Privacy Act of 1974; Department of Homeland Security Federal Emergency Management Agency-012 Suspicious Activity Reporting System of Records, 60067-60070 [2011-24934]

Download as PDF Federal Register / Vol. 76, No. 188 / Wednesday, September 28, 2011 / Notices security and access policies. Strict controls have been imposed to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need-to-know the information for the performance of their official duties and who have appropriate clearances or permissions. RETENTION AND DISPOSAL: USCIS has submitted to the National Archives and Records Administration (NARA) a retention schedule for these records. USCIS proposes that information collected for an Applicant’s temporary account and all draft benefit requests will be retained for 30 days after initiation. If a first-time Applicant does not formally submit a benefit request within 30 days of opening the temporary account, the information will be deleted. If an Applicant or Representative formally submits a benefit request within the 30-day window, USCIS proposes converting the temporary account to a permanent USCIS ELIS account and retaining the information according to the Electronic Immigration System-1 Account and Case Management SORN and Electronic Immigration System-2 Automated Background Functions SORN. SYSTEM MANAGER AND ADDRESS: The DHS system manager is the Chief, Records Division, U.S. Citizenship and Immigration Services, Department of Homeland Security, U.S. Citizenship and Immigration Services, 20 Massachusetts Avenue, NW., Washington, DC 20529. sroberts on DSK5SPTVN1PROD with NOTICES NOTIFICATION PROCEDURE: Individuals seeking notification of and access to any record contained in this system of records, or seeking to contest its content, may log in to USCIS ELIS to amend their information within the 30-day window. If they submit a benefit request, the information will still be available by logging in to their USCIS ELIS account and may be amended through the processes described in the USCIS ELIS Account and Case Management SORN and USCIS ELIS Automated Background Functions SORN. Because of the temporary nature of this data, records will not likely be available for FOIA requests. However, individuals are free to request records pertaining to them by submitting a request in writing to the National Records Center, FOIA/PA Office, P.O. Box 648010, Lee’s Summit, MO 64064– 8010. Specific FOIA contact information can be found at https://www.dhs.gov/foia VerDate Mar<15>2010 18:20 Sep 27, 2011 Jkt 223001 under ‘‘Contacts.’’ If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, 245 Murray Drive SW., Building 410, STOP–0655, Washington, DC 20528. When seeking records about yourself from this system of records or any other Departmental system of records your request must conform with the Privacy Act regulations set forth in 6 CFR part 5. You must first verify your identity, meaning that you must provide your full name, current address, and date and place of birth. You must sign your request and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, https://www.dhs.gov or 1–866–431–0486. In addition you should provide the following: • An explanation of why you believe the Department would have information on you; • Identify which component(s) of the Department you believe may have the information about you; • Specify when you believe the records would have been created; • Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records; and • If your request is seeking records pertaining to another living individual, you must include a statement from that individual certifying his/her agreement for you to access his/her records. Without this bulleted information the component(s) may not be able to conduct an effective search and your request may be denied due to lack of specificity or lack of compliance with applicable regulations. RECORD ACCESS PROCEDURES: See ‘‘Notification procedure’’ above. CONTESTING RECORD PROCEDURES: See ‘‘Notification procedure’’ above. RECORD SOURCE CATEGORIES: Records are obtained from the Applicant or his or her Representative. EXEMPTIONS CLAIMED FOR THE SYSTEM: None. PO 00000 Frm 00071 Fmt 4703 Sfmt 4703 60067 Dated: September 15, 2011. Mary Ellen Callahan, Chief Privacy Officer, Department of Homeland Security. [FR Doc. 2011–24936 Filed 9–27–11; 8:45 am] BILLING CODE 9111–97–P DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS–2011–0090] Privacy Act of 1974; Department of Homeland Security Federal Emergency Management Agency—012 Suspicious Activity Reporting System of Records Privacy Office, DHS. Notice of Privacy Act system of AGENCY: ACTION: records. In accordance with the Privacy Act of 1974, the Department of Homeland Security proposes to establish a new system of records titled, ‘‘Department of Homeland Security/ Federal Emergency Management Agency—012 Suspicious Activity Reporting System of Records.’’ This system of records allows the Department of Homeland Security/Federal Emergency Management Agency to collect, maintain, and retrieve records on individuals who report suspicious activities, individuals reported as being involved in suspicious activities, and individuals charged with the analysis and appropriate handling of suspicious activity reports. Additionally, the Department of Homeland Security/ Federal Emergency Management Agency is issuing a Notice of Proposed Rulemaking elsewhere in the Federal Register to exempt this system of records from certain provisions of the Privacy Act. This newly established system will be included in the Department of Homeland Security’s inventory of record systems. DATES: Submit comments on or before October 27, 2011. This new system will be effective October 27, 2011. ADDRESSES: You may submit comments, identified by docket number DHS– 2011–0090 by one of the following methods: Federal e-Rulemaking Portal: https:// www.regulations.gov. Follow the instructions for submitting comments. Fax: 703–483–2999. Mail: Mary Ellen Callahan, Chief Privacy Officer, Privacy Office, Department of Homeland Security, Washington, DC 20528. Instructions: All submissions received must include the agency name and docket number for this