Privacy Act System of Records, New System of Records, 68500-68503 [2015-28056]
Download as PDF
68500
Federal Register / Vol. 80, No. 214 / Thursday, November 5, 2015 / Notices
DEPARTMENT OF COMMERCE
[Docket No. 150324295–5963–03]
Privacy Act System of Records, New
System of Records
Office of the Secretary, U.S.
Department of Commerce.
ACTION: Notice of new Privacy Act
System of Records: ‘‘COMMERCE/
DEPT–25, Access Control and Identity
Management System.’’
AGENCY:
The Department of Commerce
(Department) publishes this notice to
announce the effective date of a Privacy
Act System of Records notice entitled:
COMMERCE/DEPT–25, Access Control
and Identity Management System.
DATES: The system of records becomes
effective on November 5, 2015.
ADDRESSES: For a copy of the system of
records please mail requests to: Michael
J. Toland, Departmental Freedom of
Information and Privacy Act Officer,
Office of Privacy and Open Government,
1401 Constitution Ave. NW., Room
52010, Washington, DC 20230.
FOR FURTHER INFORMATION CONTACT:
Michael J. Toland, Department Freedom
of Information and Privacy Act Officer,
Office of Privacy and Open Government,
1401 Constitution Ave. NW., Room
52010, Washington, DC 20230.
SUPPLEMENTARY INFORMATION: On May 8,
2015, and June 29, 2015, the Department
published and requested comments on a
proposed new Privacy Act System of
Records notice entitled: COMMERCE/
DEPT–25, Access Control and Identity
Management System. The system serves
to provide electronic physical access
control, intrusion detection and video
management solutions to ensure the
safety and security of DOC assets to
include people, facilities, information
and property. The system controls
access to only those authorized as well
as aids in the monitoring, assessment
and response to security and emergency
related incidents. By this notice, the
Department is adopting the proposed
new system as final effective November
5, 2015.
SUMMARY:
jstallworth on DSK7TPTVN1PROD with NOTICES
Public Comments and Responses
Interested parties were afforded the
opportunity to participate in the
rulemaking process through the
submission of written comments on the
proposed new systems of records notice
(SORN). The Department received five
public submissions in response to the
proposed SORN. Due consideration was
given to each comment received and the
Department’s responses to those
comments are noted below.
VerDate Sep<11>2014
15:06 Nov 04, 2015
Jkt 238001
One commenter recommended adding
language under the Safeguards section
to ‘‘address how the records/system is
planned to address insider threats.’’ The
Department disagrees with this
commenter’s suggestion. The addition of
such language would potentially impact
the effectiveness of the Department’s
Insider Threat Program.
Several commenters urged the
Department to withdraw this proposed
system of records and to ‘‘refrain from
implementing any intrusive system that
needlessly monitors the movements of
its employees.’’ In support of their
suggestion, two commenters said that
‘‘The Department has not explained the
need for tracking employees’ every
physical movement when on-site,
which, in the proposed system of
records, would go so far as to include
monitoring the buttons employees strike
on their work station keyboards.’’
Further, those commenters raised
concerns about employee morale and
the security of the system. In addition,
several commenters submitted the view
that this SORN does not adequately
describe provisions or processes to
insure the safety and integrity of
employees’ sensitive personally
identifiable information.
The Department disagrees with these
comments. The system of records
covered by this SORN are subject to the
Federal Information Security
Management Act (FISMA), which
requires that controls be put in place to
protect IT systems and the information
contained within. Additionally, Privacy
Impact Assessments have been
conducted on these systems to further
define procedures for protecting
Personally Identifiable Information (PII)
and address the impact on employees’
privacy. Further, the SAFEGUARDS
section of this notice describes methods
for protecting information maintained in
this system. For example, this section
mentions that ‘‘electronic records are
password-protected or PKI-protected,
consistent with the requirements of
[FISMA] (Pub. L. 107–296), and
associated OMB policies, standards and
guidance from the National Institutes of
Standards and Technology, and the
General Services Administration, all
records are protected from unauthorized
access through appropriate
administrative, physical, and technical
safeguards.’’ It should be noted that
safeguards should be described in
general terms and to the extent they
would not compromise system security,
which serves as an added layer of
protection for employees’ data.
One commenter suggested that it was
unclear whether the Department is
attempting to either (1) create a new
PO 00000
Frm 00009
Fmt 4703
Sfmt 4703
database with all the information set
forth in the SORN, or (2) come into
compliance with statutes and
regulations concerning employee data
that the Department already has in an
existing system. The Department is
issuing this new SORN to ensure that
the Department is in compliance with
the Privacy Act, as amended, 5 U.S.C.
552a(e)(4) and (11); and OMB Circular
A–130, Appendix I, Federal Agency
Responsibilities for Maintaining
Records About Individuals for all
categories of information covered by
DEPT–25. This SORN covers some
similar categories of information as a
government-wide SORN, GOVT–7,
‘‘Personal Identity Verification Identity
Management System (PIV IDMS).’’ After
a review, the Department decided to
implement a more specific SORN with
respect to this system of records.
The same commenter further
suggested that if the SORN is bringing
the Department into compliance, then
certain personnel actions involving
employee data collected prior to
publication of the SORN are called into
question. This comment goes beyond
the scope of the content and adequacy
of this SORN.
Another commenter proposed that
implementation of the SORN will result
in a significant staffing increase to
administer and monitor the program.
The Department disagrees. Adequate
resources are available within the
Department’s Office of Security and
Office of the Chief Information Officer
to administer and monitor the program
as it relates to Access Control and
Identity Management.
One commenter suggested that
employees will have difficulty
determining what information the
Department is maintaining on them and
how to obtain the information kept. The
Department disagrees with the
commenter’s suggestion. This notice has
a section, CATEGORIES OF RECORDS
IN THE SYSTEM, which enumerates the
information collected from individuals.
