Privacy Act of 1974; Department of Homeland Security, U.S. Customs and Border Protection-DHS/CBP-018-Customs-Trade Partnership Against Terrorism (C-TPAT) System, System of Records, 15962-15968 [2013-05674]
Download as PDF
mstockstill on DSK4VPTVN1PROD with NOTICES
15962
Federal Register / Vol. 78, No. 49 / Wednesday, March 13, 2013 / Notices
advise the SAMHSA Administrator and
the Associate Administrator for
Women’s Services on appropriate
activities to be undertaken by SAMHSA
and its Centers with respect to women’s
substance abuse and mental health
services.
Pursuant to Presidential Executive
Order No. 13175, November 6, 2000,
and the Presidential Memorandum of
September 23, 2004, SAMHSA
established the Tribal Technical
Advisory Committee (TTAC) for
working with Federally-recognized
Tribes to enhance the government-togovernment relationship, honor Federal
trust responsibilities and obligations to
Tribes and American Indian and Alaska
Natives. The SAMHSA TTAC serves as
an advisory body to SAMHSA.
The April 11 combined meeting will
include a report from the SAMHSA
Administrator, an update on SAMHSA’s
Budget, and discussions related to the
Newtown initiatives, evidence based
practices, disparities and faith based
iniatitives. The meeting will also
include updates on international
activities, disaster response and health
reform.
The meeting is open to the public and
will be held at the SAMHSA building,
1 Choke Cherry Road, Rockville, MD
20857 in the 1st floor Conference
Rooms. Attendance by the public will
be limited to space available. Interested
persons may present data, information,
or views, orally or in writing, on issues
pending before the committee. Written
submissions should be forwarded to the
contact person on or before one week
prior to the meeting. Oral presentations
from the public will be scheduled at the
conclusion of the meeting. Individuals
interested in making oral presentations
are encouraged to notify the contact on
or before one week prior to the meeting.
Five minutes will be allotted for each
presentation.
The meeting may be accessed via
teleconference. To attend on site, obtain
the call-in number and access code,
submit written or brief oral comments,
or request special accommodations for
persons with disabilities, please register
on-line at https://nac.samhsa.gov/
Registration/meetingsRegistration.aspx,
or communicate with SAMHSA’s
Committee Management Officer, Ms.
Geretta Wood (see contact information
below).
Substantive meeting information and
a roster of Committee members may be
obtained either by accessing the
SAMHSA Committees’ Web site at
https://nac.samhsa.gov/
WomenServices/index.aspx, or by
contacting Ms. Wood. The transcript for
the meeting will be available on the
VerDate Mar<15>2010
17:11 Mar 12, 2013
Jkt 229001
SAMHSA Committees’ Web site within
three weeks after the meeting.
Committee Names: Substance Abuse and
Mental Health Services Administration
National Advisory Council, Center for Mental
Health Services National Advisory Council,
Center for Substance Abuse Prevention
National Advisory Council, Center for
Substance Abuse Treatment National
Advisory Council, SAMHSA’s Advisory
Committee for Women’s Services, SAMHSA
Tribal Technical Advisory Committee.
Date/Time/Type: Thursday, April 11, 2013
from 9 a.m. to 5:30 EDT: Open.
Place: SAMHSA, 1 Choke Cherry Road,
SAMHSA 1st floor Conference Rooms,
Rockville, Maryland 20857.
Contact: Geretta Wood, Committee
Management Officer and Designated Federal
Official of the SAMHSA National Advisory
Council and SAMHSA’s Advisory Committee
for Women’s Services, 1 Choke Cherry Road,
Rockville, Maryland 20857, Telephone: (240)
276–2326, Fax: (240) 276–2252 and Email:
geretta.wood@samhsa.hhs.gov.
Cathy J. Friedman,
Public Health Analyst, SAMHSA.
[FR Doc. 2013–05756 Filed 3–12–13; 8:45 am]
BILLING CODE 4162–20–P
DEPARTMENT OF HEALTH AND
HUMAN SERVICES
Substance Abuse and Mental Health
Services Administration
Advisory Committee for Women’s
Services; Notice of Meeting
Pursuant to Public Law 92–463,
notice is hereby given of a meeting of
the Substance Abuse and Mental Health
Services Administration’s (SAMHSA)
Advisory Committee for Women’s
Services (ACWS) on April 10, 2013.
The meeting is open to the public. It
will include a report from the Associate
Administrator for Women’s Services
and Chair of the ACWS, an update from
the SAMHSA Women’s Coordinating
Committee and an update from the
Office of Behavioral Health Equity on
Trauma. The meeting will also include
discussions of Girls in Transition and
Disparities in the Criminal Justice
System.
The meeting is open to the public and
will be held at the SAMHSA building,
1 Choke Cherry Road, Rockville, MD
20857 in Conference Room 8–1070.
Attendance by the public will be limited
to space available. Interested persons
may present data, information, or views,
orally or in writing, on issues pending
before the committee. Written
submissions should be forwarded to the
contact person on or before one week
prior to the meeting. Oral presentations
from the public will be scheduled at the
conclusion of the meeting. Individuals
PO 00000
Frm 00035
Fmt 4703
Sfmt 4703
interested in making oral presentations
are encouraged to notify the contact on
or before one week prior to the meeting.
Five minutes will be allotted for each
presentation.
The meeting may be accessed via
teleconference. To attend on site, obtain
the call-in number and access code,
submit written or brief oral comments,
or request special accommodations for
persons with disabilities, please register
on-line at https://nac.samhsa.gov/
Registration/meetingsRegistration.aspx,
or communicate with SAMHSA’s
Committee Management Officer, Ms.
Geretta Wood (see contact information
below).
Substantive meeting information and
a roster of Committee members may be
obtained either by accessing the
SAMHSA Committees’ Web site at
https://nac.samhsa.gov/
WomenServices/index.aspx, or by
contacting Ms. Wood. The transcript for
the meeting will be available on the
SAMHSA Committees’ Web site within
three weeks after the meeting.
Committee Name: SAMHSA’s Advisory
Committee for Women’s Services.
Date/Time/Type: Wednesday, April 10,
2013 from 9 a.m. to 5:30 EDT: OPEN.
Place: SAMHSA, 1 Choke Cherry Road,
SAMHSA Conference Room 8–1070,
Rockville, Maryland 20857.
Contact: Geretta Wood, Committee
Management Officer and Designated Federal
Official, SAMHSA National Advisory
Council and SAMHSA’s Advisory Committee
for Women’s Services, 1 Choke Cherry Road,
Rockville, Maryland 20857, Telephone: (240)
276–2326, Fax: (240) 276–2252 and Email:
geretta.wood@samhsa.hhs.gov.
Cathy J. Friedman,
Public Health Analyst, SAMHSA.
[FR Doc. 2013–05755 Filed 3–12–13; 8:45 am]
BILLING CODE 4162–20–P
DEPARTMENT OF HOMELAND
SECURITY
Office of the Secretary
[Docket No. DHS–2012–0073]
Privacy Act of 1974; Department of
Homeland Security, U.S. Customs and
Border Protection—DHS/CBP–018—
Customs—Trade Partnership Against
Terrorism (C–TPAT) System, System of
Records
Privacy Office, Department of
Homeland Security.
ACTION: Notice of Privacy Act system of
records.
AGENCY:
In accordance with the
Privacy Act of 1974, the Department of
Homeland Security proposes to
SUMMARY:
E:\FR\FM\13MRN1.SGM
13MRN1
mstockstill on DSK4VPTVN1PROD with NOTICES
Federal Register / Vol. 78, No. 49 / Wednesday, March 13, 2013 / Notices
establish a new system of records titled,
‘‘Department of Homeland Security,
U.S. Customs and Border Protection,
DHS/CBP–018 Customs—Trade
Partnership Against Terrorism System
of Records.’’ This system of records
allows the Department of Homeland
Security/U.S. Customs and Border
Protection, DHS/CBP–018, CustomsTrade Partnership Against Terrorism to
collect and maintain records about
members of the trade community related
to Customs and Border Protection’s
Customs-Trade Partnership Against
Terrorism program. Businesses accepted
into the program, called partners, agree
to analyze, measure, monitor, report,
and enhance their supply chains in
exchange for greater security and
facilitated processing offered by
Customs and Border Protection. The
Customs-Trade Partnership Against
Terrorism program allows Customs and
Border Protection to focus its resources
on higher risk businesses and thereby
assists the agency in achieving its
mission to secure the border and
facilitate the movement of legitimate
international trade. This new system of
records collects and manages
information, including personally
identifiable information, about
prospective, ineligible, current, or
former trade partners in Customs-Trade
Partnership Against Terrorism, and
other entities and individuals in their
supply chains. This system also collects
and maintains information, including
personally identifiable information,
regarding members of a foreign
government secure supply chain
program that have been recognized by
Customs and Border Protection, through
a mutual recognition arrangement or
comparable arrangement, as being
compatible with the program. The
Customs-Trade Partnership Against
Terrorism program provides a Security
Link Portal, which allows partners and
applicants to access and manage their
information. Customs and Border
Protection is publishing this new system
of records notice in order to notify the
public about the system, permit trade
partners access to the information they
provide, and offer a description of how
and where information is collected and
maintained. Additionally, the
Department of Homeland Security is
issuing a Notice of Proposed
Rulemaking elsewhere in the Federal
Register, to exempt this system of
records from certain provisions of the
Privacy Act. This newly established
system will be included in the
Department of Homeland Security’s
inventory of record systems.
