Privacy Act; System of Records: Security Records, State-36., 77691-77694 [2015-31527]
Download as PDF
Federal Register / Vol. 80, No. 240 / Tuesday, December 15, 2015 / Notices
Paper Comments
• Send paper comments in triplicate
to Brent J. Fields, Secretary, Securities
and Exchange Commission, 100 F Street
NE., Washington, DC 20549–1090.
All submissions should refer to File
Number SR–NYSE–2015–62. This file
number should be included on the
subject line if email is used. To help the
Commission process and review your
comments more efficiently, please use
only one method. The Commission will
post all comments on the Commission’s
Internet Web site (https://www.sec.gov/
rules/sro.shtml). Copies of the
submission, all subsequent
amendments, all written statements
with respect to the proposed rule
change that are filed with the
Commission, and all written
communications relating to the
proposed rule change between the
Commission and any person, other than
those that may be withheld from the
public in accordance with the
provisions of 5 U.S.C. 552, will be
available for Web site viewing and
printing in the Commission’s Public
Reference Room, 100 F Street NE.,
Washington, DC 20549, on official
business days between the hours of
10:00 a.m. and 3:00 p.m. Copies of the
filing will also be available for
inspection and copying at the NYSE’s
principal office and on its Internet Web
site at www.nyse.com. All comments
received will be posted without change;
the Commission does not edit personal
identifying information from
submissions. You should submit only
information that you wish to make
available publicly. All submissions
should refer to File Number SR–NYSE–
2015–62 and should be submitted on or
before January 5, 2016.
For the Commission, by the Division of
Trading and Markets, pursuant to delegated
authority.13
Robert W. Errett,
Deputy Secretary.
[FR Doc. 2015–31439 Filed 12–14–15; 8:45 am]
BILLING CODE 8011–01–P
DEPARTMENT OF STATE
asabaliauskas on DSK5VPTVN1PROD with NOTICES
[Public Notice: 9382]
In the Matter of the Designation of
Emrah Erdogan aka Salahuddin alKurdi as a Specially Designated Global
Terrorist Pursuant to Section 1(b) of
Executive Order 13224, as Amended
Acting under the authority of and in
accordance with section 1(b) of E.O.
13 17
CFR 200.30–3(a)(12).
VerDate Sep<11>2014
17:08 Dec 14, 2015
Jkt 238001
13224 of September 23, 2001, as
amended by E.O. 13268 of July 2, 2002,
and E.O. 13284 of January 23, 2003, I
hereby determine that the individual
known as Emrah Erdogan, also known
as Salahuddin al-Kurdi committed, or
poses a significant risk of committing,
acts of terrorism that threaten the
security of U.S. nationals or the national
security, foreign policy, or economy of
the United States.
Consistent with the determination in
section 10 of Executive Order 13224 that
‘‘prior notice to persons determined to
be subject to the Order who might have
a constitutional presence in the United
States would render ineffectual the
blocking and other measures authorized
in the Order because of the ability to
transfer funds instantaneously,’’ I
determine that no prior notice needs to
be provided to any person subject to this
determination who might have a
constitutional presence in the United
States, because to do so would render
ineffectual the measures authorized in
the Order.
This notice shall be published in the
Federal Register.
John F. Kerry,
Secretary of State.
[FR Doc. 2015–31557 Filed 12–14–15; 8:45 am]
77691
current system will retain the name
‘‘Security Records’’ (previously
published at 78 FR 27276, May 9, 2013).
The records maintained in State–36,
Security Records, capture data related to
incidents and threats affecting U.S.
Government personnel, U.S.
Government information, or U.S.
Government facilities world-wide, for a
variety of legal purposes including
federal and state law enforcement and
counterterrorism purposes. The
information maintained in Security
Records may be used to determine
general suitability for employment or
retention in employment, to grant a
contract or issue a license, grant, or
security clearance. The proposed system
will include modifications and
administrative updates to the following
sections: Categories of individuals and
Categories of records. Additionally,
records regarding the Office of Foreign
Missions were removed and included in
a new SORN to provide greater
transparency of their records.