Should an employee need additional
clarification on information collected
and maintained on him or her in this
system of records, the employee can file
a Privacy Act request following the
procedures outlined in the
NOTIFICATION PROCEDURE section of
this notice. With regard to obtaining
information kept, another section,
RECORDS ACCESS PROCEDURES,
provides instructions on how an
individual can request access to records
on himself or herself. It should be noted
that under the SYSTEM EXEMPTIONS
FROM CERTAIN PROVISION OF THE
ACT section, all information and
material in the record which meets the
E:\FR\FM\05NON1.SGM
05NON1
jstallworth on DSK7TPTVN1PROD with NOTICES
Federal Register / Vol. 80, No. 214 / Thursday, November 5, 2015 / Notices
criteria of the subsections listed under
parts of General Exemptions and
Specific Exceptions of the Privacy Act
are exempted from the notice, access,
and contest requirement. Employees
should refer to the aforementioned
SYSTEM EXEMPTIONS FROM
CERTAIN PROVISION OF THE ACT
section of this notice for additional
information about the requirements for
exemptions.
Another commenter asked whether an
employee will be monitored more
closely based on political or religious or
other beliefs. There is no authority for
an agency to monitor its employees
based on their political or religious
beliefs. In fact, Section 552a(e)(7) of the
Privacy Act, prohibits an agency from
maintaining a record of how an
individual exercises rights guaranteed
under the First Amendment, and there
are a number of other statutory and
policy protections in place that guard
against this type of behavior. Therefore,
this commenter’s concern is misplaced.
Other commenters expressed
concerns about how the Department
would employ the use of key-stroke
monitoring. In particular, they wanted
to know whether the information would
be used for all agency employees, even
those not suspected of committing any
violations of Federal law or Department
policies. One of the commenters
stressed that ‘‘It is a well-accepted IT
Security policy within the Federal
workspace (and also the private sector)
that key-logging programs are insidious,
and are used by cyber-criminals to mine
data surreptitiously in order to gain
unauthorized access to protected
information resources. Their presence in
the workplace is forbidden for these
reasons.’’ The Department would like to
clarify for these commenters that keystroke monitoring, which is included in
this system of records, would be used
under appropriate conditions to
evaluate anomalous behavior, including
suspected or established violations of
Federal law or Department policies.
One commenter asked if the phrase
‘‘agency, entity or persons’’ referred to
in a routine use includes data sharing
with private sector companies or
‘‘entities.’’ The Department notes that
two routine uses, numbers 12 and 13,
found at 80 FR 26356 (May 8, 2015), of
the notice contain the phrase ‘‘agency,
entity or persons.’’ Routine use number
12 deals with sharing information when
a breach occurs, while routine use 13
concerns sharing information ‘‘for the
purpose of performing audit or oversight
operations as authorized by law.’’ In
both cases, sharing of information may
occur with private sector companies or
‘‘entities’’ that have been contracted to
VerDate Sep<11>2014
15:06 Nov 04, 2015
Jkt 238001
provide the support or services
described in the aforementioned routine
uses. Information shared is kept to the
minimum necessary to accomplish the
prescribed tasks. It should be noted that
pursuant to Federal Acquisition
Regulations (FAR) Part 24, Privacy Act
clauses are required to be included with
any contracts for which a contractor is
required to be involved with the design,
development, or operation of a system
of records on individuals to accomplish
an agency function. Under one such
clause, FAR 24.104, the contractor
agrees to ‘‘comply with the Privacy Act
of 1974 (Act) and the agency rules’’
when using any system of records on
individuals in the performance of duties
specified in the work statement. The
notice also contains a routine use,
number 9, which allows records from
this system to ‘‘be disclosed to a
contractor of the Department having
need for the information in the
performance of the contract, but not
operating a system of records with the
meaning of 5 U.S.C. 552a(m).’’
The same commenter stated, ‘‘Further,
according to this new system,
Commerce could disclose information to
Agencies, entities and persons, to
prevent, minimize, or remedy ‘a risk of
harm to economic or property interests,
identity theft or fraud, or harm to the
security or integrity of the system.’’’
This commenter went on to ask whether
some interested party in a civil lawsuit
could request and gain access to data
from this system of records under any
of the notice’s routine uses. The
commenter is referring to routine use
number 12, which concerns providing
information for breach mitigation and
notification. Provision of data from this
system of records to an interested party
engaged in a civil lawsuit is not part of
this routine use.
One commenter suggested that
according to the routine use 2 listed in
the Federal Register, 80 FR 26536 (May
8, 2015), ‘‘protecting the interest of the
Department is an accepted justification
for referring relevant records, ‘as a
routine use, to the appropriate agency,
whether [F]ederal, state, local, or
foreign, charged with the responsibility
of . . . protecting the interest of the
Department.’ This seems to give the
Department a lot of leeway to protect
itself from having to disclose possible
breaches, errors, or even somewhat
embarrassing information. It also seems
to give leeway to selectively identify
which employees might be disciplined
for wrongdoing or infractions that hurt
the Department.’’ The Department
disagrees with this commenter’s
assertion. The Department has a duty to
appropriately safeguard personally
PO 00000
Frm 00010
Fmt 4703
Sfmt 4703
68501
identifiable information (PII) in its
possession and to prevent its
compromise in order to maintain the
public’s trust. Additionally, the
Department, like each Federal agency
covered under OMB Memorandum M–
07–16, ‘‘Safeguarding Against and
responding to the Breach of Personally
Identifiable Information,’’ is required to
develop a breach notification policy and
plan, and to establish a core
management team responsible for
responding to the breach of PII. To
fulfill its commitment to employees, as
well as to satisfy OMB requirements, the
Department has developed and fully
expects all staff to follow a Personally
Identifiable Information (PII) and
Business Identifiable Information, and
Privacy Act (PA) Breach Notification
Plan. There are no exceptions to
following the plan, as well as reporting
breaches. The Department has also
established a Computer Incident
Response Team (CIRT) and the
Department of Commerce PII Breach
Response Task Force for reporting and
managing breaches.
One commenter asked how the
Department would ‘‘ensure that the
usage of the new system of records will
be limited in its scope [.]’’ For instance,
the individual proposed that the new
system poses a risk of the data being
used for purposes not intended in this
notice. This commenter also suggested
that ‘‘the collection of badge in/badge
out data, time in/time out data, login/
logout data, keystroke monitoring and
logs of internet activity all point to
using this dataset to monitor, by hours
and minutes, employees’ schedules and
work patterns. These paradata are not
reliable indicators of the time
employee’s work and they should not be
used for disciplinary purposes.’’
