Privacy Act of 1974; System of Records, 77846-77850 [2011-32074]
Download as PDF
77846
Federal Register / Vol. 76, No. 240 / Wednesday, December 14, 2011 / Notices
Dated: November 21, 2011.
Dominica Van Koten,
Chief Cadastral Surveyor.
[FR Doc. 2011–32083 Filed 12–13–11; 8:45 am]
BILLING CODE 4210–67–P
[FR Doc. 2011–32023 Filed 12–13–11; 8:45 am]
BILLING CODE 4310–GJ–P
DEPARTMENT OF THE INTERIOR
Bureau of Land Management
DEPARTMENT OF JUSTICE
[LLES956000–L19100000–BK0000–
LCRMM0M04561]
Eastern States: Filing of Plat of Survey
Bureau of Land Management,
Interior.
ACTION: Notice of Filing of Plat of
Survey; Wisconsin.
AGENCY:
The Bureau of Land
Management (BLM) will file the plat of
survey of the lands described below in
the BLM–Eastern States office in
Springfield, Virginia, 30 calendar days
from the date of publication in the
Federal Register.
FOR FURTHER INFORMATION CONTACT:
Bureau of Land Management-Eastern
States, 7450 Boston Boulevard,
Springfield, Virginia 22153. Attn:
Cadastral Survey. Persons who use a
telecommunications device for the deaf
(TDD) may call the Federal Information
Relay Service (FIRS) at 1–(800) 877–
8339 to contact the above individual
during normal business hours. The FIRS
is available 24 hours a day, 7 days a
week, to leave a message or question
with the above individual. You will
receive a reply during normal business
hours.
SUPPLEMENTARY INFORMATION: The
survey was requested by the Bureau of
Indian Affairs.
The lands surveyed are:
SUMMARY:
mstockstill on DSK4VPTVN1PROD with NOTICES
Fourth Principal Meridian, Wisconsin
T. 51 N., R. 2 W.
The plat of survey represents the
dependent resurvey of a portion of the South
boundary, a portion of the subdivisional lines
and the subdivision of Section 35, in
Township 51 North, Range 2 West, in the
State of Wisconsin, and was accepted
November 4, 2011.
We will place a copy of the plat we
described in the open files. It will be
available to the public as a matter of
information.
If BLM receives a protest against the
survey, as shown on the plat, prior to
the date of the official filing, we will
stay the filing pending our
consideration of the protest.
We will not officially file the plat
until the day after we have accepted or
dismissed all protests and they have
become final, including decisions on
appeals.
VerDate Mar<15>2010
15:14 Dec 13, 2011
Jkt 226001
Notice of Lodging of Consent Decree
Under the Comprehensive
Environmental Response,
Compensation, and Liability Act
Notice is hereby given that on
December 8, 2011, a proposed Consent
Decree in United States v. City of
Boulder, Colorado, Honeywell
International, Inc., and Tusco, Inc.,
Civil Action No. 11-cv-03178 WJM–
MJW, was lodged with the United States
District Court for the District of
Colorado. The proposed Consent
Decree, lodged on December 8, 2011,
resolves the liability of defendants City
of Boulder, Colorado, Honeywell
International, Inc., and Tusco, Inc.
(‘‘Defendants’’), for claims alleged in the
Complaint filed on December 7, 2011,
under Section 107(a) of the
Comprehensive Environmental
Response, Compensation and Liability
Act (‘‘CERCLA’’), 42 U.S.C. 9607(a). In
the Complaint, the United States sought
recovery of response costs from the
Defendants in connection with the
Hendricks Mining and Milling Site (a/k/
a Valmont Butte Site) North 63rd Street
and Valmont Road in Boulder, Colorado
(‘‘the Site’’). The proposed Consent
Decree, lodged on December 8, 2011,
requires the Defendants to pay $350,000
in response costs incurred in connection
with the Site and resolves the
Defendants’ liability for such costs
incurred through the date of lodging of
the Consent Decree. The cleanup of the
Site will be performed pursuant to plans
approved under the Colorado Voluntary
Cleanup Program and is not the subject
of the Consent Decree.
The Department of Justice will receive
comments relating to the proposed
Consent Decree for a period of thirty
(30) days from the date of this
publication. Please address comments to
the Assistant Attorney General,
Environment and Natural Resources
Division, by email to pubcommentees.enrd@usdoj.gov or regular mail to
P.O. Box 7611, U.S. Department of
Justice, Washington, DC 20044–7611,
and refer to United States v. City of
Boulder, Colorado, Honeywell
International, Inc., and Tusco, Inc., D.J.
Ref. 90–11–3–10118.
The Consent Decree may be examined
at U.S. EPA Region VIII, 1595 Wynkoop
Street, Denver, Colorado, 80202–1129.
PO 00000
Frm 00081
Fmt 4703
Sfmt 4703
During the public comment period, the
Consent Decree may also be examined
on the following Department of Justice
Web site, https://www.usdoj.gov/enrd/
Consent_Decrees.html. A copy of the
Consent Decree may also be obtained by
mail from the Consent Decree Library,
P.O. Box 7611, U.S. Department of
Justice, Washington, DC 20044–7611 or
by faxing or emailing a request to Tonia
Fleetwood (tonia.fleetwood@usdoj.gov),
fax no. (202) 514–0097, phone
confirmation number (202) 514–1547.
When requesting a copy from the
Consent Decree Library, please enclose
a check in the amount of $5.50 (25 cents
per page reproduction cost) for the
Consent Decree, payable to the U.S.
Treasury or, if by email or fax, forward
a check in that amount to the Consent
Decree Library at the address above.
Robert Brook,
Assistant Chief, Environmental Enforcement
Section, Environment and Natural Resources
Division.
[FR Doc. 2011–32052 Filed 12–13–11; 8:45 am]
BILLING CODE 4410–15–P
DEPARTMENT OF JUSTICE
[CPCLO Order No. 004–2011]
Privacy Act of 1974; System of
Records
Federal Bureau of
Investigation, Department of Justice.
ACTION: Notice to amend system of
records.
AGENCY:
The Federal Bureau of
Investigation proposes to amend its
Terrorist Screening Records System,
JUSTICE/FBI–019, maintained by the
Terrorist Screening Center, to add two
new categories of individuals and their
associated records, to add a new routine
use and make modifications to existing
routine uses, and to make several
administrative modifications and
updates throughout the notice. Public
comment is invited.
DATES: In accordance with 5 USC
552a(e)(4) and (11), the public is given
a 30-day period in which to comment
Therefore, please submit any comments
by January 13, 2012.
ADDRESSES: The public, Office of
Management and Budget (OMB), and
Congress are invited to submit any
comments to the Department of Justice,
Attn: Privacy Analyst, Office of Privacy
and Civil Liberties, National Place
Building, 1331 Pennsylvania Avenue
NW., Suite 1000, Washington, DC
20530–0001, or by facsimile to (202)
307–0693.