The Department’s report was filed
with the Office of Management and
Budget. The amended system
description, ‘‘Security Records, State–
36,’’ will read as set forth below.
BILLING CODE 4710–AD–P
Joyce A. Barr,
Assistant Secretary for Administration, U.S.
Department of State.
DEPARTMENT OF STATE
STATE–36
[Public Notice: 9381]
SYSTEM NAME:
Privacy Act; System of Records:
Security Records, State–36.
Notice is hereby given that
the Department of State proposes to
amend an existing system of records,
Security Records, State–36, pursuant to
the provisions of the Privacy Act of
1974, as amended (5 U.S.C. 552a) and
Office of Management and Budget
Circular No. A–130, Appendix I.
DATES: This system of records will be
effective on January 25, 2016, unless we
receive comments that will result in a
contrary determination.
ADDRESSES: Any persons interested in
commenting on the amended system of
records may do so by writing to the
Director; Office of Information Programs
and Services, A/GIS/IPS; Department of
State, SA–2; 515 22nd Street NW.,
Washington, DC 20522–8100.
FOR FURTHER INFORMATION CONTACT: John
Hackett, Director; Office of Information
Programs and Services, A/GIS/IPS;
Department of State, SA–2; 515 22nd
Street NW., Washington, DC 20522–
8100, or at Privacy@state.gov.
SUPPLEMENTARY INFORMATION: The
Department of State proposes that the
SUMMARY:
PO 00000
Frm 00092
Fmt 4703
Sfmt 4703
Security Records.
SECURITY CLASSIFICATION:
Unclassified and Classified.
SYSTEM LOCATION:
Department of State and its annexes,
Bureau of Diplomatic Security, and
various field and regional offices
throughout the United States, and
abroad at some U.S. Embassies, U.S.
Consulates General, and U.S.
Consulates.
CATEGORIES OF INDIVIDUALS COVERED BY THE
SYSTEM:
Present and former employees of the
Department of State; applicants for
Department employment who are
presently being investigated for security
clearance; contractors working for the
Department; interns and detailees to the
Department; employees of other federal
agencies who have accounts on our
Department networks; individuals
requiring access to the official
Department of State premises who have
undergone or are undergoing security
clearance; some passport and visa
applicants concerning matters of
adjudication; individuals and
E:\FR\FM\15DEN1.SGM
15DEN1
77692
Federal Register / Vol. 80, No. 240 / Tuesday, December 15, 2015 / Notices
institutions identified in passport and
visa crime investigations; individuals
involved in unauthorized access to
classified information; prospective alien
spouses of U.S. citizen employees of the
Department of State; individuals or
groups whose activities have a potential
bearing on the security of Departmental
or Foreign Service operations,
domestically or abroad, including those
involved in criminal or terrorist activity;
individuals and organizations who
apply to be constituents in the exchange
of security information from publicprivate partnerships; and visitors to the
Department of State main building
(Harry S Truman Building), to its
domestic annexes, field offices,
missions, and to the U.S. Embassies and
U.S. Consulates and missions overseas.
Also covered are individuals issued
security or cybersecurity violations or
infractions; litigants in civil suits and
criminal prosecutions of interest to the
Bureau of Diplomatic Security;
individuals who have Department
building passes; individuals using
Department devices or networks;
uniformed security officers; individuals
named in congressional inquiries to the
Bureau of Diplomatic Security;
individuals subject to investigations
conducted abroad on behalf of other
federal agencies; and individuals whose
activities other agencies believe may
have a bearing on U.S. foreign policy
interests.