Employees are responsible for
performing their duties at acceptable
levels and for conducting themselves in
a manner consistent with law,
regulations, and policies. If an employee
would be found to have behaved in a
way that violated these standards, the
Department will use evidence to prove
those failings by the appropriate
statutory standard. Most acts of
misconduct are proved by evidence
other than the data at issue here, but
this data may constitute evidence of
misconduct under certain
circumstances. The Department’s usage
of badge records will be undertaken in
accordance with this SORN, and there
are policies in place that ensure
evidence of employee misconduct used
in disciplinary actions is truthful,
reliable, and probative of the
misconduct that is charged.
E:\FR\FM\05NON1.SGM
05NON1
jstallworth on DSK7TPTVN1PROD with NOTICES
68502
Federal Register / Vol. 80, No. 214 / Thursday, November 5, 2015 / Notices
One commenter proposed that ‘‘to
ensure security of this system and to
protect employees, there should be a
system of records of who accesses [the]
information [maintained in this system
of records], when, for what purposes,
and how that information was
authorized.’’ The Privacy Act of 1974, as
amended, 5 U.S.C. 552a, defines
conditions under which agencies may
disclose information from records
retrieved by a person’s name or other
personal identifier. As a general rule,
the Department may not disclose a
record about such a person, except upon
a written request by, or with the prior
written consent of, that individual.
However, it is important to note that to
carry out its statutory responsibilities
the Department at times may need to
disclose information in Privacy Act
records for purposes other than those
listed in the Act. With this in mind,
under certain specific conditions, the
Privacy Act authorizes disclosure of
information in a record, whether or not
the person to whom the information
relates has requested or consented to
disclosure. For instance, the Act
authorizes disclosures under, 5 U.S.C.
552a(b), Conditions of Disclosure. The
Act also authorizes agencies, such as the
Department, to make such disclosures,
once they publish a description of what
are called the ‘‘routine uses’’ of
information in their records.
A level of protection is afforded to
individuals because the routine use
must be published in the Federal
Register, and the routine use must
include categories of users and the
purpose of the use. A routine use must
also be compatible with the purpose for
which the information was collected.
Further, another level of protection may
be evidenced through the fact that
publication of routine uses by the
Department does not require it to
disclose information in a record—it
merely permits the Department to
disclose information when deemed
appropriate or necessary by the
Department. The Department’s policy is
to carefully decide whether a disclosure
of information permitted by a routine
use is appropriate or necessary, based
on the totality of the circumstances. If
the Department believes that disclosure
of information protected by the Privacy
Act is appropriate or necessary in a
situation not covered by a routine use,
or by any other exception to the act’s
general prohibition on disclosure, it will
seek written consent for the disclosure
from the person to whom the record
pertains. Lastly, a level of protection
comes from the Privacy Act requirement
for agencies to maintain an accurate
VerDate Sep<11>2014
15:06 Nov 04, 2015
Jkt 238001
accounting of certain disclosures, except
in instances where disclosure is made to
the subject of the record. This
accounting must be maintained for a
period of five years or the life of the
record, whichever is longer, and must
be made available upon request by the
subject of the record, except for
disclosures related to law enforcement
activities. With regard to this accounting
of disclosures, according to the OMB
Privacy Act Implementation Guide,
published in the Federal Register on
July 9, 1975 (40 FR 28948–28978), ‘‘the
intent was to view the accounting of
disclosures as other than a system of
records and to conclude that an
accounting need not be maintained for
the disclosures from the accounting of
disclosures.’’
Several commenters expressed
concerns that this system of records
could create Privacy Act issues. Along
those lines, one commenter specifically
questioned the protections afforded
employees when data is released under
one or more of the exemptions
identified in notice’s the SYSTEM
EXEMPTIONS FROM CERTAIN
PROVISIONS OF THE ACT section.
While system exemptions from certain
provisions of the Privacy Act have been
identified in this notice, those
provisions are allowed by and used
following the Privacy Act; they do not
revise the Act. Further, it was
recognized in the OMB Privacy Act
Implementation Guide, published in the
Federal Register on July 9, 1975 (40 FR
28973), that ‘‘ ‘due process’ in both civil
action and criminal prosecution will
assure that individuals have a
reasonable opportunity to learn of the
existence of, and to challenge,
investigatory records, which are to be
used in legal proceedings. To the extent
that such an investigatory record is used
as a basis for denying an individual any
right, privilege, or benefit (including
employment) to which the individual
would be entitled in the absence of that
record, the individual must be granted
access to that record except to the extent
that access would reveal the identity of
a confidential source.’’
Two other commenters stated that the
notice does not provide any provisions
or processes regarding any final
disposition of employee personal
information (PII) once it has been
disclosed to other agencies, entities, or
persons. This comment goes beyond the
requirements of the Privacy Act.
More than one commenter submitted
the view that the routine uses listed in
this notice may result in matching
programs as described in 5 U.S.C.
552a(a)(8). Further, commenters added
that if the Department engages in any
PO 00000
Frm 00011
Fmt 4703
Sfmt 4703
matching program, it must follow
matching program requirements
outlined in 5 U.S.C. 552a(o). The
Department recognizes the concerns
commenters may have about matching
programs with respect to this system of
records and would like to assure those
commenters that should the Department
engage in matching programs as defined
by the Computer Matching and Privacy
Protection Act of 1988, Public Law 100–
503 (‘‘Computer Matching Act’’), it will
follow applicable procedural
requirements. The Computer Matching
Act, which amended the Privacy Act,
establishes procedural safeguards
affecting agencies’ use of Privacy Act
records when conducting certain types
of computer matching programs. These
procedures ensure the integrity, privacy,
and verification of data used in
computerized matching operations, and
the Department intends to fully comply
with these procedures should it engage
in matching programs covered by the
Computer Matching Act.
