Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-030 Use of the Terrorist Screening Database System of Records, 81787-81789 [2011-33428]
Download as PDF
81787
Rules and Regulations
Federal Register
Vol. 76, No. 250
Thursday, December 29, 2011
This section of the FEDERAL REGISTER
contains regulatory documents having general
applicability and legal effect, most of which
are keyed to and codified in the Code of
Federal Regulations, which is published under
50 titles pursuant to 44 U.S.C. 1510.
The Code of Federal Regulations is sold by
the Superintendent of Documents. Prices of
new books are listed in the first FEDERAL
REGISTER issue of each week.
DEPARTMENT OF HOMELAND
SECURITY
provisions of the Privacy Act because of
criminal, civil, and administrative
enforcement requirements. The system
of records is titled, ‘‘DHS/ALL–030 Use
of the Terrorist Screening Database
System of Records.’’ The DHS/ALL–030
Use of the Terrorist Screening Database
system of records notice (SORN) was
published concurrently in the Federal
Register, July 6, 2011, 76 FR 39408, and
comments were invited on both the
NPRM and SORN.
Public Comments
DHS received a total of two
comments, one on the NPRM and one
that addressed both the NPRM and the
SORN.
Office of the Secretary
6 CFR Part 5
[Docket No. DHS–2011–0100]
Comments on the NPRM
Privacy Act of 1974: Implementation of
Exemptions; Department of Homeland
Security/ALL–030 Use of the Terrorist
Screening Database System of
Records
DHS received two comments on the
NPRM. One of the comments on the
NPRM also included comments on the
SORN. That comment will be addressed
in its entirety under SORN below. The
one comment exclusively on the NPRM
was from a private individual. The
individual raised a series of
philosophical questions regarding the
policy behind homeland security issues
that were unrelated to this proposed
rulemaking. The individual also
mentioned several times that this is a
‘‘new database.’’ This is not a new
database. The system of records
addressed by this NPRM and the
accompanying SORN represents a
mirror copy of the Department of Justice
(DOJ)/Federal Bureau of Investigation
(FBI)–019 Terrorist Screening Records
System of Records (August 22, 2007, 72
FR 47073). The same rules outlined in
the DOJ/FBI–019 Terrorist Screening
Records System of Records (August 22,
2007, 72 FR 47073) transfer and apply.
The individual goes on to discuss the
historical relevance of the Terrorist
Screening Database and outlines the
positives and negatives of the system.
The individual also raises concerns
about the security of the system. The
DHS mirrored copy of the system will
receive the same security and protection
as it does at the FBI and Terrorist
Screening Center (TSC). The individual
also speculates that, as a matter of fiscal
priority, the system could be subject to
less funding over time based on
priorities. The system will meet the
same requirements at DHS as it does at
FBI/TSC. The individual concludes the
general comments by saying the benefits
Privacy Office, DHS.
Final rule.
AGENCY:
ACTION:
The Department of Homeland
Security is issuing a final rule to amend
its regulations to exempt portions of a
newly established system of records
titled, ‘‘Department of Homeland
Security/ALL–030 Use of the Terrorist
Screening Database System of Records’’
from certain provisions of the Privacy
Act. Specifically, the Department
exempts portions of the ‘‘Department of
Homeland Security/ALL–030 Use of the
Terrorist Screening Database System of
Records’’ from one or more provisions
of the Privacy Act because of criminal,
civil, and administrative enforcement
requirements.
SUMMARY:
Effective Date: This final rule is
effective December 29, 2011.
FOR FURTHER INFORMATION CONTACT: For
general questions and privacy issues
please contact: Mary Ellen Callahan
(703) 235–0780), Chief Privacy Officer,
Privacy Office, Department of Homeland
Security, Washington, DC 20528.
SUPPLEMENTARY INFORMATION:
tkelley on DSK3SPTVN1PROD with RULES
DATES:
Background
The Department of Homeland
Security (DHS) published a notice of
proposed rulemaking (NPRM) in the
Federal Register, July 6, 2011, 76 FR
39315, proposing to exempt portions of
the system of records from one or more
VerDate Mar<15>2010
16:16 Dec 28, 2011
Jkt 226001
PO 00000
Frm 00001
Fmt 4700
Sfmt 4700
outweigh the risks. On Privacy Act
exemptions, the individual states that
the proposed rule was nicely drafted.