VerDate Mar<15>2010
17:11 Mar 12, 2013
Jkt 229001
The new system of records will
be effective April 12, 2013, unless
comments are received that result in a
contrary determination.
ADDRESSES: You may submit comments,
identified by docket number DHS–
2012–0073 by one of the following
methods:
• Federal e-Rulemaking Portal:
https://www.regulations.gov. Follow the
instructions for submitting comments.
• Fax: 202–343–4010.
• Mail: Jonathan R. Cantor, Acting
Chief Privacy Officer, Privacy Office,
Department of Homeland Security,
Washington, DC 20528.
Instructions: All submissions received
must include the agency name and
docket number for this rulemaking. All
comments received will be posted
without change to https://
www.regulations.gov, including any
personal information provided.
Docket: For access to the docket to
read background documents or
comments received go to https://
www.regulations.gov.
DATES:
For
general questions please contact:
Laurence E. Castelli (202–325–0280),
CBP Privacy Officer, U.S. Customs and
Border Protection, 90 K Street NE.
Washington, DC 20229. For privacy
issues please contact: Jonathan R.
Cantor (202–343–1717), Acting Chief
Privacy Officer, Privacy Office,
Department of Homeland Security,
Washington, DC 20528.
SUPPLEMENTARY INFORMATION:
FOR FURTHER INFORMATION CONTACT:
I. Background
In accordance with the Privacy Act of
1974, 5 U.S.C. 552a, the Department of
Homeland Security (DHS), US Customs
and Border Protection (CBP) proposes to
establish a new DHS system of records
titled, ‘‘DHS/CBP–018–C–TPAT System
of Records.’’
CBP is publishing this new system of
records notice to notify the public about
the system and offer a description of
how CBP collects and maintains
information pertaining to prospective,
ineligible, current, or former trade
partners in C–TPAT; other entities and
individuals in their supply chains; and
members of foreign governments’ secure
supply chain programs that have been
recognized by CBP, through a mutual
recognition arrangement or comparable
arrangement, as being compatible with
C–TPAT.
CBP will use the information
collected and maintained through the
C–TPAT program to carry out its trade
facilitation, law enforcement, and
national security missions. In direct
response to 9/11, CBP challenged the
PO 00000
Frm 00036
Fmt 4703
Sfmt 4703
15963
trade community to partner with the
government to design a new approach to
supply chain security—one that protects
the United States from acts of terrorism
by improving security while facilitating
the flow of compliant cargo and
conveyances. The result was the
Customs-Trade Partnership Against
Terrorism (C–TPAT)—an innovative,
voluntary government/private sector
partnership program. C–TPAT is a
voluntary program in which certain
types of businesses agree to cooperate
with CBP in the analysis, measurement,
monitoring, reporting, and enhancement
of their supply chains.
Businesses accepted in to C–TPAT are
called partners and agree to take actions
to protect their supply chain, identify
security gaps, and implement specific
security measures and best practices in
return for facilitated processing of their
shipments by CBP. The program focuses
on improving security from the point of
origin (including manufacturer,
supplier, or vendor) through a point of
distribution to the destination. The
current security guidelines for C–TPAT
program members address a broad range
of topics including personnel, physical
and procedural security; access controls;
education, training and awareness;
manifest procedures; conveyance
security; threat awareness; and
documentation processing. These
guidelines offer a customized solution
for the members, while providing a clear
minimum standard that approved
companies must meet.
Businesses eligible to fully participate
in C–TPAT include U.S. importers;
U.S./Canada highway carriers; U.S./
Mexico highway carriers; rail and sea
carriers; licensed U.S. Customs brokers;
U.S. marine port authority/terminal
operators; U.S. freight consolidators;
ocean transportation intermediaries and
non-operating common carriers;
Mexican and Canadian manufacturers;
and Mexican long-haul carriers. As part
of its development, CBP plans to
include exporters from the United States
in C–TPAT.
There are three tiers of C–TPAT
partnership, with each tier having its
own set of requirements and
corresponding facilitated processing. In
general, businesses are considered
applicants until CBP has vetted the
information in the application and
accepted the business into the program.
Once accepted, the business is
designated as a Tier One certified
partner, and a site visit is arranged. The
site visit is used to validate the partner’s
supply chain security and leads to
importers becoming Tier Two validated
partners. As C–TPAT has incorporated
other eligible business types, it has led
E:\FR\FM\13MRN1.SGM
13MRN1
mstockstill on DSK4VPTVN1PROD with NOTICES
15964
Federal Register / Vol. 78, No. 49 / Wednesday, March 13, 2013 / Notices
to those businesses becoming certified,
validated non-importers. If an importer
with Tier Two validated partner status
exemplifies best practices in its supply
chain security, it may attain Tier Three
validated partner status. As a business
progresses up the tiers, it receives more
facilitated processing at ports of entry.
Information is collected directly from
C–TPAT partners or applicant
businesses seeking membership in C–
TPAT and indirectly from trade partners
or through Mutual Recognition
Arrangements (MRA) or memoranda of
understanding relating to harmonization
efforts between CBP and the foreign
secured supply chain program. In the
course of enrolling, certifying, and
validating C–TPAT trade partners and
their supply chains, the C–TPAT system
will receive personally identifiable
information (PII) and confidential
business information from trade entities
and their representatives.
To participate in the C–TPAT
program, a company is required to
submit a confidential, on-line
application using the C–TPAT Security
Link Portal, https://ctpat.cbp.dhs.gov.
The C–TPAT Security Link Portal is the
public-facing portion of the C–TPAT
system used by applicants to submit the
information in their company and
supply chain security profiles. Initially,
the applicant business provides basic
business-identifying information in the
company profile using the online
application form. This businessidentifying information is used to verify
the identity and actual existence of the
applicant business and may include
basic identifying elements and/or PII
used in the importation of cargo, such
as U.S. Social Security Numbers (SSN)
for sole proprietors, Internal Revenue
Service Business Identification
Numbers, and Customs assigned
identification numbers (such as
Manufacturer Identification numbers
and Broker/Filer codes, etc.). Point of
contact information is collected for the
business, as well as owner information.
Additionally, the applicant business
must complete a Supply Chain Security
Profile (SCSP). The information
provided in the SCSP is a narrative
description of the procedures the
applicant business uses to adhere to
each C–TPAT Security Criteria or
Guideline articulated for their particular
business type (importer, customs broker,
freight forwarder, air, sea, and land
carriers, contract logistics providers,
etc.) together with any supporting
documentation. Data elements entered
by the applicant business are accessible
for update or revision through the C–
TPAT Security Link Portal. An
applicant’s SCSP must provide supply
VerDate Mar<15>2010
17:11 Mar 12, 2013
Jkt 229001
chain security procedures for each
business in the applicant’s supply
chain, even if those businesses are not,
or do not desire to become partners of
C–TPAT separately. This information is
focused on the security procedures of
those businesses (e.g., whether the
business conducts background
investigations on employees), rather
than the individuals related to those
businesses (e.g., a list of employee
names).
A CBP Supply Chain Security
Specialist (SCSS) vets the SCSP
information provided by the applicant
by querying that information through
various information sources and
systems, and queries of publicly
available data (e.g., through Google).
The SCSS will then evaluate the SCSP
information against the results provided
by such system vetting, derogatory or
otherwise, and indicate whether the
applicant is fit for the program in the
Security Link Portal. Derogatory vetting
results are incorporated into an issue
paper for a C–TPAT supervisor’s
approval, and the issue paper is stored
separately from the Security Link Portal
on an internal C–TPAT SharePoint,
which is only accessible by appropriate
CBP employees and supervisors.
Vetting results containing PII are not
stored in the C–TPAT Security Link
Portal. When a query reveals derogatory
information about a business applicant
or partner, the SCSS makes a notation
on the internal portion of the C–TPAT
Security Link Portal indicating the
existence of derogatory information and
a citation to the appropriate records. For
instance, if a query of an applicant in
TECS results in derogatory information,
the TECS ID is used as an identifier for
the record in the C–TPAT Security Link
Portal, rather than the contents of the
TECS record. However, specific details
regarding the incident or violation
giving rise to the unfavorable analysis
will be maintained within the C–TPAT
SharePoint site and the relevant source
system. The SCSS is responsible for
vetting all C–TPAT applicants, and
conducts this vetting of business entities
every 6–12 months to ensure continued
compliance.
Consistent with DHS’s information
sharing mission, information stored in
DHS/CBP–018 Customs—Trade
Partnership Against Terrorism (C–
TPAT) System may be shared with other
DHS components that have a need to
know the information to carry out their
national security, law enforcement,
immigration, intelligence, or other
homeland security functions. In
addition, information may be shared
with appropriate federal, state, local,
tribal, territorial, foreign, or
PO 00000
Frm 00037
Fmt 4703
Sfmt 4703
international government agencies
consistent with the routine uses set
forth in this system of records notice.
Additionally, DHS is issuing a Notice
of Proposed Rulemaking to exempt this
system of records from certain
provisions of the Privacy Act, elsewhere
in the Federal Register. This newly
established system will be included in
DHS’s inventory of record systems.
II. Privacy Act
The Privacy Act embodies fair
information practice principles in a
statutory framework governing the
means by which Federal Government
agencies collect, maintain, use, and
disseminate individuals’ records. The
Privacy Act applies to information that
is maintained in a ‘‘system of records.’’
