentials
issued to persons entering and exiting
the facilities, using systems, or
accessing classified information.
sroberts on DSKD5P82C1PROD with NOTICES
ROUTINE USES OF RECORDS MAINTAINED IN THE
SYSTEM, INCLUDING CATEGORIES OR USERS AND
THE PURPOSES OF SUCH USES:
Information about covered
individuals may be disclosed without
consent as permitted by the Privacy Act
of 1974, 5 U.S.C. 552a(b), and:
(1) To the Department of Justice
when: (a) The agency or any component
VerDate Mar<15>2010
17:01 Aug 06, 2010
Jkt 220001
thereof; or (b) any employee of the
agency in his or her official capacity; (c)
any employee of the agency in his or her
individual capacity where agency or the
Department of Justice has agreed to
represent the employee; or (d) the
United States government, is a party to
litigation or has an interest in such
litigation, and by careful review, the
agency determines that the records are
both relevant and necessary to the
litigation and the use of such records by
DOJ is therefore deemed by the agency
to be for a purpose compatible with the
purpose for which the agency collected
the records.
(2) To a court or adjudicative body in
a proceeding when: (a) The agency or
any component thereof; (b) any
employee of the agency in his or her
official capacity; (c) any employee of the
agency in his or her individual capacity
where agency or the Department of
Justice has agreed to represent the
employee; or (d) the United States
government, is a party to litigation or
has an interest in such litigation, and by
careful review, the agency determines
that the records are both relevant and
necessary to the litigation and the use of
such records is therefore deemed by the
agency to be for a purpose that is
compatible with the purpose for which
the agency collected the records.
(3) Except as noted on Forms SF 85,
85–P, and 86, when a record on its face,
or in conjunction with other records,
indicates a violation or potential
violation of law, whether civil, criminal,
or regulatory in nature, and whether
arising by general statute or particular
program statute, or by regulation, rule,
or order issued pursuant thereto,
disclosure may be made to the
appropriate public authority, whether
federal, foreign, state, local, or tribal, or
otherwise, responsible for enforcing,
investigating or prosecuting such
violation or charged with enforcing or
implementing the statute, or rule,
regulation, or order issued pursuant
thereto, if the information disclosed is
relevant to any enforcement, regulatory,
investigative or prosecutorial
responsibility of the receiving entity.
(4) To a federal, state, or local agency,
or other appropriate entities or
individuals, or through established
liaison channels to selected foreign
governments, in order to enable an
intelligence agency to carry out its
responsibilities under the National
Security Act of 1947 as amended, the
PO 00000
Frm 00061
Fmt 4703
Sfmt 4703
47815
CIA Act of 1949 as amended, Executive
Order 12333 or any successor order,
applicable national security directives,
or classified implementing procedures
approved by the Attorney General and
promulgated pursuant to such statutes,
orders or directives.
(5) To a Member of Congress or to a
Congressional staff member in response
to an inquiry of the Congressional office
made at the written request of the
constituent about whom the record is
maintained.
(6) To the National Archives and
Records Administration or to the
General Services Administration for
records management inspections
conducted under 44 U.S.C. 2904 and
2906.
(7) To agency contractors who have
been engaged to assist the agency in the
performance of a contract service, grant,
cooperative agreement, or other activity
related to this system of records and
who need to have access to the records
in order to perform the activity.
Recipients shall be required to comply
with the requirements of the Privacy Act
of 1974, as amended, 5 U.S.C. 552a.
(8) To appropriate federal agencies
and Department contractors that have a
need to know the information for the
purpose of assisting the Department’s
efforts to respond to a suspected or
confirmed breach of the security or
confidentiality of information
maintained in this system of records,
and the information disclosed is
relevant and necessary for that
assistance.
(9) To a federal, state, local, foreign,
or tribal or other public authority the
fact that this system of records contains
information relevant to the retention of
an employee, the retention of a security
clearance, the letting of a contract, or
the issuance or retention of a license,
grant, or other benefit. The other agency
or licensing organization may then make
a request supported by the written
consent of the individual for the entire
record if it so chooses. No disclosure
will be made unless the information has
been determined to be sufficiently
reliable to support a referral to another
office within the agency or to another
federal agency for criminal, civil,
administrative personnel or regulatory
action.
(10) To another federal agency to
notify that agency when, or verify
whether, a PIV card is no longer valid.
E:\FR\FM\09AUN1.SGM
09AUN1
47816
Federal Register / Vol. 75, No. 152 / Monday, August 9, 2010 / Notices
Note: Disclosures of data pertaining to date
and time of entry and exit of an agency
employee working in the District of Columbia
may not be made to supervisors, managers or
any other persons (other than the individual
to whom the information applies) to verify
employee time and attendance record for
personnel actions because 5 U.S.C. 6106
prohibits federal Executive agencies (other
than the Bureau of Engraving and Printing)
from using a recording clock within the
District of Columbia, unless used as a part of
a flexible schedule program under 5 U.S.C.
6120 et seq.
POLICIES AND PRACTICES FOR STORING,
RETRIEVING, ACCESSING, RETAINING, AND
DISPOSING OF RECORDS IN THE SYSTEM:
STORAGE:
Records are stored in electronic media
and in paper files.