asabaliauskas on DSK5VPTVN1PROD with NOTICES
CATEGORIES OF RECORDS IN THE SYSTEM:
Incident and investigative material
relating to any category of individual
described above, including case files
containing items such as name, date and
place of birth, citizenship, telephone
numbers, addresses, physical
description (including height, weight,
body type, hair, clothing, gender,
ethnicity, race, and other general and
distinguishing physical features), accent
description, identification media (such
as passport, residency, or driver’s
license numbers), vehicle registration
and vehicle information; email address,
family identifiers (such as names of
relatives and biographic information),
employer identifiers, applications for
passports and employment,
photographs, biometric data (to include
fingerprints, and deoxyribonucleic acid
(DNA) information), birth certificates,
credit checks, security evaluations and
clearances, other agency reports and
informant reports; legal case pleadings
and files; evidence collected during
investigations; polygraphs; network
audit records, network use records,
email, chat conversations, and text
messages sent using Department devices
or networks; social media account
VerDate Sep<11>2014
17:08 Dec 14, 2015
Jkt 238001
findings for individuals undergoing
security investigations; security
violation files; training reports; weapons
assignment database; firing proficiency
and other security-related testing scores;
availability for special protective
assignments; language proficiency
scores; intelligence reports;
counterintelligence material;
counterterrorism material; internal
Departmental memoranda; internal
personnel, fiscal, and other
administrative documents; emergency
contact information for Department
employees and contractors; Social
Security number; specific areas and
times of authorized accessibility; escort
authority; status and level of security
clearance; issuing agency and issue
date; and for all individuals: Date and
times of building entrance and exit.
For visitors, information collected can
include name, date of birth, citizenship,
identification type, identification
number, temporary badge number,
host’s name, office symbol, room
number, and telephone number. For
public-private partnerships to exchange
security information, information
collected can include name, address,
telephone number and email address.
Security files contain information
needed to provide protective services
for the Secretary of State and visiting
and resident foreign officials and
associated foreign official facilities, and
to protect the Department’s official
facilities and information assets.
Security files contain documents and
reports furnished to the Department by
other agencies concerning individuals
whose activities the other agencies
believe may have a bearing on U.S.
foreign policy interests.
AUTHORITY FOR MAINTENANCE OF THE SYSTEM:
(a) 5 U.S.C. 301 (Government
Organization and Employees)
(Departmental regulations); (b) 5 U.S.C.
Chapter 73 (Suitability, Security, and
Conduct); (c) 5 U.S.C. 7531–33 (National
Security); (d) 8 U.S.C. 1104
(Enforcement of immigration and
nationality laws); (e) 18 U.S.C. 111
(Crimes and Criminal Procedures)
(Assaulting, resisting, or impeding
certain officers or employees); (f) 18
U.S.C. 112 (Protection of foreign
officials, official guests, and
internationally protected persons); (g)
18 U.S.C. 201 (Bribery of public officials
and witnesses); (h) 18 U.S.C.1030
(Fraud and related activity in
connection with computers); (i) 18
U.S.C. 1114 (Protection of officers and
employees of the U.S.); (j) 18 U.S.C.
1116 (Murder or manslaughter of foreign
officials, official guests, or
internationally protected persons); (k)
PO 00000
Frm 00093
Fmt 4703
Sfmt 4703
18 U.S.C. 1117 (Conspiracy to murder);
(l) 18 U.S.C. 1541–1546 (Issuance
without authority, false statement in
application and use of passport, forgery
or false use of passport, misuse of
passport, safe conduct violation, fraud
and misuse of visas, permits, and other
documents); (m) 22 U.S.C. 211a (Foreign
Relations and Intercourse) (Authority to
grant, issue, and verify passports); (n) 22
U.S.C. 842, 846, 911 (Duties of Officers
and Employees and Foreign Service
Officers) (Repealed, but applicable to
past records); (o) 22 U.S.C. 2454
(Administration); (p) 22 U.S.C. 2651a
(Organization of the Department of
State); (q) 22 U.S.C. 2658 (Rules and
regulations; promulgation by Secretary;
delegation of authority) (Repealed, but
applicable to past records); (r) 22 U.S.C.