Multiple commenters requested that
the Department work in collaboration
with unions to create a more useful and
less intrusive monitoring system of
records. The Department has proposed
to the Labor Management Forum
Members, to hold a meeting(s) to
discuss the appropriate process for
access, reviewing and acting upon data
collected through an electronic process.
Those meetings should begin in early
FY 16. In the view of the same
commenters, the Department should
provide notice and allow bargaining
under Federal Services-Labor
Management Relations Statute, 5 U.S.C.
7101–7135. The issuance of this notice
by the Department is a matter of
compliance with the Privacy Act and in
no way interferes with labor’s right to
bargain over matters that relate to a
change in working conditions.
In the view of one of the commenters,
‘‘the Department failed to make any
attempt to notify its labor partners of
these proposed changes.’’ In order to
address any concerns with notification,
the Department extended the comment
period for this SORN so that labor
unions had ample time to submit
comments.
One commenter wondered if the data
expected to be obtained through
COMMERCE/DEPT–25 was worth the
enormous investment of time in labormanagement negotiation, Congressional
review, and potential negative response
from Department employees over such a
program. Through a variety of methods,
the Department already collects
employee data. This SORN ensure
employees understand the system of
records and the means through which
E:\FR\FM\05NON1.SGM
05NON1
jstallworth on DSK7TPTVN1PROD with NOTICES
Federal Register / Vol. 80, No. 214 / Thursday, November 5, 2015 / Notices
they can ensure that their data is
correct.
Several commenters conveyed their
concerns about data security regarding
this system of records, especially in
light of the recent OPM data breaches in
which millions of current and former
Federal employees’ records were
compromised. One of those commenters
put forth that while the notice listed
safeguards for the system, ‘‘it was
unclear whether the data would be
encrypted.’’ Another commenter raised
concerns about identity theft and the
potential use of data for unintended
purposes that increases risks and reduce
privacy protections, especially in the
context of data aggregated in one
database. The Department recognizes
these concerns and is applying lessons
learned from recent high-profile cyber
events. As with all Department IT
systems, the appropriate FISMA
controls, specifically those regarding
encryption, will be applied based upon
the security categorization of the system
and the data contained within the
system. The Department has taken the
potential risk related to data aggregation
into consideration with respect to this
system of records. With this in mind,
the Department has applied and will
continue to apply all appropriate
FISMA controls based upon the security
categorization of a system.
More than one commenter suggested
that the Department provided
insufficient [business] justification for
this system of records in the Purposes
section. The Department disagrees with
this suggestion. As articulated in the
PURPOSES section, this notice is
intended to ensure protection of
Department assets.
One commenter suggested that the
system of records should exclude home
telephone numbers because ‘‘the
connection of home telephone to the
purposes stated in the notice is
unexplained and unclear.’’ While this
notice is intended to let employees
know what information ‘‘may’’ be
collected and what possible use of that
information exists, the collection of a
‘‘home’’ telephone number for this
system of records is not a mandatory
requirement and as such the individuals
have the option of not providing their
home telephone number. However,
having contact information, such as
home telephone number, serves a
number of purposes, including but not
limited to Continuity of Operations
(COOP) activities, telework, and
notification of family in the event of an
emergency.
The same commenter also submitted
that ‘‘social security numbers [(SSN]
should be excluded and replaced by an
VerDate Sep<11>2014
15:06 Nov 04, 2015
Jkt 238001
employee number.’’ The commenter
said the ‘‘connection of [SSN] to the
purposes stated in the notice is
unexplained and unclear.’’ The
Department has not adopted this
suggestion, because the use of SSNs in
this system of records is essential due to
the various categories of individuals in
the system. For instance, government
contractors would not have an employee
number. SSNs are also necessary for the
Department to accurately report
employees’ earnings, so they get the
proper credit towards their social
security benefit. Even with the addition
of an employee number, the Department
would still need to capture the social
security number for the reasons stated
above.
The Department has considered this
comment and to help clarify the
meaning of cellular numbers, the term
‘‘government and personal’’ will be
added before ‘‘cellular telephone
number’’ under the CATEGORIES OF
RECORDS IN THE SYSTEM section. It
should be noted that the Department
collects both personal and government
cell numbers, because in many cases
employees have dropped land line
service, so their cell number is their
personal home number. As previously
stated, having contact information, such
as a telephone number, serves a number
of purposes, including but not limited to
COOP activities, telework, and
notification of family in the event of an
emergency.
One commenter suggested that ‘‘if a
security problem does exist within the
Commerce Department and its various
Agencies that requires [the] level of
attention [identified in this system],
consultation with authoritative IT
Security professionals on implementing
a best-practices solution would seem to
be a simpler, more cost-effective, and
less intrusive alternative.’’ The
Department appreciates this
commenter’s view, and it regularly
consults with other Government
agencies and industry regarding bestpractices for the identification,
mitigation, and response to cyber
related issues and concerns with a view
towards improving Departmental
capabilities. The Department
proactively places emphasis on all
phases of the NIST Cyber Security
Framework—Identify, Protect, Detect,
Respond, and Recover.
More than one commenter maintained
that the descriptors in this notice need
to be defined in more detail. For
instance, some suggested that more
information should be provided for the
Purposes, Retrievability, and Record
Sources sections. One of the
commenters added that more clarity was
PO 00000
Frm 00012
Fmt 4703
Sfmt 9990
68503
needed for the RETRIEVABILITY
section, specifically for the statement
‘‘Information may be retrieved . . . by
automated search based on extant
indices and automated capabilities
. . .’’ While the Department disagrees
with the commenters that the
descriptors in this notice need to be
defined in more detail within the notice,
it does agree that it would be beneficial
to create a document explaining SORN
descriptors. As a way to provide
explanations about the different sections
of a SORN, the Department has
produced a fact sheet about SORN
descriptors, which will be made
available on its public Web site under
the Office of Privacy and Open
Government Web page at https://
www.osec.doc.gov/opog/.