SUMMARY:
E:\FR\FM\14DEN1.SGM
14DEN1
Federal Register / Vol. 76, No. 240 / Wednesday, December 14, 2011 / Notices
mstockstill on DSK4VPTVN1PROD with NOTICES
FOR FURTHER INFORMATION CONTACT:
Meghann Van Horne, TSC Privacy
Officer, Federal Bureau of Investigation,
935 Pennsylvania Avenue NW.,
Washington, DC 20535–0001.
SUPPLEMENTARY INFORMATION: JUSTICE/
FBI–019, last published in full at 72 FR
47073 (Aug. 22, 2007), describes the
Terrorist Screening Records System
maintained by the Federal Bureau of
Investigation (FBI) at the Terrorist
Screening Center (TSC) and at facilities
operated by other government entities.
These records are used in screening
operations to ensure the security of the
United States. The FBI now proposes to
add two new categories of individuals to
the system whose records will be useful
in screening operations: Relatives,
associates, or others closely connected
with known or suspected terrorists who
are excludable from the United States
based on these relationships by virtue of
Section 212(a)(3)(B) of the Immigration
and Nationality Act, as amended, and
individuals who were officially
detained during military operations, but
not as enemy prisoners of war, and who
have been identified as possibly posing
a threat to national security. This latter
category of individuals is commonly
referred to as Military Detainees.
Excludable individuals under the first
category may be lawful permanent
residents of the United States.
Individuals in the second category are
unlikely to be lawful permanent
residents of the United States and even
less likely to be U.S. citizens.
Nevertheless, out of an abundance of
caution and because potentially the
status of a military detainee may change
over time, the FBI is including military
detainee records in its Terrorist
Screening Records Systems. In addition
to adding the two new categories of
individuals, the FBI is also adding a
routine use, which will enable the FBI
to share information about individuals
who are excludable from the United
States by virtue of Section 212(a)(3)(B)
of the Immigration and Nationality Act
with the Department of State and the
Department of Homeland Security for
the purposes of carrying out the
provisions of this Act. The FBI is
making pertinent revisions in other
parts of the system notice to reflect the
addition of these categories of
individuals. Additional modifications to
Justice/FBI–019 include: Updates to the
system location, record access
procedures, and procedures for
contesting records; clarifications to
existing categories of records in the
system; updates to the authorities
section to reflect new authorities; and
additions or changes to more accurately
VerDate Mar<15>2010
15:14 Dec 13, 2011
Jkt 226001
describe the system’s purpose and
routine uses. The FBI is republishing
the entire system of records notice for
ease of reference to these changes.
In accordance with 5 U.S.C. 552a(r),
the Department of Justice has provided
a report to OMB and the Congress on the
modification of this system of records.
Dated: November 23, 2011.
Nancy C. Libin,
Chief Privacy and Civil Liberties Officer,
United States Department of Justice.
JUSTICE/FBI–019
SYSTEM NAME:
Terrorist Screening Records System
(TSRS).
SECURITY CLASSIFICATION:
Classified and unclassified.
SYSTEM LOCATION:
Records described in this notice are
maintained at the Terrorist Screening
Center, Federal Bureau of Investigation,
Washington, DC, and at facilities
operated by other government entities
for terrorism and national security
threat screening, system back-up, and
continuity of operations purposes.
CATEGORIES OF INDIVIDUALS COVERED BY THE
SYSTEM:
a. Individuals known or appropriately
suspected to be or have been engaged in
conduct constituting, in preparation for,
in aid of, or related to terrorism
(‘‘known or suspected terrorists’’);
b. Individuals, who are lawful
permanent resident aliens but who are
excludable from the United States based
on their familial relationship,
association, or connection with a known
or suspected terrorist and who do not
meet any of the applicable exceptions as
described in Section 212(a)(3)(B) of the
Immigration and Nationality Act of 1952
(hereinafter INA exceptions);
c. Individuals who were officially
detained during military operations, but
as not Enemy Prisoners of War, and who
have been identified to pose an actual
or possible threat to national security
(hereinafter military detainees);
d. Individuals who are the subject of
queries against TSC information
systems;
e. Individuals identified during a
terrorism screening process as a possible
identity match to a known or suspected
terrorist and other individuals who
accompany or travel with such
individuals;
f. Individuals who are misidentified
as a possible identity match to a known
or suspected terrorist (‘‘misidentified
persons’’);
PO 00000
Frm 00082
Fmt 4703
Sfmt 4703
77847
g. Individuals about whom a terrorist
watchlist-related redress inquiry has
been made; and
h. Individuals whose information is
collected and maintained for
information system user auditing and
security purposes, such as individuals
who are authorized users of TSC
information systems.
CATEGORIES OF RECORDS IN THE SYSTEM:
a. Identifying biographical
information, such as name, date of birth,
place of birth, passport and/or drivers
license information, biometric
information, such as photographs and
fingerprints, and other available
identifying particulars used to compare
the identity of an individual being
screened, with a known or suspected
terrorist, an INA exception, or a military
detainee, including audit records
containing this information;
b. Information about encounters with
individuals covered by this system,
such as date, location, screening entity,
analysis, associated individuals, and
results (positive or negative identity
match), and, for encounters with a
known or suspected terrorist, INA
exceptions, and military detainees only,
other entities notified and details of any
law enforcement, intelligence, or other
operational response;
c. For a known or suspected terrorist,
military detainee, or an INA exception,
in addition to the categories of records
listed above, references to and/or
information from other government law
enforcement and intelligence databases,
or other relevant databases that may
contain terrorism information;
d. For an individual considered to
pose an actual or possible threat to
national security, in addition to the
categories of records listed above,
references to and/or information from
other government law enforcement and
intelligence databases, or other relevant
databases that may contain information
related to possible threats to national
security;
e. For misidentified persons, in
addition to the categories of records
listed above, other identifying
information that will be used during
screening only for the purpose of
distinguishing them from a known or
suspected terrorist, an INA exception, or
a military detainee, any of whom may
have similar identifying characteristics
(such as name and date of birth);
f. For redress matters, in addition to
the categories of records listed above,
information provided by individuals or
their representatives, information
provided by the screening agency, and
internal work papers and other
E:\FR\FM\14DEN1.SGM
14DEN1
77848
Federal Register / Vol. 76, No. 240 / Wednesday, December 14, 2011 / Notices
documents related to researching and
resolving the matter;
g. Information collected and compiled
to maintain an audit trail of the activity
of authorized users of TSC information
systems, such as user name/ID, date/
time, search query and results data, user
activity information (e.g., record
retrieval, modification, or deletion data),
and record numbers; and,
h. Archived records and record
histories from the Terrorist Screening
Database, Encounter Management
Application, and other TSC data
systems that are part of the TSRS.