The individual asks the question of who
will make the determination on when
an exemption will be applied. In
response to that question, that
determination will be made by DHS
privacy or disclosure staff in
consultation with counsel. If the
exemption is applied and an appeal is
necessary, individuals may appeal the
decision. That process can be found at
www.dhs.gov/foia. The individual
expresses appreciation for the
Department’s decision to consider
requests on a case-by-case basis when
applying exemptions. The individual
states that the system should be
implemented and that it be a model for
other agencies.
Comment on the SORN
DHS received one comment on the
SORN from a public interest research
center that was joined in filing its
comments by seventeen other privacy,
consumer rights, and civil rights
organizations. The comment addressed
both the NPRM and SORN jointly and
is addressed in this section. The authors
start by stating that DHS should
‘‘suspend the proposal pending a full
review of the privacy, security, and legal
implications of the program, including
compliance with the Federal Privacy
Act.’’ The NPRM and SORN received
internal coordination and clearance by
program and compliance officials,
including, but not limited to, the Office
of General Counsel and the Chief
Privacy Officer. The organizations
further stated that ‘‘if the agency (DHS)
proceeds with the Watch List System
(WLS) program, the system must, at a
minimum: (1) Adhere to Congress’s
intent to maintain transparent and
secure government recordkeeping
systems; (2) provide individuals
judicially enforceable rights of notice,
access, and correction; (3) conform to a
revised SORN and NPRM that includes
requirements for the agency (DHS) to
respect individuals’ rights to control
their information in possession of
Federal agencies, as the Privacy Act
requires; and (4) premise its
technological and security approach on
decentralization.’’ With respect to these
points, the Department follows the
complete privacy legal framework as
well as additional privacy policy it has
E:\FR\FM\29DER1.SGM
29DER1
tkelley on DSK3SPTVN1PROD with RULES
81788
Federal Register / Vol. 76, No. 250 / Thursday, December 29, 2011 / Rules and Regulations
put in place. The organizations go on to
state that the Department is
intentionally circumventing a number of
provisions under the Privacy Act as well
as the intent of the Privacy Act. As
noted above, the NPRM and SORN
received internal coordination and
clearance by program and compliance
officials, including, but not limited to,
the Office of General Counsel and the
Chief Privacy Officer. This addresses the
author’s points covering ‘‘meaningful
privacy protections Congress
established in the Privacy Act.’’ The fact
that Privacy Act exemptions are taken
within this system of records, and
explained within the NPRM, does not
mean that the act is illegal or outside of
the intent of Congress. The exemptions
are contemplated by the Privacy Act and
the Department implemented them
consistent with that statute. The
Department maintains that, for a variety
of national security and law
enforcement purposes, the exemptions
taken within the system of records, and
outlined in the NRPM, are necessary
and are unchanged. The organizations
go on to refute the Privacy Act
exemptions claimed and recommend
changing the way the Department does
business including the way it conducts
investigations. The organizations
recommend that the Department void
the claimed exemptions. The
Department maintains that, for national
security and law enforcement purposes,
the exemptions taken within the system
of records, and outlined in the NRPM,
are necessary and remain in place. The
organizations also go on to cite concerns
regarding privacy risks contemplated in
previously published Privacy Impact
Assessments (PIAs) where the Terrorist
Screening Database (TSDB) is used. In
response, the Department emphasizes
that this is not a new database. This
NPRM and SORN represent a mirror
copy of the DOJ/FBI–019 Terrorist
Screening Records System of Records
(August 22, 2007, 72 FR 47073). The
same rules outlined in the FBI SORN
transfer and apply. The Department has
taken additional steps to further ensure
privacy protections by conducting
appropriate privacy analysis through a
published PIA as well as SORN. Doing
so provides additional transparency on
the risks, mitigations, and privacy rules
associated with maintaining a mirror
copy of the TSDB.