One of the same commenters
suggested that a plain language
document should be provided that
discusses this notice and its relationship
to the Privacy Act. The Department
agrees with the commenter that is
would be beneficial to create a
document explaining this notice and its
relationship to the Privacy Act. As a
start to providing the type of
information requested, the Department
has produced a fact sheet about SORN
COMMERCE/DEPT–25, which will be
made available on its public Web site
under the Office of Privacy and Open
Government Web page at https://
www.osec.doc.gov/opog/.
In the view of another commenter,
this notice did not provide an indication
of ‘‘how long information is retained
and how that duration relates to the
proposed uses.’’ The Department notes
that every SORN, including this one,
contains a RETENTION AND
DISPOSAL section, which describes the
policies and guidelines in place with
regard to the retention and destruction
of records in this system.
Dated: October 29, 2015.
Michael J. Toland,
Department of Commerce, Freedom of
Information and Privacy Act Officer.
For the reasons stated in the
preamble, the Department of Commerce
amends the Privacy Act System of
Records: ‘‘COMMERCE/DEPT–25,
Access Control and Identity
Management System,’’ with the minor
change as follows:
D To help clarify the meaning of
cellular numbers under the
CATEGORIES OF RECORDS IN THE
SYSTEM section, the term ‘‘government
and personal’’ will be added before the
language ‘‘cellular telephone number’’.
[FR Doc. 2015–28056 Filed 11–3–15; 11:15 am]
BILLING CODE 3510–BX–P
E:\FR\FM\05NON1.SGM
05NON1
Agencies
[Federal Register Volume 80, Number 214 (Thursday, November 5, 2015)]
[Notices]
[Pages 68500-68503]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2015-28056]
[[Page 68500]]
-----------------------------------------------------------------------
DEPARTMENT OF COMMERCE
[Docket No. 150324295-5963-03]
Privacy Act System of Records, New System of Records
AGENCY: Office of the Secretary, U.S. Department of Commerce.
ACTION: Notice of new Privacy Act System of Records: ``COMMERCE/DEPT-
25, Access Control and Identity Management System.''
-----------------------------------------------------------------------
SUMMARY: The Department of Commerce (Department) publishes this notice
to announce the effective date of a Privacy Act System of Records
notice entitled: COMMERCE/DEPT-25, Access Control and Identity
Management System.
DATES: The system of records becomes effective on November 5, 2015.
ADDRESSES: For a copy of the system of records please mail requests to:
Michael J. Toland, Departmental Freedom of Information and Privacy Act
Officer, Office of Privacy and Open Government, 1401 Constitution Ave.
NW., Room 52010, Washington, DC 20230.
FOR FURTHER INFORMATION CONTACT: Michael J. Toland, Department Freedom
of Information and Privacy Act Officer, Office of Privacy and Open
Government, 1401 Constitution Ave. NW., Room 52010, Washington, DC
20230.
SUPPLEMENTARY INFORMATION: On May 8, 2015, and June 29, 2015, the
Department published and requested comments on a proposed new Privacy
Act System of Records notice entitled: COMMERCE/DEPT-25, Access Control
and Identity Management System. The system serves to provide electronic
physical access control, intrusion detection and video management
solutions to ensure the safety and security of DOC assets to include
people, facilities, information and property. The system controls
access to only those authorized as well as aids in the monitoring,
assessment and response to security and emergency related incidents. By
this notice, the Department is adopting the proposed new system as
final effective November 5, 2015.
Public Comments and Responses
Interested parties were afforded the opportunity to participate in
the rulemaking process through the submission of written comments on
the proposed new systems of records notice (SORN). The Department
received five public submissions in response to the proposed SORN. Due
consideration was given to each comment received and the Department's
responses to those comments are noted below.
One commenter recommended adding language under the Safeguards
section to ``address how the records/system is planned to address
insider threats.'' The Department disagrees with this commenter's
suggestion. The addition of such language would potentially impact the
effectiveness of the Department's Insider Threat Program.
Several commenters urged the Department to withdraw this proposed
system of records and to ``refrain from implementing any intrusive
system that needlessly monitors the movements of its employees.'' In
support of their suggestion, two commenters said that ``The Department
has not explained the need for tracking employees' every physical
movement when on-site, which, in the proposed system of records, would
go so far as to include monitoring the buttons employees strike on
their work station keyboards.'' Further, those commenters raised
concerns about employee morale and the security of the system. In
addition, several commenters submitted the view that this SORN does not
adequately describe provisions or processes to insure the safety and
integrity of employees' sensitive personally identifiable information.
The Department disagrees with these comments. The system of records
covered by this SORN are subject to the Federal Information Security
Management Act (FISMA), which requires that controls be put in place to
protect IT systems and the information contained within. Additionally,
Privacy Impact Assessments have been conducted on these systems to
further define procedures for protecting Personally Identifiable
Information (PII) and address the impact on employees' privacy.
Further, the SAFEGUARDS section of this notice describes methods for
protecting information maintained in this system. For example, this
section mentions that ``electronic records are password-protected or
PKI-protected, consistent with the requirements of [FISMA] (Pub. L.
107-296), and associated OMB policies, standards and guidance from the
National Institutes of Standards and Technology, and the General
Services Administration, all records are protected from unauthorized
access through appropriate administrative, physical, and technical
safeguards.'' It should be noted that safeguards should be described in
general terms and to the extent they would not compromise system
security, which serves as an added layer of protection for employees'
data.
One commenter suggested that it was unclear whether the Department
is attempting to either (1) create a new database with all the
information set forth in the SORN, or (2) come into compliance with
statutes and regulations concerning employee data that the Department
already has in an existing system. The Department is issuing this new
SORN to ensure that the Department is in compliance with the Privacy
Act, as amended, 5 U.S.C. 552a(e)(4) and (11); and OMB Circular A-130,
Appendix I, Federal Agency Responsibilities for Maintaining Records
About Individuals for all categories of information covered by DEPT-25.
This SORN covers some similar categories of information as a
government-wide SORN, GOVT-7, ``Personal Identity Verification Identity
Management System (PIV IDMS).'' After a review, the Department decided
to implement a more specific SORN with respect to this system of
records.
The same commenter further suggested that if the SORN is bringing
the Department into compliance, then certain personnel actions
involving employee data collected prior to publication of the SORN are
called into question. This comment goes beyond the scope of the content
and adequacy of this SORN.