rulemaking. All SUMMARY: E:\FR\FM\28SEN1.SGM 28SEN1 60068 Federal Register / Vol. 76, No. 188 / Wednesday, September 28, 2011 / Notices comments received will be posted without change to https:// www.regulations.gov, including any personal information provided. Docket: For access to the docket to read background documents or comments received go to https:// www.regulations.gov. For general questions please contact: Dr. Lesia Banks, (202–646–3323), Acting Privacy Officer, Federal Emergency Management Agency, Department of Homeland Security, Washington, DC 20478. For privacy issues please contact: Mary Ellen Callahan (703–235– 0780), Chief Privacy Officer, Privacy Office, Department of Homeland Security, Washington, DC 20528. SUPPLEMENTARY INFORMATION: sroberts on DSK5SPTVN1PROD with NOTICES FOR FURTHER INFORMATION CONTACT: I. Background In accordance with the Privacy Act of 1974, 5 U.S.C. 552a, the Department of Homeland Security (DHS) Federal Emergency Management Agency (FEMA) proposes to establish a new DHS/FEMA system of records titled, ‘‘DHS/FEMA—012 Suspicious Activity Reporting System of Records.’’ FEMA’s mission is to ‘‘support our citizens and first responders to ensure that as a nation we work together to build, sustain, and improve our capability to prepare for, protect against, respond to, recover from, and mitigate all hazards.’’ FEMA will collect, maintain, and retrieve records on individuals who report suspicious activities, individuals reported as being involved in suspicious activities, and individuals charged with the analysis and appropriate handling of suspicious activity reports. FEMA’s Office of the Chief Security Officer (OCSO), Fraud and Investigations Unit, manages this process. To reduce any risk of unauthorized access, FEMA SARs are secured in a room monitored by FEMA OCSO special agents and analysts. FEMA SARs may shared with federal, state, local, and tribal jurisdictions that hold the responsibility of investigating suspicious activities within their jurisdictions. FEMA SARs that do not have a nexus to terrorism or hazards to homeland security, as determined by FEMA OCSO special agents or analysts, are forwarded to the appropriate jurisdiction, such as sheriff offices, county/city police, and state police. FEMA SARs that have a nexus to terrorism or hazards to homeland security, as determined by FEMA OCSO special agents or analysts, are shared with the Federal Bureau of Investigations (FBI) Joint Terrorism Task Force (JTTF), Federal Protective Service, VerDate Mar<15>2010 18:20 Sep 27, 2011 Jkt 223001 and/or other federal agencies required to investigate and respond to terrorist threats or hazards to homeland security. FEMA’s SAR process is authorized and governed by 44 CFR Chapter 2 ‘‘Delegation of Authority;’’ 42 U.S.C. 5196(d); Executive Orders 12333 and 13388; 40 U.S.C. 1315(b)(2)(F); 6 U.S.C. 314; The Homeland Security Act of 2002, as amended; the Intelligence Reform and Terrorism Prevention Act of 2004, as amended; the National Security Act of 1947, as amended; and FEMA Manual 1010–1 ‘‘Federal Emergency Management Agency Missions and Functions.’’ Consistent with DHS’s information sharing mission, information stored in the DHS/FEMA—012 Suspicious Activity Reporting System of Records may be shared with other DHS components, as well as appropriate federal, state, local, tribal, territorial, foreign, or international government agencies. This sharing will only take place after DHS determines that the receiving component or agency has a need to know the information to carry out national security, law enforcement, immigration, intelligence, or other functions consistent with the routine uses set forth in this system of records notice. Additionally, DHS is issuing a Notice of Proposed Rulemaking (NPRM) elsewhere in the Federal Register to exempt this system of records from certain provisions of the Privacy Act. This newly established system will be included in DHS’s inventory of record systems. II. Privacy Act The Privacy Act embodies fair information practice principles in a statutory framework governing the means by which the U.S. Government collects, maintains, uses, and disseminates individuals’’ records. The Privacy Act applies to information that is maintained in a ‘‘system of records.’’ A ‘‘system of records’’ is a group of any records under the control of an agency for which information is retrieved by the name of an individual or by some identifying number, symbol, or other identifying particular assigned to the individual. In the Privacy Act, an individual is defined to encompass U.S. citizens and lawful permanent residents. As a matter of policy, DHS extends administrative Privacy Act protections to all individuals where systems of records maintain information on U.S. citizens, lawful permanent residents, and visitors. Below is the description of the DHS/ FEMA—12 Suspicious Activity Reporting System of Records. PO 00000 Frm 00072 Fmt 4703 Sfmt 4703 In accordance with 5 U.S.C. 552a(r), DHS has provided a report of this system of records to the Office of Management and Budget and to Congress. SYSTEM OF RECORDS Department of Homeland Security (DHS)/ Federal Emergency Management Agency (FEMA)—012 SYSTEM NAME: DHS FEMA—012 Suspicious Activity Reporting. SECURITY CLASSIFICATION: For official use only (FOUO) and law enforcement sensitive (LES). SYSTEM LOCATION: Records are maintained at FEMA Headquarters in Washington, DC and field offices. CATEGORIES OF INDIVIDUALS COVERED BY THE SYSTEM: Individuals who report suspicious activities, individuals reported as being involved in suspicious activities, and individuals charged with the analysis and appropriate handling of suspicious activity reports. CATEGORIES OF RECORDS IN THE SYSTEM: • Case/incident number; • Name (first, middle, and last); • Address (number, street, apartment, city, and state); • Age; • Sex; • Race; • Signature (investigator, analyst, or LEO); • Jurisdiction; • Injury code if applicable; • Telephone numbers (home, business, or cell); • Other contact information (e.g., email address); • Property information (name, quantity, serial number, brand name, model, value, year, make, color, identifying characteristics, and/or registration information). AUTHORITY FOR MAINTENANCE OF THE SYSTEM: 44 CFR Chapter 2 ‘‘Delegation of Authority;’’ 42 U.S.C. 5196(d); Executive Orders 12333 and 13388; 40 U.S.C. 1315(b)(2)(F); 6 U.S.C. 314; The Homeland Security Act of 2002, as amended; the Intelligence Reform and Terrorism Prevention Act of 2004, as amended; the National Security Act of 1947, as amended; and FEMA Manual 1010–1 ‘‘Federal Emergency Management Agency Missions and Functions.’’ PURPOSE(S): The purpose of this system is to collect, investigate, analyze, and report E:\FR\FM\28SEN1.SGM 28SEN1 Federal Register / Vol. 76, No. 188 / Wednesday, September 28, 2011 / Notices suspicious activities to the Federal Bureau of Investigations (FBI) Joint Terrorism Task Force (JTTF), Federal Protective Service, and/or other federal, state, or local agencies required to investigate and respond to terrorist threats or hazards to homeland security. sroberts on DSK5SPTVN1PROD with NOTICES ROUTINE USES OF RECORDS MAINTAINED IN THE SYSTEM, INCLUDING CATEGORIES OF USERS AND THE PURPOSES OF SUCH USES: In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows: A. To the Department of Justice (DOJ), including U.S. Attorney Offices, or other federal agency conducting litigation or in proceedings before any court, adjudicative or administrative body, when it is necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation: 1. DHS or any component thereof; 2. Any employee of DHS in his/her official capacity; 3. Any employee of DHS in his/her individual capacity where DOJ or DHS has agreed to represent the employee; or 4. The U.S. or any agency thereof, is a party to the litigation or has an interest in such litigation, and DHS determines that the records are both relevant and necessary to the litigation and the use of such records is compatible with the purpose for which DHS collected the records. B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains. C. To the National Archives and Records Administration (NARA) or other federal government agencies pursuant to records management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906. D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function. E. To appropriate agencies, entities, and persons when: 1. DHS suspects or has confirmed that the security or confidentiality of information in the system of records has been compromised; 2. DHS has determined that as a result of the suspected or confirmed compromise there is a risk of harm to economic or property interests, identity VerDate Mar<15>2010 18:20 Sep 27, 2011 Jkt 223001 theft or fraud, or harm to the security or integrity of this system or other systems or programs (whether maintained by DHS or another agency or entity) or harm to the individual that rely upon the compromised information; and 3. The disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm. F. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees. G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, where a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure. H. To an appropriate federal, state, tribal, local, international counterterrorism agencies where DHS becomes aware of an indication of a threat or potential threat to security, and where such use is to assist in counterterrorism efforts. I. To an organization or individual in either the public or private sector, either foreign or domestic, where there is a reason to believe that the recipient is or could become the target of a particular terrorist activity or conspiracy, to the extent the information is relevant to the protection of life, property or other vital interests of a data subject and disclosure is proper and consistent with the official duties of the person making the disclosure. J. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information or when disclosure is necessary to preserve confidence in the integrity of DHS or is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals PO 00000 Frm 00073 Fmt 4703 Sfmt 4703 60069 covered by the system, except to the extent it is determined that release of the specific information in the context of a particular case would constitute an unwarranted invasion of personal privacy. DISCLOSURE TO CONSUMER REPORTING AGENCIES: None. POLICIES AND PRACTICES FOR STORING, RETRIEVING, ACCESSING, RETAINING, AND DISPOSING OF RECORDS IN THE SYSTEM: STORAGE: Records in this system are stored electronically or on paper in secure facilities in a locked drawer behind a locked door. The records are stored on magnetic disc, tape, digital media, and CD-ROM. RETRIEVABILITY: Records may be retrieved by case/ incident number, name, address, and/or date. SAFEGUARDS: Records in this system are safeguarded in accordance with applicable rules and policies, including all applicable DHS automated systems security and access policies. Strict controls have been imposed to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those individuals who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions. RETENTION AND DISPOSAL: Pursuant to National Archives and Records Administration (NARA) Schedule Number N1–311–99–6, Items 1, 2, and 3, files containing information or allegations which are of an investigative nature but do not relate to a specific investigation are destroyed when five years old. Investigative case files that involve allegations made against senior agency officials, attract significant attention in the media, attract congressional attention, result in substantive changes in agency policies and procedures, or are cited in the OIG’s periodic reports to Congress are cut off when the case is closed, retired to the Federal Records Center (FRC) 5 years after cutoff, and then transferred to NARA 20 years after cutoff. All other investigative case files except those that are unusually significant for documenting major violations of criminal law or ethical standards by agency officials or others are placed in inactive files when case is closed, cut E:\FR\FM\28SEN1.SGM 28SEN1 60070 Federal Register / Vol. 76, No. 188 / Wednesday, September 28, 2011 / Notices off at the end of fiscal year, and destroyed 10 years after cutoff. SYSTEM MANAGER AND ADDRESS: Office of the Chief Security Officer, Fraud and Investigation Unit, 1201 Maryland Avenue, SW., Washington, DC 20024. sroberts on DSK5SPTVN1PROD with NOTICES NOTIFICATION PROCEDURE: The Secretary of Homeland Security has exempted this system from the notification, access, and amendment procedures of the Privacy Act because it is a law enforcement system. However, DHS/FEMA will consider individual requests to determine whether or not information may be released. Thus, individuals seeking notification of and access to any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief of the FEMA Disclosure Branch whose contact information can be found at https:// www.dhs.gov/foia under ‘‘contacts.’’ If an individual believes more than one component maintains Privacy Act records concerning him or her, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, 245 Murray Drive, SW., Building 410, STOP–0655, Washington, DC 20528. When seeking records about yourself from this system of records or any other Departmental system of records your request must conform with the Privacy Act regulations set forth in 6 CFR Part 5. You must first verify your identity, meaning that you must provide your full name, current address and date and place of birth. You must sign your request, and your signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. While no specific form is required, you may obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act Officer, https://www.dhs.gov or 1–866–431–0486. In addition you should provide the following: • An explanation of why you believe the Department would have information on you; • Identify which component(s) of the Department you believe may have the information about you; • Specify when you believe the records would have been created; • Provide any other information that will help the FOIA staff determine which DHS component agency may have responsive records; and VerDate Mar<15>2010 18:20 Sep 27, 2011 Jkt 223001 • If your request is seeking records pertaining to another living individual, you must include a statement from that individual certifying his/her agreement for you to access his/her records. Without this bulleted information the component(s) may not be able to conduct an effective search, and your request may be denied due to lack of specificity or lack of compliance with applicable regulations. RECORD ACCESS PROCEDURES: See ‘‘Notification procedure’’ above. CONTESTING RECORD PROCEDURES: See ‘‘Notification procedure’’ above. RECORD SOURCE CATEGORIES: Records are obtained from individuals who report suspicious activities, individuals reported as being involved in suspicious activities, and individuals charged with the analysis and appropriate handling of suspicious activity reports, commercially available systems, and also from other federal, state, and local law enforcement agencies. EXEMPTIONS CLAIMED FOR THE SYSTEM: The Secretary of Homeland Security has exempted this system from the following provisions of the Privacy Act, subject to the limitation set forth in 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f) pursuant to 5 U.S.C. 552a (k)(2). Dated: September 9, 2011. Mary Ellen Callahan, Chief Privacy Officer, Department of Homeland Security. [FR Doc. 2011–24934 Filed 9–27–11; 8:45 am] BILLING CODE 9110–17–P DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS–2011–0085] Privacy Act of 1974; Department of Homeland Security/U.S. Citizenship and Immigration Services 015 Electronic Immigration System-2 Account and Case Management System of Records Privacy Office, DHS. Notice of Privacy Act system of AGENCY: ACTION: records. In accordance with the Privacy Act of 1974, the Department of Homeland Security proposes to establish a new Department of Homeland Security system of records titled, ‘‘Department of Homeland SUMMARY: PO 00000 Frm 00074 Fmt 4703 Sfmt 4703 Security/U.S. Citizenship and Immigration Services 015 Electronic Immigration System-2 Account and Case Management System of Records.’’ This system of records will allow the Department of Homeland Security/U.S. Citizenship and Immigration Services to collect and maintain records on an individual after he or she submits a benefit request and/or updates account information to create or update U.S. Citizenship and Immigration Services Electronic Immigration System accounts; gather any missing information; manage workflow; assist U.S. Citizenship and Immigration Services in making a benefit determination; and provide a repository of data to assist with the efficient processing of future benefit requests. U.S. Citizenship and Immigration Services Electronic Immigration System2 Account and Case Management process will also be used to process and track all actions related to a particular case, including scheduling appointments and issuing decision notices and/or proofs of benefit. Additionally, the Department of Homeland Security is issuing a Notice of Proposed Rulemaking elsewhere in the Federal Register , to exempt this system of records from certain provisions of the Privacy Act. This newly established system will be included in the Department of Homeland Security’s inventory of record systems. DATES: Submit comments on or before October 27, 2011. ADDRESSES: You may submit comments, identified by docket number DHS–20110085 by one of the following methods: Federal e-Rulemaking Portal: https:// www.regulations.gov. Follow the instructions for submitting comments. Fax: 703–483–2999. Mail: Mary Ellen Callahan, Chief Privacy Officer, Privacy Office, Department of Homeland Security, Washington, DC 20528. Instructions: All submissions received must include the agency name and docket number for this rulemaking. All comments received will be posted without change to https:// www.regulations.gov, including any personal information provided. Docket: For access to the docket to read background documents or comments received go to https:// www.regulations.gov. FOR FURTHER INFORMATION CONTACT: For general questions please contact: Donald K. Hawkins (202–272–8000), Privacy Officer, U.S. Citizenship and Immigration Services, 20 Massachusetts Avenue, NW., Washington, DC 20529. E:\FR\FM\28SEN1.SGM 28SEN1