AUTHORITY FOR MAINTENANCE OF THE SYSTEM:
Homeland Security Presidential
Directive-6, ‘‘Integration and Use of
Screening Information to Protect
Against Terrorism’’ (Sept. 16, 2003);
Homeland Security Presidential
Directive-11, ‘‘Comprehensive TerroristRelated Screening Procedures’’ (Aug. 27,
2004); National Security Presidential
Directive-59/Homeland Security
Presidential Directive-24, ‘‘Biometrics
for Identification and Screening to
Enhance National Security’’ (June 5,
2008), (HSPD-24 gives the Attorney
General authority to recommend
categories of individuals in addition to
known or suspected terrorists who may
pose a threat to national security.);
Executive Order 13388, ‘‘Further
Strengthening the Sharing of Terrorism
Information to Protect Americans,’’
(October 25, 2005); the Intelligence
Reform and Terrorism Prevention Act of
2004, Pub. L. 108–458; the National
Security Act of 1947, as amended; 28
U.S.C. 533; and Section 212(a)(3)(B) of
the Immigration and Nationality Act of
1952. In the event that the TSC’s
continuity-of-operations plans are
invoked, the agency that assumes TSC
operational functions will have the
authority to administer the Terrorist
Screening Records System as necessary
to carry out those functions.
mstockstill on DSK4VPTVN1PROD with NOTICES
PURPOSE(S):
a. To implement the U.S.
Government’s National Strategy for
Homeland Security and Homeland
Security Presidential Directive-6, to
identify potential terrorist threats, to
uphold and enforce the law, and to
ensure public safety.
b. To consolidate the government’s
approach to terrorism and national
security screening and provide for the
appropriate and lawful use of terrorist
information and other lawfully acquired
information in screening processes.
c. To implement the U.S.
Government’s Action Plan for National
Security Presidential Directive-59/
Homeland Security Presidential
VerDate Mar<15>2010
15:14 Dec 13, 2011
Jkt 226001
Directive-24, ‘‘Biometrics for
Identification and Screening to Enhance
National Security,’’ to identify
individuals considered to pose an actual
or possible threat to national security.
d. To maintain current, accurate and
thorough terrorist information and other
lawfully acquired information in a
consolidated terrorist screening
database and determine which
screening processes will use each entry
in the database.
e. To ensure that appropriate
information possessed by state, local,
territorial, and tribal governments,
which is lawfully available to the
Federal Government, is considered in
determinations made by the TSC as to
whether a person is a match to a known
or suspected terrorist, or a match to an
individual considered to pose an actual
or possible threat to national security.
f. To host mechanisms and make
terrorism information, and information
related to individuals considered to
pose an actual or possible threat to
national security, available to support
appropriate domestic and foreign
terrorism and national security
screening processes, and private-sector
screening processes that have a
substantial bearing on homeland
security.
g. To provide operational support to
assist in the identification of persons
screened and to facilitate an appropriate
and lawful response when a known or
suspected terrorist, or individual
considered to pose an actual or possible
threat to national security, is identified
in an authorized screening process.
h. To provide appropriate government
officials, agencies, or organizations with
information about encounters with
known or suspected terrorists or
military detainees, INA exceptions or
other individuals considered to pose an
actual or possible threat to national
security.
i. To assist persons misidentified
during a terrorism screening process, or
possible national security threat
screening process, and to assist
screening agencies or entities in
responding to individual complaints
about the screening process (redress).
j. To oversee the proper use,
maintenance, and security of TSC data
systems and TSC personnel.
ROUTINE USES OF RECORDS MAINTAINED IN THE
SYSTEM, INCLUDING CATEGORIES OF USERSAND
THE PURPOSES OF SUCH USES:
In addition to those disclosures
generally permitted under 5 U.S.C.
552a(b) of the Privacy Act, the records
or information in this system may be
disclosed as a routine use, under 5
U.S.C. 552a(b)(3), in accordance with
PO 00000
Frm 00083
Fmt 4703
Sfmt 4703
blanket routine uses established for FBI
record systems. See Blanket Routine
Uses (BRU) Applicable to More Than
One FBI Privacy Act System of Records,
Justice/FBI–BRU, published at 66 FR
33558 (June 22, 2001) and amended at
70 FR 7513 (February 14, 2005). In
addition, as routine uses specific to this
system, the TSC may disclose relevant
system records to the following persons
or entities and under the circumstances
or for the purposes described below, to
the extent such disclosures are
compatible with the purpose for which
the information was collected.
A. To those federal agencies that have
agreed to provide support to TSC for
purposes of ensuring the continuity of
TSC operations.
B. To federal, state, local, tribal,
territorial, foreign, multinational or
other public agencies or entities, to
entities regulated by any such agency or
entity, and to owners/operators of
critical infrastructure or private sector
entities with a substantial bearing on
national or homeland security and their
agents, contractors or representatives,
for the following purposes: (1) For use
in and in support of terrorism screening,
or possible national security threat
screening, authorized by the U.S.
Government, (2) to provide appropriate
notifications of the results of terrorism
screening, or possible national security
threat screening, using information from
the Terrorist Screening Database or a
threat related to a positive encounter
with an individual identified in the
Terrorist Screening Database, (3) to
facilitate any appropriate law
enforcement or other response (e.g.,
medical and containment response to a
biological hazard) to a known or
suspected terrorist, an individual
considered to pose an actual or possible
threat to national security, or a threat
related to an encounter with such an
individual, and (4) to assist persons
misidentified during a screening
process.
C. To any person, organization, or
governmental entity in order to notify
them of a terrorist threat, or possible
national security threat, for the purpose
of guarding against or responding to
such a threat.
D. To federal, state, local, tribal,
territorial, foreign, or multinational
agencies or entities, or other
organizations that are engaged in, or are
planning to engage in terrorism
screening, or possible national security
threat screening, authorized by the U.S.
Government, for the purpose of the
development, testing, or modification of
information technology systems used or
intended to be used during or in support
of the screening process; whenever
E:\FR\FM\14DEN1.SGM
14DEN1
mstockstill on DSK4VPTVN1PROD with NOTICES
Federal Register / Vol. 76, No. 240 / Wednesday, December 14, 2011 / Notices
practicable, however, TSC, to the extent
possible, will substitute anonymized or
de-identified data, such that the identity
of the individual cannot be derived from
the data.
E. To federal, state, local, tribal,
territorial, foreign, multinational
agencies or entities, or private sector
entities to assist in coordination of
terrorist threat, or possible national
security threat, awareness, assessment,
analysis or response.