RETRIEVABILITY:
Records are retrievable by name, date
of birth, Social Security number,
photographic identifiers, biometric
identifiers, HHS Identification Number,
and PIV card serial numbers.
sroberts on DSKD5P82C1PROD with NOTICES
SAFEGUARDS:
HHS has safeguards in place for
authorized users and monitors such
users to ensure against excessive or
unauthorized use. Personnel having
access to the system have been trained
in the Privacy Act and information
security requirements. Employees who
maintain records in this system are
instructed not to release data until the
intended recipient agrees to implement
appropriate management, operational
and technical safeguards sufficient to
protect the confidentiality, integrity and
availability of the information and
information systems and to prevent
unauthorized access.
This system will conform to all
applicable federal laws and regulations
and federal and HHS policies and
standards as they relate to information
security and data privacy. These laws
and regulations may apply but are not
limited to: the Privacy Act of 1974; the
Federal Information Security
Management Act of 2002; the Computer
Fraud and Abuse Act of 1986; the
Health Insurance Portability and
Accountability Act of 1996; the EGovernment Act of 2002, the ClingerCohen Act of 1996; the Medicare
Modernization Act of 2003, and the
corresponding implementing
regulations. OMB Circular A–130,
Management of Federal Resources,
Appendix III, Security of Federal
Automated Information Resources also
applies. Federal, and HHS policies and
standards include but are not limited to:
All pertinent National Institute of
Standards and Technology publications
VerDate Mar<15>2010
17:01 Aug 06, 2010
Jkt 220001
and the HHS Information Systems
Program Handbook.
Paper records are kept in locked
cabinets in secure facilities and access
to them is restricted to individuals
whose role requires use of the records.
The computer servers in which records
are stored are located in facilities that
are secured by alarm systems and offmaster key access. The computer servers
themselves are two-factor protected
with Public Key Infrastructure (PKI)
credentials, Personal Identification
Numbers (PINs) and passwords. Access
to individuals working at guard stations,
operating enrollment stations, issuance
stations, or the portal for sponsorship
and adjudication will be two-factor
protected using PKI and PIN; each
person granted access to the system at
guard stations, enrollment stations,
issuance stations or through the portal
must be individually authorized to use
the system. A notice warning users that
they are responsible for protecting the
information in accordance with the
Privacy Act, the Computer Security Act,
and the Federal Information Security
Management Act appears on the
monitor screen when records containing
information on individuals are first
displayed. Data exchanged between the
servers and the personal computers at
the guard stations and badging office are
encrypted. Backup tapes are stored in a
locked and controlled room in a secure,
off-site location.
An audit trail is maintained and
reviewed periodically to identify
unauthorized access. Persons given
roles in the PIV process must complete
training specific to their roles to ensure
they are knowledgeable about how to
protect individually identifiable
information.
RETENTION AND DISPOSAL:
Records relating to persons’ access
covered by this system are retained in
accordance with General Records
Schedule 18, Item 17 approved by the
National Archives and Records
Administration (NARA). Unless
retained for specific, ongoing security
investigations, for maximum security
facilities, records of access are
maintained for five years and then
destroyed. For other facilities, records
are maintained for two years and then
destroyed.
All other records relating to
individuals are retained and disposed of
in accordance with General Records
Schedule 18, item 22, approved by
NARA. In accordance with HSPD–12,
PIV cards are deactivated within 18
hours of cardholder separation, loss of
card, or expiration. PIV cards are
PO 00000
Frm 00062
Fmt 4703
Sfmt 4703
destroyed by cross-cut shredding no
later than 90 days after deactivation.
SYSTEM MANAGER AND ADDRESS:
Ken Calabrese, HHS Chief Technology
Officer, Office of the HHS Chief
Information Officer, Department of
Health and Human Services, 200
Independence Avenue, SW.,
Washington, DC 20201.
NOTIFICATION PROCEDURE:
An individual can determine if this
system contains a record pertaining to
himself or herself by sending a request
in writing, signed, to HHS Privacy Act
Officer, Room 2221, Mary E. Switzer
Building, Department of Health and
Human Services, 330 ‘‘C’’ Street, SW.,
Washington, DC 20201. When
requesting notification of or access to
records covered by this Notice, an
individual should provide his/her full
name, date of birth, agency name, and
work location. An individual requesting
notification of records in person must
provide identity documents sufficient to
satisfy the custodian of the records that
the requester is entitled to access, such
as a government-issued photo ID.
Individuals requesting notification via
telephone must furnish, at a minimum,
name, date of birth, social security
number, and home address in order to
establish identity. Individuals
requesting notification via mail shall
submit a notarized request to the
responsible Department official to verify
his or her identity or shall certify in his
or her request that he or she is the
individual who he or she claims to be
and that he or she understands that the
knowing and willful request for or
acquisition of a record pertaining to an
individual under false pretenses is a
criminal offense under the Act subject
to a $5,000 fine.
RECORD ACCESS PROCEDURE:
In addition to the procedures above,
requesters should reasonably specify the
record contents being sought. If
additional information or assistance is
required, contact the HHS Privacy Act
Officer, Room 2221, Mary E. Switzer
Building, Department of Health and
Human Services, 330 ‘‘C’’ Street, SW.,
Washington, DC 20201. Write the words
‘‘Privacy Act Request’’ on the envelope
and on the letter. For purpose of access,
use the same procedures outlined in the
Notification Procedures above. (These
procedures are in accordance with
Department regulation 45 CFR 5b.5 (a)
(2).)