2709 (Special Agents); (s) 22 U.S.C.
2712 (Authority to control certain
terrorism-related services); (t) 22 U.S.C.
3921 (Management of the Foreign
Service); (u) 22 U.S.C. 4802 (Diplomatic
Security) (Responsibility of Secretary of
State), (v) 22 U.S.C. 4804(3)(D)
(Responsibilities of Assistant Secretary
for Diplomatic Security) (Repealed, but
applicable to past records); (w) 22
U.S.C. 4831–4835 (Accountability
review, accountability review board,
procedures, findings and
recommendations by a board, relation to
other proceedings); (x) 44 U.S.C. 31
(Federal Records Act of 1950, Sec.
506(a), as amended) (applicable to past
records); (y) 44 U.S.C. 3541 (Federal
Information Security Management); (z)
Executive Order 10450 (Security
requirements for government
employment); (aa) Executive Order
12107 (Relating to the Civil Service
Commission and Labor-Management in
the Federal Service); (bb) Executive
Order 13526 and its predecessor orders
(National Security Information); (cc)
Executive Order 12968 (Access to
Classified Information); (dd) Executive
Order 13587 (Security of Classified
Networks and Information); (ee)
Executive Order 13470 and its
predecessor orders (United States
Intelligence Activities); (ff) 22 CFR
Subchapter M (International Traffic in
Arms) (applicable to past records); (gg)
40 U.S.C. Chapter 10 (Federal Property
and Administrative Services Act
(1949)); (hh) 31 U.S.C. (Internal Revenue
Code); (ii) Pub. L. 99–399, 8/27/1986
(Omnibus Diplomatic Security and
Antiterrorism Act of 1986, as amended);
(jj) Pub. L. 100–202, 12/22/1987
(Appropriations for Departments of
Commerce, Justice, and State)
(applicable to past records); (kk) Pub. L.
100–461, 10/1/1988 (Foreign
Operations, Export Financing, and
E:\FR\FM\15DEN1.SGM
15DEN1
Federal Register / Vol. 80, No. 240 / Tuesday, December 15, 2015 / Notices
Related Programs Appropriations Act);
(ll) Pub. L. 107–56, 10/26/2001 (USA
PATRIOT Act—Uniting and
Strengthening America by Providing
Appropriate Tools Required to Intercept
and Obstruct Terrorism); (mm) Pub. L.
108–21, 4/30/2003 (PROTECT Act—
Prosecutorial Remedies and Other Tools
to End the Exploitation of Children
Today Act of 2003); (nn) Executive
Order 12356 (National Security
Information) (applicable to past
records); (oo) Executive Order 9397
(Numbering System for Federal
Accounts Relating to Individual
Persons); (pp) HSPD–12, 8/27/2004
(Homeland Security Presidential
Directive); (qq) Executive Order 13356,
8/27/2004 (Strengthening the Sharing of
Terrorism Information to Protect
Americans); (rr) Pub. L. 108–458
(Section 1016), 12/17/2004 (Intelligence
Reform and Terrorism Prevention Act of
2004; (ss) Pub. L. 92–463: 5 U.S.C. App.
(Federal Advisory Committee Act).
PURPOSE(S):
The records maintained in State–36,
Security Records, capture data related to
incidents and threats affecting U.S.
Government personnel, U.S.
Government information, or U.S.
Government facilities world-wide, for a
variety of legal purposes including
federal and state law enforcement and
counterterrorism purposes. The
information maintained in Security
Records may be used to determine
general suitability for employment or
retention in employment, to grant a
contract or issue a license, grant, or
security clearance.
asabaliauskas on DSK5VPTVN1PROD with NOTICES
ROUTINE USES OF RECORDS MAINTAINED IN THE
SYSTEM, INCLUDING CATEGORIES OF USERS AND
PURPOSES OF SUCH USES:
The information in Security Records
is used by:
(a) Department of State officials in the
administration of their responsibilities;
(b) Appropriate committees of
Congress in furtherance of their
respective oversight functions;
(c) Department of Treasury; U.S.