F. To any person or entity in either
the public or private sector, domestic or
foreign, where reasonably necessary to
elicit information or cooperation from
the recipient for use by the TSC in the
performance of an authorized function,
such as obtaining information from data
sources as to the thoroughness,
accuracy, currency, or reliability of the
data provided so that the TSC may
review the quality and integrity of its
records for quality assurance or redress
purposes, and may also assist persons
misidentified during a screening
process.
G. To any federal, state, local, tribal,
territorial, foreign or multinational
agency, task force, or other entity or
person that receives information from
the U.S. Government for terrorism
screening purposes, or possible national
security threat screening purposes, in
order to facilitate TSC’s or the
recipient’s review, maintenance, and
correction of TSC data for quality
assurance or redress purposes, and to
assist persons misidentified during a
screening process.
H. To any agency, organization or
person for the purposes of (1)
performing authorized security, audit,
or oversight operations of the DOJ, FBI,
TSC, or any agency, organization, or
person engaged in or providing
information used for terrorism
screening, or possible national security
threat screening, that is supported by
the TSC, and (2) meeting related
reporting requirements.
I. To a former employee of the TSC for
purposes of: Responding to an official
inquiry by a federal, state, or local
government entity or professional
licensing authority, in accordance with
any applicable Department regulations;
or facilitating communications with a
former employee that may be necessary
for personnel-related or other official
purposes where the TSC requires
information and/or consultation
assistance from the former employee
regarding a matter within that person’s
former area of responsibility.
J. To any criminal, civil, or regulatory
law enforcement authority (whether
federal, state, local, territorial, tribal,
multinational or foreign) where the
VerDate Mar<15>2010
15:14 Dec 13, 2011
Jkt 226001
information is relevant to the recipient
entity’s law enforcement
responsibilities.
K. To a governmental entity lawfully
engaged in collecting law enforcement,
law enforcement intelligence, national
security information, homeland security
information, national intelligence,
possible national security threat
information, or terrorism information
for law enforcement, intelligence,
national security, homeland security, or
counterterrorism purposes.
L. To appropriate agencies, entities,
and persons when (1) The Department
of Justice suspects or has confirmed that
the security or confidentiality of
information in the system of records has
been compromised; (2) the Department
of Justice has determined that as a result
of the suspected or confirmed
compromise there is a risk of harm to
economic or property interests, identity
theft or fraud, or harm to the security or
integrity of this system or other systems
or programs (whether maintained by the
Department or another agency or entity)
that rely upon the compromised
information; and (3) the disclosure
made to such agencies, entities, and
persons is reasonably necessary to assist
in connection with the Department of
Justice’s efforts to respond to the
suspected or confirmed compromise
and prevent, minimize, or remedy such
harm.
M. To the United States Department
of State and the United States
Department of Homeland Security for
the purpose of carrying out their
responsibilities under Section
212(a)(3)(B) of the Immigration and
Nationality Act of 1952.
DISCLOSURE TO CONSUMER REPORTING
AGENCIES:
None.
POLICIES AND PRACTICES FOR STORING,
RETRIEVING, ACCESSING, RETAINING, AND
DISPOSING OF RECORDS IN THE SYSTEM:
STORAGE:
Records in this system are stored in
paper and/or electronic format.
Electronic storage is on servers, CD–
ROMs, DVD–ROMs, and magnetic tapes.
RETRIEVABILITY:
Records in this system are typically
retrieved by individual name, date of
birth, passport number, and other
identifying data, including unique
identifying numbers assigned by the
TSC or other government agencies.
SAFEGUARDS:
All records are maintained in a secure
government facility with access limited
to only authorized personnel or
PO 00000
Frm 00084
Fmt 4703
Sfmt 4703
77849
authorized and escorted visitors.
Physical security protections include
guards and locked facilities requiring
badges and passwords for access.
Records are accessed only by authorized
government personnel and contractors
and are protected by appropriate
physical and technological safeguards to
prevent unauthorized access. All
Federal employees and contractors
assigned to the TSC must hold an
appropriate security clearance, sign a
non-disclosure agreement, and undergo
privacy and security training.
RETENTION AND DISPOSAL:
Records in this system will be
retained and disposed of in accordance
with the records schedule approved by
the National Archives and Records
Administration. In general, for records
maintained in the Terrorist Screening
Database, active records are maintained
for 99 years and inactive (archived)
records are maintained for 50 years.
Records of possible encounters with
individuals on the Terrorist Screening
Database are maintained for 99 years.
Records of redress inquiries and quality
assurance matters are maintained for at
least six years. Audit logs are
maintained for 25 years and records of
user audits are maintained for ten years.
SYSTEM MANAGER(S) AND ADDRESS:
Director, Terrorist Screening Center,
Federal Bureau of Investigation, FBI
Headquarters, 935 Pennsylvania Avenue
NW., Washington, DC 20535–0001.
NOTIFICATION PROCEDURE:
Because this system contains
classified intelligence and law
enforcement information related to the
government’s counterterrorism, law
enforcement, and intelligence programs,
records in this system have been
exempted from notification, access, and
amendment to the extent permitted by
subsections (j) and (k) of the Privacy
Act. Requests for notification should be
addressed to the FBI at the address and
according to the requirements set forth
below under the heading ‘‘Record
Access Procedures.’’
RECORD ACCESS PROCEDURES:
Because this system contains
classified intelligence and law
enforcement information related to the
government’s counterterrorism, law
enforcement and intelligence programs,
records in this system have been
exempted from notification, access, and
amendment to the extent permitted by
subsections (j) and (k) of the Privacy
Act. A request for access to a nonexempt record shall be made in writing
with the envelope and the letter clearly
E:\FR\FM\14DEN1.SGM
14DEN1
77850
Federal Register / Vol. 76, No. 240 / Wednesday, December 14, 2011 / Notices
marked ‘‘Privacy Act Request.’’ Include
in the request your full name and
complete address. The requester must
sign the request; and, to verify it, the
signature must be notarized or
submitted under 28 U.S.C. 1746, a law
that permits statements to be made
under penalty of perjury as a substitute
for notarization. You may submit any
other identifying data you wish to
furnish to assist in making a proper
search of the system. Requests for access
to information must be addressed to the
Record Information Dissemination
Section, Federal Bureau of Investigation,
170 Marcel Drive, Winchester, Virginia
22602 or faxed to (540) 868–4992.
mstockstill on DSK4VPTVN1PROD with NOTICES
CONTESTING RECORD PROCEDURES:
Because this system contains
classified intelligence and law
enforcement information related to the
government’s counterterrorism, law
enforcement and intelligence programs,
records in this system are exempt from
notification, access, and amendment to
the extent permitted by subsections (j)
and (k) of the Privacy Act (5 U.S.C.
