Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-031 Information Sharing Environment Suspicious Activity Reporting Initiative System of Records, 79947-79949 [2010-32000]
Download as PDF
79947
Rules and Regulations
Federal Register
Vol. 75, No. 244
Tuesday, December 21, 2010
This section of the FEDERAL REGISTER
contains regulatory documents having general
applicability and legal effect, most of which
are keyed to and codified in the Code of
Federal Regulations, which is published under
50 titles pursuant to 44 U.S.C. 1510.
The Code of Federal Regulations is sold by
the Superintendent of Documents. Prices of
new books are listed in the first FEDERAL
REGISTER issue of each week.
DEPARTMENT OF HOMELAND
SECURITY
Office of the Secretary
6 CFR Part 5
[Docket No. DHS–2010–0089]
Privacy Act of 1974: Implementation of
Exemptions; Department of Homeland
Security/ALL–031 Information Sharing
Environment Suspicious Activity
Reporting Initiative System of Records
AGENCY:
ACTION:
Privacy Office, DHS.
Final rule.
The Department of Homeland
Security is issuing a final rule to amend
its regulations to exempt portions of a
newly established system of records
titled, ‘‘Department of Homeland
Security/ALL–031 Information Sharing
Environment Suspicious Activity
Reporting Initiative System of Records’’
from certain provisions of the Privacy
Act. Specifically, the Department
exempts portions of the ‘‘Department of
Homeland Security/ALL–031
Information Sharing Environment
Suspicious Activity Reporting Initiative
System of Records’’ from one or more
provisions of the Privacy Act because of
criminal, civil, and administrative
enforcement requirements.
SUMMARY:
Effective Date: This final rule is
effective December 21, 2010.
DATES:
For
general questions please contact: Ronald
Athmann (202–447–4332), Office of
Intelligence and Analysis, Department
of Homeland Security, Washington, DC
20528. For privacy issues please
contact: Mary Ellen Callahan (703–235–
0780), Chief Privacy Officer, Privacy
Office, Department of Homeland
Security, Washington, DC 20528.
jlentini on DSKJ8SOYB1PROD with RULES
FOR FURTHER INFORMATION CONTACT:
SUPPLEMENTARY INFORMATION:
VerDate Mar<15>2010
22:26 Dec 20, 2010
Jkt 223001
Background
The Department of Homeland
Security (DHS) published a notice of
proposed rulemaking in the Federal
Register, 75 FR 55290, September 10,
2010, proposing to exempt portions of
the system of records from one or more
provisions of the Privacy Act because of
criminal, civil, and administrative
enforcement requirements. The system
of records is the DHS/ALL–031
Information Sharing Environment (ISE)
Suspicious Activity Reporting (SAR)
Initiative System of Records. The DHS/
ALL–031 ISE–SAR Initiative system of
records notice was published
concurrently in the Federal Register, 75
FR 55335, September 10, 2010, and
comments were invited on both the
notice of proposed rulemaking (NPRM)
and system of records notice (SORN).
Public Comments
DHS received four comments on the
NPRM. One commenter submitted the
same set of comments for both the
NPRM and the SORN.
All four comment submissions were
in support of the DHS ISE–SAR
Initiative and the proposed exemptions
to the Privacy Act. One of the four
commenters, BITS, a membership
organization comprised of financial
intuitions and financial-services
vendors who own, operate, and/or
develop critical infrastructure
information systems, requested
clarification on the scope of the ISE–
SAR Initiative and the potential use of
SAR filed by financial institutions and
the proposed public-private partnership.
In addition, the organization
commented on the application of
Freedom of Information Act (FOIA)
exemptions particularly to any potential
plans to collect cybersecurity
information from private entities
regarding cyber attacks. Lastly, the
organization requested that the
Department consider providing
protections to private sector regulated
entities that submit ISE–SARs to DHS.
BITS Comment: It is our
understanding that the purpose of the
DHS–ALL/031 ISE–SAR Initiative
System of Records is to create a database
of physical security threats and would
not include the Bank Secrecy Act (BSA)
related SARs filed with FinCEN. The
ISE–Functional Standards do not
expressly exclude BSA-related SARs,
but the ISE Functional Standards
PO 00000
Frm 00001
Fmt 4700
Sfmt 4700
restrict the scope of a SAR to ‘‘official
documentation of observed behavior
reasonably indicative of pre-operational
planning related to terrorism or other
criminal activity.’’ Likewise, the ISE–
Functional Standards guidance criteria
for determining whether a SAR
constitutes an ISE–SAR, does not
embrace financial crimes. Given these
parameters, BITS questions whether
BSA-related SARs may be included in
the ISE–SARs database because of their
potential nexus to terrorism
information, as defined in the
Intelligence Reform and Terrorism
Prevention Act (IRTPA).
