Privacy Act; System of Records: State-78, Risk Analysis and Management Records, 76215-76217 [2011-31270]

Download as PDF Federal Register / Vol. 76, No. 234 / Tuesday, December 6, 2011 / Notices jlentini on DSK4TPTVN1PROD with NOTICES addition, non quoting firms that would like to receive the relevant information available over SQF will be allowed to connect to the SQF interface, but not send quotes.15 The tiers are designed to recoup costs associated with the ports while providing increased efficiency with the new release. The Exchange also believes that it is reasonable to eliminate the $500 per month cap for Phlx Only Members that have 50 or less SQT assignments affiliated with member organizations because there are no members today which meet the criteria for this cap. The Exchange believes that the amended tiers, which are increased for two categories, are equitable and not unfairly discriminatory because the features of SQF 6.0 are available to all participants. In addition, the member organizations with the greater number of ports, and therefore the greater system usage, will experience the increase. The Exchange believes that eliminating the $500 per month cap for the smaller organizations, defined as Phlx Only Members with 50 or less SQT assignments, is equitable and not unfairly discriminatory because there are no member organizations that will be impacted today by the elimination of this cap. There are no member organizations today that are eligible for the cap. The Exchange believes that adopting a $41,000 monthly cap is equitable and not unfairly discriminatory because all members utilizing SQF 6.0 ports may take advantage of the $41,000 cap without limitation. The Exchange believes that the member organizations with the greatest number of ports will benefit from the proposed $41,000 monthly cap. These are also the member organizations with the greatest system usage and therefore the largest costs. Finally, the Exchange believes that it is reasonable, equitable and not unfairly discriminatory to discontinue the practice of only billing member organizations for the use of active SQF 5.0 ports to the extent the member organization was paying is paying the same (or greater) number of active SQF 6.0 ports. As mentioned herein, the Exchange believes that it has provided member organizations ample time to transition and this practice is no longer System Event Messages (e.g., start of messages, start of system hours, start of quoting, start of opening); (4) Complex Order Strategy Auction Notifications (COLA); (5) Complex Order Strategy messages; (6) Option Trading Action Messages (e.g., halts, resumes); and (7) Complex Strategy Trading Action Message (e.g., halts, resumes). 15 See Securities Exchange Act Release No. 63034 (October 4, 2010), 75 FR 62441 (October 8, 2010) (SR–Phlx–2010–124). VerDate Mar<15>2010 17:04 Dec 05, 2011 Jkt 226001 necessary as there should be no member organizations utilizing SQF 6.0 [sic] by January 3, 2012. B. Self-Regulatory Organization’s Statement on Burden on Competition The Exchange does not believe that the proposed rule change will impose any burden on competition not necessary or appropriate in furtherance of the purposes of the Act. C. Self-Regulatory Organization’s Statement on Comments on the Proposed Rule Change Received From Members, Participants, or Others No written comments were either solicited or received III. Date of Effectiveness of the Proposed Rule Change and Timing for Commission Action The foregoing rule change has become effective pursuant to Section 19(b)(3)(A)(ii) of the Act.16 At any time within 60 days of the filing of the proposed rule change, the Commission summarily may temporarily suspend such rule change if it appears to the Commission that such action is necessary or appropriate in the public interest, for the protection of investors, or otherwise in furtherance of the purposes of the Act. If the Commission takes such action, the Commission shall institute proceedings to determine whether the proposed rule should be approved or disapproved. IV. Solicitation of Comments Interested persons are invited to submit written data, views, and arguments concerning the foregoing, including whether the proposed rule change is consistent with the Act. Comments may be submitted by any of the following methods: Electronic Comments: • Use the Commission’s Internet comment form (https://www.sec.gov/ rules/sro.shtml); or • Send an email to rulecomments@sec.gov. Please include File No. SR–Phlx–2011–157 on the subject line. Paper Comments • Send paper comments in triplicate to Elizabeth M. Murphy, Secretary, Securities and Exchange Commission, 100 F Street NE., Washington, DC 20549–1090. All submissions should refer to File No. SR–Phlx–2011–157. This file number should be included on the subject line if email is used. To help the 16 15 PO 00000 U.S.C. 78s(b)(3)(A)(ii). Frm 00096 Fmt 4703 Sfmt 4703 76215 Commission process and review your comments more efficiently, please use only one method. The Commission will post all comments on the Commission’s Internet Web site (https://www.sec.gov/ rules/sro.shtml). Copies of the submission, all subsequent