552a). Requests for amendment should
be addressed to the FBI at the address
and according to the requirements set
forth above under the heading ‘‘Record
Access Procedures.’’ If, however,
individuals are experiencing repeated
delays or difficulties during a
government screening process and
believe that this might be related to
terrorist watch list information, they
may contact the Federal agency that is
conducting the screening process in
question (‘‘screening agency’’). The
screening agency is in the best position
to determine if a particular problem
relates to a terrorist watch list entry or
is due to some other cause, such as a
criminal history, an immigration
violation or random screening. Some
individuals also experience repeated
delays during screening because their
names and/or other identifying data,
such as dates of birth, are similar to
those of known or suspected terrorists.
These individuals, referred to as
‘‘misidentified persons,’’ often believe
that they themselves are on a terrorist
watch list, when in fact they only bear
a similarity in name or other identifier
to an individual on the list. Most
screening agencies have or are
developing procedures to expedite the
clearance of misidentified persons
during screening. By contacting the
screening agency with a complaint,
individuals will be able to take
advantage of the procedures available to
help misidentified persons and others
experiencing screening problems. Check
the agency’s requirements for
submitting complaints but, at a
VerDate Mar<15>2010
15:14 Dec 13, 2011
Jkt 226001
minimum, individuals should describe
in as much detail as possible the
problem they are having, including
dates and locations of screening, and
provide sufficient information to
identify themselves, such as full name,
citizenship status, and date and place of
birth. The TSC assists the screening
agency in resolving any screening
complaints that may relate to terrorist
watch list information, but does not
receive or respond to individual
complaints directly. However, if TSC
receives any such complaints, TSC will
forward them to the appropriate
screening agency. Additional
information about the redress process
and how to file a complaint with a
screening agency is available on TSC’s
Web site at https://www.fbi.gov/about-us/
nsb/tsc/tsc_redress.
RECORD SOURCE CATEGORIES:
Information in this system is obtained
from individuals covered by the system,
public sources, agencies and private
sector entities conducting terrorism
screening, law enforcement and
intelligence agency record systems,
government databases, and foreign
governments.
SYSTEMS EXEMPTED FROM CERTAIN PROVISIONS
OF THE ACT:
The Attorney General has exempted
this system from subsections (c)(3) and
(4), (d)(1), (2), (3) and (4), (e)(1), (2), (3),
(5) and (8), and (g) of the Privacy Act
pursuant to 5 U.S.C. 552a(j) and (k).
These exemptions apply only to the
extent that information in the system is
subject to exemption pursuant to 5
U.S.C. 552a(j) and (k). Rules have been
promulgated in accordance with the
requirements of 5 U.S.C. 553(b), (c) and
(e) and are located at 28 CFR 16.96.
[FR Doc. 2011–32074 Filed 12–13–11; 8:45 am]
Drug
Dihydromorphine (9145) ...............
Hydromorphone (9150) ................
Schedule
I
II
Dihydromorphine is an intermediate
in the manufacture of Hydromorphone,
and is not for commercial distribution.
The company plans to manufacture
Hydromorphone HCL for sale to other
manufacturers, and to manufacture
other controlled substances for
distribution to its customers.
Any other such applicant, and any
person who is presently registered with
DEA to manufacture such substances,
may file comments or objections to the
issuance of the proposed registration
pursuant to 21 CFR 1301.33(a).
Any such written comments or
objections should be addressed, in
quintuplicate, to the Drug Enforcement
Administration, Office of Diversion
Control, Federal Register Representative
(ODL), 8701 Morrissette Drive,
Springfield, Virginia 22152; and must be
filed no later than February 13, 2012.
Dated: December 2, 2011.
Joseph T. Rannazzisi,
Deputy Assistant Administrator, Office of
Diversion Control, Drug Enforcement
Administration.
[FR Doc. 2011–32045 Filed 12–13–11; 8:45 am]
BILLING CODE 4410–09–P
DEPARTMENT OF LABOR
Occupational Safety and Health
Administration
[Docket No. OSHA–2011–0858]
Permit-Required Confined Spaces;
Extension of the Office of Management
and Budget’s (OMB) Approval of
Information Collection (Paperwork)
Requirements
BILLING CODE 4410–02–P
Occupational Safety and Health
Administration (OSHA), Labor.
ACTION: Request for public comments.
DEPARTMENT OF JUSTICE
SUMMARY:
Drug Enforcement Administration
Manufacturer of Controlled
Substances; Notice of Application
Pursuant to § 1301.33(a), Title 21 of
the Code of Federal Regulations (CFR),
this is notice that on July 8, 2011, Halo
Pharmaceutical Inc., 30 North Jefferson
Road, Whippany, New Jersey 07981,
made application by renewal to the
Drug Enforcement Administration
(DEA) to be registered as a bulk
manufacturer of the following basic
classes of controlled substances:
PO 00000
Frm 00085
Fmt 4703
Sfmt 4703
AGENCY:
OSHA solicits public
comments concerning its proposal to
extend OMB approval of the
information collection requirements
contained in the Standard on PermitRequired Confined Spaces (29 CFR
1910.146). The purpose of the
information is to ensure that employers
systematically evaluate the dangers in
permit spaces before entry is attempted,
and to ensure that adequate measures
are taken to make the spaces safe for
entry.
Comments must be submitted
(postmarked, sent, or received) by
February 13, 2012.
DATES:
E:\FR\FM\14DEN1.SGM
14DEN1
Agencies
[Federal Register Volume 76, Number 240 (Wednesday, December 14, 2011)]
[Notices]
[Pages 77846-77850]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 2011-32074]
-----------------------------------------------------------------------
DEPARTMENT OF JUSTICE
[CPCLO Order No. 004-2011]
Privacy Act of 1974; System of Records
AGENCY: Federal Bureau of Investigation, Department of Justice.
ACTION: Notice to amend system of records.
-----------------------------------------------------------------------
SUMMARY: The Federal Bureau of Investigation proposes to amend its
Terrorist Screening Records System, JUSTICE/FBI-019, maintained by the
Terrorist Screening Center, to add two new categories of individuals
and their associated records, to add a new routine use and make
modifications to existing routine uses, and to make several
administrative modifications and updates throughout the notice. Public
comment is invited.
DATES: In accordance with 5 USC 552a(e)(4) and (11), the public is
given a 30-day period in which to comment Therefore, please submit any
comments by January 13, 2012.
ADDRESSES: The public, Office of Management and Budget (OMB), and
Congress are invited to submit any comments to the Department of
Justice, Attn: Privacy Analyst, Office of Privacy and Civil Liberties,
National Place Building, 1331 Pennsylvania Avenue NW., Suite 1000,
Washington, DC 20530-0001, or by facsimile to (202) 307-0693.
[[Page 77847]]
FOR FURTHER INFORMATION CONTACT: Meghann Van Horne, TSC Privacy
Officer, Federal Bureau of Investigation, 935 Pennsylvania Avenue NW.,
Washington, DC 20535-0001.
