Published Privacy Impact Assessments on the Web, 19110-19116 [2011-8086]
Download as PDF
19110
Federal Register / Vol. 76, No. 66 / Wednesday, April 6, 2011 / Notices
Officer in consultation with counsel,
when there exists a legitimate public
interest in the disclosure of the
information or when disclosure is
necessary to preserve confidence in the
integrity of DHS or is necessary to
demonstrate the accountability of DHS’s
officers, employees, or individuals
covered by the system, except to the
extent it is determined that release of
the specific information in the context
of a particular case would constitute an
unwarranted invasion of personal
privacy.
DISCLOSURE TO CONSUMER REPORTING
AGENCIES:
None.
POLICIES AND PRACTICES FOR STORING,
RETRIEVING, ACCESSING, RETAINING, AND
DISPOSING OF RECORDS IN THE SYSTEM:
STORAGE:
Records in this system are stored
electronically or on paper in secure
facilities in a locked drawer behind a
locked door. The records are stored on
magnetic disc, tape, digital media, and
CD–ROM.
RETRIEVABILITY:
Records may be retrieved by an
individual’s name, social security
number, or unique user ID.
SAFEGUARDS:
Records in this system are
safeguarded in accordance with
applicable rules and policies, including
all applicable DHS automated systems
security and access policies. Strict
controls have been imposed to minimize
the risk of compromising the
information that is being stored. Access
to the computer system containing the
records in this system is limited to those
individuals who have a need to know
the information for the performance of
their official duties and who have
appropriate clearances or permissions.
mstockstill on DSKH9S0YB1PROD with NOTICES
RETENTION AND DISPOSAL:
FEMA’s training and exercise records
retention is generally covered under
General Records Schedule (GRS) 1A–
29a, 1–29a(2), and 1–29b; NARA
Authority N1–311–08–2 1a, and NARA
Authority N1–311–88–2 2. Under GRS
1, records are maintained for up to five
years after the cutoff date and then
destroyed. Under NARA Authority N1–
311–08–2 1a, records are retired to the
Federal Records Center (FRC) five years
after the cutoff and destroyed after forty
years. Under NARA Authority N1–311–
88–2 2, records are maintained for six
years and three months after the cutoff
and then destroyed.
VerDate Mar<15>2010
16:52 Apr 05, 2011
Jkt 223001
SYSTEM MANAGER AND ADDRESS:
RECORD ACCESS PROCEDURES:
Privacy Officer, Federal Emergency
Management Agency, Department of
Homeland Security, Washington, DC
20478.
Individuals seeking notification of
and access to any record contained in
this system of records, or seeking to
contest its content, may submit a
request in writing to the FEMA FOIA
Officer, whose contact information can
be found at https://www.dhs.gov/foia
under ‘‘contacts.’’ If an individual
believes more than one component
maintains Privacy Act records
concerning him or her the individual
may submit the request to the Chief
Privacy Officer and Chief Freedom of
Information Act Officer, Department of
Homeland Security, 245 Murray Drive,
SW., Building 410, STOP–0655,
Washington, DC 20528.
When seeking records about yourself
from this system of records or any other
Departmental system of records your
request must conform with the Privacy
Act regulations set forth in 6 CFR part
5. You must first verify your identity,
meaning that you must provide your full
name, current address and date and
place of birth. You must sign your
request, and your signature must either
be notarized or submitted under 28
U.S.C. 1746, a law that permits
statements to be made under penalty of
perjury as a substitute for notarization.
While no specific form is required, you
may obtain forms for this purpose from
the Chief Privacy Officer and Chief
Freedom of Information Act Officer,
https://www.dhs.gov or 1–866–431–0486.
In addition you should provide the
following:
• An explanation of why you believe
the Department would have information
on you;
• Identify which component(s) of the
Department you believe may have the
information about you;
• Specify when you believe the
records would have been created;
• Provide any other information that
will help the FOIA staff determine
which DHS component agency may
have responsive records; and
• If your request is seeking records
pertaining to another living individual,
you must include a statement from that
individual certifying his/her agreement
for you to access his/her records.
Without this bulleted information the
component(s) may not be able to
conduct an effective search, and your
request may be denied due to lack of
specificity or lack of compliance with
applicable regulations.
Frm 00082
Fmt 4703
Sfmt 4703
CONTESTING RECORD PROCEDURES:
See ‘‘Notification Procedure’’ above.
RECORD SOURCE CATEGORIES:
NOTIFICATION PROCEDURE:
PO 00000
See ‘‘Notification Procedure’’ above.
Records are obtained from all
individuals who have registered for,
applied for, participated in, or assisted
with FEMA’s training or exercise
programs including FEMA employees
and contractors, volunteers, other
Federal employees and other
participants such as instructors, course
developers, observers, and interpreters.
EXEMPTIONS CLAIMED FOR THE SYSTEM:
The Secretary of Homeland Security
has exempted this system from the
following provisions of the Privacy Act,
subject to the limitation set forth in 5
U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G),
(e)(4)(H), (e)(4)(I); and (f) pursuant to 5
U.S.C. 552a(k)(6).
Dated: March 3, 2011.
Mary Ellen Callahan,
Chief Privacy Officer, Department of
Homeland Security.
[FR Doc. 2011–8089 Filed 4–5–11; 8:45 am]
BILLING CODE 9111–17–P
DEPARTMENT OF HOMELAND
SECURITY
Office of the Secretary
Published Privacy Impact
Assessments on the Web
Privacy Office, Department of
Homeland Security (DHS).
ACTION: Notice of Publication of Privacy
Impact Assessments (PIAs).
AGENCY:
The Privacy Office of the DHS
has made available forty PIAs on
various programs and systems in the
Department. The assessments were
approved and published on the Privacy
Office’s Web site between May 3, 2010
and January 7, 2011.
DATES: The Privacy Impact Assessments
are available on the DHS Web site until
June 6, 2011, after which they are
obtained by contacting the DHS Privacy
Office (contact information below).
FOR FURTHER INFORMATION CONTACT:
Mary Ellen Callahan, Chief Privacy
Officer, DHS, Washington, DC 20528, or
e-mail: pia@hq.dhs.gov.
SUPPLEMENTARY INFORMATION: Between
May 3, 2010 and January 7, 2011, the
Chief Privacy Officer of the DHS
approved and published forty Privacy
Impact Assessments (PIAs) on the DHS
Privacy Office Web site, https://
www.dhs.gov/privacy, under the link for
SUMMARY:
E:\FR\FM\06APN1.SGM
06APN1
mstockstill on DSKH9S0YB1PROD with NOTICES
Federal Register / Vol. 76, No. 66 / Wednesday, April 6, 2011 / Notices
‘‘Privacy Impact Assessments.’’ Below is
a short summary of the programs,
indicating the DHS component
responsible for the system, and the date
on which the PIA was approved.
Additional information can be found on
the Web site or by contacting the
Privacy Office.
System: E-Verify Program: Use of
Commercial Data for Employer
Verification.
Component: United States Citizenship
and Immigration Services (USCIS).
Date of approval: May 4, 2010.
The Verification Division of USCIS
operates the E-Verify Program, which
provides verification of employment
authorization for employers
participating in the E-Verify program.
The E-Verify Program collects
additional employer business
information from both registering
employers and a commercial data
provider, Dun and Bradstreet (D&B), to
enhance the employer registration
process, manage customer relationships,
improve reporting capabilities and
operational effectiveness. This
expanded information collection
pertains to registered employers
participating in the E-Verify Program.
System: CRCL Matters.
Component: Civil Rights and Civil
Liberties (CRCL).
Date of approval: May 6, 2010.
CRCL has established the CRCL
Matters database. CRCL Matters is a
database developed to respond to
allegations of abuses of civil rights, civil
liberties, and religious, racial, and
ethnic profiling by department
employees and officials. The PIA is
being conducted because CRCL collects
personally identifiable information (PII).
System: Exodus Accountability
Referral System (EARS).
Component: Immigration and
Customs Enforcement (ICE).
Date of approval: May 6, 2010.
In order to enforce U.S. federal export
control laws, ICE and U.S. Customs and
Border Protection (CBP) require
information from federal regulatory
agencies that grant export licenses on
controlled items; specifically whether a
license is required and whether a
license has been granted. The ICE
Exodus Command Center operates the
EARS database that initiates, tracks, and
manages requests to regulatory agencies
for this information. The purpose of the
PIA is to document the system’s
collection and use of PII.
System: Hiring Information Tracking
System (HITS).
Component: ICE.
Date of approval: May 13, 2010.
HITS is an information system used
by ICE to track current and prior hiring
VerDate Mar<15>2010
16:52 Apr 05, 2011
Jkt 223001
actions. HITS maintains information
about individuals who are selected for
vacant positions at ICE. ICE has
conducted the PIA because HITS collect
PII about individuals who are offered
employment with ICE.
System: First Responder Technologies
(R-Tech) Program.
Component: Science and Technology
(S&T).
Date of approval: May 13, 2010.
The DHS S&T First Responder
Technologies (R-Tech) program requires
the collection of personal information
and video recordings of first responder
research volunteers in support of
operational testing, evaluation,
demonstration, and outreach activities.
The PIA discusses the risks associated
with the use of volunteers to test first
responder technologies that are not
privacy sensitive.
System: Equal Employment
Opportunities (EEO) Eagle Compliant
Enterprise System.
Component: CRCL.
Date of approval: June 3, 2010.
The CRCL EEO Program operates the
EEO Eagle Complaint Enterprise
System. EEO Eagle is an electronic
records system used to track complaints
and supporting documentation related
to individual and class complaints of
employment discrimination and
retaliation prohibited by the DHS civil
rights statutes. CRCL EEO has
conducted this PIA because EEO Eagle
collects and stores PII.
System: Security and Safety Computer
Network.
Component: United States Coast
Guard (USCG).
Date of approval: June 16, 2010.