BITS respectfully asks the Department
to clarify whether the proposed ISE–
SARs database will include or exclude
ISE–SARs filed pursuant to the BSA and
Anti-Money Laundering regulations.
The government’s use of the classified
sources and materials and aggregated
BSA data could provide Federal
agencies with a rich source of
investigative leads relating to terrorism
financing. These leads may flag
previously unidentified anomalous
behavior that becomes suspicious only
when it is combined with aggregated
investigative data sources, such as
FinCEN’s database of cross-border
electronic funds transactions. BTS asks
the Department to balance the potential
benefits of this broad interpretation with
the potential privacy, operational, and
legal hazards.
Response: DHS participation in the
Nationwide Suspicious Activity
Reporting Initiative (NSI), which is
overseen by the Department of Justice,
adheres to the requirements established
by the NSI requiring participants to
apply the ISE–SAR Functional Standard
Version 1.5 in determining whether a
suspicious activity is an ISE–SAR. DHS
would like to clarify that suspicious
activities that meet the ISE–SAR
Functional Standard Version 1.5 are not
limited to physical security threats.
Further, DHS submission of ISE–SARs
to the NSI Shared Space does not
explicitly exclude, nor does it include
any specific category or source of
information; rather DHS submissions of
ISE–SARs to the NSI Shared Space
adhere to the ISE–SAR Functional
Standard Version 1.5. For further
clarification on the scope and
application of the ISE–SAR Functional
Standard Version 1.5, DHS recommends
that BITS reach out to the NSI Program
E:\FR\FM\21DER1.SGM
21DER1
jlentini on DSKJ8SOYB1PROD with RULES
79948
Federal Register / Vol. 75, No. 244 / Tuesday, December 21, 2010 / Rules and Regulations
Management Office and review
materials available on the NSI Web site
available at https://nsi.ncirc.gov.
BITS Comment: BITS values the
Department’s commitment and efforts to
improve information-sharing of security
threats between the public and private
sector. As partners with law
enforcement, we have a long history of
positive collaboration with law
enforcement officials in the areas of
cybersecurity, fraud, and money
laundering. The financial services
industry has a vested interest in
protecting the financial system from
illicit activities that could harm national
security. As such, we are interested in
the Department’s plan to make the ISE–
SARs available to ‘‘federal departments
and agencies, state, local, and tribal law
enforcement agencies, and the private
sector.’’ We hope the Department will
provide additional information about:
(1) the identities of the as-yet unnamed
‘‘private sector’’ partners or industries
who would have access to ISE–SARs;
and (2) private-sector and public lawenforcement credentialing requirements.
Response: DHS would like to clarify
that DHS’s contribution of ISE–SARs to
the NSI Shared Space will make this
information available only to authorized
NSI participants. DHS does not
maintain a list of private sector partners
or entities who are authorized NSI
participants. As previously noted, the
NSI is not just a DHS initiative; it is
overseen by the Department of Justice
and authorized participants may
include federal departments, state, local,
and tribal law enforcement agencies,
and the private sector. Accordingly,
DHS recommends that BITS reach out to
the Department of Justice NSI PMO
regarding information on private sector
industries who would have access to the
NSI Shared Space as well as any
requirements for becoming an
authorized participant. Information
about NSI partners is available at the
NSI Web site at https://nsi.ncirc.gov.
BITS Comment: We applaud the
Department’s promulgation of an
explicit exemption from certain parts of
the Freedom of Information Act (FOIA)
for the ISE–SARs program, although we
encourage the Department to revisit the
strength and application of the
exemption, particularly if the
Department plans to collect
cybersecurity information from private
entities regarding cyber attacks.
Because of the sensitivity and
potential for severe damage associated
with reported cyber attacks and
vulnerabilities, we hope the Department
will provide a blanket exemption from
FOIA for ISE–SARs filed by a privatesector entity reporting an information-
VerDate Mar<15>2010
22:26 Dec 20, 2010
Jkt 223001
security related attack. A blanket FOIA
exemption would further the
Department’s goals of informationsharing because it would increase the
likelihood that institutions would
voluntarily report suspected or
confirmed cyber attacks that are not
required to be reported. In the past,
institutions have been reluctant to share
information regarding suspected cyber
attacks because of the potential for
endangering their customers and their
institutions. The creation of a standard,
blanket exemption for the identifying
information of the reporting entity
would eliminate the reticence in the
private sector and support more robust
participation levels.
Response: DHS would like to clarify
that the NPRM is exempting the DHS/
ALL–031 ISE–SAR Initiative System of
Records from certain portions of the
Privacy Act, not the FOIA, as
commenter suggests. When DHS
processing either a Privacy Act or FOIA
request, both applicable Privacy Act and
appropriate FOIA exemptions are
applied. With respect to applying FOIA
exemptions, DHS applies FOIA
exemptions available under current law.