After consideration of public
comments and reviewing the NPRM, the
Department determined it did not
require exemptions to subsections
(e)(12) or (h) of the Privacy Act. Thus,
the Department has removed proposed
VerDate Mar<15>2010
16:16 Dec 28, 2011
Jkt 226001
paragraphs (i) and (k) from the Final
Rule. No additional changes were made.
List of Subjects in 6 CFR Part 5
Freedom of information, Privacy.
For the reasons stated in the
preamble, DHS amends Chapter I of
Title 6, Code of Federal Regulations, as
follows:
PART 5—DISCLOSURE OF RECORDS
AND INFORMATION
1. The authority citation for Part 5
continues to read as follows:
■
Authority: 6 U.S.C. 101 et seq.; Pub. L.
107–296, 116 Stat. 2135; 5 U.S.C. 301.
Subpart A also issued under 5 U.S.C. 552.
Subpart B also issued under 5 U.S.C. 552a.
2. Add at the end of Appendix C to
Part 5, the following new paragraph
‘‘66’’:
■
Appendix C to Part 5—DHS Systems of
Records Exempt From the Privacy Act
*
*
*
*
*
66. The DHS/ALL–030 Use of
Terrorist Screening Database System of
Records consists of electronic and paper
records and will be used by DHS and its
components. The DHS/ALL–030 Use of
Terrorist Screening Database System of
Records is a repository of information
held by DHS in connection with its
several and varied missions and
functions, including, but not limited to
the enforcement of civil and criminal
laws; investigations, inquiries, and
proceedings there under; national
security and intelligence activities; and
protection of the President of the U.S. or
other individuals pursuant to Section
3056 and 3056A of Title 18. The DHS/
ALL–030 Use of Terrorist Screening
Database System of Records contains
information that is collected by, on
behalf of, in support of, or in
cooperation with DHS and its
components and may contain personally
identifiable information collected by
other Federal, state, local, tribal, foreign,
or international government agencies.
Pursuant to 5 U.S.C. 552a(j)(2), the
Secretary of Homeland Security has
exempted this system from the
following provisions of the Privacy Act,
subject to the limitations set forth in 5
U.S.C. 552a(c)(3) and (c)(4); (d); (e)(1),
(e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I),
(e)(5), (e)(8); (f); and (g)(1). Additionally,
pursuant to 5 U.S.C. 552a(k)(1) and
(k)(2), the Secretary of Homeland
Security has exempted this system from
the following provisions of the Privacy
Act, subject to the limitation set forth in
5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G),
(e)(4)(H), (e)(4)(I); and (f). Exemptions
from these particular subsections are
PO 00000
Frm 00002
Fmt 4700
Sfmt 4700
justified, on a case-by-case basis to be
determined at the time a request is
made, for the following reasons:
(a) From subsection (c)(3) and (c)(4)
(Accounting for Disclosures) because
release of the accounting of disclosures
could alert the subject of an
investigation of an actual or potential
criminal, civil, or regulatory violation to
the existence of that investigation and
reveal investigative interest on the part
of DHS as well as the recipient agency.
Disclosure of the accounting would
therefore present a serious impediment
to law enforcement efforts and/or efforts
to preserve national security. Disclosure
of the accounting would also permit the
individual who is the subject of a record
to impede the investigation, to tamper
with witnesses or evidence, and to
avoid detection or apprehension, which
would undermine the entire
investigative process.
(b) From subsection (d) (Access to
Records) because access to the records
contained in this system of records
could inform the subject of an
investigation of an actual or potential
criminal, civil, or regulatory violation to
the existence of that investigation and
reveal investigative interest on the part
of DHS or another agency. Access to the
records could permit the individual
who is the subject of a record to impede
the investigation, to tamper with
witnesses or evidence, and to avoid
detection or apprehension. Amendment
of the records could interfere with
ongoing investigations and law
enforcement activities and would
impose an unreasonable administrative
burden by requiring investigations to be
continually reinvestigated. In addition,
permitting access and amendment to
such information could disclose
security-sensitive information that
could be detrimental to homeland
security.