amendments, all written statements with respect to the proposed rule change that are filed with the Commission, and all written communications relating to the proposed rule change between the Commission and any person, other than those that may be withheld from the public in accordance with the provisions of 5 U.S.C. 552, will be available for Web site viewing and printing in the Commission’s Public Reference Room, 100 F Street, NE., Washington, DC 20549, on official business days between the hours of 10 a.m. and 3 p.m. Copies of such filing also will be available for inspection and copying at the principal office of the Exchange. All comments received will be posted without change; the Commission does not edit personal identifying information from submissions. You should submit only information that you wish to make available publicly. All submissions should refer to File No. SR–Phlx–2011– 157 and should be submitted on or before December 27, 2011. For the Commission, by the Division of Trading and Markets, pursuant to delegated authority.17 Kevin M. O’Neill, Deputy Secretary. [FR Doc. 2011–31204 Filed 12–5–11; 8:45 am] BILLING CODE 8011–01–P DEPARTMENT OF STATE [Public Notice 7709] Privacy Act; System of Records: State–78, Risk Analysis and Management Records Notice is hereby given that the Department of State proposes to create a system of records, Risk Analysis and Management Records, State–78, pursuant to the provisions of the Privacy Act of 1974, as amended (5 U.S.C. 552a) and Office of Management and Budget Circular No. A–130, Appendix I. DATES: This system of records will be effective on January 17, 2012, unless we receive comments that will result in a contrary determination. ADDRESSES: Any persons interested in commenting on the new system of SUMMARY: 17 17 E:\FR\FM\06DEN1.SGM CFR 200.30–3(a)(12). 06DEN1 76216 Federal Register / Vol. 76, No. 234 / Tuesday, December 6, 2011 / Notices records may do so by writing to the Director; Office of Information Programs and Services, A/GIS/IPS; Department of State, SA–2; 515 22nd Street NW.; Washington, DC 20522–8001. FOR FURTHER INFORMATION CONTACT: Director; Office of Information Programs and Services, A/GIS/IPS; Department of State, SA–2; 515 22nd Street NW.; Washington, DC 20522–8001. SUPPLEMENTARY INFORMATION: The Department of State proposes that the new system will be ‘‘Risk Analysis and Management Records.’’ The proposed system will support the vetting of directors, officers, or other employees of organizations who apply for Department of State contracts, grants, cooperative agreements, or other funding. The information collected from these organizations and individuals is specifically used to conduct screening to ensure that Department funds are not used to provide support to entities or individuals deemed to be a risk to U.S. national security interests. The records may contain criminal investigation records, investigatory material for law enforcement purposes, and confidential source information. The Department’s report was filed with the Office of Management and Budget. The new system description, Risk Analysis and Management (RAM) Records, State 78, will read as set forth below. Dated: November 16, 2011. Keith D. Miller, Director, Office of Operations, Bureau of Administration, U.S. Department of State. SYSTEM NAME: Risk Analysis and Management (RAM) Records. SECURITY CLASSIFICATION: Classified and Unclassified. SYSTEM LOCATION: Department of State, 2201 C Street NW., Washington, DC 20520; other Department of State annexes, posts and missions abroad; and the United States Agency for International Development (USAID), Office of Security, 1300 Pennsylvania Avenue NW., Washington, DC 20523. CATEGORIES OF INDIVIDUALS COVERED BY THE SYSTEM: jlentini on DSK4TPTVN1PROD with NOTICES Prefatory Statement. These standard routine uses apply to State–78, Risk Analysis and Management Records. CATEGORIES OF RECORDS IN THE SYSTEM: POLICIES AND PRACTICES FOR STORING, RETRIEVING, ACCESSING, RETAINING, AND DISPOSING OF RECORDS IN THE SYSTEM: Unclassified information in this system includes, but is not limited to: name, aliases, date and place of birth, gender (as shown in a governmentissued foreign or U.S. photo ID), citizenship(s), government-issued identification information (including but not limited to Social Security number if U.S. citizen or Legal Permanent Resident, passport number, or any other numbers originated by a government that specifically identifies an individual), mailing address, telephone number(s), fax number, email address, current employer and job title. The type of grant, U.S. dollar value of contract/grant, the contract/grant start and end date, and the purpose of the contract/grant are also contained in the system. Classified information in this system includes, but is not limited to: results generated from the screening of individuals covered by this Notice; intelligence and law enforcement information related to national security; and national security vetting and terrorism screening information provided to the Department by other agencies. AUTHORITY FOR MAINTENANCE OF THE SYSTEM: 18 U.S.C. 2339A, 2339B, 2339C; 22 U.S.C. 2151 et seq.; Executive Orders 13224, 13099 and 12947; and Homeland Security Presidential Directive–6. PURPOSE: STATE–78 The system covers key personnel of organizations who have applied for contracts, grants, cooperative agreements or other funding from the Department of State. These individuals may include but are not limited to principal officers or directors, program VerDate Mar<15>2010 managers, chief of party for the program, and other individuals employed by the organization. 