CONTESTING RECORDS PROCEDURES:
In addition to the procedures above,
requesters should also reasonably
E:\FR\FM\09AUN1.SGM
09AUN1
Federal Register / Vol. 75, No. 152 / Monday, August 9, 2010 / Notices
identify the record, specify the
information they are contesting, state
the corrective action sought and the
reasons for the correction along with
supporting justification showing why
the record is not accurate, timely,
relevant, or complete. Rules regarding
amendment of Privacy Act records
appear in 45 CFR part 5a. If additional
information or assistance is required,
contact the HHS Privacy Act Officer,
Room 2221, Mary E. Switzer Building,
Department of Health and Human
Services, 330 ‘‘C’’ Street, SW.,
Washington, DC 20201. Write the words
‘‘Privacy Act Request’’ on the envelope
and on the letter.
RECORDS SOURCE CATEGORIES:
Employee, contractor, or applicant;
sponsoring agency; former sponsoring
agency; other federal agencies; contract
employer; former employer.
SYSTEMS EXEMPTED FROM CERTAIN PROVISIONS
OF THE ACT:
None.
[FR Doc. 2010–19536 Filed 8–6–10; 8:45 am]
BILLING CODE 4150–03–P
DEPARTMENT OF HEALTH AND
HUMAN SERVICES
Notice of Availability: Test Tools and
Test Procedures Approved for the
Office of the National Coordinator for
Health Information Technology (ONC)
Temporary Certification Program
Office of the National
Coordinator for Health Information
Technology, Office of the Secretary,
Department of Health and Human
Services.
ACTION: Notice.
AGENCY:
Authority: 42 U.S.C. 300jj–11.
This notice announces the
availability of test tools and test
procedures approved by the National
Coordinator for Health Information
Technology (the National Coordinator)
for the testing of Complete EHRs and/or
EHR Modules by ONC-Authorized
Testing and Certification Bodies (ONC–
ATCBs) under the ONC temporary
certification program. The approved test
tools and test procedures are identified
on the ONC Web site at: https://
healthit.hhs.gov/certification.
FOR FURTHER INFORMATION CONTACT:
Carol Bean, Director, Certification
Division, Office of the National
Coordinator for Health Information
Technology, 202–690–7151.
SUPPLEMENTARY INFORMATION:
On June 24, 2010, the Department of
Health and Human Services issued a
sroberts on DSKD5P82C1PROD with NOTICES
SUMMARY:
VerDate Mar<15>2010
17:01 Aug 06, 2010
Jkt 220001
final rule establishing a temporary
certification program for the purposes of
testing and certifying health information
technology (‘‘Establishment of the
Temporary Certification Program for
Health Information Technology,’’ 75 FR
36158) (Temporary Certification
Program final rule).1 The Temporary
Certification Program final rule added a
new ‘‘Subpart D—Temporary
Certification Program for HIT’’ to part
170 of title 45 of the Code of Federal
Regulations (CFR). Section 170.423(e) of
Subpart D requires ONC–ATCBs to
‘‘[u]se test tools and test procedures
approved by the National Coordinator
for the purposes of assessing Complete
EHRs and/or EHR Modules compliance
with the certification criteria adopted by
the Secretary.’’ The preamble of the
Temporary Certification Program final
rule stated that when the National
Coordinator had approved test tools
and/or test procedures ONC would
publish a notice of availability in the
Federal Register and identify the
approved test tools and test procedures
on the ONC Web site. As discussed in
the Temporary Certification Program
final rule, we anticipated that test tools
and test procedures would not be
finalized by the National Institute of
Standards and Technology (NIST), and
therefore unable to be considered for
approval by the National Coordinator,
until after the Secretary made publicly
available a final rule for the initial set
of standards, implementation
specifications, and certification criteria
for electronic health record technology.2
This final rule, ‘‘Health Information
Technology: Initial Set of Standards,
Implementation Specifications, and
Certification Criteria for Electronic
Health Record Technology’’ (HIT
Standards and Certification Criteria
final rule) was made available for public
inspection on July 13, 2010, and was
published in the Federal Register on
July 28, 2010.
The National Coordinator has
approved, for use by ONC–ATCBs in
accordance with 45 CFR 170.423(e), test
tools and test procedures developed by
NIST for testing Complete EHRs and/or
1 The Department issued a proposed rule entitled
‘‘Proposed Establishment of Certification Programs
for Health Information Technology’’ (75 FR 11328,
March 10, 2010) that proposed the establishment of
a temporary certification program and a permanent
certification program and stated the Department’s
intentions to issue separate final rules for each
program.
2 The ‘‘Health Information Technology: Initial Set
of Standards, Implementation Specifications, and
Certification Criteria for Electronic Health Record
Technology’’ interim final rule was made available
for public inspection on December 30, 2009, and
published in the Federal Register on January 13,
2010 (75 FR 2014).
PO 00000
Frm 00063
Fmt 4703
Sfmt 4703
47817
EHR Modules to the applicable
certification criterion or criteria adopted
by the Secretary in the HIT Standards
and Certification Criteria final rule.