The USCG operates the Coast Guard
Headquarters (CGHQ) Support
Command Security and Safety
Computer Network (CSS LAN). The CSS
LAN is a stand-alone system that
encompasses multiple applications that
support: physical access control to the
CGHQ facility, identity verification,
security camera monitoring, and key
security and tracking for master keys
that are used throughout CGHQ. USCG
conducted this PIA because the
applications that comprise the CSS LAN
collect PII.
System: Digital Mail Pilot Program.
Component: DHS Wide.
Date of approval: June 18, 2010.
The DHS Office of the Chief
Administrative Officer (OCAO) has
implemented a Digital Mail Pilot
Program for DHS Headquarters (HQ) and
Components within the National Capital
Region. The Digital Mail Pilot Program
provides users the opportunity to
receive mail via email thereby
PO 00000
Frm 00083
Fmt 4703
Sfmt 4703
19111
improving DHS business processes and
increasing security. The purpose of this
PIA is to demonstrate that the Digital
Mail Pilot Program has considered and
incorporated privacy protections of PII
that may be collected, used,
disseminated, and maintained
throughout the entire lifecycle of the
program.
System: Accessibility Compliance
Management System (ACMS).
Component: DHS Wide.
Date of approval: June 22, 2010.
The DHS Office of Accessible Systems
& Technology (OAST) operates the
Accessibility Compliance Management
System (ACMS). ACMS is intended to
bring together a web-based DHS-wide
single point-of-entry reporting system.
ACMS allows documenting and
reporting of all Section 508 compliance
and accessibility activities it
consistently tracks current status and
progress towards meeting Section 508
compliance requirements for OAST and
Component Accessible Systems and
Technology Programs (ASTP). The PIA
is being conducted to determine any
privacy issues with customer
information.
System: Publicly Available Social
Media Monitoring and Situational
Awareness Initiative.
Component: Office of Operations
Coordination and Planning (OPS).
Date of approval: June 22, 2010.
The OPS, National Operations Center
(NOC), has launched and lead the
Publicly Available Social Media
Monitoring and Situational Awareness
(Initiative) to assist DHS and its
components involved in fulfilling OPS
statutory responsibility (Section 515 of
the Homeland Security Act (6 U.S.C.
321d(b)(1)) to provide situational
awareness and establish a common
operating picture for the federal
government, and for those state, local,
and tribal governments, as appropriate.
While this Initiative is not designed to
actively collect PII, OPS conducted this
PIA because the Initiative could
potentially involve PII or other
information received in an identifiable
form. In the event PII comes into the
Department’s possession under this
Initiative, the NOC will redact all PII
prior to further dissemination of any
collected information. In the event of an
in extremis situation involving potential
life and death, OPS will share certain
PII with the responding authority in
order for them to take the necessary
actions to save a life, such as name and
location of a person calling for help
buried under rubble, or hiding in a hotel
room when the hotel is under attack by
terrorists.
E:\FR\FM\06APN1.SGM
06APN1
mstockstill on DSKH9S0YB1PROD with NOTICES
19112
Federal Register / Vol. 76, No. 66 / Wednesday, April 6, 2011 / Notices
System: MyTSA.
Component: Transportation Security
Administration (TSA).
Date of approval: July 1, 2010.
TSA’s MyTSA consists of a mobile
and an iTunes application that provides
the traveling public access to relevant
TSA travel information via any mobile
phone with internet access. MyTSA
allows individuals to access such
information as the types of items that
may be carried through TSA security
checkpoints, basic information
regarding TSA checkpoint policy,
estimated wait times at TSA
checkpoints, and current travel
conditions. The MyTSA application
does not collect or use personally
identifiable information. The PIA
addresses the privacy impact of TSA’s
use of mobile media for delivering
information to the public.
System: iComplaints.
Component: CRCL.
Date of approval: July 8, 2010.
CRCL EEO Program operates the
iComplaints Complaint Enterprise
System. IComplaints is an electronic
records system used to track complaints
and supporting documentation relating
to individual and class complaints of
employment discrimination and
retaliation prohibited by DHS civil
rights statutes. IComplaints will replace
EEO Eagle as EEO Eagle is being
decommissioned. CRCL EEO has
conducted this PIA because iComplaints
collects and stores PII.
System: Operations Center Incident
Management System (OCIMS) Update.
Component: TSA.
Date of approval: July 12, 2010.
Under the Aviation and
Transportation Security Act (ATSA),
TSA has ‘‘responsibility for security in
all modes of transportation.’’ TSA uses
an operations center incident
management system called WebEOC to
perform incident management,
coordination, and situation awareness
functions for all modes of
transportation. The system stores
information that it receives about the
following categories of individuals:
(1) Individuals who violate, or are
suspected of violating transportation
security laws, regulations, policies or
procedures; (2) individuals whose
behavior or suspicious activity resulted
in referrals by Ticket Document
Checkers to Behavior Detection Officer
or Law Enforcement Officer interview
(primarily at airports); or (3) individuals
whose identity must be verified, or
checked against federal watch lists.
Individuals whose identity must be
verified includes both those individuals
who fail to show acceptable
VerDate Mar<15>2010
16:52 Apr 05, 2011
Jkt 223001
identification documents to compare to
boarding documents and law
enforcement officials seeking to fly
armed. The system collects and
compiles reports from federal, state,
local, tribal, or private sector security
officials related to incidents that may
pose a threat to transportation or
national security. TSA republished this
PIA to clarify that the TSA Operations
Center will record telephonic
communications. The PIA previously
disclosed in section 1.4 that telephone
calls were a source of information but
did not explicitly state that telephone
calls would be recorded. Daily reports
will be provided to executives at TSA
and DHS to assist in incident and
operational response management.
System: Targeted Violence
Information Sharing System (TAVISS).
Component: United States Secret
Service (USSS).
Date of approval: July 13, 2010.
USSS has created the Targeted
Violence Information Sharing System
(TAVISS). TAVISS is used to conduct
name checks and determine whether a
subject is of protective interest to any
agency within the TAVISS network. The
Secret Service is conducting this PIA
because TAVISS contains personally
identifiable information (PII) regarding
subjects of protective interest to the
Secret Service and agencies
participating in the network.
System: Watchlist Service.
Component: DHS Wide.
Date of approval: July 14, 2010.
DHS currently uses the Terrorist
Screening Database (TSDB), a
consolidated database maintained by
the Department of Justice Federal
Bureau of Investigation Terrorist
Screening Center (TSC) of identifying
information about those known or
reasonably suspected of being involved
in terrorist activity in order to facilitate
DHS mission-related functions, such
counterterrorism, law enforcement,
border security, and inspection
activities. DHS and TSC are improving
the current method of transmitting
TSDB data from TSC to DHS. Through
a new service called the ‘‘DHS Watchlist
Service’’ (WLS), TSC and DHS will
automate and simplify the current
manual process. TSC remains the
authoritative source of watchlist data
and will provide DHS with near realtime synchronization of the TSDB. DHS
will ensure that each DHS component
system receives only those TSDB
records which they are authorized to
use under the WLS Memorandum of
Understanding and authorized under
existing regulations and privacy
compliance documentation between
PO 00000
Frm 00084
Fmt 4703
Sfmt 4703
TSC and DHS (WLS MOU) and any
amendments or modifications thereto.
DHS conducted this privacy impact
assessment (PIA) because the WLS will
maintain a synchronized copy of the
TSDB, which contains PII, and
disseminate it to authorized DHS
components.
System: Significant Event Notification
(SEN) System.
Component: ICE.
Date of approval: July 26, 2010.
The Significant Event Notification
system (SEN) is a reporting and law
enforcement intelligence transmission
capability developed for DHS and ICE.
The ICE Office of Homeland Security
Investigations initiated the reporting
capability to create reports for ICE field
and headquarters managers to provide
timely information about critical
incidents, activities, and events that
involve or impact ICE field staff. The
system also handles law enforcement
intelligence communication from ICE
Office of Enforcement and Removal
Operations field offices to field and
headquarters managers and the ERO
Intelligence Operations Unit. The PIA is
being completed to provide notice of the
existence of SEN and to publicly
document the privacy protections in
place.
System: Enforcement Integrated
Database (EID) Update.
Component: ICE.
Date of approval: July 28, 2010.
The Enforcement Integrated Database
(EID) is a DHS shared common database
repository for several DHS law
enforcement and homeland security
applications. EID captures and
maintains information related to the
investigation, arrest, booking, detention,
and removal of persons encountered
during immigration and criminal law
enforcement investigations and
operations conducted by ICE and CBP,
both components within DHS. The PIA
for EID was published in January 2010.
The information entered into EID and
the scope of external information
sharing is being expanded, thus
necessitating an update to the EID PIA.
System: Iris and Face Technology
Demonstration and Evaluation (IFTDE).
Component: Science and Technology
(S&T).
Date of approval: August 12, 2010.
As part of its Multi-Modal Biometrics
Projects, S&T Directorate and the
National Institute of Standards and
Technology (NIST) are investigating iris
recognition as a promising biometric
modality that may become suitable to
support DHS operations in the near
future. As iris recognition technologies
mature, it is important to understand
E:\FR\FM\06APN1.SGM
06APN1
mstockstill on DSKH9S0YB1PROD with NOTICES
Federal Register / Vol. 76, No. 66 / Wednesday, April 6, 2011 / Notices
the capabilities and limitations of the
technologies in operational settings, as
well as what additional technology
development is necessary to reduce
technical risk in potential future
acquisitions by DHS operational
components. The purpose of this
evaluation of iris recognition
technologies is to conduct field trials/
studies of iris camera prototypes under
conditions and environments of
relevance (e.g., humidity levels, amount
of sunlight, etc.) to DHS operational
users to assess the viability of the
technology and its potential operational
effectiveness in support of DHS
operations. S&T is conducting a PIA
because biometric information is being
collected from individuals detained in
an operational setting.