(c) From subsection (e)(1) (Relevancy
and Necessity of Information) because
in the course of investigations into
potential violations of Federal law, the
accuracy of information obtained or
introduced occasionally may be unclear,
or the information may not be strictly
relevant or necessary to a specific
investigation. In the interests of effective
law enforcement, it is appropriate to
retain all information that may aid in
establishing patterns of unlawful
activity.
(d) From subsection (e)(2) (Collection
of Information from Individuals)
because requiring that information be
collected from the subject of an
investigation would alert the subject to
the nature or existence of the
investigation, thereby interfering with
E:\FR\FM\29DER1.SGM
29DER1
Federal Register / Vol. 76, No. 250 / Thursday, December 29, 2011 / Rules and Regulations
that investigation and related law
enforcement activities.
(e) From subsection (e)(3) (Notice to
Subjects) because providing such
detailed information could impede law
enforcement by compromising the
existence of a confidential investigation
or reveal the identity of witnesses or
confidential informants.
(f) From subsections (e)(4)(G),
(e)(4)(H), and (e)(4)(I) (Agency
Requirements) and (f) (Agency Rules),
because portions of this system are
exempt from the individual access
provisions of subsection (d) for the
reasons noted above, and therefore DHS
is not required to establish
requirements, rules, or procedures with
respect to such access. Providing notice
to individuals with respect to existence
of records pertaining to them in the
system of records or otherwise setting
up procedures pursuant to which
individuals may access and view
records pertaining to themselves in the
system would undermine investigative
efforts and reveal the identities of
witnesses, and potential witnesses, and
confidential informants.
(g) From subsection (e)(5) (Collection
of Information) because with the
collection of information for law
enforcement purposes, it is impossible
to determine in advance what
information is accurate, relevant, timely,
and complete. Compliance with
subsection (e)(5) would preclude DHS
agents from using their investigative
training and exercise of good judgment
to both conduct and report on
investigations.
(h) From subsection (e)(8) (Notice on
Individuals) because compliance would
interfere with DHS’s ability to obtain,
serve, and issue subpoenas, warrants,
and other law enforcement mechanisms
that may be filed under seal and could
result in disclosure of investigative
techniques, procedures, and evidence.
(i) From subsection (g)(1) (Civil
Remedies) to the extent that the system
is exempt from other specific
subsections of the Privacy Act.
tkelley on DSK3SPTVN1PROD with RULES
Dated: November 23, 2011.
Mary Ellen Callahan,
Chief Privacy Officer, Department of
Homeland Security.
[FR Doc. 2011–33428 Filed 12–28–11; 8:45 am]
BILLING CODE 9110–9M–P
DEPARTMENT OF AGRICULTURE
12 CFR Part 345
7 CFR Part 4274
Community Reinvestment
Direct and Insured Loanmaking
CFR Correction
In Title 7 of the Code of Federal
Regulations, Part 2000 to End, revised as
of January 1, 2011, on page 746, in
§ 4274.338, paragraph (b)(4)(ii)(D) is
added to read as follows:
§ 4274.338 Loan agreements between the
Agency and the intermediary.
*
*
*
*
*
(b) * * *
(4) * * *
(ii) * * *
(D) An annual report on the extent to
which increased employment, income
and ownership opportunities are
provided to low-income persons, farm
families, and displaced farm families for
each loan made by such intermediary.
*
*
*
*
*
Jkt 226001
CFR Correction
In Title 12 of the Code of Federal
Regulations, Parts 300 to 499, revised as
of January 1, 2011, on page 457, in
§ 345.12, paragraph (u)(1) is revised to
read as follows:
§ 345.12
Definitions.
*
*
*
*
*
(u) * * *
(1) Definition. Small bank means a
bank that, as of December 31 of either
of the prior two calendar years, had
assets of less than $1.122 billion.
Intermediate small bank means a small
bank with assets of at least $280 million
as of December 31 of both of the prior
two calendar years and less than $1.122
billion as of December 31 of either of the
prior two calendar years.