The FOIA currently does not provide for
a standard ‘‘blanket exception’’ for ISE–
SARs data filed by a private-sector
entity reporting an information-security
related attack. Nevertheless, if DHS
were to receive a FOIA request for such
information, it would apply applicable
FOIA exemptions (e.g., Exemption 4
which applies to trade secrets and
commercial or financial information
obtained from a person that is privileged
or confidential may apply in this
instance).
BITS Comment: Given the likelihood
that BSA-related ISE–SARs may be
aggregated into the ISE–SAR central
data warehouse, we urge the
Department to consider providing a dual
‘‘safe-harbor’’ provision to protect
private-sector, regulated entities that
submit reports to the ISE–SAR database.
First, a safe harbor should be created
to address the liabilities associated with
the provision of personally identifiable
information to the ISE. We understand
that the Department will exercise the
utmost caution to protect the integrity of
PII, but we also recognize that the
provision of PII in such a large scale to
federal agencies or private entities
inevitably raises the specter of data
compromise, identity theft, and fraud.
Thus, we respectfully request that
entities providing such PII in the
requisite format be shielded from civil
and criminal liability arising from the
provision of PII to the ISE–SAR
database.
PO 00000
Frm 00002
Fmt 4700
Sfmt 4700
We also suggest the creation of a ‘‘safe
harbor’’ to protect prudentially
regulated, private-sector entities (such
as financial institutions) who: (1) Are
compliant with relevant federal
regulations; and (2) submit data to the
ISE–SAR database in good faith, from
adverse regulatory findings based on
conclusions resulting from
governmental use of the ISE–SAR
database.
Response: DHS is one of many
authorized NSI participants and
therefore cannot comment on whether a
‘‘large scale of BSA-related ISE–SARs’’
will be included in the NSI Shared
Space. To the extent DHS enters in ISE–
SAR data obtained from an external
entity into the NSI Shared Space, it will
entail the use of the Summary ISE–SAR
Information format, which excludes
privacy fields or data elements that
contain PII as identified in Section IV of
the ISE–SAR Functional Standard. It is
believed the data contained within a
Summary ISE–SAR Information format
will support sufficient trending and
pattern recognition to trigger further
analysis and/or investigation where
additional information can be requested
from the submitting organization.
Accordingly, DHS does not see the need
to create a ‘‘dual safe harbor provision’’
as the commenter suggests.
After consideration of public
comments, the Department will
implement the rulemaking as proposed.
List of Subjects in 6 CFR Part 5
Freedom of information, Privacy.
■ For the reasons stated in the preamble,
DHS amends Chapter I of Title 6, Code
of Federal Regulations, as follows:
PART 5—DISCLOSURE OF RECORDS
AND INFORMATION
1. The authority citation for part 5
continues to read as follows:
■
Authority: 6 U.S.C. 101 et seq.; Pub. L.
107–296, 116 Stat. 2135; 5 U.S.C. 301.
Subpart A also issued under 5 U.S.C. 552.
Subpart B also issued under 5 U.S.C. 552a.
2. Add at the end of appendix C to
part 5, the following new paragraph
‘‘52’’:
■
Appendix C to Part 5—DHS Systems of
Records Exempt From the Privacy Act
*
*
*
*
*
52. The DHS/ALL—031 ISE SAR Initiative
System of Records consists of electronic
records and will be used by DHS and its
components. The DHS/ALL—031 ISE SAR
Initiative System of Records is a repository of
information held by DHS in connection with
its several and varied missions and functions,
including, but not limited to the enforcement
of civil and criminal laws; investigations,
inquiries, and proceedings there under;
E:\FR\FM\21DER1.SGM
21DER1
jlentini on DSKJ8SOYB1PROD with RULES
Federal Register / Vol. 75, No. 244 / Tuesday, December 21, 2010 / Rules and Regulations
national security and intelligence activities;
and protection of the President of the U.S. or
other individuals pursuant to Section 3056
and 3056A of Title 18. The DHS/ALL—031
ISE SAR Initiative System of Records
contains information that is collected by, on
behalf of, in support of, or in cooperation
with DHS, its components, as well as other
federal, state, local, tribal, or foreign agencies
or private sector organization and may
contain personally identifiable information
collected by other federal, state, local, tribal,
foreign, or international government
agencies. The Secretary of Homeland
Security has exempted this system from the
following provisions of the Privacy Act,
subject to the limitations set forth in 5 U.S.C.
552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3),
(e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5), (e)(8), and
(e)(12); (f); (g)(1); and (h) of the Privacy Act
pursuant to 5 U.S.C. 552a(j)(2). Additionally,
the Secretary of Homeland Security has
exempted this system from the following
provisions of the Privacy Act, subject to the
limitation set forth in 5 U.S.C. 552a(c)(3); (d);
(e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f) of
the Privacy Act pursuant to 5 U.S.C.