17:04 Dec 05, 2011 Jkt 226001 The information in the system supports the vetting of directors, officers, or other employees of organizations who apply for Department of State contracts, grants, cooperative agreements, or other funding. The information collected from these organizations and individuals is specifically used to conduct screening to ensure that Department funds are not used to provide support to entities or individuals deemed to be a risk to U.S. national security interests. ROUTINE USES OF RECORDS MAINTAINED IN THE SYSTEM, INCLUDING CATEGORIES OF USERS AND THE PURPOSES OF SUCH USES: Information may be disclosed to the United States Agency for International Development (USAID) and to federal government agencies for vetting programs. The Department of State periodically publishes in the Federal Register its standard routine uses which apply to all of its Privacy Act systems of records. These notices appear in the form of a PO 00000 Frm 00097 Fmt 4703 Sfmt 4703 STORAGE: Records in this system are stored in both paper and electronic format. RETRIEVABILITY: Records are retrieved by name, date and place of birth, government-issued identifying numbers (such as Social Security numbers or passport numbers), and solicitation number. SAFEGUARDS: The records are maintained in an authorized security container with access limited to authorized government personnel and authorized contractors. Physical security protections include guards and locked facilities requiring badges. Only authorized government personnel and authorized contractors can access records within the system. The Department mandates and certifies that physical and technological safeguards appropriate for classified and Sensitive but Unclassified systems are used to protect the records against unauthorized access. All authorized government personnel and authorized contractors with access to the system must hold an appropriate security clearance, sign a non-disclosure agreement, and undergo both privacy and security training. Classified and Sensitive but Unclassified paper records are kept in an approved security container. Access to these records is limited to those authorized government personnel and authorized contractors who have a need for the records in the performance of their official duties. Electronic records are kept in a secure database. Access to the records is restricted to those authorized government personnel and authorized contractors with a specific role in the vetting process as part of the performance of their official duties. The RAM database is housed on and accessed from a Sensitive but Unclassified computer network. Vetting requests, analyses, and results will be stored separately on a classified computer network. Both computer networks and the RAM database require a user identification name and password and approval from the Office of Security. An audit trail is maintained and periodically reviewed to monitor access to the system. When it is determined that a user no longer needs access, the user account is disabled. E:\FR\FM\06DEN1.SGM 06DEN1 Federal Register / Vol. 76, No. 234 / Tuesday, December 6, 2011 / Notices Authorized government personnel and authorized contractors assigned roles in the vetting process are provided rolespecific training to ensure that they are knowledgeable in how to protect personally identifiable information. Access to the Department of State records within the system will be controlled by the network firewall configuration. Within the Department of State, all users are given cyber security awareness training which covers the procedures for handling Sensitive but Unclassified information, including personally identifiable information (PII). Annual refresher training is mandatory. In addition, all Foreign Service and Civil Service employees and those Locally Engaged Staff who handle PII are required to take the FSI distance learning course instructing employees on privacy and security requirements, including the rules of behavior for handling PII and the potential consequences if it is handled improperly. Before being granted access to RAM records, a user must first be granted access to the Department of State computer system. Remote access to the Department of State network from non-Department owned systems is authorized only through a Department-approved access program. Remote access to the network is configured with the Office of Management and Budget Memorandum M–07–16 security requirements, which include but are not limited to two-factor authentication and time out function. All Department of State employees and contractors with authorized access have undergone a thorough background security investigation. RETENTION