Office of Personnel Management;
Agency for International Development;
Department of Commerce; Peace Corps;
Department of Defense; Central
Intelligence Agency; Department of
Justice; Department of Homeland
Security; National Counter Terrorism
Center; and other federal agencies
inquiring pursuant to law or Executive
Order, in order to make a determination
of general suitability for employment or
retention in employment, to grant a
contract or issue a license, grant, or
security clearance;
(d) Any federal, state, municipal,
foreign or international law enforcement
VerDate Sep<11>2014
17:08 Dec 14, 2015
Jkt 238001
or other relevant agency or organization
as needed for security, law enforcement
or counterterrorism purposes, such as:
Threat alerts and analyses, protective
intelligence and counterintelligence
information, information relevant for
screening purposes;
(e) Any other agency or department of
the federal government pursuant to
statutory intelligence responsibilities or
other lawful purposes;
(f) Any other agency or department of
the Executive Branch having oversight
or review authority with regard to its
investigative responsibilities;
(g) A federal, state, local, foreign, or
international agency or other public
authority that investigates, prosecutes,
or assists in investigation or prosecution
of violation of criminal law or enforces,
implements, or assists in enforcement or
implementation of statute, rule,
regulation, or order;
(h) A federal, state, local or foreign
agency or other public authority or
professional organization maintaining
civil, criminal, and other relevant
enforcement or pertinent records such
as current licenses; information may be
given to a consumer reporting agency:
(1) To obtain information, relevant
enforcement records or other pertinent
records such as current licenses, or
(2) to obtain information relevant to
an agency investigation, a decision
concerning the hiring or retention of an
employee or other personnel action, the
issuance of a security clearance or the
initiation of administrative, civil, or
criminal action;
(i) Officials of government agencies in
the letting of a contract, issuance of a
license, grant or other benefit, and the
establishment of a claim;
(j) Any private or public source,
witness, or subject from which
information is requested in the course of
a legitimate agency investigation or
other inquiry, to the extent necessary to
identify an individual; to inform a
source, witness or subject of the nature
and purpose of the investigation or
other inquiry; and to identify the
information requested;
(k) An attorney or other designated
representative of any source, witness or
subject described in paragraph (j) of the
Privacy Act only to the extent that the
information would be provided to that
category of individual itself in the
course of an investigation or other
inquiry;
(l) A federal agency following a
response to its subpoena or to a
prosecution request that such record be
released for the purpose of its
introduction to a grand jury or other
criminal proceeding;
PO 00000
Frm 00094
Fmt 4703
Sfmt 4703
77693
(m) Relevant information may be
disclosed from this system to the news
media and general public in furtherance
of a legitimate law enforcement or
public safety function as determined by
the Department, e.g., to assist in the
location of federal fugitives, to provide
notification of arrests, to provide alerts,
assessments, or similar information on
potential threats to life, health, or
property, or to keep the public
appropriately informed of other law
enforcement or Department matters or
other matters of legitimate public
interest where disclosure could not
reasonably be expected to constitute an
unwarranted invasion of personal
privacy and could not reasonably be
expected to prejudice the outcome of a
pending or future trial;
(n) State, local, federal or nongovernmental agencies and entities as
needed for purposes of emergency or
disaster response; and
(o) U.S. government agencies within
the framework of the National
Suspicious Activity Report (SAR)
Initiative (NSI) regarding foreign
intelligence and terrorist threats,
managed by the Department of Justice.
The Department of State periodically
publishes in the Federal Register its
standard routine uses that apply to all
of its Privacy Act systems of records.
These notices appear in the form of a
Prefatory Statement. These standard
routine uses apply to Security Records,
State–36.