These approved test tools and test
procedures are identified on the ONC
Web site at: https://healthit.hhs.gov/
certification.
Dated: August 2, 2010.
David Blumenthal,
National Coordinator for Health Information
Technology.
[FR Doc. 2010–19533 Filed 8–6–10; 8:45 am]
BILLING CODE 4150–45–P
DEPARTMENT OF HEALTH AND
HUMAN SERVICES
Health Resources and Services
Administration
Agency Information Collection
Activities: Submission for OMB
Review; Comment Request
Periodically, the Health Resources
and Services Administration (HRSA)
publishes abstracts of information
collection requests under review by the
Office of Management and Budget
(OMB), in compliance with the
Paperwork Reduction Act of 1995 (44
U.S.C. Chapter 35). To request a copy of
the clearance requests submitted to
OMB for review, e-mail
paperwork@hrsa.gov or call the HRSA
Reports Clearance Office on (301) 443–
1129.
The following request has been
submitted to the Office of Management
and Budget for review under the
Paperwork Reduction Act of 1995:
Proposed Project: Title: ‘‘Health Care
and Other Facilities’’ Project Status
Update Form (OMB No. 0915–0309)—
[Extension] .
The Health Resources and Services
Administration’s Health Care and Other
Facilities (HCOF) program provides
congressionally-directed funds to
health-related facilities for constructionrelated activities and/or capital
equipment purchases. Awarded
facilities are required to provide a
periodic (quarterly for constructionrelated projects, annually for equipment
only projects) update of the status of the
funded project until it is completed. The
monitoring period averages about 3
years, although some projects take up to
5 years to complete. The information
collected from these updates is vital to
program management staff to determine
whether projects are progressing
according to the established timeframes,
meeting deadlines established in the
Notice of Grant Award (NGA), and
drawing down funds appropriately. The
E:\FR\FM\09AUN1.SGM
09AUN1
Agencies
[Federal Register Volume 75, Number 152 (Monday, August 9, 2010)]
[Notices]
[Pages 47812-47817]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 2010-19536]
=======================================================================
-----------------------------------------------------------------------
DEPARTMENT OF HEALTH AND HUMAN SERVICES
Office of Security and Strategic Information
Privacy Act of 1974; Report of a New System of Records
AGENCY: Office of the Assistant Secretary for Administration and
Management.
[[Page 47813]]
ACTION: Notice of a New Privacy Act System of Records.
-----------------------------------------------------------------------
SUMMARY: In accordance with the requirements of the Privacy Act of
1974, the Department of Health and Human Services is establishing a new
system of records entitled, ``Facility and Resource Access Control
Records,'' System No. 09-90-0777. This notice implements in part
Homeland Security Presidential Directive 12 (HSPD-12), ``Policy for a
Common Identification Standard for Federal Employees and Contractors''
of August 27, 2004. HSPD-12 requires all employees, contractors, and
others who will be granted regular access to federal facilities for
more than six months to undergo a background investigation to determine
suitability and to be issued a Personal Identity Verification (PIV)
Card (i.e. an identification badge). The purpose of the program is to
enhance access controls to federal facilities to improve security. The
badge stores the individual's name, employing organization, the badge
issuer, the badge serial number, the expiration date, a picture of the
badge holder, two fingerprints, and four encryption keys that may be
used by the PIV card holder, when properly activated, in association
with federal information technology resources. The Facility and
Resource Access Control Records comprise information about the issuance
of Personal Identity Verification (PIV) cards, PIV card holders (e.g.
employees, contractors), other individuals who require regular access
to HHS facilities or resources, and the use of PIV cards to access
facilities or resources. The Facility and Resource Access Control
Records also include information about occasional visitors and short-
term guests who do not carry PIV cards but to whom HHS will issue
temporary credentials.
DATES: Effective Date: The new system of records will be effective on
the date of publication of this notice, with the exception of the
routine uses, which will become effective on September 8, 2010. We may
defer implementation of this system or one or more of the routine use
statements listed below if we receive comments that persuade us to do
so.
DATES: Comments are due by September 8, 2010.
ADDRESSES: Address comments to HHS Privacy Act Officer, Mary E. Switzer
Building, Department of Health and Human Services, 330 ``C'' Street,
SW., Washington, DC 20201, or via electronic mail to HSPD12-privacy at
hhs.gov. Comments will be available for public viewing in the public
reading room located at the same address, or on our Web site at https://www.hhs.gov. To review comments in person, please call the Division of
Freedom of Information and Privacy at 202-690-7453 for an appointment.
FOR FURTHER INFORMATION CONTACT: Ms. Maya A. Bernstein, Office of the
Assistant Secretary for Planning and Evaluation, 200 Independence
Avenue, SW., Room 434E, Washington, DC 20201, via e-mail at
hhs.gov">maya.bernstein@hhs.gov, or via telephone at 202/690-7100.
SUPPLEMENTARY INFORMATION: The Facility and Resource Access Control
Records enhance HHS' security and permit the Department to comply with
Homeland Security Presidential Directive 12 (HSPD-12), ``Policy for a
Common Identification Standard for Federal Employees and Contractors.''