AND DISPOSAL: Records are retired in accordance with published Department of State Records Disposition Schedules as approved by the National Archives and Records Administration (NARA). More specific information may be obtained by writing the Director; Office of Information Programs and Services, A/GIS/IPS; Department of State, SA–2; 515 22nd Street, NW., Washington, DC 20522–8001. RECORD ACCESS PROCEDURES: Individuals who wish to gain access to or amend records pertaining to themselves should write to the Director, Office of Information Programs and Services (address above). CONTESTING RECORD PROCEDURES: (See above.) RECORD SOURCE CATEGORIES: Information in this system is obtained from the application form completed and submitted by an organization or individual applying for a contract, grant, cooperative agreement, or other funding from the Department of State. In the case of applications submitted by an individual in his/her own capacity, the information will be collected directly from the individual applicant. Information in this system may also be obtained from public sources, agencies conducting national security screening law enforcement and intelligence agency records, and other government databases. SYSTEMS EXEMPTED FROM CERTAIN PROVISIONS OF THE ACT: Office of Risk Analysis and Management, Department of State, Washington, DC, 2201 C St. NW., Washington, DC 20520. Pursuant to 5 U.S.C. 552a(j)(2), records in this system may be exempt from subsections (c)(3) and (4), (d), (e)(1), (2) and (3), (e)(4)(G), (H), and (I), (e)(5) and (8), (f), (g) and (h) of the Privacy Act. Pursuant to 5 U.S.C. 552a(k)(1), (k)(2), and (k)(5), records in this system may be exempt from subsections 5 U.S.C. 552a(c)(3),(d), (e)(1), (e)(4)(G), (H), and (I), and (f) of the Privacy Act. If a record contains information from other exempt systems of records, the Department of State will rely on the exemptions claimed for those systems. NOTIFICATION PROCEDURE: [FR Doc. 2011–31270 Filed 12–5–11; 8:45 am] Individuals who have cause to believe that Risk Analysis and Management Records might have records pertaining to them should write to the Director; BILLING CODE 4710–24–P SYSTEM MANAGER(S) AND ADDRESS: jlentini on DSK4TPTVN1PROD with NOTICES Office of Information Programs and Services, A/GIS/IPS, Department of State, SA–2; 515 22nd Street NW., Washington, DC 20522–8001. The individual must specify that he/she wishes the records of the Risk Analysis and Management Records to be checked. At a minimum, the individual must include: name; date and place of birth; current mailing address and zip code; signature; and the approximate dates of application for a contract, grant or other funding. VerDate Mar<15>2010 17:04 Dec 05, 2011 Jkt 226001 PO 00000 Frm 00098 Fmt 4703 Sfmt 4703 76217 DEPARTMENT OF TRANSPORTATION Federal Railroad Administration [Docket Number FRA–2011–0089] Petition for Waiver of Compliance In accordance with part 211 of title 49 of the Code of Federal Regulations (CFR), this document provides the public notice that by a document dated November 9, 2011, the Association of American Railroads (AAR) and the American Short Line and Regional Railroad Association (ASLRRA) have petitioned the Federal Railroad Administration (FRA) on behalf of their members for a waiver of compliance from certain provisions of the Federal railroad safety regulations contained at 49 CFR part 231, Safety Appliance Standards. FRA assigned the petition Docket Number FRA–2011–0089. Specifically, AAR and ASLRRA are requesting relief from section 49 CFR Section 231.27(b)(3), which requires that end platforms on boxcars be ‘‘centered on each end of car between inner ends of handholds not more than eight (8) inches above top of center sill.’’ The AAR and ASLRRA request relief for a group of boxcars that have end platforms that may exceed the 8-inch maximum by as much as 2 inches. AAR and ASLRRA stated that more than 18,000 cars and 20 different car owners are affected. The cars were manufactured between 1977 and 2001 as provided in an attachment to the petition. AAR and ALSRRA assert that in order to correct the end platform variance, many cars would require extensive modifications that are costly and labor intensive. Additionally, AAR and ASLRRA stated that one issue is whether the cars in question actually violate 49 CFR 231.27(b)(3) based on the specific method used to measure the sill step relationship to the platform height. AAR and ASLRRA believe that waiver would resolve any end platform variance created by the ambiguous wording contained in 49 CFR 231.27(b)(3). AAR and ASLRRA also stated that they are unaware of any personal injuries or other incidents arising from the height of the end platforms. AAR and ASLRRA believe a permanent waiver would be appropriate instead of the granting of a traditional 5-year waiver. A copy of the petition, as well as any written communications concerning the petition, is available for review online at www.regulations.gov and in person at the U.S. Department of Transportation’s (DOT) Docket Operations Facility, 1200 New Jersey Ave. SE., W12–140, Washington, DC 20590. The Docket E:\FR\FM\06DEN1.SGM 06DEN1