A ‘‘system of records’’ is a group of any
records under the control of an agency
for which information is retrieved by
the name of an individual or by some
identifying number, symbol, or other
identifying particular assigned to the
individual. In the Privacy Act, an
individual is defined to encompass U.S.
citizens and lawful permanent
residents. As a matter of policy, DHS
extends administrative Privacy Act
protections to all individuals where
systems of records maintain information
on U.S. citizens, lawful permanent
residents, and visitors.
Below is the description of the DHS/
CBP–018 Customs—Trade Partnership
Against Terrorism (C–TPAT) System of
Records. In accordance with 5 U.S.C.
552a(r), DHS has provided a report of
this system of records to the Office of
Management and Budget and to
Congress.
SYSTEM OF RECORDS:
Department of Homeland Security
(DHS)/U.S. Customs and Border
Protection (CBP)–018.
SYSTEM NAME:
DHS/CBP–018 Customs—Trade
Partnership Against Terrorism (C–
TPAT)
SECURITY CLASSIFICATION:
Unclassified, for official use only, law
enforcement sensitive.
SYSTEM LOCATION:
Records are maintained at CBP
Headquarters, Washington, DC and field
offices in C–TPAT’s Security Link Portal
and a CBP collaborative intranet.
CATEGORIES OF INDIVIDUALS COVERED BY THE
SYSTEM:
Individuals, including Points of
Contact (POC), owners, and others
associated with prospective, ineligible,
current, or former C–TPAT business
E:\FR\FM\13MRN1.SGM
13MRN1
Federal Register / Vol. 78, No. 49 / Wednesday, March 13, 2013 / Notices
entities; individuals associated with the
supply chain of such C–TPAT business
entities; and individuals associated with
business entities in foreign governments
secure supply chain programs that have
been recognized by CBP, through
harmonization, a mutual recognition
arrangement, or comparable
arrangement, as being compatible with
C–TPAT.
mstockstill on DSK4VPTVN1PROD with NOTICES
CATEGORIES OF RECORDS IN THE SYSTEM:
At the Application level, information
is collected from the applicant about
itself and those members of its
international supply chain. Pre-set
fields of business-identifying
information within the company profile
portion of the online application
include:
• Business Entity Type;
• Application Exception Token;
• Legal Business Name;
• Other Name(s) by which the
Business is known (i.e., ‘‘Doing
Business As’’), if applicable;
• Business Telephone;
• Business Fax;
• Business Web site address;
• Business history;
• Physical Address(es);
• Mailing Address(es);
• Owner Type: (e.g., Corporation\
Partnership\Sole Proprietor, etc.);
• Years in Business;
• Number of Employees;
• Business Points of Contacts;
• First Name;
• Last Name;
• Title;
• Email Address (also used to log in
to the Security Link Portal);
• Password;
• Telephone Number;
• Contact Type;
• U.S. Social Security Numbers (as
volunteered by sole proprietors as their
tax identification number);
• Internal Revenue Service Business
Identification Numbers;
• Customs assigned identification
numbers (Importers of Record (IOR)
number; Manufacturer Identification
Numbers (MID) and Broker/Filer codes,
etc.);
• Issue Papers, including information
regarding whether the applicant is
eligible for C–TPAT membership or
source record numbers for such
information;
• Narrative description of supply
chain security procedures for applicant
and other entities in applicant’s supply
chain;
• Validation supporting
documentation (e.g., bills of lading;
audits—internal & external; proof of
background checks; contractual
obligations; via a letter from a senior
VerDate Mar<15>2010
17:11 Mar 12, 2013
Jkt 229001
business partner officer attesting to
compliance; statements demonstrating
compliance with C–TPAT security
criteria or an equivalent World Customs
Organization accredited security
program administered by a foreign
customs authority; importer security
questionnaire); and
• Account Status.
Information received from and
confirmed to countries with which CBP
has a Mutual Recognition Arrangement
(MRA) includes:
• Legal Business Name;
• Other Name(s) by which the
Business is known (i.e., ‘‘Doing
Business As’’), if applicable;
• Company Type;
• Date Partner Certified;
• Account Status;
• Vetting Status;
• Date Validation Completed;
• SCSS Name;
• Office Assigned Name;
• Mutual Recognition Country;
• Business identifying numbers, e.g.:
Æ Standard Carrier Alpha Code
(SCAC);
Æ IOR;
Æ MID;
By Applicant request, information
received from, and forwarded to, foreign
secure supply chain programs pursuant
to a harmonization program may
include, but is not limited to:
• Legal Name;
• Doing Business As;
• Telephone Number;
• Fax Number;
• Web site;
• Owner Type;
• Business Start Date;
• Number of Employees;
• Brief Company History;
• Primary Address, Type;
• Primary Address, Name;
• Primary Address, Country;
• Primary Address, Street Address;
• Primary Address, City;
• Primary Address, State/Province;
• Primary Address, Zip/Postal Code;
• Mailing Address:
Æ Type;
Æ Name;
Æ Country;
Æ Street Address;
Æ City;
Æ State/Province; and
Æ Zip/Postal Code.
• Primary Contact:
Æ Email Address;
Æ Type;
Æ Salutation;
Æ First Name;
Æ Last Name;
Æ Title; and
Æ Telephone Number.
• Partner Notifications;
• Number of Entries;
PO 00000
Frm 00038
Fmt 4703
Sfmt 4703
15965
• U.S. Department of Transportation
(DOT) Issued Number;
• U.S. National Motor Freight Traffic
Association Issued;
• SCAC;
• Dun & Bradstreet Number;
• Services Offered;
• Driver Sources;
• Entries related to harmonization
country;
• The entire Security Profile (Upon
Request):
Æ Account Number;
Æ Risking Status;
Æ MSR Status;
Æ Validation Type;
Æ Validation Closed Date;
Æ Validation Status;
Æ Validation Type Verification
(Government Contact);
Æ Verification Type Start Date;
Æ Verification Type: (phone, visit,
mutual recognition);
Æ Verification Visit address;
Æ Business Type; and
Æ Harmonization Host Program.
• Account Status;
• Vetting Status;
• Minimum Security Requirements/
Security Profile Status;
• Validation Status; and
• Harmonization Status.
AUTHORITY FOR MAINTENANCE OF THE SYSTEM:
This system and program are
authorized by 6 U.S.C. 901 note
(Security and Accountability for Every
Port Act of 2006 (SAFE Port Act),
including 6 U.S.C. 961–973. Pilot
programs enhancing secure supply
chain practices related to C–TPAT are
also authorized by Homeland Security
Presidential Directive/HSPD–8,
‘‘National Preparedness’’ Section 22
(December 17, 2003).
PURPOSE(S):
The purpose of this system is to verify
the identity of C–TPAT partners,
determine enrollment level, and provide
identifiable ‘‘low risk’’ entities with
fewer random checks and facilitated
processing. The information will be
cross-referenced with data maintained
in CBP’s other cargo and enforcement
databases and will be shared with other
law enforcement systems, agencies or
foreign entities, as appropriate, when
related to ongoing investigations or
operations. Information will be used to
analyze, measure, monitor, report, and
enhance business supply chains to
permit facilitated processing of C–TPAT
partner shipments by CBP.
ROUTINE USES OF RECORDS MAINTAINED IN THE
SYSTEM, INCLUDING CATEGORIES OF USERS AND
THE PURPOSES OF SUCH USES:
In addition to those disclosures
generally permitted under 5 U.S.C.
E:\FR\FM\13MRN1.SGM
13MRN1
mstockstill on DSK4VPTVN1PROD with NOTICES
15966
Federal Register / Vol. 78, No. 49 / Wednesday, March 13, 2013 / Notices
552a(b) of the Privacy Act, all or a
portion of the records or information
contained in this system may be
disclosed outside DHS as a routine use
pursuant to 5 U.S.C. 552a(b)(3). Any
disclosure of information must be made
consistent with the official duties of the
person making the disclosure. The
routine uses are as follows:
A. To the Department of Justice (DOJ),
including the United States Attorneys
Offices, or other federal agency
conducting litigation or in proceedings
before any court, adjudicative or
administrative body, when it is relevant
or necessary to the litigation and one of
the following is a party to the litigation
or has an interest in such litigation:
1. DHS or any component thereof;
2. Any employee of DHS in his/her
official capacity;
3. Any employee of DHS in his/her
individual capacity when DOJ or DHS
has agreed to represent the employee; or
4. The United States or any agency
thereof.
B. To a congressional office from the
record of an individual in response to
an inquiry from that congressional office
made at the request of the individual to
whom the record pertains.
C. To the National Archives and
Records Administration (NARA) or
General Services Administration
pursuant to records management
inspections being conducted under the
authority of 44 U.S.C. 2904 and 2906.
D. To an agency or organization for
the purpose of performing audit or
oversight operations as authorized by
law, but only such information as is
necessary and relevant to such audit or
oversight function.
E. To appropriate agencies, entities,
and persons when:
1. DHS suspects or has confirmed that
the security or confidentiality of
information in the system of records has
been compromised;
2. DHS has determined that as a result
of the suspected or confirmed
compromise there is a risk of harm to
economic or property interests, identity
theft or fraud, or harm to the security or
integrity of this system or other systems
or programs (whether maintained by
DHS or another agency or entity) or
harm to the individuals that rely upon
the compromised information; and
3. The disclosure made to such
agencies, entities, and persons is
reasonably necessary to assist in
connection with DHS’s efforts to
respond to the suspected or confirmed
compromise and prevent, minimize, or
remedy such harm.