This Presidential mandate requires all government employees,
contractors, and certain other individuals to use new identification
badges, known as Personal Identity Verification (PIV) cards, as their
singular form of identification when accessing government buildings,
facilities, or information technology systems. The PIV card will
enhance security, increase government efficiency, reduce identity
fraud, and protect personal privacy.
Before obtaining a PIV card, each employee or contractor must
undergo a standardized security credentialing process, including
background investigations, to ensure safety of HHS facilities and the
people who work in them. The PIV card system places modern card readers
at the entrances of HHS facilities that allow interoperability with all
federal agencies and ensure that entry of employees, contractors, and
other regular visitors is strictly authorized. Leveraging cutting-edge
technologies such as fingerprint recognition and single sign-on
capabilities, this technology will reduce identity fraud and ensure
only authorized users can access essential information. Finally, by
protecting employees, facilities, and information, the PIV card guards
the government resources that provide critical services to the American
people.
The PIV card will store the holder's name, employing organization,
the badge issuer, the badge serial number, the expiration date, a
picture of the badge holder, two fingerprints, and encryption keys that
may be activated for access to information technology resources, if
needed. It will not store other identifying information such as social
security number or birth date. An associated database will store
similar information in order to verify that individuals entering
federal buildings or using other federal resources, such as information
technology (IT) systems, are properly authorized for that access. In
addition, the database will be used to verify the ability of other
agencies' PIV card holders to enter HHS facilities or use HHS
resources.
Although HHS will not issue PIV cards to occasional visitors,
information about occasional visitors will be maintained as part of the
Facility and Resource Access Control Records. Some of these visitors
may be required to undergo brief criminal history checks, depending on
the reason for their visit and how often they enter our facilities or
use our (IT) systems. The Facility and Resource Access Control Records
includes that information.
Routine Uses
In addition to the collection, use, and disclosure of information
described in the statute itself, the Privacy Act permits HHS to
establish disclosures to non-HHS entities that are not already
identified by statute, and do not require the individual record
subject's consent, by using an administrative process. These
disclosures are known as ``routine uses,'' and are permitted to be
established if they are ``compatible with the purpose'' for which the
information was collected, and if the agency publishes them in the
Federal Register for 30 days in advance. Both identifiable and non-
identifiable data may be disclosed under a routine use. This notice
includes routine uses for the new system, and they are described below.
Most of the routine uses fall into standard categories that are
common to most systems of records across the government. These include
(1) disclosure to the Department of Justice (DOJ) when DOJ represents
HHS, our employees, or the government in litigation, and they need to
have access to the records to perform that function. If such a case
goes to court, another routine use (2) permits the records to be
disclosed in evidence before a federal court or appropriate
adjudicative body. There is a disclosure (3) permitted when a record in
this system of records or in combination with other records indicates a
violation of law -- we turn them over to the appropriate law
enforcement entity in order to maintain the integrity of the program
and ensure trust in the system. Another routine use (4) permits
disclosure for intelligence and national security purposes, especially
since the system manages information about persons that have access to
federal facilities and federal information technology systems that has
[[Page 47814]]
been recognized by the President as a homeland security issue.
The routine use disclosure to an individual Member of Congress (5)
permits the Department to cooperate with a Member of Congress seeking
information on behalf of a constituent (as opposed to the Committees of
jurisdiction performing oversight) with a matter that involves these
records. If the request is in writing, and we obtain a copy of the
request, we will assume the constituent's consent for the Member to
obtain records on a constituent's behalf even if a formal authorization
is not included, so that the Department and the Member can better serve
our citizens. However, the Member would get no more access to the
record than that to which the constituent is entitled.
The sixth routine use (6) permits the National Archives and Records
Administration to carry out records management functions.
Where HHS engages a contractor to carry out a function related to
this system of records, routine use (7) permits disclosure to those
individuals who require access to the records in order to perform the
contracted work, and we will require the contractor to comply with the
Privacy Act. Another routine use (8) permits disclosure to contractors
or other agencies for the purpose of assisting the Department in
responding to a suspected or confirmed data breach.
When an individual submits an application for a background
investigation, the individual normally signs an authorization
permitting records to be obtained by the investigator from almost any
source. Occasionally, after an individual has moved to another job or
contract, if negative information should come to light relevant to
another entity's decision about the suitability of the individual, a
routine use (9) allows HHS to notify the other entity merely that we
have relevant information. It is expected that the other entity, if
interested in pursuing the matter, would present a written
authorization on which HHS could rely to disclose more detailed
records. However, the disclosed information will be limited to that
which is reliable enough for such a referral.
Finally, one routine use is particular to the PIV card system and
allows the program to function as it is intended. HSPD-12 directs that,
eventually, all PIV card holders should, in most cases, be able to
visit other federal facilities and, if appropriate, use other agencies'
computer resources, by presenting the PIV card. This system of records
also describes information about visitors to HHS who have a PIV card
from another agency. Therefore, this system of records also comprises
information about those visitors, their entry and exit times, and
summary information about them. A routine use (10) permits HHS to
notify another federal agency if a PIV card is expired or no longer
valid.