Agencies

[Federal Register Volume 76, Number 234 (Tuesday, December 6, 2011)]
[Notices]
[Pages 76215-76217]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 2011-31270]


=======================================================================
-----------------------------------------------------------------------

DEPARTMENT OF STATE

[Public Notice 7709]


Privacy Act; System of Records: State-78, Risk Analysis and 
Management Records

SUMMARY: Notice is hereby given that the Department of State proposes 
to create a system of records, Risk Analysis and Management Records, 
State-78, pursuant to the provisions of the Privacy Act of 1974, as 
amended (5 U.S.C. 552a) and Office of Management and Budget Circular 
No. A-130, Appendix I.

DATES: This system of records will be effective on January 17, 2012, 
unless we receive comments that will result in a contrary 
determination.

ADDRESSES: Any persons interested in commenting on the new system of

[[Page 76216]]

records may do so by writing to the Director; Office of Information 
Programs and Services, A/GIS/IPS; Department of State, SA-2; 515 22nd 
Street NW.; Washington, DC 20522-8001.

FOR FURTHER INFORMATION CONTACT: Director; Office of Information 
Programs and Services, A/GIS/IPS; Department of State, SA-2; 515 22nd 
Street NW.; Washington, DC 20522-8001.

SUPPLEMENTARY INFORMATION: The Department of State proposes that the 
new system will be ``Risk Analysis and Management Records.'' The 
proposed system will support the vetting of directors, officers, or 
other employees of organizations who apply for Department of State 
contracts, grants, cooperative agreements, or other funding. The 
information collected from these organizations and individuals is 
specifically used to conduct screening to ensure that Department funds 
are not used to provide support to entities or individuals deemed to be 
a risk to U.S. national security interests. The records may contain 
criminal investigation records, investigatory material for law 
enforcement purposes, and confidential source information.
    The Department's report was filed with the Office of Management and 
Budget. The new system description, Risk Analysis and Management (RAM) 
Records, State 78, will read as set forth below.

    Dated: November 16, 2011.
Keith D. Miller,
Director, Office of Operations, Bureau of Administration, U.S. 
Department of State.
STATE-78

SYSTEM NAME:
    Risk Analysis and Management (RAM) Records.

SECURITY CLASSIFICATION:
    Classified and Unclassified.

SYSTEM LOCATION:
    Department of State, 2201 C Street NW., Washington, DC 20520; other 
Department of State annexes, posts and missions abroad; and the United 
States Agency for International Development (USAID), Office of 
Security, 1300 Pennsylvania Avenue NW., Washington, DC 20523.