SUPPLEMENTARY INFORMATION: JUSTICE/FBI-019, last published in full at
72 FR 47073 (Aug. 22, 2007), describes the Terrorist Screening Records
System maintained by the Federal Bureau of Investigation (FBI) at the
Terrorist Screening Center (TSC) and at facilities operated by other
government entities. These records are used in screening operations to
ensure the security of the United States. The FBI now proposes to add
two new categories of individuals to the system whose records will be
useful in screening operations: Relatives, associates, or others
closely connected with known or suspected terrorists who are excludable
from the United States based on these relationships by virtue of
Section 212(a)(3)(B) of the Immigration and Nationality Act, as
amended, and individuals who were officially detained during military
operations, but not as enemy prisoners of war, and who have been
identified as possibly posing a threat to national security. This
latter category of individuals is commonly referred to as Military
Detainees. Excludable individuals under the first category may be
lawful permanent residents of the United States. Individuals in the
second category are unlikely to be lawful permanent residents of the
United States and even less likely to be U.S. citizens. Nevertheless,
out of an abundance of caution and because potentially the status of a
military detainee may change over time, the FBI is including military
detainee records in its Terrorist Screening Records Systems. In
addition to adding the two new categories of individuals, the FBI is
also adding a routine use, which will enable the FBI to share
information about individuals who are excludable from the United States
by virtue of Section 212(a)(3)(B) of the Immigration and Nationality
Act with the Department of State and the Department of Homeland
Security for the purposes of carrying out the provisions of this Act.
The FBI is making pertinent revisions in other parts of the system
notice to reflect the addition of these categories of individuals.
Additional modifications to Justice/FBI-019 include: Updates to the
system location, record access procedures, and procedures for
contesting records; clarifications to existing categories of records in
the system; updates to the authorities section to reflect new
authorities; and additions or changes to more accurately describe the
system's purpose and routine uses. The FBI is republishing the entire
system of records notice for ease of reference to these changes.
In accordance with 5 U.S.C. 552a(r), the Department of Justice has
provided a report to OMB and the Congress on the modification of this
system of records.
Dated: November 23, 2011.
Nancy C. Libin,
Chief Privacy and Civil Liberties Officer, United States Department of
Justice.
JUSTICE/FBI-019
SYSTEM NAME:
Terrorist Screening Records System (TSRS).
SECURITY CLASSIFICATION:
Classified and unclassified.
SYSTEM LOCATION:
Records described in this notice are maintained at the Terrorist
Screening Center, Federal Bureau of Investigation, Washington, DC, and
at facilities operated by other government entities for terrorism and
national security threat screening, system back-up, and continuity of
operations purposes.
CATEGORIES OF INDIVIDUALS COVERED BY THE SYSTEM:
a. Individuals known or appropriately suspected to be or have been
engaged in conduct constituting, in preparation for, in aid of, or
related to terrorism (``known or suspected terrorists'');
b. Individuals, who are lawful permanent resident aliens but who
are excludable from the United States based on their familial
relationship, association, or connection with a known or suspected
terrorist and who do not meet any of the applicable exceptions as
described in Section 212(a)(3)(B) of the Immigration and Nationality
Act of 1952 (hereinafter INA exceptions);
c. Individuals who were officially detained during military
operations, but as not Enemy Prisoners of War, and who have been
identified to pose an actual or possible threat to national security
(hereinafter military detainees);
d. Individuals who are the subject of queries against TSC
information systems;
e. Individuals identified during a terrorism screening process as a
possible identity match to a known or suspected terrorist and other
individuals who accompany or travel with such individuals;
f. Individuals who are misidentified as a possible identity match
to a known or suspected terrorist (``misidentified persons'');
g. Individuals about whom a terrorist watchlist-related redress
inquiry has been made; and
h. Individuals whose information is collected and maintained for
information system user auditing and security purposes, such as
individuals who are authorized users of TSC information systems.
CATEGORIES OF RECORDS IN THE SYSTEM:
a. Identifying biographical information, such as name, date of
birth, place of birth, passport and/or drivers license information,
biometric information, such as photographs and fingerprints, and other
available identifying particulars used to compare the identity of an
individual being screened, with a known or suspected terrorist, an INA
exception, or a military detainee, including audit records containing
this information;
b. Information about encounters with individuals covered by this
system, such as date, location, screening entity, analysis, associated
individuals, and results (positive or negative identity match), and,
for encounters with a known or suspected terrorist, INA exceptions, and
military detainees only, other entities notified and details of any law
enforcement, intelligence, or other operational response;
c. For a known or suspected terrorist, military detainee, or an INA
exception, in addition to the categories of records listed above,
references to and/or information from other government law enforcement
and intelligence databases, or other relevant databases that may
contain terrorism information;
d. For an individual considered to pose an actual or possible
threat to national security, in addition to the categories of records
listed above, references to and/or information from other government
law enforcement and intelligence databases, or other relevant databases
that may contain information related to possible threats to national
security;
e. For misidentified persons, in addition to the categories of
records listed above, other identifying information that will be used
during screening only for the purpose of distinguishing them from a
known or suspected terrorist, an INA exception, or a military detainee,
any of whom may have similar identifying characteristics (such as name
and date of birth);
f. For redress matters, in addition to the categories of records
listed above, information provided by individuals or their
representatives, information provided by the screening agency, and
internal work papers and other
[[Page 77848]]
documents related to researching and resolving the matter;
g. Information collected and compiled to maintain an audit trail of
the activity of authorized users of TSC information systems, such as
user name/ID, date/time, search query and results data, user activity
information (e.g., record retrieval, modification, or deletion data),
and record numbers; and,
h. Archived records and record histories from the Terrorist
Screening Database, Encounter Management Application, and other TSC
data systems that are part of the TSRS.
AUTHORITY FOR MAINTENANCE OF THE SYSTEM:
Homeland Security Presidential Directive-6, ``Integration and Use
of Screening Information to Protect Against Terrorism'' (Sept. 16,
2003); Homeland Security Presidential Directive-11, ``Comprehensive
Terrorist-Related Screening Procedures'' (Aug. 27, 2004); National
Security Presidential Directive-59/Homeland Security Presidential
Directive-24, ``Biometrics for Identification and Screening to Enhance
National Security'' (June 5, 2008), (HSPD-24 gives the Attorney General
authority to recommend categories of individuals in addition to known
or suspected terrorists who may pose a threat to national security.);
Executive Order 13388, ``Further Strengthening the Sharing of Terrorism
Information to Protect Americans,'' (October 25, 2005); the
Intelligence Reform and Terrorism Prevention Act of 2004, Pub. L. 108-
458; the National Security Act of 1947, as amended; 28 U.S.C. 533; and
Section 212(a)(3)(B) of the Immigration and Nationality Act of 1952. In
the event that the TSC's continuity-of-operations plans are invoked,
the agency that assumes TSC operational functions will have the
authority to administer the Terrorist Screening Records System as
necessary to carry out those functions.