*
*
*
*
*
[FR Doc. 2011–33529 Filed 12–28–11; 8:45 am]
BILLING CODE 1505–01–D
[FR Doc. 2011–33527 Filed 12–28–11; 8:45 am]
BUREAU OF CONSUMER FINANCIAL
PROTECTION
BILLING CODE 1505–01–D
12 CFR Part 1013
DEPARTMENT OF JUSTICE
[Docket No. CFPB–2011–0026]
Executive Office for Immigration
Review
RIN 3170–AA06
8 CFR Part 1292
Consumer Leasing (Regulation M);
Correction
Bureau of Consumer Financial
Protection.
ACTION: Interim final rule; correction.
AGENCY:
Professional Conduct for
Practitioners—Representation and
Appearances
CFR Correction
In Title 8 of the Code of Federal
Regulations, revised as of January 1,
2011, on page 1142, in § 1292.1,
paragraph (a)(2) introductory text is
corrected to read as follows:
§ 1292.1
Representation of others.
(a) * * *
(2) Law students and law graduates
not yet admitted to the bar. A law
student who is enrolled in an accredited
U.S. law school, or a graduate of an
accredited U.S. law school who is not
yet admitted to the bar, provided that:
*
*
*
*
*
BILLING CODE 1505–01–D
16:16 Dec 28, 2011
FEDERAL DEPOSIT INSURANCE
CORPORATION
Rural Business-Cooperative Service
[FR Doc. 2011–33530 Filed 12–28–11; 8:45 am]
VerDate Mar<15>2010
81789
PO 00000
Frm 00003
Fmt 4700
Sfmt 4700
The Bureau of Consumer
Financial Protection (Bureau) is
correcting an interim final rule that
appeared in the Federal Register of
December 19, 2011 (76 FR 78500). The
interim final rule established a new
Regulation M (Consumer Leasing) in
accordance with the transfer of
rulemaking authority for the Consumer
Leasing Act of 1976 (CLA) from the
Board of Governors of the Federal
Reserve System to the Bureau under
Title X of the Dodd-Frank Wall Street
Reform and Consumer Protection Act.1
DATES: Effective December 30, 2011.
FOR FURTHER INFORMATION CONTACT:
Courtney Jean or Priscilla Walton-Fein,
Office of Regulations, at (202) 435–7700.
SUMMARY:
1 Section 1066 of the Dodd-Frank Act grants the
Secretary of the Treasury interim authority to
perform certain functions of the Bureau. Pursuant
to that authority, Treasury is publishing this interim
final rule on behalf of the Bureau.
E:\FR\FM\29DER1.SGM
29DER1
Agencies
[Federal Register Volume 76, Number 250 (Thursday, December 29, 2011)]
[Rules and Regulations]
[Pages 81787-81789]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 2011-33428]
========================================================================
Rules and Regulations
Federal Register
________________________________________________________________________
This section of the FEDERAL REGISTER contains regulatory documents
having general applicability and legal effect, most of which are keyed
to and codified in the Code of Federal Regulations, which is published
under 50 titles pursuant to 44 U.S.C. 1510.
The Code of Federal Regulations is sold by the Superintendent of Documents.
Prices of new books are listed in the first FEDERAL REGISTER issue of each
week.
========================================================================
Federal Register / Vol. 76, No. 250 / Thursday, December 29, 2011 /
Rules and Regulations
[[Page 81787]]
DEPARTMENT OF HOMELAND SECURITY
Office of the Secretary
6 CFR Part 5
[Docket No. DHS-2011-0100]
Privacy Act of 1974: Implementation of Exemptions; Department of
Homeland Security/ALL-030 Use of the Terrorist Screening Database
System of Records
AGENCY: Privacy Office, DHS.
ACTION: Final rule.
-----------------------------------------------------------------------
SUMMARY: The Department of Homeland Security is issuing a final rule to
amend its regulations to exempt portions of a newly established system
of records titled, ``Department of Homeland Security/ALL-030 Use of the
Terrorist Screening Database System of Records'' from certain
provisions of the Privacy Act. Specifically, the Department exempts
portions of the ``Department of Homeland Security/ALL-030 Use of the
Terrorist Screening Database System of Records'' from one or more
provisions of the Privacy Act because of criminal, civil, and
administrative enforcement requirements.