Another commenter proposed that implementation of the SORN will
result in a significant staffing increase to administer and monitor the
program. The Department disagrees. Adequate resources are available
within the Department's Office of Security and Office of the Chief
Information Officer to administer and monitor the program as it relates
to Access Control and Identity Management.
One commenter suggested that employees will have difficulty
determining what information the Department is maintaining on them and
how to obtain the information kept. The Department disagrees with the
commenter's suggestion. This notice has a section, CATEGORIES OF
RECORDS IN THE SYSTEM, which enumerates the information collected from
individuals. Should an employee need additional clarification on
information collected and maintained on him or her in this system of
records, the employee can file a Privacy Act request following the
procedures outlined in the NOTIFICATION PROCEDURE section of this
notice. With regard to obtaining information kept, another section,
RECORDS ACCESS PROCEDURES, provides instructions on how an individual
can request access to records on himself or herself. It should be noted
that under the SYSTEM EXEMPTIONS FROM CERTAIN PROVISION OF THE ACT
section, all information and material in the record which meets the
[[Page 68501]]
criteria of the subsections listed under parts of General Exemptions
and Specific Exceptions of the Privacy Act are exempted from the
notice, access, and contest requirement. Employees should refer to the
aforementioned SYSTEM EXEMPTIONS FROM CERTAIN PROVISION OF THE ACT
section of this notice for additional information about the
requirements for exemptions.
Another commenter asked whether an employee will be monitored more
closely based on political or religious or other beliefs. There is no
authority for an agency to monitor its employees based on their
political or religious beliefs. In fact, Section 552a(e)(7) of the
Privacy Act, prohibits an agency from maintaining a record of how an
individual exercises rights guaranteed under the First Amendment, and
there are a number of other statutory and policy protections in place
that guard against this type of behavior. Therefore, this commenter's
concern is misplaced.
Other commenters expressed concerns about how the Department would
employ the use of key-stroke monitoring. In particular, they wanted to
know whether the information would be used for all agency employees,
even those not suspected of committing any violations of Federal law or
Department policies. One of the commenters stressed that ``It is a
well-accepted IT Security policy within the Federal workspace (and also
the private sector) that key-logging programs are insidious, and are
used by cyber-criminals to mine data surreptitiously in order to gain
unauthorized access to protected information resources. Their presence
in the workplace is forbidden for these reasons.'' The Department would
like to clarify for these commenters that key-stroke monitoring, which
is included in this system of records, would be used under appropriate
conditions to evaluate anomalous behavior, including suspected or
established violations of Federal law or Department policies.
One commenter asked if the phrase ``agency, entity or persons''
referred to in a routine use includes data sharing with private sector
companies or ``entities.'' The Department notes that two routine uses,
numbers 12 and 13, found at 80 FR 26356 (May 8, 2015), of the notice
contain the phrase ``agency, entity or persons.'' Routine use number 12
deals with sharing information when a breach occurs, while routine use
13 concerns sharing information ``for the purpose of performing audit
or oversight operations as authorized by law.'' In both cases, sharing
of information may occur with private sector companies or ``entities''
that have been contracted to provide the support or services described
in the aforementioned routine uses. Information shared is kept to the
minimum necessary to accomplish the prescribed tasks. It should be
noted that pursuant to Federal Acquisition Regulations (FAR) Part 24,
Privacy Act clauses are required to be included with any contracts for
which a contractor is required to be involved with the design,
development, or operation of a system of records on individuals to
accomplish an agency function. Under one such clause, FAR 24.104, the
contractor agrees to ``comply with the Privacy Act of 1974 (Act) and
the agency rules'' when using any system of records on individuals in
the performance of duties specified in the work statement. The notice
also contains a routine use, number 9, which allows records from this
system to ``be disclosed to a contractor of the Department having need
for the information in the performance of the contract, but not
operating a system of records with the meaning of 5 U.S.C. 552a(m).''
The same commenter stated, ``Further, according to this new system,
Commerce could disclose information to Agencies, entities and persons,
to prevent, minimize, or remedy `a risk of harm to economic or property
interests, identity theft or fraud, or harm to the security or
integrity of the system.''' This commenter went on to ask whether some
interested party in a civil lawsuit could request and gain access to
data from this system of records under any of the notice's routine
uses. The commenter is referring to routine use number 12, which
concerns providing information for breach mitigation and notification.
Provision of data from this system of records to an interested party
engaged in a civil lawsuit is not part of this routine use.
One commenter suggested that according to the routine use 2 listed
in the Federal Register, 80 FR 26536 (May 8, 2015), ``protecting the
interest of the Department is an accepted justification for referring
relevant records, `as a routine use, to the appropriate agency, whether
[F]ederal, state, local, or foreign, charged with the responsibility of
. . . protecting the interest of the Department.' This seems to give
the Department a lot of leeway to protect itself from having to
disclose possible breaches, errors, or even somewhat embarrassing
information. It also seems to give leeway to selectively identify which
employees might be disciplined for wrongdoing or infractions that hurt
the Department.'' The Department disagrees with this commenter's
assertion. The Department has a duty to appropriately safeguard
personally identifiable information (PII) in its possession and to
prevent its compromise in order to maintain the public's trust.
Additionally, the Department, like each Federal agency covered under
OMB Memorandum M-07-16, ``Safeguarding Against and responding to the
Breach of Personally Identifiable Information,'' is required to develop
a breach notification policy and plan, and to establish a core
management team responsible for responding to the breach of PII. To
fulfill its commitment to employees, as well as to satisfy OMB
requirements, the Department has developed and fully expects all staff
to follow a Personally Identifiable Information (PII) and Business
Identifiable Information, and Privacy Act (PA) Breach Notification
Plan. There are no exceptions to following the plan, as well as
reporting breaches. The Department has also established a Computer
Incident Response Team (CIRT) and the Department of Commerce PII Breach
Response Task Force for reporting and managing breaches.
One commenter asked how the Department would ``ensure that the
usage of the new system of records will be limited in its scope [.]''