552a(k)(2) and (k)(3). Exemptions from these
particular subsections are justified, on a caseby-case basis to be determined at the time a
request is made, for the following reasons:
(a) From subsection (c)(3) and (c)(4)
(Accounting for Disclosures) because release
of the accounting of disclosures could alert
the subject of an investigation of an actual or
potential criminal, civil, or regulatory
violation to the existence of that investigation
and reveal investigative interest on the part
of DHS as well as the recipient agency.
Disclosure of the accounting would therefore
present a serious impediment to law
enforcement efforts and/or efforts to preserve
national security. Disclosure of the
accounting would also permit the individual
who is the subject of a record to impede the
investigation, to tamper with witnesses or
evidence, and to avoid detection or
apprehension, which would undermine the
entire investigative process.
(b) From subsection (d) (Access to Records)
because access to the records contained in
this system of records could inform the
subject of an investigation of an actual or
potential criminal, civil, or regulatory
violation to the existence of that investigation
and reveal investigative interest on the part
of DHS or another agency. Access to the
records could permit the individual who is
the subject of a record to impede the
investigation, to tamper with witnesses or
evidence, and to avoid detection or
apprehension. Amendment of the records
could interfere with ongoing investigations
and law enforcement activities and would
impose an unreasonable administrative
burden by requiring investigations to be
continually reinvestigated. In addition,
permitting access and amendment to such
information could disclose security-sensitive
information that could be detrimental to
homeland security.
(c) From subsection (e)(1) (Relevancy and
Necessity of Information) because in the
course of investigations into potential
violations of federal law, the accuracy of
information obtained or introduced
VerDate Mar<15>2010
22:26 Dec 20, 2010
Jkt 223001
occasionally may be unclear, or the
information may not be strictly relevant or
necessary to a specific investigation. In the
interests of effective law enforcement, it is
appropriate to retain all information that may
aid in establishing patterns of unlawful
activity.
(d) From subsection (e)(2) (Collection of
Information from Individuals) because
requiring that information be collected from
the subject of an investigation would alert the
subject to the nature or existence of the
investigation, thereby interfering with that
investigation and related law enforcement
activities.
(e) From subsection (e)(3) (Notice to
Subjects) because providing such detailed
information could impede law enforcement
by compromising the existence of a
confidential investigation or reveal the
identity of witnesses or confidential
informants.
(f) From subsections (e)(4)(G), (e)(4)(H),
and (e)(4)(I) (Agency Requirements) and (f)
(Agency Rules), because portions of this
system are exempt from the individual access
provisions of subsection (d) for the reasons
noted above, and therefore DHS is not
required to establish requirements, rules, or
procedures with respect to such access.
Providing notice to individuals with respect
to existence of records pertaining to them in
the system of records or otherwise setting up
procedures pursuant to which individuals
may access and view records pertaining to
themselves in the system would undermine
investigative efforts and reveal the identities
of witnesses, and potential witnesses, and
confidential informants.
(g) From subsection (e)(5) (Collection of
Information) because with the collection of
information for law enforcement purposes, it
is impossible to determine in advance what
information is accurate, relevant, timely, and
complete. Compliance with subsection (e)(5)
would preclude DHS agents from using their
investigative training and exercise of good
judgment to both conduct and report on
investigations.
(h) From subsection (e)(8) (Notice on
Individuals) because compliance would
interfere with DHS’s ability to obtain, serve,
and issue subpoenas, warrants, and other law
enforcement mechanisms that may be filed
under seal and could result in disclosure of
investigative techniques, procedures, and
evidence.
(i) From subsection (e)(12) (Computer
Matching) if the agency is a recipient agency
or a source agency in a matching program
with a non-Federal agency, with respect to
any establishment or revision of a matching
program, at least 30 days prior to conducting
such program, publish in the Federal
Register notice of such establishment or
revision.
(j) From subsection (g)(1) (Civil Remedies)
to the extent that the system is exempt from
other specific subsections of the Privacy Act.
(k) From subsection (h) (Legal Guardians)
the parent of any minor, or the legal guardian
of any individual who has been declared to
be incompetent due to physical or mental
incapacity or age by a court of competent
jurisdiction, may act on behalf of the
individual.
PO 00000
Frm 00003
Fmt 4700
Sfmt 4700
79949
Dated: December 9, 2010.
Mary Ellen Callahan
Chief Privacy Officer, Department of
Homeland Security.
[FR Doc. 2010–32000 Filed 12–20–10; 8:45 am]
BILLING CODE 9110–9B–P
DEPARTMENT OF AGRICULTURE
Office of the Secretary
7 CFR Part 2
RIN 0503–AA43
Revision of Delegation of Authority
Office of the Secretary, USDA.
Final rule.
AGENCY:
ACTION:
This document amends the
delegation of authority from the U.S.