System: Freedom of Information Act
(FOIA) and Privacy Act (PA) Records
Program.
Component: DHS Wide.
Date of approval: August 18, 2010.
DHS and its components have
established a Departmental Freedom of
Information Act (FOIA) and Privacy Act
(PA) Program to maintain records
created by the Department’s FOIA and
PA staff, as well as manage a multitude
of FOIA and PA systems. While DHS
has established the Department’s FOIA
and PA program, some components
have established information technology
as well as paper-based systems designed
to handle component-specific FOIA and
PA processing. The purpose of the
various systems within the FOIA and
PA program is to process record
requests and administrative appeals
under the FOIA and PA, as well as
access, notification, and amendment
requests and appeals under the PA.
These systems also maintain records
used in litigation arising from such
requests and appeals, and in assisting
DHS in carrying out any other
responsibilities under the FOIA and PA.
The DHS Privacy Office has conducted
PIA to assess the risks presented by the
use of PII in the various FOIA and PA
processes and systems employed by
DHS’ FOIA and PA program.
System: Entellitrack.
Component: CRCL.
Date of approval: August 23, 2010.
CRCL and TSA have established a
new database called Entellitrak which is
an enterprise tracking system that has
been configured to track, search, and
report on complaints data. It is a
database developed to respond to
allegations of abuses of civil rights, civil
liberties, and religious, racial, and
ethnic profiling by department
employees and officials. Entellitrak will
replace the legacy system CRCL Matters
VerDate Mar<15>2010
16:52 Apr 05, 2011
Jkt 223001
with all CRCL Matters data migrating
onto Entellitrak in the transition. The
PIA is being conducted because
Entellitrak collects and stores PII.
System: Watchlist Service Update.
Component: DHS Wide.
Date of approval: September 7, 2010.
DHS currently uses the Terrorist
Screening Database (TSDB), a
consolidated database maintained by
the Department of Justice Federal
Bureau of Investigation Terrorist
Screening Center (TSC) that contains
identifying information about those
known or reasonably suspected of being
involved in terrorist activity in order to
facilitate DHS mission-related functions,
such counterterrorism, law enforcement,
border security, and inspection
activities. In July 2010, DHS launched
an improved method of transmitting
TSDB data from TSC to DHS through a
new service called the ‘‘DHS Watchlist
Service’’ (WLS). At that time, DHS
published a PIA to describe and analyze
privacy risks associated with this new
service. The WLS maintains a
synchronized copy of the TSDB, which
contains PII, and disseminates it to
authorized DHS components. DHS is
issuing this privacy impact assessment
update to identify two additional
authorized DHS recipients of TSDB data
via the WLS in the form of a computer
readable extract: the DHS Office of
Intelligence and Analysis and the ICE.
System: Citizenship and Immigration
Data Repository (CIDR).
Component: USCIS.
Date of approval: September 8, 2010.
DHS and USCIS developed the
Citizenship Immigration Data
Repository (CIDR), hosted on DHS
classified networks, in order to make
information from multiple USCIS
benefits administration systems
available for querying by authorized
USCIS personnel for the following three
purposes: (1) Vetting USCIS application
information for indications of possible
immigration fraud and national security
concerns; (2) detecting possible fraud
and misuse of immigration information
or position by USCIS employees, for
personal gain or by coercion; and (3)
responding to requests for information
(RFIs) from the DHS Office of
Intelligence and Analysis (I&A) and/or
the federal intelligence and law
enforcement community members that
are based on classified criteria. In
conjunction with this PIA, DHS is
issuing a new Privacy Act system of
records notice to cover the search
parameters and the results of the
searches.
System: Access to Sensitive Security
Information and Contract Solicitation.
PO 00000
Frm 00085
Fmt 4703
Sfmt 4703
19113
Component: TSA.
Date of approval: September 9, 2010.
TSA is responsible for the acquisition
of services and supplies related to
protecting the nation’s transportation
system. If determined necessary for the
proposal preparation process, TSA may
permit offerors to have access to
Sensitive Security Information (SSI)
necessary to prepare a proposal. SSI is
a form of unclassified information that
if publicly released would be
detrimental to transportation security.
The standards governing SSI are
promulgated under 49 U.S.C. 114(r) in
49 CFR part 1520. In order to determine
if a potential offer or may be granted
access to SSI in the pre-contract award
acquisition process, TSA will conduct a
security threat assessment (STA) of the
individuals and company. The STA may
include a verification of site facility
clearance in the National Industrial
Security Program, contractor suitability
determination or other federal
background investigation, individual
security clearance(s), and if required, a
criminal history records check and/or a
check against terrorism databases.
Because this program entails a new
collection of information about
members of the public in identifiable
form, the E-Government Act of 2002 and
the Homeland Security Act of 2002
requires that TSA conduct a PIA.
System: Eversity Enterprise System.
Component: CRCL.
Date of approval: September 14, 2010.
The CRCL EEO Program operates the
Eversity Enterprise System. Eversity is
an electronic records system used in
workforce analysis, tracking,
management, and reporting required
under Equal Employment Opportunity
Commission (EEOC) Management
Directive (MD) 715. CRCL EEO has
conducted this PIA because Eversity
collects and stores PII.
System: Social Networking
Interactions and Applications
(Communications/Outreach/Public
Dialogue).
Component: DHS Wide.
Date of approval: September 16, 2010.
Social networking interactions and
applications includes a sphere of nongovernment Web sites and web-based
tools that focuses on connecting users,
inside and outside of the DHS, to engage
in dialogue, share information and
media, and collaborate. Third parties
control and operate these nongovernmental websites; however, the
Department may use them as alternative
channels to provide robust information
and engage with the public. The
Department may also use these websites
to make information and services
E:\FR\FM\06APN1.SGM
06APN1
mstockstill on DSKH9S0YB1PROD with NOTICES
19114
Federal Register / Vol. 76, No. 66 / Wednesday, April 6, 2011 / Notices
widely available, while promoting
transparency and accountability, as a
service for those seeking information
about or services from the Department.
This PIA analyzes the Department’s use
of social networking and how these
interactions and applications could
result in the Department receiving PII.
This PIA describes the information the
Department may have access to, how it
will use the information, what
information is retained and shared, and
how individuals can gain access to and
correct their information.
System: Alien Criminal Response
Information Management System
(ACRIMe) & Enforcement Integrated
Database (EID) Update.
Component: ICE.
Date of approval: September 29, 2010.
ACRIMe is an information system
used by ICE to receive and respond to
immigration status inquiries made by
other agencies about individuals
arrested, subject to background checks,
or otherwise encountered by those
agencies. EID is an ICE case
management system that captures and
maintains information related to the
investigation, arrest, booking, detention,
and removal of persons encountered
during immigration and criminal law
enforcement investigations and
operations conducted by ICE and U.S.
Customs and Border Protection. ICE is
combining ACRIMe and EID data via the
ICE Integrated Decision Support System,
a reporting sub system of EID, to enable
and enhance comprehensive reporting
about criminal aliens throughout the
alien identification, apprehension, and
removal process. To effectuate this
reporting, ICE is modifying ACRIMe to
expand its user base within the agency,
implementing new user functionality in
ACRIMe and EID, and updating IIDS to
support enhanced reporting of ACRIMe
and EID data. ICE is further expanding
ACRIMe support for the Secure
Communities initiative. ICE is
conducting this PIA update to address
these modifications and enhancements.
System: National File Tracking
System (NFTS).
Component: USCIS.
Date of approval: October 5, 2010.
USCIS has prepared this PIA for the
National File Tracking System (NFTS).
NFTS is an automated file-tracking
system used to maintain an accurate file
inventory and track the physical
location of files. The system facilitates
USCIS’s ability to efficiently manage
and streamline access to the millions of
immigration files under its control.
USCIS is conducting this PIA to
document, analyze and assess the
current practices with respect to the PII,
NFTS collects, uses and shares.
VerDate Mar<15>2010
16:52 Apr 05, 2011
Jkt 223001
System: Standoff Technology
Integration and Demonstration Program
Update.
Component: S&T.
Date of approval: October 14, 2010.
S&T has updated the Standoff
Explosives Detection Technology
Demonstration Program (now referred to
as the Standoff Technology Integration
and Demonstration Program, or STIDP)
PIA issued July 21, 2008 to reflect
updates to the program involving live
crowd testing.
The program is adding new
technologies, expanding the use of the
test center, enhancing object tracking
technologies and beginning to distribute
crowd video data to vendors. The PIA
update identifies and addresses the
privacy issues associated with public
test and evaluation activities on
technologies that will be acquired,
matured, and integrated by STIDP
between now and the end of the
program, currently slated for 2014.
Based on the privacy issues identified,
three sets of privacy protective
requirements were developed and
implemented at all stages of the
program. The Live Testing
Requirements and Law Enforcement
Operations Requirements apply to
conducting and operating a test in a
public environment and the Data
Protection Requirements address the
collection and protection of PII. These
requirements, when systematically
applied to test and evaluation plans and
their implementation, ensure that
privacy concerns are appropriately
addressed for broad classes of
technologies tested in a range of venues
with and without law enforcement
operations. This update assists STIDP’s
mission of developing an integrated
countermeasure architecture to prevent
person-borne improvised explosive
device attacks.
System: Electronic Surveillance
System (ELSUR).
Component: ICE.
Date of approval: November 2, 2010.
The Electronic Surveillance System
(ELSUR) is owned by ICE. ELSUR
allows ICE to track and search for ICE
applications for court orders that
authorize ICE to intercept oral, wire, or
electronic communications during the
course of a criminal investigation. ICE
conducted this PIA because ELSUR
contains PII and to publicly document
the privacy protections that are in place.
System: Immigration Benefits
Background Check Systems (IBBCS).
Component: USCIS.
Date of approval: November 5, 2010.