DATES: Effective Date: This final rule is effective December 29, 2011.
FOR FURTHER INFORMATION CONTACT: For general questions and privacy
issues please contact: Mary Ellen Callahan (703) 235-0780), Chief
Privacy Officer, Privacy Office, Department of Homeland Security,
Washington, DC 20528.
SUPPLEMENTARY INFORMATION:
Background
The Department of Homeland Security (DHS) published a notice of
proposed rulemaking (NPRM) in the Federal Register, July 6, 2011, 76 FR
39315, proposing to exempt portions of the system of records from one
or more provisions of the Privacy Act because of criminal, civil, and
administrative enforcement requirements. The system of records is
titled, ``DHS/ALL-030 Use of the Terrorist Screening Database System of
Records.'' The DHS/ALL-030 Use of the Terrorist Screening Database
system of records notice (SORN) was published concurrently in the
Federal Register, July 6, 2011, 76 FR 39408, and comments were invited
on both the NPRM and SORN.
Public Comments
DHS received a total of two comments, one on the NPRM and one that
addressed both the NPRM and the SORN.
Comments on the NPRM
DHS received two comments on the NPRM. One of the comments on the
NPRM also included comments on the SORN. That comment will be addressed
in its entirety under SORN below. The one comment exclusively on the
NPRM was from a private individual. The individual raised a series of
philosophical questions regarding the policy behind homeland security
issues that were unrelated to this proposed rulemaking. The individual
also mentioned several times that this is a ``new database.'' This is
not a new database. The system of records addressed by this NPRM and
the accompanying SORN represents a mirror copy of the Department of
Justice (DOJ)/Federal Bureau of Investigation (FBI)-019 Terrorist
Screening Records System of Records (August 22, 2007, 72 FR 47073). The
same rules outlined in the DOJ/FBI-019 Terrorist Screening Records
System of Records (August 22, 2007, 72 FR 47073) transfer and apply.
The individual goes on to discuss the historical relevance of the
Terrorist Screening Database and outlines the positives and negatives
of the system. The individual also raises concerns about the security
of the system. The DHS mirrored copy of the system will receive the
same security and protection as it does at the FBI and Terrorist
Screening Center (TSC). The individual also speculates that, as a
matter of fiscal priority, the system could be subject to less funding
over time based on priorities. The system will meet the same
requirements at DHS as it does at FBI/TSC. The individual concludes the
general comments by saying the benefits outweigh the risks. On Privacy
Act exemptions, the individual states that the proposed rule was nicely
drafted. The individual asks the question of who will make the
determination on when an exemption will be applied. In response to that
question, that determination will be made by DHS privacy or disclosure
staff in consultation with counsel. If the exemption is applied and an
appeal is necessary, individuals may appeal the decision. That process
can be found at www.dhs.gov/foia. The individual expresses appreciation
for the Department's decision to consider requests on a case-by-case
basis when applying exemptions. The individual states that the system
should be implemented and that it be a model for other agencies.