F. To contractors and their agents,
grantees, experts, consultants, and
others performing or working on a
VerDate Mar<15>2010
17:11 Mar 12, 2013
Jkt 229001
contract, service, grant, cooperative
agreement, or other assignment for DHS,
when necessary to accomplish an
agency function related to this system of
records. Individuals provided
information under this routine use are
subject to the same Privacy Act
requirements and limitations on
disclosure as are applicable to DHS
officers and employees.
G. To an appropriate federal, state,
tribal, local, international, or foreign law
enforcement agency or other appropriate
authority charged with investigating or
prosecuting a violation or enforcing or
implementing a law, rule, regulation, or
order, when a record, either on its face
or in conjunction with other
information, indicates a violation or
potential violation of law, which
includes criminal, civil, or regulatory
violations.
H. To appropriate foreign
governmental agencies or multilateral
governmental organizations pursuant to
an arrangement between CBP and a
foreign government or multilateral
governmental organization regarding
supply chain security.
I. To an appropriate federal, state,
local, territorial, tribal, or foreign
governmental agencies or multilateral
governmental organizations or other
appropriate authority or entity when
necessary to vet a C–TPAT applicant or
validate a C–TPAT partner.
J. To appropriate federal, state, local,
tribal, or foreign governmental agencies
or multilateral governmental
organizations when DHS reasonably
believes there to be a threat or potential
threat to national or international
security for which the information may
be relevant in countering the threat or
potential threat.
K. To a federal, state, tribal, or local
agency, or other appropriate entity or
individual, or foreign governments, in
order to provide relevant information
related to intelligence,
counterintelligence, or antiterrorism
activities authorized by U.S. law,
Executive Order, or other applicable
national security directive.
L. To an organization or individual in
either the public or private sector, either
foreign or domestic, when there is a
reason to believe that the recipient is or
could become the target of a particular
terrorist activity or conspiracy, or when
the information is relevant and
necessary to the protection of life or
property.
M. To third parties during the course
of a law enforcement investigation to
the extent necessary to obtain
information pertinent to the
investigation.
PO 00000
Frm 00039
Fmt 4703
Sfmt 4703
N. To an appropriate federal, state,
local, tribal, foreign, or international
agency, if the information is relevant to
a requesting agency’s decision
concerning the hiring or retention of an
individual, or issuance of a security
clearance, license, contract, grant, or
other benefit, or if the information is
relevant to a DHS decision concerning
the hiring or retention of an employee,
the issuance of a security clearance, the
reporting of an investigation of an
employee, the letting of a contract, or
the issuance of a license, grant or other
benefit.
O. To a federal, state, local, tribal, or
foreign governmental agency or
multilateral governmental organization
for the purpose of consulting with that
agency or entity: (1) To assist in making
a determination regarding redress for an
individual in connection with the
operations of a DHS component or
program; (2) for the purpose of verifying
the identity of an individual seeking
redress in connection with the
operations of a DHS component or
program; or (3) for the purpose of
verifying the accuracy of information
submitted by an individual who has
requested such redress on behalf of
another individual.
P. To appropriate federal, state, local,
tribal, or foreign governmental agencies
or multilateral governmental
organizations for the purpose of
protecting the vital health interests of a
data subject or other persons (e.g., to
assist such agencies or organizations in
preventing exposure to or transmission
of a communicable or quarantinable
disease or to combat other significant
public health threats; appropriate notice
will be provided of any identified health
threat or risk).
Q. To the news media and the public,
with the approval of the Chief Privacy
Officer in consultation with counsel,
when there exists a legitimate public
interest in the disclosure of the
information or when disclosure is
necessary to preserve confidence in the
integrity of DHS or is necessary to
demonstrate the accountability of DHS’s
officers, employees, or individuals
covered by the system, except to the
extent it is determined that release of
the specific information in the context
of a particular case would constitute an
unwarranted invasion of personal
privacy.
DISCLOSURE TO CONSUMER REPORTING
AGENCIES:
None.
E:\FR\FM\13MRN1.SGM
13MRN1
Federal Register / Vol. 78, No. 49 / Wednesday, March 13, 2013 / Notices
POLICIES AND PRACTICES FOR STORING,
RETRIEVING, ACCESSING, RETAINING, AND
DISPOSING OF RECORDS IN THE SYSTEM:
STORAGE:
Records in this system are stored
electronically or on paper in secure
facilities in a locked drawer behind a
locked door. The records are stored on
magnetic disc, tape, digital media, and
CD–ROM.
RETRIEVABILITY:
Records may be retrieved by any of
the information listed in the categories
of records above.
SAFEGUARDS:
Records in this system are
safeguarded in accordance with
applicable rules and policies, including
all applicable DHS automated systems
security and access policies. Strict
controls have been imposed to minimize
the risk of compromising the
information that is being stored. Access
to the computer system containing the
records in this system is limited to those
individuals who have a need to know
the information for the performance of
their official duties and who have
appropriate clearances or permissions.
RETENTION AND DISPOSAL:
CBP is proposing the following
retention schedule to the National
Archives and Records Administration
(NARA): Information stored in C–TPAT
will be retained for the period during
which the application is pending
decision by CBP and for the period of
active membership of the business
entity, plus five years. Where
information regarding the possible
ineligibility of an applicant for C–TPAT
membership is found, it will be retained
in the C–TPAT system for an additional
25 years to assist with future vetting, or
consistent with the applicable retention
period for the System of Records from
which such information was derived,
whichever is longer.
SYSTEM MANAGER AND ADDRESS:
C–TPAT Director, U.S. Customs and
Border Protection, 1300 Pennsylvania
Avenue NW., Washington, DC 20229;
(202) 344–2619.
mstockstill on DSK4VPTVN1PROD with NOTICES
NOTIFICATION PROCEDURE:
The C–TPAT Security Link Portal
provides access to the information an
applicant or partner submitted. The C–
TPAT partner interface allows
participants to access and change the
information they have provided at any
time by accessing their business
identifying information and C–TPAT
profile through secure login procedures.
C–TPAT Partners access the C–TPAT
VerDate Mar<15>2010
17:11 Mar 12, 2013
Jkt 229001
Security Link Portal via https://
ctpat.cbp.dhs.gov.
Through the Security Link Portal, C–
TPAT partners have a direct messaging
option where they may communicate
with their assigned SCSS if they believe
CBP has acted upon inaccurate or
erroneously provided information. If
this method is unsuccessful and C–
TPAT facilitated processing is denied or
removed, within 30 days of notification
the entity may make written inquiry
regarding such denial or removal. The
applicant should provide as much
identifying information as possible
regarding the business, in order to
identify the record at issue. C–TPAT
participants may provide CBP with
additional information to ensure that
the information maintained by CBP is
accurate and complete. The submitter
will receive a written response to each
inquiry. If C–TPAT partnership is
suspended or removed, the business
may appeal this decision to CBP HQ, to
the attention of the Executive Director,
C–TPAT Program Division: Executive
Director, Cargo and Conveyance
Security, U.S. Customs and Border
Protection, 1300 Pennsylvania Avenue
NW., Room 2.2A, Washington, DC
20229.
The Secretary of Homeland Security
has exempted portions of this system
from the notification, access, and
amendment procedures of the Privacy
Act because it is a law enforcement
system. However, DHS/CBP will
consider individual requests to
determine whether or not information
may be released. Thus, individuals
seeking notification of and access to any
record contained in this system of
records, or seeking to contest its
content, may submit a request in writing
to the Headquarters or component’s
FOIA Officer, whose contact
information can be found at https://
www.dhs.gov/foia under ‘‘contacts.’’ If
an individual believes more than one
component maintains Privacy Act
records concerning him or her the
individual may submit the request to
the Chief Privacy Officer and Chief
Freedom of Information Act Officer,
Department of Homeland Security, 245
Murray Drive SW., Building 410, STOP–
0655, Washington, DC 20528.
When seeking records about yourself
from this system of records or any other
Departmental system of records your
request must conform with the Privacy
Act regulations set forth in 6 CFR part
5. You must first verify your identity,
meaning that you must provide your full
name, current address, and date and
place of birth. You must sign your
request, and your signature must either
be notarized or submitted under 28
PO 00000
Frm 00040
Fmt 4703
Sfmt 4703
15967
U.S.C. 1746, a law that permits
statements to be made under penalty of
perjury as a substitute for notarization.
While no specific form is required, you
may obtain forms for this purpose from
the Chief Privacy Officer and Chief
Freedom of Information Act Officer,
https://www.dhs.gov or 1–866–431–0486.
In addition you should provide the
following:
• An explanation of why you believe
the Department would have information
on you;
• Identify which component(s) of the
Department you believe may have the
information about you;
• Specify when you believe the
records would have been created; and
• Provide any other information that
will help the FOIA staff determine
which DHS component agency may
have responsive records.
If your request is seeking records
pertaining to another living individual,
you must include a statement from that
individual certifying his/her agreement
for you to access his/her records.
Without this bulleted information the
component(s) may not be able to
conduct an effective search, and your
request may be denied due to lack of
specificity or lack of compliance with
applicable regulations.
RECORD ACCESS PROCEDURES:
See ‘‘Notification procedure’’ above.
CONTESTING RECORD PROCEDURES:
See ‘‘Notification procedure’’ above.