For instance, the individual proposed that the new system poses a risk
of the data being used for purposes not intended in this notice. This
commenter also suggested that ``the collection of badge in/badge out
data, time in/time out data, login/logout data, keystroke monitoring
and logs of internet activity all point to using this dataset to
monitor, by hours and minutes, employees' schedules and work patterns.
These paradata are not reliable indicators of the time employee's work
and they should not be used for disciplinary purposes.'' Employees are
responsible for performing their duties at acceptable levels and for
conducting themselves in a manner consistent with law, regulations, and
policies. If an employee would be found to have behaved in a way that
violated these standards, the Department will use evidence to prove
those failings by the appropriate statutory standard. Most acts of
misconduct are proved by evidence other than the data at issue here,
but this data may constitute evidence of misconduct under certain
circumstances. The Department's usage of badge records will be
undertaken in accordance with this SORN, and there are policies in
place that ensure evidence of employee misconduct used in disciplinary
actions is truthful, reliable, and probative of the misconduct that is
charged.
[[Page 68502]]
One commenter proposed that ``to ensure security of this system and
to protect employees, there should be a system of records of who
accesses [the] information [maintained in this system of records],
when, for what purposes, and how that information was authorized.'' The
Privacy Act of 1974, as amended, 5 U.S.C. 552a, defines conditions
under which agencies may disclose information from records retrieved by
a person's name or other personal identifier. As a general rule, the
Department may not disclose a record about such a person, except upon a
written request by, or with the prior written consent of, that
individual. However, it is important to note that to carry out its
statutory responsibilities the Department at times may need to disclose
information in Privacy Act records for purposes other than those listed
in the Act. With this in mind, under certain specific conditions, the
Privacy Act authorizes disclosure of information in a record, whether
or not the person to whom the information relates has requested or
consented to disclosure. For instance, the Act authorizes disclosures
under, 5 U.S.C. 552a(b), Conditions of Disclosure. The Act also
authorizes agencies, such as the Department, to make such disclosures,
once they publish a description of what are called the ``routine uses''
of information in their records.
A level of protection is afforded to individuals because the
routine use must be published in the Federal Register, and the routine
use must include categories of users and the purpose of the use. A
routine use must also be compatible with the purpose for which the
information was collected. Further, another level of protection may be
evidenced through the fact that publication of routine uses by the
Department does not require it to disclose information in a record--it
merely permits the Department to disclose information when deemed
appropriate or necessary by the Department. The Department's policy is
to carefully decide whether a disclosure of information permitted by a
routine use is appropriate or necessary, based on the totality of the
circumstances. If the Department believes that disclosure of
information protected by the Privacy Act is appropriate or necessary in
a situation not covered by a routine use, or by any other exception to
the act's general prohibition on disclosure, it will seek written
consent for the disclosure from the person to whom the record pertains.
Lastly, a level of protection comes from the Privacy Act requirement
for agencies to maintain an accurate accounting of certain disclosures,
except in instances where disclosure is made to the subject of the
record. This accounting must be maintained for a period of five years
or the life of the record, whichever is longer, and must be made
available upon request by the subject of the record, except for
disclosures related to law enforcement activities. With regard to this
accounting of disclosures, according to the OMB Privacy Act
Implementation Guide, published in the Federal Register on July 9, 1975
(40 FR 28948-28978), ``the intent was to view the accounting of
disclosures as other than a system of records and to conclude that an
accounting need not be maintained for the disclosures from the
accounting of disclosures.''
Several commenters expressed concerns that this system of records
could create Privacy Act issues. Along those lines, one commenter
specifically questioned the protections afforded employees when data is
released under one or more of the exemptions identified in notice's the
SYSTEM EXEMPTIONS FROM CERTAIN PROVISIONS OF THE ACT section. While
system exemptions from certain provisions of the Privacy Act have been
identified in this notice, those provisions are allowed by and used
following the Privacy Act; they do not revise the Act. Further, it was
recognized in the OMB Privacy Act Implementation Guide, published in
the Federal Register on July 9, 1975 (40 FR 28973), that `` `due
process' in both civil action and criminal prosecution will assure that
individuals have a reasonable opportunity to learn of the existence of,
and to challenge, investigatory records, which are to be used in legal
proceedings. To the extent that such an investigatory record is used as
a basis for denying an individual any right, privilege, or benefit
(including employment) to which the individual would be entitled in the
absence of that record, the individual must be granted access to that
record except to the extent that access would reveal the identity of a
confidential source.''
Two other commenters stated that the notice does not provide any
provisions or processes regarding any final disposition of employee
personal information (PII) once it has been disclosed to other
agencies, entities, or persons. This comment goes beyond the
requirements of the Privacy Act.
More than one commenter submitted the view that the routine uses
listed in this notice may result in matching programs as described in 5
U.S.C. 552a(a)(8). Further, commenters added that if the Department
engages in any matching program, it must follow matching program
requirements outlined in 5 U.S.C. 552a(o). The Department recognizes
the concerns commenters may have about matching programs with respect
to this system of records and would like to assure those commenters
that should the Department engage in matching programs as defined by
the Computer Matching and Privacy Protection Act of 1988, Public Law
100-503 (``Computer Matching Act''), it will follow applicable
procedural requirements. The Computer Matching Act, which amended the
Privacy Act, establishes procedural safeguards affecting agencies' use
of Privacy Act records when conducting certain types of computer
matching programs. These procedures ensure the integrity, privacy, and
verification of data used in computerized matching operations, and the
Department intends to fully comply with these procedures should it
engage in matching programs covered by the Computer Matching Act.
Multiple commenters requested that the Department work in
collaboration with unions to create a more useful and less intrusive
monitoring system of records. The Department has proposed to the Labor
Management Forum Members, to hold a meeting(s) to discuss the
appropriate process for access, reviewing and acting upon data
collected through an electronic process. Those meetings should begin in
early FY 16. In the view of the same commenters, the Department should
provide notice and allow bargaining under Federal Services-Labor
Management Relations Statute, 5 U.S.C. 7101-7135. The issuance of this
notice by the Department is a matter of compliance with the Privacy Act
and in no way interferes with labor's right to bargain over matters
that relate to a change in working conditions.