Agencies

[Federal Register Volume 76, Number 188 (Wednesday, September 28, 2011)]
[Notices]
[Pages 60067-60070]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 2011-24934]


-----------------------------------------------------------------------

DEPARTMENT OF HOMELAND SECURITY

Office of the Secretary

[Docket No. DHS-2011-0090]


Privacy Act of 1974; Department of Homeland Security Federal 
Emergency Management Agency--012 Suspicious Activity Reporting System 
of Records

AGENCY: Privacy Office, DHS.

ACTION: Notice of Privacy Act system of records.

-----------------------------------------------------------------------

SUMMARY: In accordance with the Privacy Act of 1974, the Department of 
Homeland Security proposes to establish a new system of records titled, 
``Department of Homeland Security/Federal Emergency Management Agency--
012 Suspicious Activity Reporting System of Records.'' This system of 
records allows the Department of Homeland Security/Federal Emergency 
Management Agency to collect, maintain, and retrieve records on 
individuals who report suspicious activities, individuals reported as 
being involved in suspicious activities, and individuals charged with 
the analysis and appropriate handling of suspicious activity reports. 
Additionally, the Department of Homeland Security/Federal Emergency 
Management Agency is issuing a Notice of Proposed Rulemaking elsewhere 
in the Federal Register to exempt this system of records from certain 
provisions of the Privacy Act. This newly established system will be 
included in the Department of Homeland Security's inventory of record 
systems.

DATES: Submit comments on or before October 27, 2011. This new system 
will be effective October 27, 2011.

ADDRESSES: You may submit comments, identified by docket number DHS-
2011-0090 by one of the following methods:
    Federal e-Rulemaking Portal: https://www.regulations.gov. Follow the 
instructions for submitting comments.
    Fax: 703-483-2999.
    Mail: Mary Ellen Callahan, Chief Privacy Officer, Privacy Office, 
Department of Homeland Security, Washington, DC 20528.
    Instructions: All submissions received must include the agency name 
and docket number for this rulemaking. All

[[Page 60068]]

comments received will be posted without change to https://www.regulations.gov, including any personal information provided.
    Docket: For access to the docket to read background documents or 
comments received go to https://www.regulations.gov.

FOR FURTHER INFORMATION CONTACT: For general questions please contact: 
Dr. Lesia Banks, (202-646-3323), Acting Privacy Officer, Federal 
Emergency Management Agency, Department of Homeland Security, 
Washington, DC 20478. For privacy issues please contact: Mary Ellen 
Callahan (703-235-0780), Chief Privacy Officer, Privacy Office, 
Department of Homeland Security, Washington, DC 20528.