As part of its benefits adjudication
process and as required by law, USCIS
PO 00000
Frm 00086
Fmt 4703
Sfmt 4703
conducts background checks on
petitioners and applicants who seek
certain immigration benefits. These
background checks consist of four
separate checks against systems within
Department of Justice (DOJ), Federal
Bureau of Investigation (FBI), and DHS.
In order to facilitate the collection and
transmission of information necessary to
complete background check processes,
USCIS maintains five information
technology electronic systems: The
Fingerprint Masthead Notification
System (FMNS), the Customer Identity
Capture System (CICS), the FD–258
Tracking System—Mainframe (FD–258
MF), the Benefits Biometrics Support
System (BBSS), and the Interagency
Border Inspection System (IBIS)
Manifest. USCIS is conducting this PIA
because FMNS, CICS, FD–258 MF,
BBSS, and IBIS Manifest collect, use,
and share PII. The PIA replaces the
previously published USCIS PIA for the
‘‘Background Check Service (BCS)’’
which describes planned background
check-related systems that were never
implemented. Upon publication of this
PIA, the BCS PIA will be retired.
System: Quality Assurance Recording
System (QARS).
Component: Federal Emergency
Management Agency (FEMA).
Date of approval: November 10, 2010.
FEMA, Response and Recovery
Bureau operates the QARS. The
proposed system of telephone call and
computer screen capture recording is for
internal employee and contractor
performance evaluation, training and
quality assurance purposes to improve
customer service to disaster assistance
applicants requesting assistance under
the Robert T. Stafford Disaster Relief
and Emergency Assistance Act. FEMA is
conducting the PIA because QARS call
recordings and screen captures
information about the FEMA employees
and/or contractors as they provide
customer service to disaster assistance
applicants. The system will maintain
information about disaster assistance
applicants, but the focus of this system
is on employee and contractor quality
assurance.
System: Protective Research
Information System Management
(PRISM–ID).
Component: USSS.
Date of approval: November 12, 2010.
USSS has created and used the
PRISM–ID system to record information
that in accordance with Secret Service
criteria is required to assist the agency
in meeting its protective mission that
includes the protection of the President,
Vice President, their immediate
families, former Presidents and First
E:\FR\FM\06APN1.SGM
06APN1
mstockstill on DSKH9S0YB1PROD with NOTICES
Federal Register / Vol. 76, No. 66 / Wednesday, April 6, 2011 / Notices
Ladies, major candidates for the
presidency and vice presidency, foreign
heads of state visiting the United States,
and other individuals authorized to
receive Secret Service protection. The
PIA is being conducted because PRISM–
ID collects PII.
System: Department of Homeland
Security Information Sharing
Environment Suspicious Activity
Reporting Initiative (ISE–SAR).
Component: DHS Wide.
Date of approval: November 17, 2010.
The Office and Intelligence and
Analysis, primarily through the State
and Local Program Office in
coordination with the Office of
Operations Coordination Planning, is
leading the DHS effort to implement the
Nationwide Suspicious Activity
Reporting Initiative (NSI). The NSI is a
key aspect of the federal Information
Sharing Environment (ISE) that
Congress created in the Intelligence
Reform and Terrorism Prevention Act of
2004 (IRPTA). The NSI is overseen by
DOJ and is designed to support the
sharing of information through the ISE
about suspicious activities which are
defined as ‘‘official documentation of
observed behavior reasonably indicative
of pre-operational planning related to
terrorism or other criminal activity
[related to terrorism].’’ The Office of
Intelligence and Analysis and the Office
of Operations and Coordination
Planning have been jointly coordinating
activities throughout DHS to develop a
department-level interface with the NSI
that will enable DHS to share
Suspicious Activity Reporting (SAR)
that meet the ISE–SAR Functional
Standard Version 1.5 (hereinafter
referred to as ISE–SAR). Throughout
this PIA, the term ‘‘SAR’’ refers to
suspicious activity reporting, which
may include activities that do not have
a nexus to terrorism, and the term ‘‘ISE–
SAR’’ refers to a subset of SAR that meet
the ISE–SAR Functional Standard. The
ISE–SAR Functional Standard Version
1.5 defines an ISE–SAR as official
documentation of observed behavior
reasonably indicative of: Pre-operational
planning related to terrorism or other
criminal activity associated with
terrorism. DHS conducted the PIA
because ISE–SAR may contain PII. The
PIA describes the coordinated activities
of the DHS ISE–SAR Initiative,
including the process for DHS
component level review, identification,
and submission of ISE–SAR to the NSI
Shared Space as well as the technology
that DHS developed to support DHS’
participation in the NSI.
System: Research Project Involving
Volunteers.
VerDate Mar<15>2010
16:52 Apr 05, 2011
Jkt 223001
Component: S&T.
Date of approval: November 23, 2010.
An integral part of the S&T mission is
to conduct research, development,
testing, and evaluation (RDT&E) on
technologies or topics related to
improving homeland security and
combating terrorism. Some S&T RDT&E
activities use volunteers to test,
evaluate, provide feedback, or otherwise
collect data on certain research topics,
technologies, equipment, and
capabilities related to S&T’s mission.
Volunteer RDT&E activities require the
collection of a range of information from
volunteers including work experience,
biographic data and images. RDT&E
activities will vary in the types and
breadth of data elements and
information collected from volunteers.
S&T is conducting this PIA to establish
protections for all volunteer S&T RTD&E
activities. Volunteer RDT&E activities
that are covered by the PIA are listed in
the appendix, updated periodically.
System: NOC Patriot Report Database.
Component: OPS.
Date of approval: December 7, 2010.
The NOC in OPS operates the NOC
Patriot Report Database. The NOC
Patriot Report Database is a repository
for reports generated to record and track
suspicious activity that may implicate
terrorism-related or criminal activity.
OPS has conducted this PIA because the
NOC Patriot Report Database may
contain PII.
System: Electronic Discovery Software
System (EDSS).
Component: ICE.
Date of approval: December 10, 2010.
The Electronic Discovery Software
System (EDSS) is owned by the Office
of the Principal Legal Advisor (OPLA)
within ICE. EDSS supports the
collection and organization of paper and
electronic documents for analysis,
review, redaction, and production to
meet litigation discovery requirements.
ICE may also use the system to process
agency records in response to FOIA or
PA requests. ICE conducted this PIA
because EDSS collects, analyzes, and
stores PII.
System: TECS System: CBP Primary
and Secondary Processing.
Component: CBP.
Date of approval: December 23, 2010.
The TECS (not an acronym) System is
the updated and modified version of the
former Treasury Enforcement
Communications System. TECS is
owned and managed by CBP. TECS is
both an information-sharing platform,
which allows users to access different
databases that may be maintained on the
platform or accessed through the
platform, and the name of a system of
PO 00000
Frm 00087
Fmt 4703
Sfmt 4703
19115
records that include temporary and
permanent enforcement, inspection, and
operational records relevant to the
antiterrorism and law enforcement
mission of CBP and numerous other
federal agencies that it supports. TECS
not only provides a platform for
interaction between these systems and
defined TECS users, but also serves as
a data repository to support law
enforcement ‘‘lookouts,’’ border
screening, and reporting for CBP’s
primary and secondary inspection
processes, which are generally
referenced as TECS Records or Subject
Records. In order to provide more
transparency as it relates to the
functions and data in TECS, CBP
published separate PIAs and Privacy
Act System of Records Notices (SORNs)
for the CBP sub-systems based on the
purpose and use of the information. CBP
also maintains other federal agency data
on TECS to stage the information for use
by CBP at the time an individual
presents himself/herself to CBP. This
allows TECS to work more efficiently
and reduces the performance impact on
the originating systems. The PIA focuses
on CBP’s use and modernization of
TECS as it relates to the primary and
secondary inspection processes
(including information collected in
advance of arrival, during inspections at
the United States (U.S.) port of entry
(POE), and retention of information and
reports following interactions during
U.S. border crossing activities) to ensure
compliance with the numerous laws
enforced by CBP, including determining
the admissibility of persons attempting
to enter the U.S. CBP will issue a
separate PIA to address the information
access and system linkages facilitated
for CBP, DHS, and other federal agency
systems that link to TECS and share
data within the TECS user community.
System: ELBC System: Exit Line
Breach Control System.
Component: TSA.
Date of approval: December 28, 2010.
TSA has conducted an assessment of
ELBC systems for use in airports. The
assessment will evaluate the ELBC
systems’ capability to monitor traffic
flow at the exit lanes from the sterile
areas of the airport and initiate an
automated response if it appears that an
individual is entering the sterile area
through the exit lane. TSA will make
results of the assessment available to
airports seeking to implement such
systems. This PIA is being conducted to
provide transparency into TSA testing
affecting the public and the collection of
images as part of the assessment. If TSA
decides to implement such systems for
E:\FR\FM\06APN1.SGM
06APN1
mstockstill on DSKH9S0YB1PROD with NOTICES
19116
Federal Register / Vol. 76, No. 66 / Wednesday, April 6, 2011 / Notices
its own use, a new PIA will be
conducted.
System: NICC SARS: National
Infrastructure Coordinating Center
Suspicious Activity Reporting Initiative
(NICC).
Component: National Protection and
Programs Directorate (NPPD).
Date of approval: December 29, 2010.
NPPD Office of Infrastructure
Protection (IP) National Infrastructure
Coordinating Center (NICC) has
published this PIA to reflect activities
under its Suspicious Activity Reporting
(SAR) Initiative. The NICC SAR
Initiative serves as a mechanism by
which a report involving suspicious
behavior related to an observed
encounter or reported activity is
received and evaluated to determine its
potential nexus to terrorism. NICC is
conducting this PIA because SAR
occasionally contain PII and NICC will
be collecting and contributing SAR data
for reporting and evaluation
proceedings.
System: Publicly Available Social
Media Monitoring and Situational
Awareness Initiative Update.
Component: OPS.
Date of approval: January 7, 2011.