Safeguards
HHS has safeguards in place for authorized users and monitors such
users to ensure against excessive or unauthorized use. Personnel having
access to the system have been trained in the Privacy Act and
information security requirements. Employees who maintain records in
this system are instructed not to release data until the intended
recipient agrees to implement appropriate management, operational and
technical safeguards sufficient to protect the confidentiality,
integrity and availability of the information and information systems
and to prevent unauthorized access.
This system will conform to all applicable federal laws and
regulations and federal and HHS policies and standards as they relate
to information security and data privacy. These laws and regulations
may apply but are not limited to: the Privacy Act of 1974; the Federal
Information Security Management Act of 2002; the Computer Fraud and
Abuse Act of 1986; the Health Insurance Portability and Accountability
Act of 1996; the E-Government Act of 2002, and the Clinger-Cohen Act of
1996 Circular A-130, Management of Federal Resources, Appendix III,
Security of Federal Automated Information Resources also applies.
Federal, and HHS policies and standards include but are not limited to:
all pertinent National Institute of Standards and Technology
publications and the HHS Information Systems Program Handbook.
Dated: July 26, 2010.
RADM Arthur J. Lawrence,
Director, Office of Security and Strategic Information.
SYSTEM NO. 09-90-0777
SYSTEM NAME:
``Facility and Resource Access Control Records''.
SECURITY CLASSIFICATION:
Most identity records are not classified. However, in some cases,
records of certain individuals, or portions of some records, may be
classified in the interest of national security.
SYSTEM LOCATION:
Data covered by this system are maintained at the following
locations: Department of Health and Human Services (HHS), Office of the
Secretary, 200 Independence Avenue, SW., Washington, DC 20201; HHS
Operating Divisions and regional offices around the country; Qwest
Datacenter in Sterling, Virginia; and the Qwest CyberCenter in
Highlands Ranch, Colorado. Some data covered by this system will be
accessed at HHS locations, both federal buildings and federally-leased
space, and at the physical security office(s) or computer security
offices of those locations.
CATEGORIES OF INDIVIDUALS COVERED BY THE SYSTEM:
(1) Individuals who require or are under consideration to obtain
regular, ongoing access to HHS facilities, information technology
systems, or information classified in the interest of national
security, such as applicants for employment or contracts with HHS,
federal employees, tribal members, contractors, students, interns,
volunteers, affiliates such as individuals authorized to perform or use
services provided in HHS facilities (e.g., HEW Credit Union, fitness
center, etc.) and individuals formerly in any of these positions. (2)
PIV card holders from other agencies who visit HHS facilities or use
HHS computer systems. (3) Occasional visitors or short-term employees
or guests who do not carry PIV cards and do not require certificates
for using encryption with a Public Key Infrastructure (PKI), to whom
HHS will issue temporary identification and low assurance credentials.
CATEGORIES OF RECORDS IN THE SYSTEM:
(1) Records maintained on individuals issued credentials by HHS
include the following: Full name, Social Security number; date and
place of birth; citizenship; signature; image (photograph);
fingerprints; hair color; eye color; height; weight; sex; race; scars,
marks, or tattoos; organization/office of assignment, location and
contact information; PIV card issue and expiration dates; personal
identification number (PIN); PIV request form; PIV sponsor, enrollment,
registrar and issuance information; PIV card serial number; emergency
responder designation; foreign national designator; contractor
designator; information derived from documents used to verify identity
such as document title, issuing authority, or expiration date; position
sensitivity; level of national security clearance and expiration date;
computer system user name; user access and
[[Page 47815]]
permission rights; authentication certificates; digital signature
information; employment category; position title; dates, times, and
locations of entries and exits.
(2) HHS maintains the following categories of records about PIV
card holders from other agencies entering HHS facilities or using HHS
systems: Name, PIV card serial number; dates, times, and locations of
entries and exits; organization name; level of national security
clearance and expiration date; digital signature information; computer
networks, applications, and data accessed.
(3) HHS maintains the following categories of records about
occasional visitors and short term guests: name, photograph, date and
time of entry and exit, facility to which admitted, and name of person
visiting.
AUTHORITY FOR MAINTENANCE OF THE SYSTEM:
5 U.S.C. 301; Information Technology Management Reform Act of 1996
(Pub. L. 104-106, sec. 5113); Electronic Government Act (Pub. L. 104-
347, sec. 203); Paperwork Reduction Act of 1995 (44 U.S.C. ch. 35);
Government Paperwork Elimination Act (Pub. L. 105-277, sec. 1701, 44
U.S.C. 3504); Homeland Security Presidential Directive (HSPD) 12,
Policy for a Common Identification Standard for Federal Employees and
Contractors, Aug. 27, 2004; Federal Property and Administrative Act of
1949, as amended.
PURPOSE(S) OF THE SYSTEM:
The primary purposes of the system of records are to (1) Ensure the
safety and security of HHS facilities, systems, or information, and our
occupants and users; (2) to verify that all persons entering federal
facilities, using federal information resources, or accessing
classified information are authorized to do so; and (3) to track and
control PIV cards and other identity credentials issued to persons
entering and exiting the facilities, using systems, or accessing
classified information.