SUPPLEMENTARY INFORMATION:

I. Background

    In accordance with the Privacy Act of 1974, 5 U.S.C. 552a, the 
Department of Homeland Security (DHS) Federal Emergency Management 
Agency (FEMA) proposes to establish a new DHS/FEMA system of records 
titled, ``DHS/FEMA--012 Suspicious Activity Reporting System of 
Records.''
    FEMA's mission is to ``support our citizens and first responders to 
ensure that as a nation we work together to build, sustain, and improve 
our capability to prepare for, protect against, respond to, recover 
from, and mitigate all hazards.'' FEMA will collect, maintain, and 
retrieve records on individuals who report suspicious activities, 
individuals reported as being involved in suspicious activities, and 
individuals charged with the analysis and appropriate handling of 
suspicious activity reports. FEMA's Office of the Chief Security 
Officer (OCSO), Fraud and Investigations Unit, manages this process. To 
reduce any risk of unauthorized access, FEMA SARs are secured in a room 
monitored by FEMA OCSO special agents and analysts.
    FEMA SARs may shared with federal, state, local, and tribal 
jurisdictions that hold the responsibility of investigating suspicious 
activities within their jurisdictions. FEMA SARs that do not have a 
nexus to terrorism or hazards to homeland security, as determined by 
FEMA OCSO special agents or analysts, are forwarded to the appropriate 
jurisdiction, such as sheriff offices, county/city police, and state 
police. FEMA SARs that have a nexus to terrorism or hazards to homeland 
security, as determined by FEMA OCSO special agents or analysts, are 
shared with the Federal Bureau of Investigations (FBI) Joint Terrorism 
Task Force (JTTF), Federal Protective Service, and/or other federal 
agencies required to investigate and respond to terrorist threats or 
hazards to homeland security.
    FEMA's SAR process is authorized and governed by 44 CFR Chapter 2 
``Delegation of Authority;'' 42 U.S.C. 5196(d); Executive Orders 12333 
and 13388; 40 U.S.C. 1315(b)(2)(F); 6 U.S.C. 314; The Homeland Security 
Act of 2002, as amended; the Intelligence Reform and Terrorism 
Prevention Act of 2004, as amended; the National Security Act of 1947, 
as amended; and FEMA Manual 1010-1 ``Federal Emergency Management 
Agency Missions and Functions.''
    Consistent with DHS's information sharing mission, information 
stored in the DHS/FEMA--012 Suspicious Activity Reporting System of 
Records may be shared with other DHS components, as well as appropriate 
federal, state, local, tribal, territorial, foreign, or international 
government agencies. This sharing will only take place after DHS 
determines that the receiving component or agency has a need to know 
the information to carry out national security, law enforcement, 
immigration, intelligence, or other functions consistent with the 
routine uses set forth in this system of records notice.
    Additionally, DHS is issuing a Notice of Proposed Rulemaking (NPRM) 
elsewhere in the Federal Register to exempt this system of records from 
certain provisions of the Privacy Act. This newly established system 
will be included in DHS's inventory of record systems.

II. Privacy Act

    The Privacy Act embodies fair information practice principles in a 
statutory framework governing the means by which the U.S. Government 
collects, maintains, uses, and disseminates individuals'' records. The 
Privacy Act applies to information that is maintained in a ``system of 
records.'' A ``system of records'' is a group of any records under the 
control of an agency for which information is retrieved by the name of 
an individual or by some identifying number, symbol, or other 
identifying particular assigned to the individual. In the Privacy Act, 
an individual is defined to encompass U.S. citizens and lawful 
permanent residents. As a matter of policy, DHS extends administrative 
Privacy Act protections to all individuals where systems of records 
maintain information on U.S. citizens, lawful permanent residents, and 
visitors.
    Below is the description of the DHS/FEMA--12 Suspicious Activity 
Reporting System of Records.
    In accordance with 5 U.S.C. 552a(r), DHS has provided a report of 
this system of records to the Office of Management and Budget and to 
Congress.

System of Records
Department of Homeland Security (DHS)/Federal Emergency Management 
Agency (FEMA)--012

System name:
    DHS FEMA--012 Suspicious Activity Reporting.

Security classification:
    For official use only (FOUO) and law enforcement sensitive (LES).

System location:
    Records are maintained at FEMA Headquarters in Washington, DC and 
field offices.

Categories of individuals covered by the system:
    Individuals who report suspicious activities, individuals reported 
as being involved in suspicious activities, and individuals charged 
with the analysis and appropriate handling of suspicious activity 
reports.

Categories of records in the system:
     Case/incident number;
     Name (first, middle, and last);
     Address (number, street, apartment, city, and state);
     Age;
     Sex;
     Race;
     Signature (investigator, analyst, or LEO);
     Jurisdiction;
     Injury code if applicable;
     Telephone numbers (home, business, or cell);
     Other contact information (e.g., email address);
     Property information (name, quantity, serial number, brand 
name, model, value, year, make, color, identifying characteristics, 
and/or registration information).