OPS, NOC, leads the Publicly
Available Social Media Monitoring and
Situational Awareness (Initiative) to
assist the DHS and its components
involved in fulfilling OPS statutory
responsibility (Section 515 of the
Homeland Security Act (6 U.S.C.
321d(b)(1)) to provide situational
awareness and establish a common
operating picture for the federal
government, and for those state, local,
and tribal governments, as appropriate.
The NOC and participating components
may also share this de-identified
information with international partners
and the private sector where necessary
and appropriate for coordination. While
this Initiative is not designed to actively
collect PII, OPS is conducting this
update to the PIA because the initiative
may now collect and disseminate PII for
certain narrowly tailored categories. For
example, in the event of an in extremis
situation involving potential life and
death, OPS will share certain PII with
the responding authority in order for
them to take the necessary actions to
save a life, such as name and location
of a person calling for help buried under
rubble, or hiding in a hotel room when
the hotel is under attack by terrorists. In
the event PII comes into the
Department’s possession under
circumstances other than those itemized
herein, the NOC will redact all PII prior
to further dissemination of any collected
information. After conducting the
VerDate Mar<15>2010
16:52 Apr 05, 2011
Jkt 223001
Second Privacy Compliance Review, it
was determined that the PIA should be
updated to allow for collection and
dissemination of PII in a limited number
of situations in order to respond to the
evolving operational needs of the NOC.
The PIA will be reviewed every six
months to ensure compliance. The
review will be done in conjunction with
a Privacy Office-led Privacy Compliance
Review (PCR) of the Initiative and of
OPS social media monitoring Internetbased platforms and information
technology infrastructure.
Dated: March 17, 2011.
Mary Ellen Callahan,
Chief Privacy Officer, Department of
Homeland Security.
[FR Doc. 2011–8086 Filed 4–5–11; 8:45 am]
BILLING CODE 9110–9L–P
DEPARTMENT OF HOMELAND
SECURITY
Federal Emergency Management
Agency
[Internal Agency Docket No. FEMA–1960–
DR; Docket ID FEMA–2011–0001]
Illinois; Major Disaster and Related
Determinations
Federal Emergency
Management Agency, DHS.
ACTION: Notice.
AGENCY:
This is a notice of the
Presidential declaration of a major
disaster for the State of Illinois (FEMA–
1960–DR), dated March 17, 2011, and
related determinations.
DATES: Effective Date: March 17, 2011.
FOR FURTHER INFORMATION CONTACT:
Peggy Miller, Office of Response and
Recovery, Federal Emergency
Management Agency, 500 C Street, SW.,
Washington, DC 20472, (202) 646–3886.
SUPPLEMENTARY INFORMATION: Notice is
hereby given that, in a letter dated
March 17, 2011, the President issued a
major disaster declaration under the
authority of the Robert T. Stafford
Disaster Relief and Emergency
Assistance Act, 42 U.S.C. 5121 et seq.
(the ‘‘Stafford Act’’), as follows:
SUMMARY:
I have determined that the damage in
certain areas of the State of Illinois resulting
from a severe winter storm and snowstorm
during the period of January 31 to February
3, 2011, is of sufficient severity and
magnitude to warrant a major disaster
declaration under the Robert T. Stafford
Disaster Relief and Emergency Assistance
Act, 42 U.S.C. 5121 et seq. (the ‘‘Stafford
Act’’). Therefore, I declare that such a major
disaster exists in the State of Illinois.
In order to provide Federal assistance, you
are hereby authorized to allocate from funds
PO 00000
Frm 00088
Fmt 4703
Sfmt 4703
available for these purposes such amounts as
you find necessary for Federal disaster
assistance and administrative expenses.
You are authorized to provide Public
Assistance in the designated areas and
Hazard Mitigation throughout the State. You
are further authorized to provide emergency
protective measures, including snow
assistance, under the Public Assistance
program for any continuous 48-hour period
during or proximate to the incident period.
You may extend the period of assistance, as
warranted. This assistance excludes regular
time costs for the sub-grantees’ regular
employees. Consistent with the requirement
that Federal assistance is supplemental, any
Federal funds provided under the Stafford
Act for Public Assistance and Hazard
Mitigation will be limited to 75 percent of the
total eligible costs.
Further, you are authorized to make
changes to this declaration for the approved
assistance to the extent allowable under the
Stafford Act.
The Federal Emergency Management
Agency (FEMA) hereby gives notice that
pursuant to the authority vested in the
Administrator, under Executive Order
12148, as amended, Gregory W. Eaton,
of FEMA is appointed to act as the
Federal Coordinating Officer for this
major disaster.
The following areas of the State of
Illinois have been designated as
adversely affected by this major disaster:
Adams, Bond, Boone, Brown, Bureau,
Calhoun, Carroll, Cass, Christian, Clark, Clay,
Coles, Cook, Crawford, Cumberland, DeKalb,
Douglas, DuPage, Edgar, Effingham, Fayette,
Ford, Fulton, Hancock, Henderson, Henry,
Jasper, Jo Daviess, Kane, Knox, Lake, LaSalle,
Lee, Logan, Marion, Marshall, Mason,
McDonough, McHenry, Menard, Mercer,
Morgan, Moultrie, Ogle, Peoria, Pike,
Putnam, Richland, Rock Island, Schuyler,
Scott, Shelby, Stark, Tazewell, Warren,
Washington, Whiteside, Will, Winnebago,
and Woodford Counties for Public
Assistance.
Bureau, Calhoun, Carroll, Cass, Cook,
DeKalb, DuPage, Fulton, Hancock, Henry, Jo
Daviess, Kane, Lake, LaSalle, Lee, Logan,
Marshall, Mason, McDonough, Mercer,
Morgan, Ogle, Peoria, Pike, Putnam, Rock
Island, Schuyler, Stark, Tazewell, Warren,
Whiteside, Will, Winnebago, and Woodford
Counties for emergency protective measures
(Category B), including snow assistance,
under the Public Assistance program for any
continuous 48-hour period during or
proximate to the incident period. This
emergency assistance will be provided for a
period of 72 hours for the counties of Adams,
Boone, Brown, Ford, Henderson, Knox,
McHenry, Menard, and Scott.
All counties within the State of Illinois are
eligible to apply for assistance under the
Hazard Mitigation Grant Program.
The following Catalog of Federal Domestic
Assistance Numbers (CFDA) are to be used
for reporting and drawing funds: 97.030,
Community Disaster Loans; 97.031, Cora
Brown Fund; 97.032, Crisis Counseling;
97.033, Disaster Legal Services; 97.034,
E:\FR\FM\06APN1.SGM
06APN1
Agencies
[Federal Register Volume 76, Number 66 (Wednesday, April 6, 2011)]
[Notices]
[Pages 19110-19116]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 2011-8086]
-----------------------------------------------------------------------
DEPARTMENT OF HOMELAND SECURITY
Office of the Secretary
Published Privacy Impact Assessments on the Web
AGENCY: Privacy Office, Department of Homeland Security (DHS).
ACTION: Notice of Publication of Privacy Impact Assessments (PIAs).
-----------------------------------------------------------------------
SUMMARY: The Privacy Office of the DHS has made available forty PIAs on
various programs and systems in the Department. The assessments were
approved and published on the Privacy Office's Web site between May 3,
2010 and January 7, 2011.
DATES: The Privacy Impact Assessments are available on the DHS Web site
until June 6, 2011, after which they are obtained by contacting the DHS
Privacy Office (contact information below).
FOR FURTHER INFORMATION CONTACT: Mary Ellen Callahan, Chief Privacy
Officer, DHS, Washington, DC 20528, or e-mail: pia@hq.dhs.gov.
SUPPLEMENTARY INFORMATION: Between May 3, 2010 and January 7, 2011, the
Chief Privacy Officer of the DHS approved and published forty Privacy
Impact Assessments (PIAs) on the DHS Privacy Office Web site, https://www.dhs.gov/privacy, under the link for
[[Page 19111]]
``Privacy Impact Assessments.'' Below is a short summary of the
programs, indicating the DHS component responsible for the system, and
the date on which the PIA was approved. Additional information can be
found on the Web site or by contacting the Privacy Office.
System: E-Verify Program: Use of Commercial Data for Employer
Verification.
Component: United States Citizenship and Immigration Services
(USCIS).
Date of approval: May 4, 2010.
The Verification Division of USCIS operates the E-Verify Program,
which provides verification of employment authorization for employers
participating in the E-Verify program. The E-Verify Program collects
additional employer business information from both registering
employers and a commercial data provider, Dun and Bradstreet (D&B), to
enhance the employer registration process, manage customer
relationships, improve reporting capabilities and operational
effectiveness. This expanded information collection pertains to
registered employers participating in the E-Verify Program.
System: CRCL Matters.
Component: Civil Rights and Civil Liberties (CRCL).
Date of approval: May 6, 2010.
CRCL has established the CRCL Matters database. CRCL Matters is a
database developed to respond to allegations of abuses of civil rights,
civil liberties, and religious, racial, and ethnic profiling by
department employees and officials. The PIA is being conducted because
CRCL collects personally identifiable information (PII).
System: Exodus Accountability Referral System (EARS).
Component: Immigration and Customs Enforcement (ICE).
Date of approval: May 6, 2010.
In order to enforce U.S. federal export control laws, ICE and U.S.
Customs and Border Protection (CBP) require information from federal
regulatory agencies that grant export licenses on controlled items;
specifically whether a license is required and whether a license has
been granted. The ICE Exodus Command Center operates the EARS database
that initiates, tracks, and manages requests to regulatory agencies for
this information. The purpose of the PIA is to document the system's
collection and use of PII.
System: Hiring Information Tracking System (HITS).
Component: ICE.
Date of approval: May 13, 2010.
HITS is an information system used by ICE to track current and
prior hiring actions. HITS maintains information about individuals who
are selected for vacant positions at ICE. ICE has conducted the PIA
because HITS collect PII about individuals who are offered employment
with ICE.