In the view of one of the commenters, ``the Department failed to
make any attempt to notify its labor partners of these proposed
changes.'' In order to address any concerns with notification, the
Department extended the comment period for this SORN so that labor
unions had ample time to submit comments.
One commenter wondered if the data expected to be obtained through
COMMERCE/DEPT-25 was worth the enormous investment of time in labor-
management negotiation, Congressional review, and potential negative
response from Department employees over such a program. Through a
variety of methods, the Department already collects employee data. This
SORN ensure employees understand the system of records and the means
through which
[[Page 68503]]
they can ensure that their data is correct.
Several commenters conveyed their concerns about data security
regarding this system of records, especially in light of the recent OPM
data breaches in which millions of current and former Federal
employees' records were compromised. One of those commenters put forth
that while the notice listed safeguards for the system, ``it was
unclear whether the data would be encrypted.'' Another commenter raised
concerns about identity theft and the potential use of data for
unintended purposes that increases risks and reduce privacy
protections, especially in the context of data aggregated in one
database. The Department recognizes these concerns and is applying
lessons learned from recent high-profile cyber events. As with all
Department IT systems, the appropriate FISMA controls, specifically
those regarding encryption, will be applied based upon the security
categorization of the system and the data contained within the system.
The Department has taken the potential risk related to data aggregation
into consideration with respect to this system of records. With this in
mind, the Department has applied and will continue to apply all
appropriate FISMA controls based upon the security categorization of a
system.
More than one commenter suggested that the Department provided
insufficient [business] justification for this system of records in the
Purposes section. The Department disagrees with this suggestion. As
articulated in the PURPOSES section, this notice is intended to ensure
protection of Department assets.
One commenter suggested that the system of records should exclude
home telephone numbers because ``the connection of home telephone to
the purposes stated in the notice is unexplained and unclear.'' While
this notice is intended to let employees know what information ``may''
be collected and what possible use of that information exists, the
collection of a ``home'' telephone number for this system of records is
not a mandatory requirement and as such the individuals have the option
of not providing their home telephone number. However, having contact
information, such as home telephone number, serves a number of
purposes, including but not limited to Continuity of Operations (COOP)
activities, telework, and notification of family in the event of an
emergency.
The same commenter also submitted that ``social security numbers
[(SSN] should be excluded and replaced by an employee number.'' The
commenter said the ``connection of [SSN] to the purposes stated in the
notice is unexplained and unclear.'' The Department has not adopted
this suggestion, because the use of SSNs in this system of records is
essential due to the various categories of individuals in the system.
For instance, government contractors would not have an employee number.
SSNs are also necessary for the Department to accurately report
employees' earnings, so they get the proper credit towards their social
security benefit. Even with the addition of an employee number, the
Department would still need to capture the social security number for
the reasons stated above.
The Department has considered this comment and to help clarify the
meaning of cellular numbers, the term ``government and personal'' will
be added before ``cellular telephone number'' under the CATEGORIES OF
RECORDS IN THE SYSTEM section. It should be noted that the Department
collects both personal and government cell numbers, because in many
cases employees have dropped land line service, so their cell number is
their personal home number. As previously stated, having contact
information, such as a telephone number, serves a number of purposes,
including but not limited to COOP activities, telework, and
notification of family in the event of an emergency.
One commenter suggested that ``if a security problem does exist
within the Commerce Department and its various Agencies that requires
[the] level of attention [identified in this system], consultation with
authoritative IT Security professionals on implementing a best-
practices solution would seem to be a simpler, more cost-effective, and
less intrusive alternative.'' The Department appreciates this
commenter's view, and it regularly consults with other Government
agencies and industry regarding best-practices for the identification,
mitigation, and response to cyber related issues and concerns with a
view towards improving Departmental capabilities. The Department
proactively places emphasis on all phases of the NIST Cyber Security
Framework--Identify, Protect, Detect, Respond, and Recover.
More than one commenter maintained that the descriptors in this
notice need to be defined in more detail. For instance, some suggested
that more information should be provided for the Purposes,
Retrievability, and Record Sources sections. One of the commenters
added that more clarity was needed for the RETRIEVABILITY section,
specifically for the statement ``Information may be retrieved . . . by
automated search based on extant indices and automated capabilities . .
.'' While the Department disagrees with the commenters that the
descriptors in this notice need to be defined in more detail within the
notice, it does agree that it would be beneficial to create a document
explaining SORN descriptors. As a way to provide explanations about the
different sections of a SORN, the Department has produced a fact sheet
about SORN descriptors, which will be made available on its public Web
site under the Office of Privacy and Open Government Web page at https://www.osec.doc.gov/opog/.
One of the same commenters suggested that a plain language document
should be provided that discusses this notice and its relationship to
the Privacy Act. The Department agrees with the commenter that is would
be beneficial to create a document explaining this notice and its
relationship to the Privacy Act. As a start to providing the type of
information requested, the Department has produced a fact sheet about
SORN COMMERCE/DEPT-25, which will be made available on its public Web
site under the Office of Privacy and Open Government Web page at https://www.osec.doc.gov/opog/.
In the view of another commenter, this notice did not provide an
indication of ``how long information is retained and how that duration
relates to the proposed uses.'' The Department notes that every SORN,
including this one, contains a RETENTION AND DISPOSAL section, which
describes the policies and guidelines in place with regard to the
retention and destruction of records in this system.
Dated: October 29, 2015.
Michael J. Toland,
Department of Commerce, Freedom of Information and Privacy Act Officer.
For the reasons stated in the preamble, the Department of Commerce
amends the Privacy Act System of Records: ``COMMERCE/DEPT-25, Access
Control and Identity Management System,'' with the minor change as
follows:
[ssquf] To help clarify the meaning of cellular numbers under the
CATEGORIES OF RECORDS IN THE SYSTEM section, the term ``government and
personal'' will be added before the language ``cellular telephone
number''.
[FR Doc. 2015-28056 Filed 11-3-15; 11:15 am]
BILLING CODE 3510-BX-P