Department of Agriculture’s Under
Secretary for Marketing and Regulatory
Programs (MRP) to the Deputy Under
Secretary for MRP to establish the order
in which a Deputy Under Secretary may
perform the duties and exercise the
powers of the Under Secretary during
the absence or unavailability of the
Under Secretary when there is more
than one Deputy Under Secretary.
DATES: Effective Date: December 21,
2010.
FOR FURTHER INFORMATION CONTACT: Ms.
Karen Grillo, Chief of Staff, Marketing
and Regulatory Programs, USDA, 1400
Independence Avenue, SW.,
Washington, DC 20250; 202–7204–256.
SUPPLEMENTARY INFORMATION: Pursuant
to 7 CFR 2.77, the Under Secretary for
Marketing and Regulatory Programs
(MRP) has delegated to the Deputy
Under Secretary for MRP the following
authority, to be exercised only during
the absence or unavailability of the
Under Secretary: Perform all the duties
and exercise all the powers which are
now or which may hereafter be
delegated to the Under Secretary. This
final rule amends 7 CFR 2.77 to
establish the order in which a Deputy
Under Secretary may exercise that
delegation when the MRP mission area
has more than one Deputy Under
Secretary. The authority shall be
exercised by the respective Deputy
Under Secretary in the order in which
he or she has taken office as the Deputy
Under Secretary.
This rule relates to internal agency
management. Therefore, this rule is
exempt from the provisions of Executive
Orders 12866 and 12988. Moreover,
pursuant to 5 U.S.C. 553, notice of
proposed rulemaking and opportunity
for comment are not required for this
rule, and it may be made effective less
SUMMARY:
E:\FR\FM\21DER1.SGM
21DER1
Agencies
[Federal Register Volume 75, Number 244 (Tuesday, December 21, 2010)]
[Rules and Regulations]
[Pages 79947-79949]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 2010-32000]
========================================================================
Rules and Regulations
Federal Register
________________________________________________________________________
This section of the FEDERAL REGISTER contains regulatory documents
having general applicability and legal effect, most of which are keyed
to and codified in the Code of Federal Regulations, which is published
under 50 titles pursuant to 44 U.S.C. 1510.
The Code of Federal Regulations is sold by the Superintendent of Documents.
Prices of new books are listed in the first FEDERAL REGISTER issue of each
week.
========================================================================
Federal Register / Vol. 75, No. 244 / Tuesday, December 21, 2010 /
Rules and Regulations
[[Page 79947]]
DEPARTMENT OF HOMELAND SECURITY
Office of the Secretary
6 CFR Part 5
[Docket No. DHS-2010-0089]
Privacy Act of 1974: Implementation of Exemptions; Department of
Homeland Security/ALL-031 Information Sharing Environment Suspicious
Activity Reporting Initiative System of Records
AGENCY: Privacy Office, DHS.
ACTION: Final rule.
-----------------------------------------------------------------------
SUMMARY: The Department of Homeland Security is issuing a final rule to
amend its regulations to exempt portions of a newly established system
of records titled, ``Department of Homeland Security/ALL-031
Information Sharing Environment Suspicious Activity Reporting
Initiative System of Records'' from certain provisions of the Privacy
Act. Specifically, the Department exempts portions of the ``Department
of Homeland Security/ALL-031 Information Sharing Environment Suspicious
Activity Reporting Initiative System of Records'' from one or more
provisions of the Privacy Act because of criminal, civil, and
administrative enforcement requirements.
DATES: Effective Date: This final rule is effective December 21, 2010.
FOR FURTHER INFORMATION CONTACT: For general questions please contact:
Ronald Athmann (202-447-4332), Office of Intelligence and Analysis,
Department of Homeland Security, Washington, DC 20528. For privacy
issues please contact: Mary Ellen Callahan (703-235-0780), Chief
Privacy Officer, Privacy Office, Department of Homeland Security,
Washington, DC 20528.
SUPPLEMENTARY INFORMATION:
Background
The Department of Homeland Security (DHS) published a notice of
proposed rulemaking in the Federal Register, 75 FR 55290, September 10,
2010, proposing to exempt portions of the system of records from one or
more provisions of the Privacy Act because of criminal, civil, and
administrative enforcement requirements. The system of records is the
DHS/ALL-031 Information Sharing Environment (ISE) Suspicious Activity
Reporting (SAR) Initiative System of Records. The DHS/ALL-031 ISE-SAR
Initiative system of records notice was published concurrently in the
Federal Register, 75 FR 55335, September 10, 2010, and comments were
invited on both the notice of proposed rulemaking (NPRM) and system of
records notice (SORN).
Public Comments
DHS received four comments on the NPRM. One commenter submitted the
same set of comments for both the NPRM and the SORN.