Comment on the SORN
DHS received one comment on the SORN from a public interest
research center that was joined in filing its comments by seventeen
other privacy, consumer rights, and civil rights organizations. The
comment addressed both the NPRM and SORN jointly and is addressed in
this section. The authors start by stating that DHS should ``suspend
the proposal pending a full review of the privacy, security, and legal
implications of the program, including compliance with the Federal
Privacy Act.'' The NPRM and SORN received internal coordination and
clearance by program and compliance officials, including, but not
limited to, the Office of General Counsel and the Chief Privacy
Officer. The organizations further stated that ``if the agency (DHS)
proceeds with the Watch List System (WLS) program, the system must, at
a minimum: (1) Adhere to Congress's intent to maintain transparent and
secure government recordkeeping systems; (2) provide individuals
judicially enforceable rights of notice, access, and correction; (3)
conform to a revised SORN and NPRM that includes requirements for the
agency (DHS) to respect individuals' rights to control their
information in possession of Federal agencies, as the Privacy Act
requires; and (4) premise its technological and security approach on
decentralization.'' With respect to these points, the Department
follows the complete privacy legal framework as well as additional
privacy policy it has
[[Page 81788]]
put in place. The organizations go on to state that the Department is
intentionally circumventing a number of provisions under the Privacy
Act as well as the intent of the Privacy Act. As noted above, the NPRM
and SORN received internal coordination and clearance by program and
compliance officials, including, but not limited to, the Office of
General Counsel and the Chief Privacy Officer. This addresses the
author's points covering ``meaningful privacy protections Congress
established in the Privacy Act.'' The fact that Privacy Act exemptions
are taken within this system of records, and explained within the NPRM,
does not mean that the act is illegal or outside of the intent of
Congress. The exemptions are contemplated by the Privacy Act and the
Department implemented them consistent with that statute. The
Department maintains that, for a variety of national security and law
enforcement purposes, the exemptions taken within the system of
records, and outlined in the NRPM, are necessary and are unchanged. The
organizations go on to refute the Privacy Act exemptions claimed and
recommend changing the way the Department does business including the
way it conducts investigations. The organizations recommend that the
Department void the claimed exemptions. The Department maintains that,
for national security and law enforcement purposes, the exemptions
taken within the system of records, and outlined in the NRPM, are
necessary and remain in place. The organizations also go on to cite
concerns regarding privacy risks contemplated in previously published
Privacy Impact Assessments (PIAs) where the Terrorist Screening
Database (TSDB) is used. In response, the Department emphasizes that
this is not a new database. This NPRM and SORN represent a mirror copy
of the DOJ/FBI-019 Terrorist Screening Records System of Records
(August 22, 2007, 72 FR 47073). The same rules outlined in the FBI SORN
transfer and apply. The Department has taken additional steps to
further ensure privacy protections by conducting appropriate privacy
analysis through a published PIA as well as SORN. Doing so provides
additional transparency on the risks, mitigations, and privacy rules
associated with maintaining a mirror copy of the TSDB.
After consideration of public comments and reviewing the NPRM, the
Department determined it did not require exemptions to subsections
(e)(12) or (h) of the Privacy Act. Thus, the Department has removed
proposed paragraphs (i) and (k) from the Final Rule. No additional
changes were made.
List of Subjects in 6 CFR Part 5
Freedom of information, Privacy.
For the reasons stated in the preamble, DHS amends Chapter I of
Title 6, Code of Federal Regulations, as follows:
PART 5--DISCLOSURE OF RECORDS AND INFORMATION
0
1. The authority citation for Part 5 continues to read as follows:
Authority: 6 U.S.C. 101 et seq.; Pub. L. 107-296, 116 Stat.
2135; 5 U.S.C. 301. Subpart A also issued under 5 U.S.C. 552.
Subpart B also issued under 5 U.S.C. 552a.
0
2. Add at the end of Appendix C to Part 5, the following new paragraph
``66'':
Appendix C to Part 5--DHS Systems of Records Exempt From the Privacy
Act
* * * * *
66. The DHS/ALL-030 Use of Terrorist Screening Database System of
Records consists of electronic and paper records and will be used by
DHS and its components. The DHS/ALL-030 Use of Terrorist Screening
Database System of Records is a repository of information held by DHS
in connection with its several and varied missions and functions,
including, but not limited to the enforcement of civil and criminal
laws; investigations, inquiries, and proceedings there under; national
security and intelligence activities; and protection of the President
of the U.S. or other individuals pursuant to Section 3056 and 3056A of
Title 18. The DHS/ALL-030 Use of Terrorist Screening Database System of
Records contains information that is collected by, on behalf of, in
support of, or in cooperation with DHS and its components and may
contain personally identifiable information collected by other Federal,
state, local, tribal, foreign, or international government agencies.