RECORD SOURCE CATEGORIES:
Records are obtained from the
business; from CBP systems including,
but not limited to, TECS, the Automated
Targeting System (ATS), the Automated
Commercial System (ACS); and from
public sources. Information is also
collected by the SCSS from the C–TPAT
applicant and other businesses during
the course of validating the business’s
supply chain and from foreign
governments and multilateral
governmental organizations with which
CBP has entered into MRAs or other
arrangements.
EXEMPTIONS CLAIMED FOR THE SYSTEM:
No exemption shall be asserted with
respect to information requested from
and provided by the C–TPAT applicant
including, but not limited to, company
profile, supply chain information, and
other information provided during the
application and validation process. CBP
will not assert any exemptions for an
individual’s application data and final
membership determination in response
to a request from that individual.
However, the Privacy Act requires DHS
E:\FR\FM\13MRN1.SGM
13MRN1
15968
Federal Register / Vol. 78, No. 49 / Wednesday, March 13, 2013 / Notices
to maintain an accounting of the
disclosures made pursuant to all
routines uses. Disclosing the fact that a
law enforcement agency has sought
particular records may affect ongoing
law enforcement activities. As such,
pursuant to 5 U.S.C. 552a(j)(2), DHS will
claim exemption from sections (c)(3),
(e)(8), and (g) of the Privacy Act of 1974,
as amended, as is necessary and
appropriate to protect this information.
Further, DHS will claim exemption from
section (c)(3) of the Privacy Act of 1974,
as amended, pursuant to 5 U.S.C.
552a(k)(2) as is necessary and
appropriate to protect this information.
Pursuant to exemption 5 U.S.C.
552a(j)(2) of the Privacy Act, all other
C–TPAT data, including information
regarding the possible ineligibility of an
applicant for C–TPAT membership
discovered during the vetting process
and any resulting issue papers, are
exempt from 5 U.S.C. 552a(c)(3) and (4);
(d); (e)(1), (e)(2), (e)(3), (e)(4)(G),
(e)(4)(H), (e)(4)(I), (e)(5) and (e)(8); (f);
and (g). Pursuant to 5 U.S.C. 552a(k)(2),
information regarding the possible
ineligibility of an applicant for C–TPAT
membership discovered during the
vetting process and any resulting issue
papers are exempt from 5 U.S.C.
552a(c)(3); (d); (e)(1), (e)(4)(G),
(e)(4)(H),(e)(4)(I); and (f). In addition, to
the extent a record contains information
from other exempt systems of records,
CBP will rely on the exemptions
claimed for those systems.
Dated: February 21, 2013.
Jonathan R. Cantor,
Acting Chief Privacy Officer, Department of
Homeland Security.
[FR Doc. 2013–05674 Filed 3–12–13; 8:45 am]
BILLING CODE 9111–14–P
DEPARTMENT OF HOMELAND
SECURITY
Federal Emergency Management
Agency
[Docket ID: FEMA–2007–0008]
National Advisory Council
Federal Emergency
Management Agency, DHS.
ACTION: Committee Management;
Request for Applicants for Appointment
to the National Advisory Council.
mstockstill on DSK4VPTVN1PROD with NOTICES
AGENCY:
The Federal Emergency
Management Agency (FEMA) is
requesting individuals who are
interested in serving on the National
Advisory Council (NAC) to apply for
appointment as identified in this notice.
As provided for in the Post-Katrina
Emergency Management Reform Act of
SUMMARY:
VerDate Mar<15>2010
17:11 Mar 12, 2013
Jkt 229001
2006 (PKEMRA), the NAC shall advise
the Administrator of FEMA on all
aspects of emergency management. The
NAC shall incorporate State, local and
Tribal government and private sector
input in the development and revision
of the national preparedness goal, the
national preparedness system, the
National Incident Management System,
the National Response Framework, and
other related plans and strategies. The
NAC consists of up to 35 members, all
of whom are experts and leaders in their
respective fields. FEMA seeks to
appoint individuals to nine positions on
the Council that are open due to
vacancy or term expiration on June 15,
2013.
DATES: Applications and nominations
will be accepted until Friday, March 22,
2013, 5:00 p.m. EST.
ADDRESSES: Applications for
membership should be submitted by:
• Email: FEMA-NAC@fema.dhs.gov.
• Fax: (540) 504–2331.
• Mail: Office of the National
Advisory Council, Federal Emergency
Management Agency (Room 722F), 500
C Street SW., Washington, DC 20472–
3100.
FOR FURTHER INFORMATION CONTACT:
Alexandra Woodruff, Alternate
Designated Federal Officer, The Office
of the National Advisory Council,
Federal Emergency Management Agency
(Room 722F), 500 C Street SW.,
Washington, DC 20472–3100; telephone
(202) 646–3746; fax (540) 504–2331; and
email FEMA-NAC@fema.dhs.gov. For
more information on the NAC, please
visit https://www.fema.gov/about/
national-advisory-council.
SUPPLEMENTARY INFORMATION: The NAC
is an advisory committee established in
accordance with the provisions of the
Federal Advisory Committee Act
(FACA), 5 U.S.C. App. (Pub. L. 92–463).
As required by PKEMRA, the Secretary
of Homeland Security established the
NAC to ensure effective and ongoing
coordination of Federal preparedness,
protection, response, recovery, and
mitigation for natural disasters, acts of
terrorism, and other man-made
disasters. FEMA is requesting
individuals who are interested in
serving on the NAC to apply for
appointment. The terms for seven
positions on the Council will expire
June 15, 2013 in the following
discipline areas: Emergency
Management Field (one representative
appointment), State Non-Elected
Officials (one representative
appointment), Standards Setting and
Accrediting (one representative
appointment), Public Health (one
Special Government Employee (SGE)
PO 00000
Frm 00041
Fmt 4703
Sfmt 4703
appointment), Functional Accessibility
(one representative appointment),
Emergency Medical Providers (one SGE
appointment), and Tribal Non-Elected
Officials (one representative
appointment). FEMA seeks to appoint
individuals to these positions for threeyear terms. There are two vacancies
with terms ending June 15, 2014 in the
disciplines of Tribal Elected Officials
(one representative appointment) and
Emergency Response (one
representative appointment). FEMA
seeks to appoint individuals to serve the
remainder of these terms. The position
for Tribal Elected Officials (one
representative appointment) is currently
vacant with a term ending June 15,
2014. FEMA seeks to appoint an
individual to serve the remainder of this
term. The Administrator may appoint
additional candidates to serve as FEMA
Administrator Selection (either
representative or SGE) for three-year
terms. Additionally, there is an Ex
Officio position for a representative
from the U.S. Department of Defense.
Individuals interested in serving on
the NAC are invited to apply for
appointment by submitting a Resume or
Curriculum Vitae (CV) to the Office of
the NAC as listed in the ADDRESSES
section of this notice. Letters of
recommendation may also be provided,
but are not required. There is no
application form. However,
applications/nominations must include
the following information: The
applicant’s full name, home and
business phone numbers, preferred
email address, home and business
mailing addresses, current position title
& organization, and the discipline area
of interest (i.e., Emergency
Management). Current Council members
whose terms are ending should notify
the Office of the NAC of their interest
in reappointment in lieu of submitting
a new application, and if desired,
provide updated application materials
for consideration.
Appointees may be designated as a
SGE as defined in section 202(a) of title
18, United States Code, or as a
Representative appointment. Candidates
selected for appointment as SGEs are
required to complete a Confidential
Financial Disclosure Form (Office of
Government Ethics (OGE) Form 450).
This form can be obtained by visiting
the Web Site of the Office of
Government Ethics (https://
www.oge.gov), or by contacting the
Office of the NAC. Please do not submit
this form with your application. Contact
information is provided in the FOR
FURTHER INFORMATION CONTACT section of
this notice.
E:\FR\FM\13MRN1.SGM
13MRN1
Agencies
[Federal Register Volume 78, Number 49 (Wednesday, March 13, 2013)]
[Notices]
[Pages 15962-15968]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 2013-05674]
=======================================================================
-----------------------------------------------------------------------
DEPARTMENT OF HOMELAND SECURITY
Office of the Secretary
[Docket No. DHS-2012-0073]
Privacy Act of 1974; Department of Homeland Security, U.S.
Customs and Border Protection--DHS/CBP-018--Customs--Trade Partnership
Against Terrorism (C-TPAT) System, System of Records
AGENCY: Privacy Office, Department of Homeland Security.
ACTION: Notice of Privacy Act system of records.
-----------------------------------------------------------------------
SUMMARY: In accordance with the Privacy Act of 1974, the Department of
Homeland Security proposes to
[[Page 15963]]
establish a new system of records titled, ``Department of Homeland
Security, U.S. Customs and Border Protection, DHS/CBP-018 Customs--
Trade Partnership Against Terrorism System of Records.'' This system of
records allows the Department of Homeland Security/U.S. Customs and
Border Protection, DHS/CBP-018, Customs-Trade Partnership Against
Terrorism to collect and maintain records about members of the trade
community related to Customs and Border Protection's Customs-Trade
Partnership Against Terrorism program. Businesses accepted into the
program, called partners, agree to analyze, measure, monitor, report,
and enhance their supply chains in exchange for greater security and
facilitated processing offered by Customs and Border Protection. The
Customs-Trade Partnership Against Terrorism program allows Customs and
Border Protection to focus its resources on higher risk businesses and
thereby assists the agency in achieving its mission to secure the
border and facilitate the movement of legitimate international trade.