All four comment submissions were in support of the DHS ISE-SAR
Initiative and the proposed exemptions to the Privacy Act. One of the
four commenters, BITS, a membership organization comprised of financial
intuitions and financial-services vendors who own, operate, and/or
develop critical infrastructure information systems, requested
clarification on the scope of the ISE-SAR Initiative and the potential
use of SAR filed by financial institutions and the proposed public-
private partnership. In addition, the organization commented on the
application of Freedom of Information Act (FOIA) exemptions
particularly to any potential plans to collect cybersecurity
information from private entities regarding cyber attacks. Lastly, the
organization requested that the Department consider providing
protections to private sector regulated entities that submit ISE-SARs
to DHS.
BITS Comment: It is our understanding that the purpose of the DHS-
ALL/031 ISE-SAR Initiative System of Records is to create a database of
physical security threats and would not include the Bank Secrecy Act
(BSA) related SARs filed with FinCEN. The ISE-Functional Standards do
not expressly exclude BSA-related SARs, but the ISE Functional
Standards restrict the scope of a SAR to ``official documentation of
observed behavior reasonably indicative of pre-operational planning
related to terrorism or other criminal activity.'' Likewise, the ISE-
Functional Standards guidance criteria for determining whether a SAR
constitutes an ISE-SAR, does not embrace financial crimes. Given these
parameters, BITS questions whether BSA-related SARs may be included in
the ISE-SARs database because of their potential nexus to terrorism
information, as defined in the Intelligence Reform and Terrorism
Prevention Act (IRTPA).
BITS respectfully asks the Department to clarify whether the
proposed ISE-SARs database will include or exclude ISE-SARs filed
pursuant to the BSA and Anti-Money Laundering regulations. The
government's use of the classified sources and materials and aggregated
BSA data could provide Federal agencies with a rich source of
investigative leads relating to terrorism financing. These leads may
flag previously unidentified anomalous behavior that becomes suspicious
only when it is combined with aggregated investigative data sources,
such as FinCEN's database of cross-border electronic funds
transactions. BTS asks the Department to balance the potential benefits
of this broad interpretation with the potential privacy, operational,
and legal hazards.
Response: DHS participation in the Nationwide Suspicious Activity
Reporting Initiative (NSI), which is overseen by the Department of
Justice, adheres to the requirements established by the NSI requiring
participants to apply the ISE-SAR Functional Standard Version 1.5 in
determining whether a suspicious activity is an ISE-SAR. DHS would like
to clarify that suspicious activities that meet the ISE-SAR Functional
Standard Version 1.5 are not limited to physical security threats.
Further, DHS submission of ISE-SARs to the NSI Shared Space does not
explicitly exclude, nor does it include any specific category or source
of information; rather DHS submissions of ISE-SARs to the NSI Shared
Space adhere to the ISE-SAR Functional Standard Version 1.5. For
further clarification on the scope and application of the ISE-SAR
Functional Standard Version 1.5, DHS recommends that BITS reach out to
the NSI Program
[[Page 79948]]
Management Office and review materials available on the NSI Web site
available at https://nsi.ncirc.gov.
BITS Comment: BITS values the Department's commitment and efforts
to improve information-sharing of security threats between the public
and private sector. As partners with law enforcement, we have a long
history of positive collaboration with law enforcement officials in the
areas of cybersecurity, fraud, and money laundering. The financial
services industry has a vested interest in protecting the financial
system from illicit activities that could harm national security. As
such, we are interested in the Department's plan to make the ISE-SARs
available to ``federal departments and agencies, state, local, and
tribal law enforcement agencies, and the private sector.'' We hope the
Department will provide additional information about: (1) the
identities of the as-yet unnamed ``private sector'' partners or
industries who would have access to ISE-SARs; and (2) private-sector
and public law-enforcement credentialing requirements.
Response: DHS would like to clarify that DHS's contribution of ISE-
SARs to the NSI Shared Space will make this information available only
to authorized NSI participants. DHS does not maintain a list of private
sector partners or entities who are authorized NSI participants. As
previously noted, the NSI is not just a DHS initiative; it is overseen
by the Department of Justice and authorized participants may include
federal departments, state, local, and tribal law enforcement agencies,
and the private sector. Accordingly, DHS recommends that BITS reach out
to the Department of Justice NSI PMO regarding information on private
sector industries who would have access to the NSI Shared Space as well
as any requirements for becoming an authorized participant. Information
about NSI partners is available at the NSI Web site at https://nsi.ncirc.gov.
BITS Comment: We applaud the Department's promulgation of an
explicit exemption from certain parts of the Freedom of Information Act
(FOIA) for the ISE-SARs program, although we encourage the Department
to revisit the strength and application of the exemption, particularly
if the Department plans to collect cybersecurity information from
private entities regarding cyber attacks.