Authority for maintenance of the system:
    44 CFR Chapter 2 ``Delegation of Authority;'' 42 U.S.C. 5196(d); 
Executive Orders 12333 and 13388; 40 U.S.C. 1315(b)(2)(F); 6 U.S.C. 
314; The Homeland Security Act of 2002, as amended; the Intelligence 
Reform and Terrorism Prevention Act of 2004, as amended; the National 
Security Act of 1947, as amended; and FEMA Manual 1010-1 ``Federal 
Emergency Management Agency Missions and Functions.''

Purpose(s):
    The purpose of this system is to collect, investigate, analyze, and 
report

[[Page 60069]]

suspicious activities to the Federal Bureau of Investigations (FBI) 
Joint Terrorism Task Force (JTTF), Federal Protective Service, and/or 
other federal, state, or local agencies required to investigate and 
respond to terrorist threats or hazards to homeland security.

Routine uses of records maintained in the system, including categories 
of users and the purposes of such uses:
    In addition to those disclosures generally permitted under 5 U.S.C. 
552a(b) of the Privacy Act, all or a portion of the records or 
information contained in this system may be disclosed outside DHS as a 
routine use pursuant to 5 U.S.C. 552a(b)(3) as follows:
    A. To the Department of Justice (DOJ), including U.S. Attorney 
Offices, or other federal agency conducting litigation or in 
proceedings before any court, adjudicative or administrative body, when 
it is necessary to the litigation and one of the following is a party 
to the litigation or has an interest in such litigation:
    1. DHS or any component thereof;
    2. Any employee of DHS in his/her official capacity;
    3. Any employee of DHS in his/her individual capacity where DOJ or 
DHS has agreed to represent the employee; or
    4. The U.S. or any agency thereof, is a party to the litigation or 
has an interest in such litigation, and DHS determines that the records 
are both relevant and necessary to the litigation and the use of such 
records is compatible with the purpose for which DHS collected the 
records.
    B. To a congressional office from the record of an individual in 
response to an inquiry from that congressional office made at the 
request of the individual to whom the record pertains.
    C. To the National Archives and Records Administration (NARA) or 
other federal government agencies pursuant to records management 
inspections being conducted under the authority of 44 U.S.C. 2904 and 
2906.
    D. To an agency, organization, or individual for the purpose of 
performing audit or oversight operations as authorized by law, but only 
such information as is necessary and relevant to such audit or 
oversight function.
    E. To appropriate agencies, entities, and persons when:
    1. DHS suspects or has confirmed that the security or 
confidentiality of information in the system of records has been 
compromised;
    2. DHS has determined that as a result of the suspected or 
confirmed compromise there is a risk of harm to economic or property 
interests, identity theft or fraud, or harm to the security or 
integrity of this system or other systems or programs (whether 
maintained by DHS or another agency or entity) or harm to the 
individual that rely upon the compromised information; and
    3. The disclosure made to such agencies, entities, and persons is 
reasonably necessary to assist in connection with DHS's efforts to 
respond to the suspected or confirmed compromise and prevent, minimize, 
or remedy such harm.
    F. To contractors and their agents, grantees, experts, consultants, 
and others performing or working on a contract, service, grant, 
cooperative agreement, or other assignment for DHS, when necessary to 
accomplish an agency function related to this system of records. 
Individuals provided information under this routine use are subject to 
the same Privacy Act requirements and limitations on disclosure as are 
applicable to DHS officers and employees.
    G. To an appropriate federal, state, tribal, local, international, 
or foreign law enforcement agency or other appropriate authority 
charged with investigating or prosecuting a violation or enforcing or 
implementing a law, rule, regulation, or order, where a record, either 
on its face or in conjunction with other information, indicates a 
violation or potential violation of law, which includes criminal, 
civil, or regulatory violations and such disclosure is proper and 
consistent with the official duties of the person making the 
disclosure.
    H. To an appropriate federal, state, tribal, local, international 
counterterrorism agencies where DHS becomes aware of an indication of a 
threat or potential threat to security, and where such use is to assist 
in counterterrorism efforts.
    I. To an organization or individual in either the public or private 
sector, either foreign or domestic, where there is a reason to believe 
that the recipient is or could become the target of a particular 
terrorist activity or conspiracy, to the extent the information is 
relevant to the protection of life, property or other vital interests 
of a data subject and disclosure is proper and consistent with the 
official duties of the person making the disclosure.
    J. To the news media and the public, with the approval of the Chief 
Privacy Officer in consultation with counsel, when there exists a 
legitimate public interest in the disclosure of the information or when 
disclosure is necessary to preserve confidence in the integrity of DHS 
or is necessary to demonstrate the accountability of DHS's officers, 
employees, or individuals covered by the system, except to the extent 
it is determined that release of the specific information in the 
context of a particular case would constitute an unwarranted invasion 
of personal privacy.