This new system of records collects and manages information, including
personally identifiable information, about prospective, ineligible,
current, or former trade partners in Customs-Trade Partnership Against
Terrorism, and other entities and individuals in their supply chains.
This system also collects and maintains information, including
personally identifiable information, regarding members of a foreign
government secure supply chain program that have been recognized by
Customs and Border Protection, through a mutual recognition arrangement
or comparable arrangement, as being compatible with the program. The
Customs-Trade Partnership Against Terrorism program provides a Security
Link Portal, which allows partners and applicants to access and manage
their information. Customs and Border Protection is publishing this new
system of records notice in order to notify the public about the
system, permit trade partners access to the information they provide,
and offer a description of how and where information is collected and
maintained. Additionally, the Department of Homeland Security is
issuing a Notice of Proposed Rulemaking elsewhere in the Federal
Register, to exempt this system of records from certain provisions of
the Privacy Act. This newly established system will be included in the
Department of Homeland Security's inventory of record systems.
DATES: The new system of records will be effective April 12, 2013,
unless comments are received that result in a contrary determination.
ADDRESSES: You may submit comments, identified by docket number DHS-
2012-0073 by one of the following methods:
Federal e-Rulemaking Portal: https://www.regulations.gov.
Follow the instructions for submitting comments.
Fax: 202-343-4010.
Mail: Jonathan R. Cantor, Acting Chief Privacy Officer,
Privacy Office, Department of Homeland Security, Washington, DC 20528.
Instructions: All submissions received must include the agency name
and docket number for this rulemaking. All comments received will be
posted without change to https://www.regulations.gov, including any
personal information provided.
Docket: For access to the docket to read background documents or
comments received go to https://www.regulations.gov.
FOR FURTHER INFORMATION CONTACT: For general questions please contact:
Laurence E. Castelli (202-325-0280), CBP Privacy Officer, U.S. Customs
and Border Protection, 90 K Street NE. Washington, DC 20229. For
privacy issues please contact: Jonathan R. Cantor (202-343-1717),
Acting Chief Privacy Officer, Privacy Office, Department of Homeland
Security, Washington, DC 20528.
SUPPLEMENTARY INFORMATION:
I. Background
In accordance with the Privacy Act of 1974, 5 U.S.C. 552a, the
Department of Homeland Security (DHS), US Customs and Border Protection
(CBP) proposes to establish a new DHS system of records titled, ``DHS/
CBP-018-C-TPAT System of Records.''
CBP is publishing this new system of records notice to notify the
public about the system and offer a description of how CBP collects and
maintains information pertaining to prospective, ineligible, current,
or former trade partners in C-TPAT; other entities and individuals in
their supply chains; and members of foreign governments' secure supply
chain programs that have been recognized by CBP, through a mutual
recognition arrangement or comparable arrangement, as being compatible
with C-TPAT.
CBP will use the information collected and maintained through the
C-TPAT program to carry out its trade facilitation, law enforcement,
and national security missions. In direct response to 9/11, CBP
challenged the trade community to partner with the government to design
a new approach to supply chain security--one that protects the United
States from acts of terrorism by improving security while facilitating
the flow of compliant cargo and conveyances. The result was the
Customs-Trade Partnership Against Terrorism (C-TPAT)--an innovative,
voluntary government/private sector partnership program. C-TPAT is a
voluntary program in which certain types of businesses agree to
cooperate with CBP in the analysis, measurement, monitoring, reporting,
and enhancement of their supply chains.
Businesses accepted in to C-TPAT are called partners and agree to
take actions to protect their supply chain, identify security gaps, and
implement specific security measures and best practices in return for
facilitated processing of their shipments by CBP. The program focuses
on improving security from the point of origin (including manufacturer,
supplier, or vendor) through a point of distribution to the
destination. The current security guidelines for C-TPAT program members
address a broad range of topics including personnel, physical and
procedural security; access controls; education, training and
awareness; manifest procedures; conveyance security; threat awareness;
and documentation processing. These guidelines offer a customized
solution for the members, while providing a clear minimum standard that
approved companies must meet.
Businesses eligible to fully participate in C-TPAT include U.S.
importers; U.S./Canada highway carriers; U.S./Mexico highway carriers;
rail and sea carriers; licensed U.S. Customs brokers; U.S. marine port
authority/terminal operators; U.S. freight consolidators; ocean
transportation intermediaries and non-operating common carriers;
Mexican and Canadian manufacturers; and Mexican long-haul carriers. As
part of its development, CBP plans to include exporters from the United
States in C-TPAT.
There are three tiers of C-TPAT partnership, with each tier having
its own set of requirements and corresponding facilitated processing.
In general, businesses are considered applicants until CBP has vetted
the information in the application and accepted the business into the
program. Once accepted, the business is designated as a Tier One
certified partner, and a site visit is arranged. The site visit is used
to validate the partner's supply chain security and leads to importers
becoming Tier Two validated partners. As C-TPAT has incorporated other
eligible business types, it has led
[[Page 15964]]
to those businesses becoming certified, validated non-importers. If an
importer with Tier Two validated partner status exemplifies best
practices in its supply chain security, it may attain Tier Three
validated partner status. As a business progresses up the tiers, it
receives more facilitated processing at ports of entry.
Information is collected directly from C-TPAT partners or applicant
businesses seeking membership in C-TPAT and indirectly from trade
partners or through Mutual Recognition Arrangements (MRA) or memoranda
of understanding relating to harmonization efforts between CBP and the
foreign secured supply chain program. In the course of enrolling,
certifying, and validating C-TPAT trade partners and their supply
chains, the C-TPAT system will receive personally identifiable
information (PII) and confidential business information from trade
entities and their representatives.
To participate in the C-TPAT program, a company is required to
submit a confidential, on-line application using the C-TPAT Security
Link Portal, https://ctpat.cbp.dhs.gov. The C-TPAT Security Link Portal
is the public-facing portion of the C-TPAT system used by applicants to
submit the information in their company and supply chain security
profiles. Initially, the applicant business provides basic business-
identifying information in the company profile using the online
application form. This business-identifying information is used to
verify the identity and actual existence of the applicant business and
may include basic identifying elements and/or PII used in the
importation of cargo, such as U.S. Social Security Numbers (SSN) for
sole proprietors, Internal Revenue Service Business Identification
Numbers, and Customs assigned identification numbers (such as
Manufacturer Identification numbers and Broker/Filer codes, etc.).
Point of contact information is collected for the business, as well as
owner information.
Additionally, the applicant business must complete a Supply Chain
Security Profile (SCSP). The information provided in the SCSP is a
narrative description of the procedures the applicant business uses to
adhere to each C-TPAT Security Criteria or Guideline articulated for
their particular business type (importer, customs broker, freight
forwarder, air, sea, and land carriers, contract logistics providers,
etc.) together with any supporting documentation. Data elements entered
by the applicant business are accessible for update or revision through
the C-TPAT Security Link Portal. An applicant's SCSP must provide
supply chain security procedures for each business in the applicant's
supply chain, even if those businesses are not, or do not desire to
become partners of C-TPAT separately. This information is focused on
the security procedures of those businesses (e.g., whether the business
conducts background investigations on employees), rather than the
individuals related to those businesses (e.g., a list of employee
names).
A CBP Supply Chain Security Specialist (SCSS) vets the SCSP
information provided by the applicant by querying that information
through various information sources and systems, and queries of
publicly available data (e.g., through Google). The SCSS will then
evaluate the SCSP information against the results provided by such
system vetting, derogatory or otherwise, and indicate whether the
applicant is fit for the program in the Security Link Portal.
Derogatory vetting results are incorporated into an issue paper for a
C-TPAT supervisor's approval, and the issue paper is stored separately
from the Security Link Portal on an internal C-TPAT SharePoint, which
is only accessible by appropriate CBP employees and supervisors.
Vetting results containing PII are not stored in the C-TPAT
Security Link Portal. When a query reveals derogatory information about
a business applicant or partner, the SCSS makes a notation on the
internal portion of the C-TPAT Security Link Portal indicating the
existence of derogatory information and a citation to the appropriate
records. For instance, if a query of an applicant in TECS results in
derogatory information, the TECS ID is used as an identifier for the
record in the C-TPAT Security Link Portal, rather than the contents of
the TECS record. However, specific details regarding the incident or
violation giving rise to the unfavorable analysis will be maintained
within the C-TPAT SharePoint site and the relevant source system. The
SCSS is responsible for vetting all C-TPAT applicants, and conducts
this vetting of business entities every 6-12 months to ensure continued
compliance.
Consistent with DHS's information sharing mission, information
stored in DHS/CBP-018 Customs--Trade Partnership Against Terrorism (C-
TPAT) System may be shared with other DHS components that have a need
to know the information to carry out their national security, law
enforcement, immigration, intelligence, or other homeland security
functions. In addition, information may be shared with appropriate
federal, state, local, tribal, territorial, foreign, or international
government agencies consistent with the routine uses set forth in this
system of records notice.
Additionally, DHS is issuing a Notice of Proposed Rulemaking to
exempt this system of records from certain provisions of the Privacy
Act, elsewhere in the Federal Register. This newly established system
will be included in DHS's inventory of record systems.
II. Privacy Act
The Privacy Act embodies fair information practice principles in a
statutory framework governing the means by which Federal Government
agencies collect, maintain, use, and disseminate individuals' records.