ROUTINE USES OF RECORDS MAINTAINED IN THE SYSTEM, INCLUDING CATEGORIES
OR USERS AND THE PURPOSES OF SUCH USES:
Information about covered individuals may be disclosed without
consent as permitted by the Privacy Act of 1974, 5 U.S.C. 552a(b), and:
(1) To the Department of Justice when: (a) The agency or any
component thereof; or (b) any employee of the agency in his or her
official capacity; (c) any employee of the agency in his or her
individual capacity where agency or the Department of Justice has
agreed to represent the employee; or (d) the United States government,
is a party to litigation or has an interest in such litigation, and by
careful review, the agency determines that the records are both
relevant and necessary to the litigation and the use of such records by
DOJ is therefore deemed by the agency to be for a purpose compatible
with the purpose for which the agency collected the records.
(2) To a court or adjudicative body in a proceeding when: (a) The
agency or any component thereof; (b) any employee of the agency in his
or her official capacity; (c) any employee of the agency in his or her
individual capacity where agency or the Department of Justice has
agreed to represent the employee; or (d) the United States government,
is a party to litigation or has an interest in such litigation, and by
careful review, the agency determines that the records are both
relevant and necessary to the litigation and the use of such records is
therefore deemed by the agency to be for a purpose that is compatible
with the purpose for which the agency collected the records.
(3) Except as noted on Forms SF 85, 85-P, and 86, when a record on
its face, or in conjunction with other records, indicates a violation
or potential violation of law, whether civil, criminal, or regulatory
in nature, and whether arising by general statute or particular program
statute, or by regulation, rule, or order issued pursuant thereto,
disclosure may be made to the appropriate public authority, whether
federal, foreign, state, local, or tribal, or otherwise, responsible
for enforcing, investigating or prosecuting such violation or charged
with enforcing or implementing the statute, or rule, regulation, or
order issued pursuant thereto, if the information disclosed is relevant
to any enforcement, regulatory, investigative or prosecutorial
responsibility of the receiving entity.
(4) To a federal, state, or local agency, or other appropriate
entities or individuals, or through established liaison channels to
selected foreign governments, in order to enable an intelligence agency
to carry out its responsibilities under the National Security Act of
1947 as amended, the CIA Act of 1949 as amended, Executive Order 12333
or any successor order, applicable national security directives, or
classified implementing procedures approved by the Attorney General and
promulgated pursuant to such statutes, orders or directives.
(5) To a Member of Congress or to a Congressional staff member in
response to an inquiry of the Congressional office made at the written
request of the constituent about whom the record is maintained.
(6) To the National Archives and Records Administration or to the
General Services Administration for records management inspections
conducted under 44 U.S.C. 2904 and 2906.
(7) To agency contractors who have been engaged to assist the
agency in the performance of a contract service, grant, cooperative
agreement, or other activity related to this system of records and who
need to have access to the records in order to perform the activity.
Recipients shall be required to comply with the requirements of the
Privacy Act of 1974, as amended, 5 U.S.C. 552a.
(8) To appropriate federal agencies and Department contractors that
have a need to know the information for the purpose of assisting the
Department's efforts to respond to a suspected or confirmed breach of
the security or confidentiality of information maintained in this
system of records, and the information disclosed is relevant and
necessary for that assistance.
(9) To a federal, state, local, foreign, or tribal or other public
authority the fact that this system of records contains information
relevant to the retention of an employee, the retention of a security
clearance, the letting of a contract, or the issuance or retention of a
license, grant, or other benefit. The other agency or licensing
organization may then make a request supported by the written consent
of the individual for the entire record if it so chooses. No disclosure
will be made unless the information has been determined to be
sufficiently reliable to support a referral to another office within
the agency or to another federal agency for criminal, civil,
administrative personnel or regulatory action.
(10) To another federal agency to notify that agency when, or
verify whether, a PIV card is no longer valid.
[[Page 47816]]
Note: Disclosures of data pertaining to date and time of entry
and exit of an agency employee working in the District of Columbia
may not be made to supervisors, managers or any other persons (other
than the individual to whom the information applies) to verify
employee time and attendance record for personnel actions because 5
U.S.C. 6106 prohibits federal Executive agencies (other than the
Bureau of Engraving and Printing) from using a recording clock
within the District of Columbia, unless used as a part of a flexible
schedule program under 5 U.S.C. 6120 et seq.
POLICIES AND PRACTICES FOR STORING, RETRIEVING, ACCESSING, RETAINING,
AND DISPOSING OF RECORDS IN THE SYSTEM:
STORAGE:
Records are stored in electronic media and in paper files.
RETRIEVABILITY:
Records are retrievable by name, date of birth, Social Security
number, photographic identifiers, biometric identifiers, HHS
Identification Number, and PIV card serial numbers.
SAFEGUARDS:
HHS has safeguards in place for authorized users and monitors such
users to ensure against excessive or unauthorized use. Personnel having
access to the system have been trained in the Privacy Act and
information security requirements. Employees who maintain records in
this system are instructed not to release data until the intended
recipient agrees to implement appropriate management, operational and
technical safeguards sufficient to protect the confidentiality,
integrity and availability of the information and information systems
and to prevent unauthorized access.