System: First Responder Technologies (R-Tech) Program.
Component: Science and Technology (S&T).
Date of approval: May 13, 2010.
The DHS S&T First Responder Technologies (R-Tech) program requires
the collection of personal information and video recordings of first
responder research volunteers in support of operational testing,
evaluation, demonstration, and outreach activities. The PIA discusses
the risks associated with the use of volunteers to test first responder
technologies that are not privacy sensitive.
System: Equal Employment Opportunities (EEO) Eagle Compliant
Enterprise System.
Component: CRCL.
Date of approval: June 3, 2010.
The CRCL EEO Program operates the EEO Eagle Complaint Enterprise
System. EEO Eagle is an electronic records system used to track
complaints and supporting documentation related to individual and class
complaints of employment discrimination and retaliation prohibited by
the DHS civil rights statutes. CRCL EEO has conducted this PIA because
EEO Eagle collects and stores PII.
System: Security and Safety Computer Network.
Component: United States Coast Guard (USCG).
Date of approval: June 16, 2010.
The USCG operates the Coast Guard Headquarters (CGHQ) Support
Command Security and Safety Computer Network (CSS LAN). The CSS LAN is
a stand-alone system that encompasses multiple applications that
support: physical access control to the CGHQ facility, identity
verification, security camera monitoring, and key security and tracking
for master keys that are used throughout CGHQ. USCG conducted this PIA
because the applications that comprise the CSS LAN collect PII.
System: Digital Mail Pilot Program.
Component: DHS Wide.
Date of approval: June 18, 2010.
The DHS Office of the Chief Administrative Officer (OCAO) has
implemented a Digital Mail Pilot Program for DHS Headquarters (HQ) and
Components within the National Capital Region. The Digital Mail Pilot
Program provides users the opportunity to receive mail via email
thereby improving DHS business processes and increasing security. The
purpose of this PIA is to demonstrate that the Digital Mail Pilot
Program has considered and incorporated privacy protections of PII that
may be collected, used, disseminated, and maintained throughout the
entire lifecycle of the program.
System: Accessibility Compliance Management System (ACMS).
Component: DHS Wide.
Date of approval: June 22, 2010.
The DHS Office of Accessible Systems & Technology (OAST) operates
the Accessibility Compliance Management System (ACMS). ACMS is intended
to bring together a web-based DHS-wide single point-of-entry reporting
system. ACMS allows documenting and reporting of all Section 508
compliance and accessibility activities it consistently tracks current
status and progress towards meeting Section 508 compliance requirements
for OAST and Component Accessible Systems and Technology Programs
(ASTP). The PIA is being conducted to determine any privacy issues with
customer information.
System: Publicly Available Social Media Monitoring and Situational
Awareness Initiative.
Component: Office of Operations Coordination and Planning (OPS).
Date of approval: June 22, 2010.
The OPS, National Operations Center (NOC), has launched and lead
the Publicly Available Social Media Monitoring and Situational
Awareness (Initiative) to assist DHS and its components involved in
fulfilling OPS statutory responsibility (Section 515 of the Homeland
Security Act (6 U.S.C. 321d(b)(1)) to provide situational awareness and
establish a common operating picture for the federal government, and
for those state, local, and tribal governments, as appropriate. While
this Initiative is not designed to actively collect PII, OPS conducted
this PIA because the Initiative could potentially involve PII or other
information received in an identifiable form. In the event PII comes
into the Department's possession under this Initiative, the NOC will
redact all PII prior to further dissemination of any collected
information. In the event of an in extremis situation involving
potential life and death, OPS will share certain PII with the
responding authority in order for them to take the necessary actions to
save a life, such as name and location of a person calling for help
buried under rubble, or hiding in a hotel room when the hotel is under
attack by terrorists.
[[Page 19112]]
System: MyTSA.
Component: Transportation Security Administration (TSA).
Date of approval: July 1, 2010.
TSA's MyTSA consists of a mobile and an iTunes application that
provides the traveling public access to relevant TSA travel information
via any mobile phone with internet access. MyTSA allows individuals to
access such information as the types of items that may be carried
through TSA security checkpoints, basic information regarding TSA
checkpoint policy, estimated wait times at TSA checkpoints, and current
travel conditions. The MyTSA application does not collect or use
personally identifiable information. The PIA addresses the privacy
impact of TSA's use of mobile media for delivering information to the
public.
System: iComplaints.
Component: CRCL.
Date of approval: July 8, 2010.
CRCL EEO Program operates the iComplaints Complaint Enterprise
System. IComplaints is an electronic records system used to track
complaints and supporting documentation relating to individual and
class complaints of employment discrimination and retaliation
prohibited by DHS civil rights statutes. IComplaints will replace EEO
Eagle as EEO Eagle is being decommissioned. CRCL EEO has conducted this
PIA because iComplaints collects and stores PII.
System: Operations Center Incident Management System (OCIMS)
Update.
Component: TSA.
Date of approval: July 12, 2010.
Under the Aviation and Transportation Security Act (ATSA), TSA has
``responsibility for security in all modes of transportation.'' TSA
uses an operations center incident management system called WebEOC to
perform incident management, coordination, and situation awareness
functions for all modes of transportation. The system stores
information that it receives about the following categories of
individuals: (1) Individuals who violate, or are suspected of violating
transportation security laws, regulations, policies or procedures; (2)
individuals whose behavior or suspicious activity resulted in referrals
by Ticket Document Checkers to Behavior Detection Officer or Law
Enforcement Officer interview (primarily at airports); or (3)
individuals whose identity must be verified, or checked against federal
watch lists. Individuals whose identity must be verified includes both
those individuals who fail to show acceptable identification documents
to compare to boarding documents and law enforcement officials seeking
to fly armed. The system collects and compiles reports from federal,
state, local, tribal, or private sector security officials related to
incidents that may pose a threat to transportation or national
security. TSA republished this PIA to clarify that the TSA Operations
Center will record telephonic communications. The PIA previously
disclosed in section 1.4 that telephone calls were a source of
information but did not explicitly state that telephone calls would be
recorded. Daily reports will be provided to executives at TSA and DHS
to assist in incident and operational response management.
System: Targeted Violence Information Sharing System (TAVISS).
Component: United States Secret Service (USSS).
Date of approval: July 13, 2010.
USSS has created the Targeted Violence Information Sharing System
(TAVISS). TAVISS is used to conduct name checks and determine whether a
subject is of protective interest to any agency within the TAVISS
network. The Secret Service is conducting this PIA because TAVISS
contains personally identifiable information (PII) regarding subjects
of protective interest to the Secret Service and agencies participating
in the network.
System: Watchlist Service.
Component: DHS Wide.
Date of approval: July 14, 2010.
DHS currently uses the Terrorist Screening Database (TSDB), a
consolidated database maintained by the Department of Justice Federal
Bureau of Investigation Terrorist Screening Center (TSC) of identifying
information about those known or reasonably suspected of being involved
in terrorist activity in order to facilitate DHS mission-related
functions, such counterterrorism, law enforcement, border security, and
inspection activities. DHS and TSC are improving the current method of
transmitting TSDB data from TSC to DHS. Through a new service called
the ``DHS Watchlist Service'' (WLS), TSC and DHS will automate and
simplify the current manual process. TSC remains the authoritative
source of watchlist data and will provide DHS with near real-time
synchronization of the TSDB. DHS will ensure that each DHS component
system receives only those TSDB records which they are authorized to
use under the WLS Memorandum of Understanding and authorized under
existing regulations and privacy compliance documentation between TSC
and DHS (WLS MOU) and any amendments or modifications thereto. DHS
conducted this privacy impact assessment (PIA) because the WLS will
maintain a synchronized copy of the TSDB, which contains PII, and
disseminate it to authorized DHS components.
System: Significant Event Notification (SEN) System.
Component: ICE.
Date of approval: July 26, 2010.
The Significant Event Notification system (SEN) is a reporting and
law enforcement intelligence transmission capability developed for DHS
and ICE. The ICE Office of Homeland Security Investigations initiated
the reporting capability to create reports for ICE field and
headquarters managers to provide timely information about critical
incidents, activities, and events that involve or impact ICE field
staff. The system also handles law enforcement intelligence
communication from ICE Office of Enforcement and Removal Operations
field offices to field and headquarters managers and the ERO
Intelligence Operations Unit. The PIA is being completed to provide
notice of the existence of SEN and to publicly document the privacy
protections in place.
System: Enforcement Integrated Database (EID) Update.
Component: ICE.
Date of approval: July 28, 2010.
The Enforcement Integrated Database (EID) is a DHS shared common
database repository for several DHS law enforcement and homeland
security applications. EID captures and maintains information related
to the investigation, arrest, booking, detention, and removal of
persons encountered during immigration and criminal law enforcement
investigations and operations conducted by ICE and CBP, both components
within DHS. The PIA for EID was published in January 2010. The
information entered into EID and the scope of external information
sharing is being expanded, thus necessitating an update to the EID PIA.
System: Iris and Face Technology Demonstration and Evaluation
(IFTDE).
Component: Science and Technology (S&T).
Date of approval: August 12, 2010.
As part of its Multi-Modal Biometrics Projects, S&T Directorate and
the National Institute of Standards and Technology (NIST) are
investigating iris recognition as a promising biometric modality that
may become suitable to support DHS operations in the near future. As
iris recognition technologies mature, it is important to understand
[[Page 19113]]
the capabilities and limitations of the technologies in operational
settings, as well as what additional technology development is
necessary to reduce technical risk in potential future acquisitions by
DHS operational components. The purpose of this evaluation of iris
recognition technologies is to conduct field trials/studies of iris
camera prototypes under conditions and environments of relevance (e.g.,
humidity levels, amount of sunlight, etc.) to DHS operational users to
assess the viability of the technology and its potential operational
effectiveness in support of DHS operations. S&T is conducting a PIA
because biometric information is being collected from individuals
detained in an operational setting.