The Privacy Act applies to information that is maintained in a ``system
of records.'' A ``system of records'' is a group of any records under
the control of an agency for which information is retrieved by the name
of an individual or by some identifying number, symbol, or other
identifying particular assigned to the individual. In the Privacy Act,
an individual is defined to encompass U.S. citizens and lawful
permanent residents. As a matter of policy, DHS extends administrative
Privacy Act protections to all individuals where systems of records
maintain information on U.S. citizens, lawful permanent residents, and
visitors.
Below is the description of the DHS/CBP-018 Customs--Trade
Partnership Against Terrorism (C-TPAT) System of Records. In accordance
with 5 U.S.C. 552a(r), DHS has provided a report of this system of
records to the Office of Management and Budget and to Congress.
System of records:
Department of Homeland Security (DHS)/U.S. Customs and Border
Protection (CBP)-018.
System name:
DHS/CBP-018 Customs--Trade Partnership Against Terrorism (C-TPAT)
Security classification:
Unclassified, for official use only, law enforcement sensitive.
System location:
Records are maintained at CBP Headquarters, Washington, DC and
field offices in C-TPAT's Security Link Portal and a CBP collaborative
intranet.
Categories of individuals covered by the system:
Individuals, including Points of Contact (POC), owners, and others
associated with prospective, ineligible, current, or former C-TPAT
business
[[Page 15965]]
entities; individuals associated with the supply chain of such C-TPAT
business entities; and individuals associated with business entities in
foreign governments secure supply chain programs that have been
recognized by CBP, through harmonization, a mutual recognition
arrangement, or comparable arrangement, as being compatible with C-
TPAT.
Categories of records in the system:
At the Application level, information is collected from the
applicant about itself and those members of its international supply
chain. Pre-set fields of business-identifying information within the
company profile portion of the online application include:
Business Entity Type;
Application Exception Token;
Legal Business Name;
Other Name(s) by which the Business is known (i.e.,
``Doing Business As''), if applicable;
Business Telephone;
Business Fax;
Business Web site address;
Business history;
Physical Address(es);
Mailing Address(es);
Owner Type: (e.g., Corporation\ Partnership\Sole
Proprietor, etc.);
Years in Business;
Number of Employees;
Business Points of Contacts;
First Name;
Last Name;
Title;
Email Address (also used to log in to the Security Link
Portal);
Password;
Telephone Number;
Contact Type;
U.S. Social Security Numbers (as volunteered by sole
proprietors as their tax identification number);
Internal Revenue Service Business Identification Numbers;
Customs assigned identification numbers (Importers of
Record (IOR) number; Manufacturer Identification Numbers (MID) and
Broker/Filer codes, etc.);
Issue Papers, including information regarding whether the
applicant is eligible for C-TPAT membership or source record numbers
for such information;
Narrative description of supply chain security procedures
for applicant and other entities in applicant's supply chain;
Validation supporting documentation (e.g., bills of
lading; audits--internal & external; proof of background checks;
contractual obligations; via a letter from a senior business partner
officer attesting to compliance; statements demonstrating compliance
with C-TPAT security criteria or an equivalent World Customs
Organization accredited security program administered by a foreign
customs authority; importer security questionnaire); and
Account Status.
Information received from and confirmed to countries with which CBP
has a Mutual Recognition Arrangement (MRA) includes:
Legal Business Name;
Other Name(s) by which the Business is known (i.e.,
``Doing Business As''), if applicable;
Company Type;
Date Partner Certified;
Account Status;
Vetting Status;
Date Validation Completed;
SCSS Name;
Office Assigned Name;
Mutual Recognition Country;
Business identifying numbers, e.g.:
[cir] Standard Carrier Alpha Code (SCAC);
[cir] IOR;
[cir] MID;
By Applicant request, information received from, and forwarded to,
foreign secure supply chain programs pursuant to a harmonization
program may include, but is not limited to:
Legal Name;
Doing Business As;
Telephone Number;
Fax Number;
Web site;
Owner Type;
Business Start Date;
Number of Employees;
Brief Company History;
Primary Address, Type;
Primary Address, Name;
Primary Address, Country;
Primary Address, Street Address;
Primary Address, City;
Primary Address, State/Province;
Primary Address, Zip/Postal Code;
Mailing Address:
[cir] Type;
[cir] Name;
[cir] Country;
[cir] Street Address;
[cir] City;
[cir] State/Province; and
[cir] Zip/Postal Code.
Primary Contact:
[cir] Email Address;
[cir] Type;
[cir] Salutation;
[cir] First Name;
[cir] Last Name;
[cir] Title; and
[cir] Telephone Number.
Partner Notifications;
Number of Entries;
U.S. Department of Transportation (DOT) Issued Number;
U.S. National Motor Freight Traffic Association Issued;
SCAC;
Dun & Bradstreet Number;
Services Offered;
Driver Sources;
Entries related to harmonization country;
The entire Security Profile (Upon Request):
[cir] Account Number;
[cir] Risking Status;
[cir] MSR Status;
[cir] Validation Type;
[cir] Validation Closed Date;
[cir] Validation Status;
[cir] Validation Type Verification (Government Contact);
[cir] Verification Type Start Date;
[cir] Verification Type: (phone, visit, mutual recognition);
[cir] Verification Visit address;
[cir] Business Type; and
[cir] Harmonization Host Program.
Account Status;
Vetting Status;
Minimum Security Requirements/Security Profile Status;
Validation Status; and
Harmonization Status.
Authority for maintenance of the system:
This system and program are authorized by 6 U.S.C. 901 note
(Security and Accountability for Every Port Act of 2006 (SAFE Port
Act), including 6 U.S.C. 961-973. Pilot programs enhancing secure
supply chain practices related to C-TPAT are also authorized by
Homeland Security Presidential Directive/HSPD-8, ``National
Preparedness'' Section 22 (December 17, 2003).
Purpose(s):
The purpose of this system is to verify the identity of C-TPAT
partners, determine enrollment level, and provide identifiable ``low
risk'' entities with fewer random checks and facilitated processing.
The information will be cross-referenced with data maintained in CBP's
other cargo and enforcement databases and will be shared with other law
enforcement systems, agencies or foreign entities, as appropriate, when
related to ongoing investigations or operations. Information will be
used to analyze, measure, monitor, report, and enhance business supply
chains to permit facilitated processing of C-TPAT partner shipments by
CBP.
Routine uses of records maintained in the system, including categories
of users and the purposes of such uses:
In addition to those disclosures generally permitted under 5 U.S.C.
[[Page 15966]]
552a(b) of the Privacy Act, all or a portion of the records or
information contained in this system may be disclosed outside DHS as a
routine use pursuant to 5 U.S.C. 552a(b)(3). Any disclosure of
information must be made consistent with the official duties of the
person making the disclosure. The routine uses are as follows:
A. To the Department of Justice (DOJ), including the United States
Attorneys Offices, or other federal agency conducting litigation or in
proceedings before any court, adjudicative or administrative body, when
it is relevant or necessary to the litigation and one of the following
is a party to the litigation or has an interest in such litigation:
1. DHS or any component thereof;
2. Any employee of DHS in his/her official capacity;
3. Any employee of DHS in his/her individual capacity when DOJ or
DHS has agreed to represent the employee; or
4. The United States or any agency thereof.
B. To a congressional office from the record of an individual in
response to an inquiry from that congressional office made at the
request of the individual to whom the record pertains.
C. To the National Archives and Records Administration (NARA) or
General Services Administration pursuant to records management
inspections being conducted under the authority of 44 U.S.C. 2904 and
2906.
D. To an agency or organization for the purpose of performing audit
or oversight operations as authorized by law, but only such information
as is necessary and relevant to such audit or oversight function.
E. To appropriate agencies, entities, and persons when:
1. DHS suspects or has confirmed that the security or
confidentiality of information in the system of records has been
compromised;
2. DHS has determined that as a result of the suspected or
confirmed compromise there is a risk of harm to economic or property
interests, identity theft or fraud, or harm to the security or
integrity of this system or other systems or programs (whether
maintained by DHS or another agency or entity) or harm to the
individuals that rely upon the compromised information; and
3. The disclosure made to such agencies, entities, and persons is
reasonably necessary to assist in connection with DHS's efforts to
respond to the suspected or confirmed compromise and prevent, minimize,
or remedy such harm.
F. To contractors and their agents, grantees, experts, consultants,
and others performing or working on a contract, service, grant,
cooperative agreement, or other assignment for DHS, when necessary to
accomplish an agency function related to this system of records.
Individuals provided information under this routine use are subject to
the same Privacy Act requirements and limitations on disclosure as are
applicable to DHS officers and employees.
G. To an appropriate federal, state, tribal, local, international,
or foreign law enforcement agency or other appropriate authority
charged with investigating or prosecuting a violation or enforcing or
implementing a law, rule, regulation, or order, when a record, either
on its face or in conjunction with other information, indicates a
violation or potential violation of law, which includes criminal,
civil, or regulatory violations.
H. To appropriate foreign governmental agencies or multilateral
governmental organizations pursuant to an arrangement between CBP and a
foreign government or multilateral governmental organization regarding
supply chain security.
I. To an appropriate federal, state, local, territorial, tribal, or
foreign governmental agencies or multilateral governmental
organizations or other appropriate authority or entity when necessary
to vet a C-TPAT applicant or validate a C-TPAT partner.