PURPOSE(S):
a. To implement the U.S. Government's National Strategy for
Homeland Security and Homeland Security Presidential Directive-6, to
identify potential terrorist threats, to uphold and enforce the law,
and to ensure public safety.
b. To consolidate the government's approach to terrorism and
national security screening and provide for the appropriate and lawful
use of terrorist information and other lawfully acquired information in
screening processes.
c. To implement the U.S. Government's Action Plan for National
Security Presidential Directive-59/Homeland Security Presidential
Directive-24, ``Biometrics for Identification and Screening to Enhance
National Security,'' to identify individuals considered to pose an
actual or possible threat to national security.
d. To maintain current, accurate and thorough terrorist information
and other lawfully acquired information in a consolidated terrorist
screening database and determine which screening processes will use
each entry in the database.
e. To ensure that appropriate information possessed by state,
local, territorial, and tribal governments, which is lawfully available
to the Federal Government, is considered in determinations made by the
TSC as to whether a person is a match to a known or suspected
terrorist, or a match to an individual considered to pose an actual or
possible threat to national security.
f. To host mechanisms and make terrorism information, and
information related to individuals considered to pose an actual or
possible threat to national security, available to support appropriate
domestic and foreign terrorism and national security screening
processes, and private-sector screening processes that have a
substantial bearing on homeland security.
g. To provide operational support to assist in the identification
of persons screened and to facilitate an appropriate and lawful
response when a known or suspected terrorist, or individual considered
to pose an actual or possible threat to national security, is
identified in an authorized screening process.
h. To provide appropriate government officials, agencies, or
organizations with
information about encounters with known or suspected terrorists or
military detainees, INA exceptions or other individuals considered to
pose an actual or possible threat to national security.
i. To assist persons misidentified during a terrorism screening
process, or possible national security threat screening process, and to
assist screening agencies or entities in responding to individual
complaints about the screening process (redress).
j. To oversee the proper use, maintenance, and security of TSC data
systems and TSC personnel.
ROUTINE USES OF RECORDS MAINTAINED IN THE SYSTEM, INCLUDING CATEGORIES
OF USERSAND THE PURPOSES OF SUCH USES:
In addition to those disclosures generally permitted under 5 U.S.C.
552a(b) of the Privacy Act, the records or information in this system
may be disclosed as a routine use, under 5 U.S.C. 552a(b)(3), in
accordance with blanket routine uses established for FBI record
systems. See Blanket Routine Uses (BRU) Applicable to More Than One FBI
Privacy Act System of Records, Justice/FBI-BRU, published at 66 FR
33558 (June 22, 2001) and amended at 70 FR 7513 (February 14, 2005). In
addition, as routine uses specific to this system, the TSC may disclose
relevant system records to the following persons or entities and under
the circumstances or for the purposes described below, to the extent
such disclosures are compatible with the purpose for which the
information was collected.
A. To those federal agencies that have agreed to provide support to
TSC for purposes of ensuring the continuity of TSC operations.
B. To federal, state, local, tribal, territorial, foreign,
multinational or other public agencies or entities, to entities
regulated by any such agency or entity, and to owners/operators of
critical infrastructure or private sector entities with a substantial
bearing on national or homeland security and their agents, contractors
or representatives, for the following purposes: (1) For use in and in
support of terrorism screening, or possible national security threat
screening, authorized by the U.S. Government, (2) to provide
appropriate notifications of the results of terrorism screening, or
possible national security threat screening, using information from the
Terrorist Screening Database or a threat related to a positive
encounter with an individual identified in the Terrorist Screening
Database, (3) to facilitate any appropriate law enforcement or other
response (e.g., medical and containment response to a biological
hazard) to a known or suspected terrorist, an individual considered to
pose an actual or possible threat to national security, or a threat
related to an encounter with such an individual, and (4) to assist
persons misidentified during a screening process.
C. To any person, organization, or governmental entity in order to
notify them of a terrorist threat, or possible national security
threat, for the purpose of guarding against or responding to such a
threat.
D. To federal, state, local, tribal, territorial, foreign, or
multinational agencies or entities, or other organizations that are
engaged in, or are planning to engage in terrorism screening, or
possible national security threat screening, authorized by the U.S.
Government, for the purpose of the development, testing, or
modification of information technology systems used or intended to be
used during or in support of the screening process; whenever
[[Page 77849]]
practicable, however, TSC, to the extent possible, will substitute
anonymized or de-identified data, such that the identity of the
individual cannot be derived from the data.
E. To federal, state, local, tribal, territorial, foreign,
multinational agencies or entities, or private sector entities to
assist in coordination of terrorist threat, or possible national
security threat, awareness, assessment, analysis or response.
F. To any person or entity in either the public or private sector,
domestic or foreign, where reasonably necessary to elicit information
or cooperation from the recipient for use by the TSC in the performance
of an authorized function, such as obtaining information from data
sources as to the thoroughness, accuracy, currency, or reliability of
the data provided so that the TSC may review the quality and integrity
of its records for quality assurance or redress purposes, and may also
assist persons misidentified during a screening process.
G. To any federal, state, local, tribal, territorial, foreign or
multinational agency, task force, or other entity or person that
receives information from the U.S. Government for terrorism screening
purposes, or possible national security threat screening purposes, in
order to facilitate TSC's or the recipient's review, maintenance, and
correction of TSC data for quality assurance or redress purposes, and
to assist persons misidentified during a screening process.
H. To any agency, organization or person for the purposes of (1)
performing authorized security, audit, or oversight operations of the
DOJ, FBI, TSC, or any agency, organization, or person engaged in or
providing information used for terrorism screening, or possible
national security threat screening, that is supported by the TSC, and
(2) meeting related reporting requirements.
I. To a former employee of the TSC for purposes of: Responding to
an official inquiry by a federal, state, or local government entity or
professional licensing authority, in accordance with any applicable
Department regulations; or facilitating communications with a former
employee that may be necessary for personnel-related or other official
purposes where the TSC requires information and/or consultation
assistance from the former employee regarding a matter within that
person's former area of responsibility.
J. To any criminal, civil, or regulatory law enforcement authority
(whether federal, state, local, territorial, tribal, multinational or
foreign) where the information is relevant to the recipient entity's
law enforcement responsibilities.
K. To a governmental entity lawfully engaged in collecting law
enforcement, law enforcement intelligence, national security
information, homeland security information, national intelligence,
possible national security threat information, or terrorism information
for law enforcement, intelligence, national security, homeland
security, or counterterrorism purposes.