System: Freedom of Information Act (FOIA) and Privacy Act (PA)
Records Program.
Component: DHS Wide.
Date of approval: August 18, 2010.
DHS and its components have established a Departmental Freedom of
Information Act (FOIA) and Privacy Act (PA) Program to maintain records
created by the Department's FOIA and PA staff, as well as manage a
multitude of FOIA and PA systems. While DHS has established the
Department's FOIA and PA program, some components have established
information technology as well as paper-based systems designed to
handle component-specific FOIA and PA processing. The purpose of the
various systems within the FOIA and PA program is to process record
requests and administrative appeals under the FOIA and PA, as well as
access, notification, and amendment requests and appeals under the PA.
These systems also maintain records used in litigation arising from
such requests and appeals, and in assisting DHS in carrying out any
other responsibilities under the FOIA and PA. The DHS Privacy Office
has conducted PIA to assess the risks presented by the use of PII in
the various FOIA and PA processes and systems employed by DHS' FOIA and
PA program.
System: Entellitrack.
Component: CRCL.
Date of approval: August 23, 2010.
CRCL and TSA have established a new database called Entellitrak
which is an enterprise tracking system that has been configured to
track, search, and report on complaints data. It is a database
developed to respond to allegations of abuses of civil rights, civil
liberties, and religious, racial, and ethnic profiling by department
employees and officials. Entellitrak will replace the legacy system
CRCL Matters with all CRCL Matters data migrating onto Entellitrak in
the transition. The PIA is being conducted because Entellitrak collects
and stores PII.
System: Watchlist Service Update.
Component: DHS Wide.
Date of approval: September 7, 2010.
DHS currently uses the Terrorist Screening Database (TSDB), a
consolidated database maintained by the Department of Justice Federal
Bureau of Investigation Terrorist Screening Center (TSC) that contains
identifying information about those known or reasonably suspected of
being involved in terrorist activity in order to facilitate DHS
mission-related functions, such counterterrorism, law enforcement,
border security, and inspection activities. In July 2010, DHS launched
an improved method of transmitting TSDB data from TSC to DHS through a
new service called the ``DHS Watchlist Service'' (WLS). At that time,
DHS published a PIA to describe and analyze privacy risks associated
with this new service. The WLS maintains a synchronized copy of the
TSDB, which contains PII, and disseminates it to authorized DHS
components. DHS is issuing this privacy impact assessment update to
identify two additional authorized DHS recipients of TSDB data via the
WLS in the form of a computer readable extract: the DHS Office of
Intelligence and Analysis and the ICE.
System: Citizenship and Immigration Data Repository (CIDR).
Component: USCIS.
Date of approval: September 8, 2010.
DHS and USCIS developed the Citizenship Immigration Data Repository
(CIDR), hosted on DHS classified networks, in order to make information
from multiple USCIS benefits administration systems available for
querying by authorized USCIS personnel for the following three
purposes: (1) Vetting USCIS application information for indications of
possible immigration fraud and national security concerns; (2)
detecting possible fraud and misuse of immigration information or
position by USCIS employees, for personal gain or by coercion; and (3)
responding to requests for information (RFIs) from the DHS Office of
Intelligence and Analysis (I&A) and/or the federal intelligence and law
enforcement community members that are based on classified criteria. In
conjunction with this PIA, DHS is issuing a new Privacy Act system of
records notice to cover the search parameters and the results of the
searches.
System: Access to Sensitive Security Information and Contract
Solicitation.
Component: TSA.
Date of approval: September 9, 2010.
TSA is responsible for the acquisition of services and supplies
related to protecting the nation's transportation system. If determined
necessary for the proposal preparation process, TSA may permit offerors
to have access to Sensitive Security Information (SSI) necessary to
prepare a proposal. SSI is a form of unclassified information that if
publicly released would be detrimental to transportation security. The
standards governing SSI are promulgated under 49 U.S.C. 114(r) in 49
CFR part 1520. In order to determine if a potential offer or may be
granted access to SSI in the pre-contract award acquisition process,
TSA will conduct a security threat assessment (STA) of the individuals
and company. The STA may include a verification of site facility
clearance in the National Industrial Security Program, contractor
suitability determination or other federal background investigation,
individual security clearance(s), and if required, a criminal history
records check and/or a check against terrorism databases. Because this
program entails a new collection of information about members of the
public in identifiable form, the E-Government Act of 2002 and the
Homeland Security Act of 2002 requires that TSA conduct a PIA.
System: Eversity Enterprise System.
Component: CRCL.
Date of approval: September 14, 2010.
The CRCL EEO Program operates the Eversity Enterprise System.
Eversity is an electronic records system used in workforce analysis,
tracking, management, and reporting required under Equal Employment
Opportunity Commission (EEOC) Management Directive (MD) 715. CRCL EEO
has conducted this PIA because Eversity collects and stores PII.
System: Social Networking Interactions and Applications
(Communications/Outreach/Public Dialogue).
Component: DHS Wide.
Date of approval: September 16, 2010.
Social networking interactions and applications includes a sphere
of non-government Web sites and web-based tools that focuses on
connecting users, inside and outside of the DHS, to engage in dialogue,
share information and media, and collaborate. Third parties control and
operate these non-governmental websites; however, the Department may
use them as alternative channels to provide robust information and
engage with the public. The Department may also use these websites to
make information and services
[[Page 19114]]
widely available, while promoting transparency and accountability, as a
service for those seeking information about or services from the
Department. This PIA analyzes the Department's use of social networking
and how these interactions and applications could result in the
Department receiving PII. This PIA describes the information the
Department may have access to, how it will use the information, what
information is retained and shared, and how individuals can gain access
to and correct their information.
System: Alien Criminal Response Information Management System
(ACRIMe) & Enforcement Integrated Database (EID) Update.
Component: ICE.
Date of approval: September 29, 2010.
ACRIMe is an information system used by ICE to receive and respond
to immigration status inquiries made by other agencies about
individuals arrested, subject to background checks, or otherwise
encountered by those agencies. EID is an ICE case management system
that captures and maintains information related to the investigation,
arrest, booking, detention, and removal of persons encountered during
immigration and criminal law enforcement investigations and operations
conducted by ICE and U.S. Customs and Border Protection. ICE is
combining ACRIMe and EID data via the ICE Integrated Decision Support
System, a reporting sub system of EID, to enable and enhance
comprehensive reporting about criminal aliens throughout the alien
identification, apprehension, and removal process. To effectuate this
reporting, ICE is modifying ACRIMe to expand its user base within the
agency, implementing new user functionality in ACRIMe and EID, and
updating IIDS to support enhanced reporting of ACRIMe and EID data. ICE
is further expanding ACRIMe support for the Secure Communities
initiative. ICE is conducting this PIA update to address these
modifications and enhancements.
System: National File Tracking System (NFTS).
Component: USCIS.
Date of approval: October 5, 2010.
USCIS has prepared this PIA for the National File Tracking System
(NFTS). NFTS is an automated file-tracking system used to maintain an
accurate file inventory and track the physical location of files. The
system facilitates USCIS's ability to efficiently manage and streamline
access to the millions of immigration files under its control. USCIS is
conducting this PIA to document, analyze and assess the current
practices with respect to the PII, NFTS collects, uses and shares.
System: Standoff Technology Integration and Demonstration Program
Update.
Component: S&T.
Date of approval: October 14, 2010.
S&T has updated the Standoff Explosives Detection Technology
Demonstration Program (now referred to as the Standoff Technology
Integration and Demonstration Program, or STIDP) PIA issued July 21,
2008 to reflect updates to the program involving live crowd testing.
The program is adding new technologies, expanding the use of the
test center, enhancing object tracking technologies and beginning to
distribute crowd video data to vendors. The PIA update identifies and
addresses the privacy issues associated with public test and evaluation
activities on technologies that will be acquired, matured, and
integrated by STIDP between now and the end of the program, currently
slated for 2014. Based on the privacy issues identified, three sets of
privacy protective requirements were developed and implemented at all
stages of the program. The Live Testing Requirements and Law
Enforcement Operations Requirements apply to conducting and operating a
test in a public environment and the Data Protection Requirements
address the collection and protection of PII. These requirements, when
systematically applied to test and evaluation plans and their
implementation, ensure that privacy concerns are appropriately
addressed for broad classes of technologies tested in a range of venues
with and without law enforcement operations. This update assists
STIDP's mission of developing an integrated countermeasure architecture
to prevent person-borne improvised explosive device attacks.
System: Electronic Surveillance System (ELSUR).
Component: ICE.
Date of approval: November 2, 2010.
The Electronic Surveillance System (ELSUR) is owned by ICE. ELSUR
allows ICE to track and search for ICE applications for court orders
that authorize ICE to intercept oral, wire, or electronic
communications during the course of a criminal investigation. ICE
conducted this PIA because ELSUR contains PII and to publicly document
the privacy protections that are in place.
System: Immigration Benefits Background Check Systems (IBBCS).
Component: USCIS.
Date of approval: November 5, 2010.
As part of its benefits adjudication process and as required by
law, USCIS conducts background checks on petitioners and applicants who
seek certain immigration benefits. These background checks consist of
four separate checks against systems within Department of Justice
(DOJ), Federal Bureau of Investigation (FBI), and DHS. In order to
facilitate the collection and transmission of information necessary to
complete background check processes, USCIS maintains five information
technology electronic systems: The Fingerprint Masthead Notification
System (FMNS), the Customer Identity Capture System (CICS), the FD-258
Tracking System--Mainframe (FD-258 MF), the Benefits Biometrics Support
System (BBSS), and the Interagency Border Inspection System (IBIS)
Manifest. USCIS is conducting this PIA because FMNS, CICS, FD-258 MF,
BBSS, and IBIS Manifest collect, use, and share PII. The PIA replaces
the previously published USCIS PIA for the ``Background Check Service
(BCS)'' which describes planned background check-related systems that
were never implemented. Upon publication of this PIA, the BCS PIA will
be retired.