J. To appropriate federal, state, local, tribal, or foreign
governmental agencies or multilateral governmental organizations when
DHS reasonably believes there to be a threat or potential threat to
national or international security for which the information may be
relevant in countering the threat or potential threat.
K. To a federal, state, tribal, or local agency, or other
appropriate entity or individual, or foreign governments, in order to
provide relevant information related to intelligence,
counterintelligence, or antiterrorism activities authorized by U.S.
law, Executive Order, or other applicable national security directive.
L. To an organization or individual in either the public or private
sector, either foreign or domestic, when there is a reason to believe
that the recipient is or could become the target of a particular
terrorist activity or conspiracy, or when the information is relevant
and necessary to the protection of life or property.
M. To third parties during the course of a law enforcement
investigation to the extent necessary to obtain information pertinent
to the investigation.
N. To an appropriate federal, state, local, tribal, foreign, or
international agency, if the information is relevant to a requesting
agency's decision concerning the hiring or retention of an individual,
or issuance of a security clearance, license, contract, grant, or other
benefit, or if the information is relevant to a DHS decision concerning
the hiring or retention of an employee, the issuance of a security
clearance, the reporting of an investigation of an employee, the
letting of a contract, or the issuance of a license, grant or other
benefit.
O. To a federal, state, local, tribal, or foreign governmental
agency or multilateral governmental organization for the purpose of
consulting with that agency or entity: (1) To assist in making a
determination regarding redress for an individual in connection with
the operations of a DHS component or program; (2) for the purpose of
verifying the identity of an individual seeking redress in connection
with the operations of a DHS component or program; or (3) for the
purpose of verifying the accuracy of information submitted by an
individual who has requested such redress on behalf of another
individual.
P. To appropriate federal, state, local, tribal, or foreign
governmental agencies or multilateral governmental organizations for
the purpose of protecting the vital health interests of a data subject
or other persons (e.g., to assist such agencies or organizations in
preventing exposure to or transmission of a communicable or
quarantinable disease or to combat other significant public health
threats; appropriate notice will be provided of any identified health
threat or risk).
Q. To the news media and the public, with the approval of the Chief
Privacy Officer in consultation with counsel, when there exists a
legitimate public interest in the disclosure of the information or when
disclosure is necessary to preserve confidence in the integrity of DHS
or is necessary to demonstrate the accountability of DHS's officers,
employees, or individuals covered by the system, except to the extent
it is determined that release of the specific information in the
context of a particular case would constitute an unwarranted invasion
of personal privacy.
Disclosure to consumer reporting agencies:
None.
[[Page 15967]]
Policies and practices for storing, retrieving, accessing, retaining,
and disposing of records in the system:
Storage:
Records in this system are stored electronically or on paper in
secure facilities in a locked drawer behind a locked door. The records
are stored on magnetic disc, tape, digital media, and CD-ROM.
Retrievability:
Records may be retrieved by any of the information listed in the
categories of records above.
Safeguards:
Records in this system are safeguarded in accordance with
applicable rules and policies, including all applicable DHS automated
systems security and access policies. Strict controls have been imposed
to minimize the risk of compromising the information that is being
stored. Access to the computer system containing the records in this
system is limited to those individuals who have a need to know the
information for the performance of their official duties and who have
appropriate clearances or permissions.
Retention and disposal:
CBP is proposing the following retention schedule to the National
Archives and Records Administration (NARA): Information stored in C-
TPAT will be retained for the period during which the application is
pending decision by CBP and for the period of active membership of the
business entity, plus five years. Where information regarding the
possible ineligibility of an applicant for C-TPAT membership is found,
it will be retained in the C-TPAT system for an additional 25 years to
assist with future vetting, or consistent with the applicable retention
period for the System of Records from which such information was
derived, whichever is longer.
System Manager and address:
C-TPAT Director, U.S. Customs and Border Protection, 1300
Pennsylvania Avenue NW., Washington, DC 20229; (202) 344-2619.
Notification procedure:
The C-TPAT Security Link Portal provides access to the information
an applicant or partner submitted. The C-TPAT partner interface allows
participants to access and change the information they have provided at
any time by accessing their business identifying information and C-TPAT
profile through secure login procedures. C-TPAT Partners access the C-
TPAT Security Link Portal via https://ctpat.cbp.dhs.gov.
Through the Security Link Portal, C-TPAT partners have a direct
messaging option where they may communicate with their assigned SCSS if
they believe CBP has acted upon inaccurate or erroneously provided
information. If this method is unsuccessful and C-TPAT facilitated
processing is denied or removed, within 30 days of notification the
entity may make written inquiry regarding such denial or removal. The
applicant should provide as much identifying information as possible
regarding the business, in order to identify the record at issue. C-
TPAT participants may provide CBP with additional information to ensure
that the information maintained by CBP is accurate and complete. The
submitter will receive a written response to each inquiry. If C-TPAT
partnership is suspended or removed, the business may appeal this
decision to CBP HQ, to the attention of the Executive Director, C-TPAT
Program Division: Executive Director, Cargo and Conveyance Security,
U.S. Customs and Border Protection, 1300 Pennsylvania Avenue NW., Room
2.2A, Washington, DC 20229.
The Secretary of Homeland Security has exempted portions of this
system from the notification, access, and amendment procedures of the
Privacy Act because it is a law enforcement system. However, DHS/CBP
will consider individual requests to determine whether or not
information may be released. Thus, individuals seeking notification of
and access to any record contained in this system of records, or
seeking to contest its content, may submit a request in writing to the
Headquarters or component's FOIA Officer, whose contact information can
be found at https://www.dhs.gov/foia under ``contacts.'' If an
individual believes more than one component maintains Privacy Act
records concerning him or her the individual may submit the request to
the Chief Privacy Officer and Chief Freedom of Information Act Officer,
Department of Homeland Security, 245 Murray Drive SW., Building 410,
STOP-0655, Washington, DC 20528.
When seeking records about yourself from this system of records or
any other Departmental system of records your request must conform with
the Privacy Act regulations set forth in 6 CFR part 5. You must first
verify your identity, meaning that you must provide your full name,
current address, and date and place of birth. You must sign your
request, and your signature must either be notarized or submitted under
28 U.S.C. 1746, a law that permits statements to be made under penalty
of perjury as a substitute for notarization. While no specific form is
required, you may obtain forms for this purpose from the Chief Privacy
Officer and Chief Freedom of Information Act Officer, https://www.dhs.gov or 1-866-431-0486. In addition you should provide the
following:
An explanation of why you believe the Department would
have information on you;
Identify which component(s) of the Department you believe
may have the information about you;
Specify when you believe the records would have been
created; and
Provide any other information that will help the FOIA
staff determine which DHS component agency may have responsive records.
If your request is seeking records pertaining to another living
individual, you must include a statement from that individual
certifying his/her agreement for you to access his/her records.
Without this bulleted information the component(s) may not be able
to conduct an effective search, and your request may be denied due to
lack of specificity or lack of compliance with applicable regulations.
Record access procedures:
See ``Notification procedure'' above.
Contesting record procedures:
See ``Notification procedure'' above.
Record source categories:
Records are obtained from the business; from CBP systems including,
but not limited to, TECS, the Automated Targeting System (ATS), the
Automated Commercial System (ACS); and from public sources. Information
is also collected by the SCSS from the C-TPAT applicant and other
businesses during the course of validating the business's supply chain
and from foreign governments and multilateral governmental
organizations with which CBP has entered into MRAs or other
arrangements.
Exemptions claimed for the system:
No exemption shall be asserted with respect to information
requested from and provided by the C-TPAT applicant including, but not
limited to, company profile, supply chain information, and other
information provided during the application and validation process. CBP
will not assert any exemptions for an individual's application data and
final membership determination in response to a request from that
individual. However, the Privacy Act requires DHS
[[Page 15968]]
to maintain an accounting of the disclosures made pursuant to all
routines uses. Disclosing the fact that a law enforcement agency has
sought particular records may affect ongoing law enforcement
activities. As such, pursuant to 5 U.S.C. 552a(j)(2), DHS will claim
exemption from sections (c)(3), (e)(8), and (g) of the Privacy Act of
1974, as amended, as is necessary and appropriate to protect this
information. Further, DHS will claim exemption from section (c)(3) of
the Privacy Act of 1974, as amended, pursuant to 5 U.S.C. 552a(k)(2) as
is necessary and appropriate to protect this information.
Pursuant to exemption 5 U.S.C. 552a(j)(2) of the Privacy Act, all
other C-TPAT data, including information regarding the possible
ineligibility of an applicant for C-TPAT membership discovered during
the vetting process and any resulting issue papers, are exempt from 5
U.S.C. 552a(c)(3) and (4); (d); (e)(1), (e)(2), (e)(3), (e)(4)(G),
(e)(4)(H), (e)(4)(I), (e)(5) and (e)(8); (f); and (g). Pursuant to 5
U.S.C. 552a(k)(2), information regarding the possible ineligibility of
an applicant for C-TPAT membership discovered during the vetting
process and any resulting issue papers are exempt from 5 U.S.C.
552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H),(e)(4)(I); and (f). In
addition, to the extent a record contains information from other exempt
systems of records, CBP will rely on the exemptions claimed for those
systems.
Dated: February 21, 2013.
Jonathan R. Cantor,
Acting Chief Privacy Officer, Department of Homeland Security.
[FR Doc. 2013-05674 Filed 3-12-13; 8:45 am]
BILLING CODE 9111-14-P