CATEGORIES OF INDIVIDUALS COVERED BY THE SYSTEM:
    The system covers key personnel of organizations who have applied 
for contracts, grants, cooperative agreements or other funding from the 
Department of State. These individuals may include but are not limited 
to principal officers or directors, program managers, chief of party 
for the program, and other individuals employed by the organization.

CATEGORIES OF RECORDS IN THE SYSTEM:
    Unclassified information in this system includes, but is not 
limited to: name, aliases, date and place of birth, gender (as shown in 
a government-issued foreign or U.S. photo ID), citizenship(s), 
government-issued identification information (including but not limited 
to Social Security number if U.S. citizen or Legal Permanent Resident, 
passport number, or any other numbers originated by a government that 
specifically identifies an individual), mailing address, telephone 
number(s), fax number, email address, current employer and job title. 
The type of grant, U.S. dollar value of contract/grant, the contract/
grant start and end date, and the purpose of the contract/grant are 
also contained in the system.
    Classified information in this system includes, but is not limited 
to: results generated from the screening of individuals covered by this 
Notice; intelligence and law enforcement information related to 
national security; and national security vetting and terrorism 
screening information provided to the Department by other agencies.

AUTHORITY FOR MAINTENANCE OF THE SYSTEM:
    18 U.S.C. 2339A, 2339B, 2339C; 22 U.S.C. 2151 et seq.; Executive 
Orders 13224, 13099 and 12947; and Homeland Security Presidential 
Directive-6.

PURPOSE:
    The information in the system supports the vetting of directors, 
officers, or other employees of organizations who apply for Department 
of State contracts, grants, cooperative agreements, or other funding. 
The information collected from these organizations and individuals is 
specifically used to conduct screening to ensure that Department funds 
are not used to provide support to entities or individuals deemed to be 
a risk to U.S. national security interests.

ROUTINE USES OF RECORDS MAINTAINED IN THE SYSTEM, INCLUDING CATEGORIES 
OF USERS AND THE PURPOSES OF SUCH USES:
    Information may be disclosed to the United States Agency for 
International Development (USAID) and to federal government agencies 
for vetting programs.
    The Department of State periodically publishes in the Federal 
Register its standard routine uses which apply to all of its Privacy 
Act systems of records. These notices appear in the form of a Prefatory 
Statement. These standard routine uses apply to State-78, Risk Analysis 
and Management Records.

POLICIES AND PRACTICES FOR STORING, RETRIEVING, ACCESSING, RETAINING, 
AND DISPOSING OF RECORDS IN THE SYSTEM:
STORAGE:
    Records in this system are stored in both paper and electronic 
format.

RETRIEVABILITY:
    Records are retrieved by name, date and place of birth, government-
issued identifying numbers (such as Social Security numbers or passport 
numbers), and solicitation number.

SAFEGUARDS:
    The records are maintained in an authorized security container with 
access limited to authorized government personnel and authorized 
contractors. Physical security protections include guards and locked 
facilities requiring badges. Only authorized government personnel and 
authorized contractors can access records within the system. The 
Department mandates and certifies that physical and technological 
safeguards appropriate for classified and Sensitive but Unclassified 
systems are used to protect the records against unauthorized access. 
All authorized government personnel and authorized contractors with 
access to the system must hold an appropriate security clearance, sign 
a non-disclosure agreement, and undergo both privacy and security 
training.
    Classified and Sensitive but Unclassified paper records are kept in 
an approved security container. Access to these records is limited to 
those authorized government personnel and authorized contractors who 
have a need for the records in the performance of their official 
duties.
    Electronic records are kept in a secure database. Access to the 
records is restricted to those authorized government personnel and 
authorized contractors with a specific role in the vetting process as 
part of the performance of their official duties. The RAM database is 
housed on and accessed from a Sensitive but Unclassified computer 
network. Vetting requests, analyses, and results will be stored 
separately on a classified computer network. Both computer networks and 
the RAM database require a user identification name and password and 
approval from the Office of Security. An audit trail is maintained and 
periodically reviewed to monitor access to the system. When it is 
determined that a user no longer needs access, the user account is 
disabled.