POLICIES AND PRACTICES FOR STORING,
RETRIEVING, ACCESSING, RETAINING, AND
DISPOSING OF RECORDS IN THE SYSTEM:
STORAGE:
Physical and electronic media.
RETRIEVABILITY:
By individual name, personal or
biometric identifier, case number, badge
number, and Social Security number
(for other than visitors), as well as by
each category of records in the system.
SAFEGUARDS:
All users are given cybersecurity
awareness training which covers the
procedures for handling Sensitive But
Unclassified information, including
personally identifiable information (PII).
Annual refresher training is mandatory.
In addition, all Foreign Service and
Civil Service employees and those
Locally Engaged Staff who handle PII
are required to take the FSI distance
learning course instructing employees
on privacy and security requirements,
including the rules of behavior for
handling PII and the potential
consequences if it is handled
improperly. Before being granted access
E:\FR\FM\15DEN1.SGM
15DEN1
77694
Federal Register / Vol. 80, No. 240 / Tuesday, December 15, 2015 / Notices
to Security Records, a user must first be
granted access to the Department of
State computer system, and user access
is not granted until a background
investigation has been completed.
Remote access to the Department of
State network from non-Department
owned systems is authorized only
through a Department-approved access
program. Remote access to the network
is configured with the Office of
Management and Budget Memorandum
M–07–16 security requirements, which
include but are not limited to two-factor
authentication and time out function.
All Department of State employees
and contractors with authorized access
have undergone a thorough background
security investigation. Access to the
Department of State, its annexes, and
posts abroad is controlled by security
guards and admission is limited to those
individuals possessing a valid
identification card or individuals under
proper escort. All paper records
containing personal information are
maintained in secured file cabinets in
restricted areas, access to which is
limited to authorized personnel. Access
to computerized files is passwordprotected and under the direct
supervision of the system manager. The
system manager has the capability of
printing audit trails of access from the
computer media, thereby permitting
regular and ad hoc monitoring of
computer usage. When it is determined
that a user no longer needs access, the
user account is disabled.
RETENTION AND DISPOSAL:
Retention of these records varies
depending upon the specific kind of
record involved. The records are retired
or destroyed in accordance with
published schedules of the Department
of State and as approved by the National
Archives and Records Administration.
More specific information may be
obtained by writing to the Director;
Office of Information Programs and
Services; A/GIS/IPS; SA–2; Department
of State; 515 22nd Street NW.,
Washington, DC 20522–8100.
asabaliauskas on DSK5VPTVN1PROD with NOTICES
SYSTEM MANAGER AND ADDRESS:
Principal Deputy Assistant Secretary
for Diplomatic Security and Director for
the Diplomatic Security Service;
Department of State; SA–20; 23rd Floor;
1801 North Lynn Street, Washington,
DC 20522–2008 for the Harry S. Truman
Building, domestic annexes, field offices
and missions; Security Officers at
respective U.S. Embassies, Consulates,
and missions overseas.
NOTIFICATION PROCEDURE:
Individuals who have reason to
believe that the Bureau of Diplomatic
VerDate Sep<11>2014
17:08 Dec 14, 2015
Jkt 238001
Security may have security/investigative
records pertaining to themselves should
write to the Director; Office of
Information Programs and Services; A/
GIS/IPS; SA–2; Department of State; 515
22nd Street NW., Washington, DC
20522–8100. The individual must
specify that he/she wishes Security
Records to be checked. At a minimum,
the individual must include: Name; date
and place of birth; current mailing
address and zip code; signature; and a
brief description of the circumstances
which may have caused the creation of
the record.
RECORD ACCESS AND AMENDMENT PROCEDURES:
Individuals who wish to gain access
to or amend records pertaining to
themselves should write to the Director;
Office of Information Programs and
Services (address above).
CONTESTING RECORD PROCEDURES:
See above.