System: Quality Assurance Recording System (QARS).
Component: Federal Emergency Management Agency (FEMA).
Date of approval: November 10, 2010.
FEMA, Response and Recovery Bureau operates the QARS. The proposed
system of telephone call and computer screen capture recording is for
internal employee and contractor performance evaluation, training and
quality assurance purposes to improve customer service to disaster
assistance applicants requesting assistance under the Robert T.
Stafford Disaster Relief and Emergency Assistance Act. FEMA is
conducting the PIA because QARS call recordings and screen captures
information about the FEMA employees and/or contractors as they provide
customer service to disaster assistance applicants. The system will
maintain information about disaster assistance applicants, but the
focus of this system is on employee and contractor quality assurance.
System: Protective Research Information System Management (PRISM-
ID).
Component: USSS.
Date of approval: November 12, 2010.
USSS has created and used the PRISM-ID system to record information
that in accordance with Secret Service criteria is required to assist
the agency in meeting its protective mission that includes the
protection of the President, Vice President, their immediate families,
former Presidents and First
[[Page 19115]]
Ladies, major candidates for the presidency and vice presidency,
foreign heads of state visiting the United States, and other
individuals authorized to receive Secret Service protection. The PIA is
being conducted because PRISM-ID collects PII.
System: Department of Homeland Security Information Sharing
Environment Suspicious Activity Reporting Initiative (ISE-SAR).
Component: DHS Wide.
Date of approval: November 17, 2010.
The Office and Intelligence and Analysis, primarily through the
State and Local Program Office in coordination with the Office of
Operations Coordination Planning, is leading the DHS effort to
implement the Nationwide Suspicious Activity Reporting Initiative
(NSI). The NSI is a key aspect of the federal Information Sharing
Environment (ISE) that Congress created in the Intelligence Reform and
Terrorism Prevention Act of 2004 (IRPTA). The NSI is overseen by DOJ
and is designed to support the sharing of information through the ISE
about suspicious activities which are defined as ``official
documentation of observed behavior reasonably indicative of pre-
operational planning related to terrorism or other criminal activity
[related to terrorism].'' The Office of Intelligence and Analysis and
the Office of Operations and Coordination Planning have been jointly
coordinating activities throughout DHS to develop a department-level
interface with the NSI that will enable DHS to share Suspicious
Activity Reporting (SAR) that meet the ISE-SAR Functional Standard
Version 1.5 (hereinafter referred to as ISE-SAR). Throughout this PIA,
the term ``SAR'' refers to suspicious activity reporting, which may
include activities that do not have a nexus to terrorism, and the term
``ISE-SAR'' refers to a subset of SAR that meet the ISE-SAR Functional
Standard. The ISE-SAR Functional Standard Version 1.5 defines an ISE-
SAR as official documentation of observed behavior reasonably
indicative of: Pre-operational planning related to terrorism or other
criminal activity associated with terrorism. DHS conducted the PIA
because ISE-SAR may contain PII. The PIA describes the coordinated
activities of the DHS ISE-SAR Initiative, including the process for DHS
component level review, identification, and submission of ISE-SAR to
the NSI Shared Space as well as the technology that DHS developed to
support DHS' participation in the NSI.
System: Research Project Involving Volunteers.
Component: S&T.
Date of approval: November 23, 2010.
An integral part of the S&T mission is to conduct research,
development, testing, and evaluation (RDT&E) on technologies or topics
related to improving homeland security and combating terrorism. Some
S&T RDT&E activities use volunteers to test, evaluate, provide
feedback, or otherwise collect data on certain research topics,
technologies, equipment, and capabilities related to S&T's mission.
Volunteer RDT&E activities require the collection of a range of
information from volunteers including work experience, biographic data
and images. RDT&E activities will vary in the types and breadth of data
elements and information collected from volunteers. S&T is conducting
this PIA to establish protections for all volunteer S&T RTD&E
activities. Volunteer RDT&E activities that are covered by the PIA are
listed in the appendix, updated periodically.
System: NOC Patriot Report Database.
Component: OPS.
Date of approval: December 7, 2010.
The NOC in OPS operates the NOC Patriot Report Database. The NOC
Patriot Report Database is a repository for reports generated to record
and track suspicious activity that may implicate terrorism-related or
criminal activity. OPS has conducted this PIA because the NOC Patriot
Report Database may contain PII.
System: Electronic Discovery Software System (EDSS).
Component: ICE.
Date of approval: December 10, 2010.
The Electronic Discovery Software System (EDSS) is owned by the
Office of the Principal Legal Advisor (OPLA) within ICE. EDSS supports
the collection and organization of paper and electronic documents for
analysis, review, redaction, and production to meet litigation
discovery requirements. ICE may also use the system to process agency
records in response to FOIA or PA requests. ICE conducted this PIA
because EDSS collects, analyzes, and stores PII.
System: TECS System: CBP Primary and Secondary Processing.
Component: CBP.
Date of approval: December 23, 2010.
The TECS (not an acronym) System is the updated and modified
version of the former Treasury Enforcement Communications System. TECS
is owned and managed by CBP. TECS is both an information-sharing
platform, which allows users to access different databases that may be
maintained on the platform or accessed through the platform, and the
name of a system of records that include temporary and permanent
enforcement, inspection, and operational records relevant to the
antiterrorism and law enforcement mission of CBP and numerous other
federal agencies that it supports. TECS not only provides a platform
for interaction between these systems and defined TECS users, but also
serves as a data repository to support law enforcement ``lookouts,''
border screening, and reporting for CBP's primary and secondary
inspection processes, which are generally referenced as TECS Records or
Subject Records. In order to provide more transparency as it relates to
the functions and data in TECS, CBP published separate PIAs and Privacy
Act System of Records Notices (SORNs) for the CBP sub-systems based on
the purpose and use of the information. CBP also maintains other
federal agency data on TECS to stage the information for use by CBP at
the time an individual presents himself/herself to CBP. This allows
TECS to work more efficiently and reduces the performance impact on the
originating systems. The PIA focuses on CBP's use and modernization of
TECS as it relates to the primary and secondary inspection processes
(including information collected in advance of arrival, during
inspections at the United States (U.S.) port of entry (POE), and
retention of information and reports following interactions during U.S.
border crossing activities) to ensure compliance with the numerous laws
enforced by CBP, including determining the admissibility of persons
attempting to enter the U.S. CBP will issue a separate PIA to address
the information access and system linkages facilitated for CBP, DHS,
and other federal agency systems that link to TECS and share data
within the TECS user community.
System: ELBC System: Exit Line Breach Control System.
Component: TSA.
Date of approval: December 28, 2010.
TSA has conducted an assessment of ELBC systems for use in
airports. The assessment will evaluate the ELBC systems' capability to
monitor traffic flow at the exit lanes from the sterile areas of the
airport and initiate an automated response if it appears that an
individual is entering the sterile area through the exit lane. TSA will
make results of the assessment available to airports seeking to
implement such systems. This PIA is being conducted to provide
transparency into TSA testing affecting the public and the collection
of images as part of the assessment. If TSA decides to implement such
systems for
[[Page 19116]]
its own use, a new PIA will be conducted.
System: NICC SARS: National Infrastructure Coordinating Center
Suspicious Activity Reporting Initiative (NICC).
Component: National Protection and Programs Directorate (NPPD).
Date of approval: December 29, 2010.
NPPD Office of Infrastructure Protection (IP) National
Infrastructure Coordinating Center (NICC) has published this PIA to
reflect activities under its Suspicious Activity Reporting (SAR)
Initiative. The NICC SAR Initiative serves as a mechanism by which a
report involving suspicious behavior related to an observed encounter
or reported activity is received and evaluated to determine its
potential nexus to terrorism. NICC is conducting this PIA because SAR
occasionally contain PII and NICC will be collecting and contributing
SAR data for reporting and evaluation proceedings.
System: Publicly Available Social Media Monitoring and Situational
Awareness Initiative Update.
Component: OPS.
Date of approval: January 7, 2011.
OPS, NOC, leads the Publicly Available Social Media Monitoring and
Situational Awareness (Initiative) to assist the DHS and its components
involved in fulfilling OPS statutory responsibility (Section 515 of the
Homeland Security Act (6 U.S.C. 321d(b)(1)) to provide situational
awareness and establish a common operating picture for the federal
government, and for those state, local, and tribal governments, as
appropriate. The NOC and participating components may also share this
de-identified information with international partners and the private
sector where necessary and appropriate for coordination. While this
Initiative is not designed to actively collect PII, OPS is conducting
this update to the PIA because the initiative may now collect and
disseminate PII for certain narrowly tailored categories. For example,
in the event of an in extremis situation involving potential life and
death, OPS will share certain PII with the responding authority in
order for them to take the necessary actions to save a life, such as
name and location of a person calling for help buried under rubble, or
hiding in a hotel room when the hotel is under attack by terrorists. In
the event PII comes into the Department's possession under
circumstances other than those itemized herein, the NOC will redact all
PII prior to further dissemination of any collected information. After
conducting the Second Privacy Compliance Review, it was determined that
the PIA should be updated to allow for collection and dissemination of
PII in a limited number of situations in order to respond to the
evolving operational needs of the NOC. The PIA will be reviewed every
six months to ensure compliance. The review will be done in conjunction
with a Privacy Office-led Privacy Compliance Review (PCR) of the
Initiative and of OPS social media monitoring Internet-based platforms
and information technology infrastructure.
Dated: March 17, 2011.
Mary Ellen Callahan,
Chief Privacy Officer, Department of Homeland Security.
[FR Doc. 2011-8086 Filed 4-5-11; 8:45 am]
BILLING CODE 9110-9L-P