Because of the sensitivity and potential for severe damage
associated with reported cyber attacks and vulnerabilities, we hope the
Department will provide a blanket exemption from FOIA for ISE-SARs
filed by a private-sector entity reporting an information-security
related attack. A blanket FOIA exemption would further the Department's
goals of information-sharing because it would increase the likelihood
that institutions would voluntarily report suspected or confirmed cyber
attacks that are not required to be reported. In the past, institutions
have been reluctant to share information regarding suspected cyber
attacks because of the potential for endangering their customers and
their institutions. The creation of a standard, blanket exemption for
the identifying information of the reporting entity would eliminate the
reticence in the private sector and support more robust participation
levels.
Response: DHS would like to clarify that the NPRM is exempting the
DHS/ALL-031 ISE-SAR Initiative System of Records from certain portions
of the Privacy Act, not the FOIA, as commenter suggests. When DHS
processing either a Privacy Act or FOIA request, both applicable
Privacy Act and appropriate FOIA exemptions are applied. With respect
to applying FOIA exemptions, DHS applies FOIA exemptions available
under current law. The FOIA currently does not provide for a standard
``blanket exception'' for ISE-SARs data filed by a private-sector
entity reporting an information-security related attack. Nevertheless,
if DHS were to receive a FOIA request for such information, it would
apply applicable FOIA exemptions (e.g., Exemption 4 which applies to
trade secrets and commercial or financial information obtained from a
person that is privileged or confidential may apply in this instance).
BITS Comment: Given the likelihood that BSA-related ISE-SARs may be
aggregated into the ISE-SAR central data warehouse, we urge the
Department to consider providing a dual ``safe-harbor'' provision to
protect private-sector, regulated entities that submit reports to the
ISE-SAR database.
First, a safe harbor should be created to address the liabilities
associated with the provision of personally identifiable information to
the ISE. We understand that the Department will exercise the utmost
caution to protect the integrity of PII, but we also recognize that the
provision of PII in such a large scale to federal agencies or private
entities inevitably raises the specter of data compromise, identity
theft, and fraud. Thus, we respectfully request that entities providing
such PII in the requisite format be shielded from civil and criminal
liability arising from the provision of PII to the ISE-SAR database.
We also suggest the creation of a ``safe harbor'' to protect
prudentially regulated, private-sector entities (such as financial
institutions) who: (1) Are compliant with relevant federal regulations;
and (2) submit data to the ISE-SAR database in good faith, from adverse
regulatory findings based on conclusions resulting from governmental
use of the ISE-SAR database.
Response: DHS is one of many authorized NSI participants and
therefore cannot comment on whether a ``large scale of BSA-related ISE-
SARs'' will be included in the NSI Shared Space. To the extent DHS
enters in ISE-SAR data obtained from an external entity into the NSI
Shared Space, it will entail the use of the Summary ISE-SAR Information
format, which excludes privacy fields or data elements that contain PII
as identified in Section IV of the ISE-SAR Functional Standard. It is
believed the data contained within a Summary ISE-SAR Information format
will support sufficient trending and pattern recognition to trigger
further analysis and/or investigation where additional information can
be requested from the submitting organization. Accordingly, DHS does
not see the need to create a ``dual safe harbor provision'' as the
commenter suggests.
After consideration of public comments, the Department will
implement the rulemaking as proposed.
List of Subjects in 6 CFR Part 5
Freedom of information, Privacy.
0
For the reasons stated in the preamble, DHS amends Chapter I of Title
6, Code of Federal Regulations, as follows:
PART 5--DISCLOSURE OF RECORDS AND INFORMATION
0
1. The authority citation for part 5 continues to read as follows:
Authority: 6 U.S.C. 101 et seq.; Pub. L. 107-296, 116 Stat.
2135; 5 U.S.C. 301. Subpart A also issued under 5 U.S.C. 552.
Subpart B also issued under 5 U.S.C. 552a.
0
2. Add at the end of appendix C to part 5, the following new paragraph
``52'':
Appendix C to Part 5--DHS Systems of Records Exempt From the Privacy
Act
* * * * *
52. The DHS/ALL--031 ISE SAR Initiative System of Records
consists of electronic records and will be used by DHS and its
components. The DHS/ALL--031 ISE SAR Initiative System of Records is
a repository of information held by DHS in connection with its
several and varied missions and functions, including, but not
limited to the enforcement of civil and criminal laws;
investigations, inquiries, and proceedings there under;
[[Page 79949]]
national security and intelligence activities; and protection of the
President of the U.S. or other individuals pursuant to Section 3056
and 3056A of Title 18. The DHS/ALL--031 ISE SAR Initiative System of
Records contains information that is collected by, on behalf of, in
support of, or in cooperation with DHS, its components, as well as
other federal, state, local, tribal, or foreign agencies or private
sector organization and may contain personally identifiable
information collected by other federal, state, local, tribal,
foreign, or international government agencies. The Secretary of
Homeland Security has exempted this system from the following
provisions of the Privacy Act, subject to the limitations set forth
in 5 U.S.C. 552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3),
(e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5), (e)(8), and (e)(12); (f);
(g)(1); and (h) of the Privacy Act pursuant to 5 U.S.C. 552a(j)(2).