L. To appropriate agencies, entities, and persons when (1) The
Department of Justice suspects or has confirmed that the security or
confidentiality of information in the system of records has been
compromised; (2) the Department of Justice has determined that as a
result of the suspected or confirmed compromise there is a risk of harm
to economic or property interests, identity theft or fraud, or harm to
the security or integrity of this system or other systems or programs
(whether maintained by the Department or another agency or entity) that
rely upon the compromised information; and (3) the disclosure made to
such agencies, entities, and persons is reasonably necessary to assist
in connection with the Department of Justice's efforts to respond to
the suspected or confirmed compromise and prevent, minimize, or remedy
such harm.
M. To the United States Department of State and the United States
Department of Homeland Security for the purpose of carrying out their
responsibilities under Section 212(a)(3)(B) of the Immigration and
Nationality Act of 1952.
DISCLOSURE TO CONSUMER REPORTING AGENCIES:
None.
POLICIES AND PRACTICES FOR STORING, RETRIEVING, ACCESSING, RETAINING,
AND DISPOSING OF RECORDS IN THE SYSTEM:
STORAGE:
Records in this system are stored in paper and/or electronic
format. Electronic storage is on servers, CD-ROMs, DVD-ROMs, and
magnetic tapes.
RETRIEVABILITY:
Records in this system are typically retrieved by individual name,
date of birth, passport number, and other identifying data, including
unique identifying numbers assigned by the TSC or other government
agencies.
SAFEGUARDS:
All records are maintained in a secure government facility with
access limited to only authorized personnel or authorized and escorted
visitors. Physical security protections include guards and locked
facilities requiring badges and passwords for access. Records are
accessed only by authorized government personnel and contractors and
are protected by appropriate physical and technological safeguards to
prevent unauthorized access. All Federal employees and contractors
assigned to the TSC must hold an appropriate security clearance, sign a
non-disclosure agreement, and undergo privacy and security training.
RETENTION AND DISPOSAL:
Records in this system will be retained and disposed of in
accordance with the records schedule approved by the National Archives
and Records Administration. In general, for records maintained in the
Terrorist Screening Database, active records are maintained for 99
years and inactive (archived) records are maintained for 50 years.
Records of possible encounters with individuals on the Terrorist
Screening Database are maintained for 99 years. Records of redress
inquiries and quality assurance matters are maintained for at least six
years. Audit logs are maintained for 25 years and records of user
audits are maintained for ten years.
SYSTEM MANAGER(S) AND ADDRESS:
Director, Terrorist Screening Center, Federal Bureau of
Investigation, FBI Headquarters, 935 Pennsylvania Avenue NW.,
Washington, DC 20535-0001.
NOTIFICATION PROCEDURE:
Because this system contains classified intelligence and law
enforcement information related to the government's counterterrorism,
law enforcement, and intelligence programs, records in this system have
been exempted from notification, access, and amendment to the extent
permitted by subsections (j) and (k) of the Privacy Act. Requests for
notification should be addressed to the FBI at the address and
according to the requirements set forth below under the heading
``Record Access Procedures.''
RECORD ACCESS PROCEDURES:
Because this system contains classified intelligence and law
enforcement information related to the government's counterterrorism,
law enforcement and intelligence programs, records in this system have
been exempted from notification, access, and amendment to the extent
permitted by subsections (j) and (k) of the Privacy Act. A request for
access to a non-exempt record shall be made in writing with the
envelope and the letter clearly
[[Page 77850]]
marked ``Privacy Act Request.'' Include in the request your full name
and complete address. The requester must sign the request; and, to
verify it, the signature must be notarized or submitted under 28 U.S.C.
1746, a law that permits statements to be made under penalty of perjury
as a substitute for notarization. You may submit any other identifying
data you wish to furnish to assist in making a proper search of the
system. Requests for access to information must be addressed to the
Record Information Dissemination Section, Federal Bureau of
Investigation, 170 Marcel Drive, Winchester, Virginia 22602 or faxed to
(540) 868-4992.
CONTESTING RECORD PROCEDURES:
Because this system contains classified intelligence and law
enforcement information related to the government's counterterrorism,
law enforcement and intelligence programs, records in this system are
exempt from notification, access, and amendment to the extent permitted
by subsections (j) and (k) of the Privacy Act (5 U.S.C. 552a). Requests
for amendment should be addressed to the FBI at the address and
according to the requirements set forth above under the heading
``Record Access Procedures.'' If, however, individuals are experiencing
repeated delays or difficulties during a government screening process
and believe that this might be related to terrorist watch list
information, they may contact the Federal agency that is conducting the
screening process in question (``screening agency''). The screening
agency is in the best position to determine if a particular problem
relates to a terrorist watch list entry or is due to some other cause,
such as a criminal history, an immigration violation or random
screening. Some individuals also experience repeated delays during
screening because their names and/or other identifying data, such as
dates of birth, are similar to those of known or suspected terrorists.
These individuals, referred to as ``misidentified persons,'' often
believe that they themselves are on a terrorist watch list, when in
fact they only bear a similarity in name or other identifier to an
individual on the list. Most screening agencies have or are developing
procedures to expedite the clearance of misidentified persons during
screening. By contacting the screening agency with a complaint,
individuals will be able to take advantage of the procedures available
to help misidentified persons and others experiencing screening
problems. Check the agency's requirements for submitting complaints
but, at a minimum, individuals should describe in as much detail as
possible the problem they are having, including dates and locations of
screening, and provide sufficient information to identify themselves,
such as full name, citizenship status, and date and place of birth. The
TSC assists the screening agency in resolving any screening complaints
that may relate to terrorist watch list information, but does not
receive or respond to individual complaints directly. However, if TSC
receives any such complaints, TSC will forward them to the appropriate
screening agency. Additional information about the redress process and
how to file a complaint with a screening agency is available on TSC's
Web site at https://www.fbi.gov/about-us/nsb/tsc/tsc_redress.
RECORD SOURCE CATEGORIES:
Information in this system is obtained from individuals covered by
the system, public sources, agencies and private sector entities
conducting terrorism screening, law enforcement and intelligence agency
record systems, government databases, and foreign governments.
SYSTEMS EXEMPTED FROM CERTAIN PROVISIONS OF THE ACT:
The Attorney General has exempted this system from subsections
(c)(3) and (4), (d)(1), (2), (3) and (4), (e)(1), (2), (3), (5) and
(8), and (g) of the Privacy Act pursuant to 5 U.S.C. 552a(j) and (k).
These exemptions apply only to the extent that information in the
system is subject to exemption pursuant to 5 U.S.C. 552a(j) and (k).
Rules have been promulgated in accordance with the requirements of 5
U.S.C. 553(b), (c) and (e) and are located at 28 CFR 16.96.
[FR Doc. 2011-32074 Filed 12-13-11; 8:45 am]
BILLING CODE 4410-02-P