[[Page 76217]]

Authorized government personnel and authorized contractors assigned 
roles in the vetting process are provided role-specific training to 
ensure that they are knowledgeable in how to protect personally 
identifiable information. Access to the Department of State records 
within the system will be controlled by the network firewall 
configuration.
    Within the Department of State, all users are given cyber security 
awareness training which covers the procedures for handling Sensitive 
but Unclassified information, including personally identifiable 
information (PII). Annual refresher training is mandatory. In addition, 
all Foreign Service and Civil Service employees and those Locally 
Engaged Staff who handle PII are required to take the FSI distance 
learning course instructing employees on privacy and security 
requirements, including the rules of behavior for handling PII and the 
potential consequences if it is handled improperly. Before being 
granted access to RAM records, a user must first be granted access to 
the Department of State computer system.
    Remote access to the Department of State network from non-
Department owned systems is authorized only through a Department-
approved access program. Remote access to the network is configured 
with the Office of Management and Budget Memorandum M-07-16 security 
requirements, which include but are not limited to two-factor 
authentication and time out function. All Department of State employees 
and contractors with authorized access have undergone a thorough 
background security investigation.

RETENTION AND DISPOSAL:
    Records are retired in accordance with published Department of 
State Records Disposition Schedules as approved by the National 
Archives and Records Administration (NARA). More specific information 
may be obtained by writing the Director; Office of Information Programs 
and Services, A/GIS/IPS; Department of State, SA-2; 515 22nd Street, 
NW., Washington, DC 20522-8001.

SYSTEM MANAGER(S) AND ADDRESS:
    Office of Risk Analysis and Management, Department of State, 
Washington, DC, 2201 C St. NW., Washington, DC 20520.

NOTIFICATION PROCEDURE:
    Individuals who have cause to believe that Risk Analysis and 
Management Records might have records pertaining to them should write 
to the Director; Office of Information Programs and Services, A/GIS/
IPS, Department of State, SA-2; 515 22nd Street NW., Washington, DC 
20522-8001. The individual must specify that he/she wishes the records 
of the Risk Analysis and Management Records to be checked. At a 
minimum, the individual must include: name; date and place of birth; 
current mailing address and zip code; signature; and the approximate 
dates of application for a contract, grant or other funding.

RECORD ACCESS PROCEDURES:
    Individuals who wish to gain access to or amend records pertaining 
to themselves should write to the Director, Office of Information 
Programs and Services (address above).

CONTESTING RECORD PROCEDURES:
    (See above.)

RECORD SOURCE CATEGORIES:
    Information in this system is obtained from the application form 
completed and submitted by an organization or individual applying for a 
contract, grant, cooperative agreement, or other funding from the 
Department of State. In the case of applications submitted by an 
individual in his/her own capacity, the information will be collected 
directly from the individual applicant. Information in this system may 
also be obtained from public sources, agencies conducting national 
security screening law enforcement and intelligence agency records, and 
other government databases.

SYSTEMS EXEMPTED FROM CERTAIN PROVISIONS OF THE ACT:
    Pursuant to 5 U.S.C. 552a(j)(2), records in this system may be 
exempt from subsections (c)(3) and (4), (d), (e)(1), (2) and (3), 
(e)(4)(G), (H), and (I), (e)(5) and (8), (f), (g) and (h) of the 
Privacy Act. Pursuant to 5 U.S.C. 552a(k)(1), (k)(2), and (k)(5), 
records in this system may be exempt from subsections 5 U.S.C. 
552a(c)(3),(d), (e)(1), (e)(4)(G), (H), and (I), and (f) of the Privacy 
Act.
    If a record contains information from other exempt systems of 
records, the Department of State will rely on the exemptions claimed 
for those systems.

[FR Doc. 2011-31270 Filed 12-5-11; 8:45 am]
BILLING CODE 4710-24-P
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.