Pursuant to 5 U.S.C. 552a(j)(2), the Secretary of Homeland Security has
exempted this system from the following provisions of the Privacy Act,
subject to the limitations set forth in 5 U.S.C. 552a(c)(3) and (c)(4);
(d); (e)(1), (e)(2), (e)(3), (e)(4)(G), (e)(4)(H), (e)(4)(I), (e)(5),
(e)(8); (f); and (g)(1). Additionally, pursuant to 5 U.S.C. 552a(k)(1)
and (k)(2), the Secretary of Homeland Security has exempted this system
from the following provisions of the Privacy Act, subject to the
limitation set forth in 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G),
(e)(4)(H), (e)(4)(I); and (f). Exemptions from these particular
subsections are justified, on a case-by-case basis to be determined at
the time a request is made, for the following reasons:
(a) From subsection (c)(3) and (c)(4) (Accounting for Disclosures)
because release of the accounting of disclosures could alert the
subject of an investigation of an actual or potential criminal, civil,
or regulatory violation to the existence of that investigation and
reveal investigative interest on the part of DHS as well as the
recipient agency. Disclosure of the accounting would therefore present
a serious impediment to law enforcement efforts and/or efforts to
preserve national security. Disclosure of the accounting would also
permit the individual who is the subject of a record to impede the
investigation, to tamper with witnesses or evidence, and to avoid
detection or apprehension, which would undermine the entire
investigative process.
(b) From subsection (d) (Access to Records) because access to the
records contained in this system of records could inform the subject of
an investigation of an actual or potential criminal, civil, or
regulatory violation to the existence of that investigation and reveal
investigative interest on the part of DHS or another agency. Access to
the records could permit the individual who is the subject of a record
to impede the investigation, to tamper with witnesses or evidence, and
to avoid detection or apprehension. Amendment of the records could
interfere with ongoing investigations and law enforcement activities
and would impose an unreasonable administrative burden by requiring
investigations to be continually reinvestigated. In addition,
permitting access and amendment to such information could disclose
security-sensitive information that could be detrimental to homeland
security.
(c) From subsection (e)(1) (Relevancy and Necessity of Information)
because in the course of investigations into potential violations of
Federal law, the accuracy of information obtained or introduced
occasionally may be unclear, or the information may not be strictly
relevant or necessary to a specific investigation. In the interests of
effective law enforcement, it is appropriate to retain all information
that may aid in establishing patterns of unlawful activity.
(d) From subsection (e)(2) (Collection of Information from
Individuals) because requiring that information be collected from the
subject of an investigation would alert the subject to the nature or
existence of the investigation, thereby interfering with
[[Page 81789]]
that investigation and related law enforcement activities.
(e) From subsection (e)(3) (Notice to Subjects) because providing
such detailed information could impede law enforcement by compromising
the existence of a confidential investigation or reveal the identity of
witnesses or confidential informants.
(f) From subsections (e)(4)(G), (e)(4)(H), and (e)(4)(I) (Agency
Requirements) and (f) (Agency Rules), because portions of this system
are exempt from the individual access provisions of subsection (d) for
the reasons noted above, and therefore DHS is not required to establish
requirements, rules, or procedures with respect to such access.
Providing notice to individuals with respect to existence of records
pertaining to them in the system of records or otherwise setting up
procedures pursuant to which individuals may access and view records
pertaining to themselves in the system would undermine investigative
efforts and reveal the identities of witnesses, and potential
witnesses, and confidential informants.
(g) From subsection (e)(5) (Collection of Information) because with
the collection of information for law enforcement purposes, it is
impossible to determine in advance what information is accurate,
relevant, timely, and complete. Compliance with subsection (e)(5) would
preclude DHS agents from using their investigative training and
exercise of good judgment to both conduct and report on investigations.
(h) From subsection (e)(8) (Notice on Individuals) because
compliance would interfere with DHS's ability to obtain, serve, and
issue subpoenas, warrants, and other law enforcement mechanisms that
may be filed under seal and could result in disclosure of investigative
techniques, procedures, and evidence.
(i) From subsection (g)(1) (Civil Remedies) to the extent that the
system is exempt from other specific subsections of the Privacy Act.
Dated: November 23, 2011.
Mary Ellen Callahan,
Chief Privacy Officer, Department of Homeland Security.
[FR Doc. 2011-33428 Filed 12-28-11; 8:45 am]
BILLING CODE 9110-9M-P