RECORD SOURCE CATEGORIES:
These records contain information
obtained from the individual; persons
having knowledge of the individual;
persons having knowledge of incidents
or other matters of investigative interest
to the Department; other U.S. law
enforcement agencies and court
systems; pertinent records of other
federal, state, or local agencies or
foreign governments; pertinent records
of private firms or organizations; the
intelligence community; and other
public sources. The records also contain
information obtained from interviews,
review of records, and other authorized
investigative techniques.
SYSTEMS EXEMPTED FROM CERTAIN PROVISIONS
OF THE ACT:
Any other exempt records from other
agencies’ systems of records that are
recompiled into this system are also
considered exempt to the extent they are
claimed as such in the original systems.
Pursuant to 5 U.S.C. 552a (j)(2),
records in this system may be exempted
from subsections (c)(3) and (4), (d),
(e)(1), (2), (3), and (e)(4)(G), (H), and (I),
and (f) of the Privacy Act. Pursuant to
5 U.S.C. 552a (k)(1), (k)(2), and (k)(5),
records in this system may be exempted
from subsections (c)(3), (d)(1), (d)(2),
(d)(3), (d)(4), (d)(5), (e)(1), (e)(4)(G),
(e)(4)(H), (e)(4)(I), (f)(1), (f)(2), (f)(3),
(f)(4), and (f)(5).
See 22 CFR 171.
[FR Doc. 2015–31527 Filed 12–14–15; 8:45 am]
BILLING CODE 4710–43–P
PO 00000
Frm 00095
Fmt 4703
Sfmt 4703
OFFICE OF THE UNITED STATES
TRADE REPRESENTATIVE
Procurement Thresholds for
Implementation of the Trade
Agreements Act of 1979
Office of the United States
Trade Representative.
ACTION: Notice of Determination of
Procurement Thresholds.
AGENCY:
FOR FURTHER INFORMATION CONTACT:
Scott Pietan, Director of International
Procurement Policy, Office of the
United States Trade Representative,
(202) 395–9646 or scott_pietan@
ustr.eop.gov.
SUMMARY: Executive Order 12260
requires the United States Trade
Representative to set the U.S. dollar
thresholds for application of Title III of
the Trade Agreements Act of 1979, as
amended (19 U.S.C. 2511 et seq.), which
implements U.S. trade agreement
obligations, including those under the
World Trade Organization (WTO)
Agreement on Government
Procurement, Chapter 15 of the United
States-Australia Free Trade Agreement
(United States-Australia FTA), Chapter
9 of the United States-Bahrain Free
Trade Agreement (United States-Bahrain
FTA), Chapter 9 of the United StatesChile Free Trade Agreement (United
States-Chile FTA), Chapter 9 of the
United States-Colombia Free Trade
Agreement (United States-Colombia
FTA), Chapter 9 of the Dominican
Republic-Central American-United
States Free Trade Agreement (DR–
CAFTA), Chapter 9 of the United StatesMorocco Free Trade Agreement (United
States-Morocco FTA), Chapter 10 of the
North American Free Trade Agreement
(NAFTA), Chapter 9 of the United
States-Oman Free Trade Agreement
(United States-Oman FTA), Chapter 9 of
the United States-Panama Trade
Promotion Agreement (United StatesPanama TPA), Chapter 9 of the United
States-Peru Trade Promotion Agreement
(United States-Peru TPA), and Chapter
13 of the United States-Singapore Free
Trade Agreement (United StatesSingapore FTA). These obligations
apply to covered procurements valued
at or above specified U.S. dollar
thresholds.
Now, therefore, I, Michael B.G.
Froman, United States Trade
Representative, in conformity with the
provisions of Executive Order 12260,
and in order to carry out U.S. trade
agreement obligations under the WTO
Agreement on Government
Procurement, Chapter 15 of the United
States-Australia FTA, Chapter 9 of the
United States-Bahrain FTA, Chapter 9 of
E:\FR\FM\15DEN1.SGM
15DEN1
Agencies
[Federal Register Volume 80, Number 240 (Tuesday, December 15, 2015)]
[Notices]
[Pages 77691-77694]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2015-31527]
-----------------------------------------------------------------------
DEPARTMENT OF STATE
[Public Notice: 9381]
Privacy Act; System of Records: Security Records, State-36.