This system will conform to all applicable federal laws and
regulations and federal and HHS policies and standards as they relate
to information security and data privacy. These laws and regulations
may apply but are not limited to: the Privacy Act of 1974; the Federal
Information Security Management Act of 2002; the Computer Fraud and
Abuse Act of 1986; the Health Insurance Portability and Accountability
Act of 1996; the E-Government Act of 2002, the Clinger-Cohen Act of
1996; the Medicare Modernization Act of 2003, and the corresponding
implementing regulations. OMB Circular A-130, Management of Federal
Resources, Appendix III, Security of Federal Automated Information
Resources also applies. Federal, and HHS policies and standards include
but are not limited to: All pertinent National Institute of Standards
and Technology publications and the HHS Information Systems Program
Handbook.
Paper records are kept in locked cabinets in secure facilities and
access to them is restricted to individuals whose role requires use of
the records. The computer servers in which records are stored are
located in facilities that are secured by alarm systems and off-master
key access. The computer servers themselves are two-factor protected
with Public Key Infrastructure (PKI) credentials, Personal
Identification Numbers (PINs) and passwords. Access to individuals
working at guard stations, operating enrollment stations, issuance
stations, or the portal for sponsorship and adjudication will be two-
factor protected using PKI and PIN; each person granted access to the
system at guard stations, enrollment stations, issuance stations or
through the portal must be individually authorized to use the system. A
notice warning users that they are responsible for protecting the
information in accordance with the Privacy Act, the Computer Security
Act, and the Federal Information Security Management Act appears on the
monitor screen when records containing information on individuals are
first displayed. Data exchanged between the servers and the personal
computers at the guard stations and badging office are encrypted.
Backup tapes are stored in a locked and controlled room in a secure,
off-site location.
An audit trail is maintained and reviewed periodically to identify
unauthorized access. Persons given roles in the PIV process must
complete training specific to their roles to ensure they are
knowledgeable about how to protect individually identifiable
information.
RETENTION AND DISPOSAL:
Records relating to persons' access covered by this system are
retained in accordance with General Records Schedule 18, Item 17
approved by the National Archives and Records Administration (NARA).
Unless retained for specific, ongoing security investigations, for
maximum security facilities, records of access are maintained for five
years and then destroyed. For other facilities, records are maintained
for two years and then destroyed.
All other records relating to individuals are retained and disposed
of in accordance with General Records Schedule 18, item 22, approved by
NARA. In accordance with HSPD-12, PIV cards are deactivated within 18
hours of cardholder separation, loss of card, or expiration. PIV cards
are destroyed by cross-cut shredding no later than 90 days after
deactivation.
SYSTEM MANAGER AND ADDRESS:
Ken Calabrese, HHS Chief Technology Officer, Office of the HHS
Chief Information Officer, Department of Health and Human Services, 200
Independence Avenue, SW., Washington, DC 20201.
NOTIFICATION PROCEDURE:
An individual can determine if this system contains a record
pertaining to himself or herself by sending a request in writing,
signed, to HHS Privacy Act Officer, Room 2221, Mary E. Switzer
Building, Department of Health and Human Services, 330 ``C'' Street,
SW., Washington, DC 20201. When requesting notification of or access to
records covered by this Notice, an individual should provide his/her
full name, date of birth, agency name, and work location. An individual
requesting notification of records in person must provide identity
documents sufficient to satisfy the custodian of the records that the
requester is entitled to access, such as a government-issued photo ID.
Individuals requesting notification via telephone must furnish, at a
minimum, name, date of birth, social security number, and home address
in order to establish identity. Individuals requesting notification via
mail shall submit a notarized request to the responsible Department
official to verify his or her identity or shall certify in his or her
request that he or she is the individual who he or she claims to be and
that he or she understands that the knowing and willful request for or
acquisition of a record pertaining to an individual under false
pretenses is a criminal offense under the Act subject to a $5,000 fine.
RECORD ACCESS PROCEDURE:
In addition to the procedures above, requesters should reasonably
specify the record contents being sought. If additional information or
assistance is required, contact the HHS Privacy Act Officer, Room 2221,
Mary E. Switzer Building, Department of Health and Human Services, 330
``C'' Street, SW., Washington, DC 20201. Write the words ``Privacy Act
Request'' on the envelope and on the letter. For purpose of access, use
the same procedures outlined in the Notification Procedures above.
(These procedures are in accordance with Department regulation 45 CFR
5b.5 (a) (2).)
CONTESTING RECORDS PROCEDURES:
In addition to the procedures above, requesters should also
reasonably
[[Page 47817]]
identify the record, specify the information they are contesting, state
the corrective action sought and the reasons for the correction along
with supporting justification showing why the record is not accurate,
timely, relevant, or complete. Rules regarding amendment of Privacy Act
records appear in 45 CFR part 5a. If additional information or
assistance is required, contact the HHS Privacy Act Officer, Room 2221,
Mary E. Switzer Building, Department of Health and Human Services, 330
``C'' Street, SW., Washington, DC 20201. Write the words ``Privacy Act
Request'' on the envelope and on the letter.
RECORDS SOURCE CATEGORIES:
Employee, contractor, or applicant; sponsoring agency; former
sponsoring agency; other federal agencies; contract employer; former
employer.
SYSTEMS EXEMPTED FROM CERTAIN PROVISIONS OF THE ACT:
None.
[FR Doc. 2010-19536 Filed 8-6-10; 8:45 am]
BILLING CODE 4150-03-P