Additionally, the Secretary of Homeland Security has exempted this
system from the following provisions of the Privacy Act, subject to
the limitation set forth in 5 U.S.C. 552a(c)(3); (d); (e)(1),
(e)(4)(G), (e)(4)(H), (e)(4)(I); and (f) of the Privacy Act pursuant
to 5 U.S.C. 552a(k)(2) and (k)(3). Exemptions from these particular
subsections are justified, on a case-by-case basis to be determined
at the time a request is made, for the following reasons:
(a) From subsection (c)(3) and (c)(4) (Accounting for
Disclosures) because release of the accounting of disclosures could
alert the subject of an investigation of an actual or potential
criminal, civil, or regulatory violation to the existence of that
investigation and reveal investigative interest on the part of DHS
as well as the recipient agency. Disclosure of the accounting would
therefore present a serious impediment to law enforcement efforts
and/or efforts to preserve national security. Disclosure of the
accounting would also permit the individual who is the subject of a
record to impede the investigation, to tamper with witnesses or
evidence, and to avoid detection or apprehension, which would
undermine the entire investigative process.
(b) From subsection (d) (Access to Records) because access to
the records contained in this system of records could inform the
subject of an investigation of an actual or potential criminal,
civil, or regulatory violation to the existence of that
investigation and reveal investigative interest on the part of DHS
or another agency. Access to the records could permit the individual
who is the subject of a record to impede the investigation, to
tamper with witnesses or evidence, and to avoid detection or
apprehension. Amendment of the records could interfere with ongoing
investigations and law enforcement activities and would impose an
unreasonable administrative burden by requiring investigations to be
continually reinvestigated. In addition, permitting access and
amendment to such information could disclose security-sensitive
information that could be detrimental to homeland security.
(c) From subsection (e)(1) (Relevancy and Necessity of
Information) because in the course of investigations into potential
violations of federal law, the accuracy of information obtained or
introduced occasionally may be unclear, or the information may not
be strictly relevant or necessary to a specific investigation. In
the interests of effective law enforcement, it is appropriate to
retain all information that may aid in establishing patterns of
unlawful activity.
(d) From subsection (e)(2) (Collection of Information from
Individuals) because requiring that information be collected from
the subject of an investigation would alert the subject to the
nature or existence of the investigation, thereby interfering with
that investigation and related law enforcement activities.
(e) From subsection (e)(3) (Notice to Subjects) because
providing such detailed information could impede law enforcement by
compromising the existence of a confidential investigation or reveal
the identity of witnesses or confidential informants.
(f) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency
Requirements) and (f) (Agency Rules), because portions of this
system are exempt from the individual access provisions of
subsection (d) for the reasons noted above, and therefore DHS is not
required to establish requirements, rules, or procedures with
respect to such access. Providing notice to individuals with respect
to existence of records pertaining to them in the system of records
or otherwise setting up procedures pursuant to which individuals may
access and view records pertaining to themselves in the system would
undermine investigative efforts and reveal the identities of
witnesses, and potential witnesses, and confidential informants.
(g) From subsection (e)(5) (Collection of Information) because
with the collection of information for law enforcement purposes, it
is impossible to determine in advance what information is accurate,
relevant, timely, and complete. Compliance with subsection (e)(5)
would preclude DHS agents from using their investigative training
and exercise of good judgment to both conduct and report on
investigations.
(h) From subsection (e)(8) (Notice on Individuals) because
compliance would interfere with DHS's ability to obtain, serve, and
issue subpoenas, warrants, and other law enforcement mechanisms that
may be filed under seal and could result in disclosure of
investigative techniques, procedures, and evidence.
(i) From subsection (e)(12) (Computer Matching) if the agency is
a recipient agency or a source agency in a matching program with a
non-Federal agency, with respect to any establishment or revision of
a matching program, at least 30 days prior to conducting such
program, publish in the Federal Register notice of such
establishment or revision.
(j) From subsection (g)(1) (Civil Remedies) to the extent that
the system is exempt from other specific subsections of the Privacy
Act.
(k) From subsection (h) (Legal Guardians) the parent of any
minor, or the legal guardian of any individual who has been declared
to be incompetent due to physical or mental incapacity or age by a
court of competent jurisdiction, may act on behalf of the
individual.
Dated: December 9, 2010.
Mary Ellen Callahan
Chief Privacy Officer, Department of Homeland Security.
[FR Doc. 2010-32000 Filed 12-20-10; 8:45 am]
BILLING CODE 9110-9B-P