Disclosure to consumer reporting agencies:
    None.

Policies and practices for storing, retrieving, accessing, retaining, 
and disposing of records in the system:
Storage:
    Records in this system are stored electronically or on paper in 
secure facilities in a locked drawer behind a locked door. The records 
are stored on magnetic disc, tape, digital media, and CD-ROM.

Retrievability:
    Records may be retrieved by case/incident number, name, address, 
and/or date.

Safeguards:
    Records in this system are safeguarded in accordance with 
applicable rules and policies, including all applicable DHS automated 
systems security and access policies. Strict controls have been imposed 
to minimize the risk of compromising the information that is being 
stored. Access to the computer system containing the records in this 
system is limited to those individuals who have a need to know the 
information for the performance of their official duties and who have 
appropriate clearances or permissions.

Retention and disposal:
    Pursuant to National Archives and Records Administration (NARA) 
Schedule Number N1-311-99-6, Items 1, 2, and 3, files containing 
information or allegations which are of an investigative nature but do 
not relate to a specific investigation are destroyed when five years 
old. Investigative case files that involve allegations made against 
senior agency officials, attract significant attention in the media, 
attract congressional attention, result in substantive changes in 
agency policies and procedures, or are cited in the OIG's periodic 
reports to Congress are cut off when the case is closed, retired to the 
Federal Records Center (FRC) 5 years after cutoff, and then transferred 
to NARA 20 years after cutoff. All other investigative case files 
except those that are unusually significant for documenting major 
violations of criminal law or ethical standards by agency officials or 
others are placed in inactive files when case is closed, cut

[[Page 60070]]

off at the end of fiscal year, and destroyed 10 years after cutoff.

System Manager and address:
    Office of the Chief Security Officer, Fraud and Investigation Unit, 
1201 Maryland Avenue, SW., Washington, DC 20024.

Notification procedure:
    The Secretary of Homeland Security has exempted this system from 
the notification, access, and amendment procedures of the Privacy Act 
because it is a law enforcement system. However, DHS/FEMA will consider 
individual requests to determine whether or not information may be 
released. Thus, individuals seeking notification of and access to any 
record contained in this system of records, or seeking to contest its 
content, may submit a request in writing to the Chief of the FEMA 
Disclosure Branch whose contact information can be found at https://www.dhs.gov/foia under ``contacts.'' If an individual believes more 
than one component maintains Privacy Act records concerning him or her, 
the individual may submit the request to the Chief Privacy Officer and 
Chief Freedom of Information Act Officer, Department of Homeland 
Security, 245 Murray Drive, SW., Building 410, STOP-0655, Washington, 
DC 20528.
    When seeking records about yourself from this system of records or 
any other Departmental system of records your request must conform with 
the Privacy Act regulations set forth in 6 CFR Part 5. You must first 
verify your identity, meaning that you must provide your full name, 
current address and date and place of birth. You must sign your 
request, and your signature must either be notarized or submitted under 
28 U.S.C. 1746, a law that permits statements to be made under penalty 
of perjury as a substitute for notarization. While no specific form is 
required, you may obtain forms for this purpose from the Chief Privacy 
Officer and Chief Freedom of Information Act Officer, https://www.dhs.gov or 1-866-431-0486. In addition you should provide the 
following:
     An explanation of why you believe the Department would 
have information on you;
     Identify which component(s) of the Department you believe 
may have the information about you;
     Specify when you believe the records would have been 
created;
     Provide any other information that will help the FOIA 
staff determine which DHS component agency may have responsive records; 
and
     If your request is seeking records pertaining to another 
living individual, you must include a statement from that individual 
certifying his/her agreement for you to access his/her records.
    Without this bulleted information the component(s) may not be able 
to conduct an effective search, and your request may be denied due to 
lack of specificity or lack of compliance with applicable regulations.

Record access procedures:
    See ``Notification procedure'' above.

Contesting record procedures:
    See ``Notification procedure'' above.

Record source categories:
    Records are obtained from individuals who report suspicious 
activities, individuals reported as being involved in suspicious 
activities, and individuals charged with the analysis and appropriate 
handling of suspicious activity reports, commercially available 
systems, and also from other federal, state, and local law enforcement 
agencies.

Exemptions claimed for the system:
    The Secretary of Homeland Security has exempted this system from 
the following provisions of the Privacy Act, subject to the limitation 
set forth in 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), 
(e)(4)(I); and (f) pursuant to 5 U.S.C. 552a (k)(2).

    Dated: September 9, 2011.
Mary Ellen Callahan,
Chief Privacy Officer, Department of Homeland Security.
[FR Doc. 2011-24934 Filed 9-27-11; 8:45 am]
BILLING CODE 9110-17-P
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.