SUMMARY: Notice is hereby given that the Department of State proposes
to amend an existing system of records, Security Records, State-36,
pursuant to the provisions of the Privacy Act of 1974, as amended (5
U.S.C. 552a) and Office of Management and Budget Circular No. A-130,
Appendix I.
DATES: This system of records will be effective on January 25, 2016,
unless we receive comments that will result in a contrary
determination.
ADDRESSES: Any persons interested in commenting on the amended system
of records may do so by writing to the Director; Office of Information
Programs and Services, A/GIS/IPS; Department of State, SA-2; 515 22nd
Street NW., Washington, DC 20522-8100.
FOR FURTHER INFORMATION CONTACT: John Hackett, Director; Office of
Information Programs and Services, A/GIS/IPS; Department of State, SA-
2; 515 22nd Street NW., Washington, DC 20522-8100, or at
Privacy@state.gov.
SUPPLEMENTARY INFORMATION: The Department of State proposes that the
current system will retain the name ``Security Records'' (previously
published at 78 FR 27276, May 9, 2013). The records maintained in
State-36, Security Records, capture data related to incidents and
threats affecting U.S. Government personnel, U.S. Government
information, or U.S. Government facilities world-wide, for a variety of
legal purposes including federal and state law enforcement and
counterterrorism purposes. The information maintained in Security
Records may be used to determine general suitability for employment or
retention in employment, to grant a contract or issue a license, grant,
or security clearance. The proposed system will include modifications
and administrative updates to the following sections: Categories of
individuals and Categories of records. Additionally, records regarding
the Office of Foreign Missions were removed and included in a new SORN
to provide greater transparency of their records.
The Department's report was filed with the Office of Management and
Budget. The amended system description, ``Security Records, State-36,''
will read as set forth below.
Joyce A. Barr,
Assistant Secretary for Administration, U.S. Department of State.
STATE-36
SYSTEM NAME:
Security Records.
SECURITY CLASSIFICATION:
Unclassified and Classified.
SYSTEM LOCATION:
Department of State and its annexes, Bureau of Diplomatic Security,
and various field and regional offices throughout the United States,
and abroad at some U.S. Embassies, U.S. Consulates General, and U.S.
Consulates.
CATEGORIES OF INDIVIDUALS COVERED BY THE SYSTEM:
Present and former employees of the Department of State; applicants
for Department employment who are presently being investigated for
security clearance; contractors working for the Department; interns and
detailees to the Department; employees of other federal agencies who
have accounts on our Department networks; individuals requiring access
to the official Department of State premises who have undergone or are
undergoing security clearance; some passport and visa applicants
concerning matters of adjudication; individuals and
[[Page 77692]]
institutions identified in passport and visa crime investigations;
individuals involved in unauthorized access to classified information;
prospective alien spouses of U.S. citizen employees of the Department
of State; individuals or groups whose activities have a potential
bearing on the security of Departmental or Foreign Service operations,
domestically or abroad, including those involved in criminal or
terrorist activity; individuals and organizations who apply to be
constituents in the exchange of security information from public-
private partnerships; and visitors to the Department of State main
building (Harry S Truman Building), to its domestic annexes, field
offices, missions, and to the U.S. Embassies and U.S. Consulates and
missions overseas. Also covered are individuals issued security or
cybersecurity violations or infractions; litigants in civil suits and
criminal prosecutions of interest to the Bureau of Diplomatic Security;
individuals who have Department building passes; individuals using
Department devices or networks; uniformed security officers;
individuals named in congressional inquiries to the Bureau of
Diplomatic Security; individuals subject to investigations conducted
abroad on behalf of other federal agencies; and individuals whose
activities other agencies believe may have a bearing on U.S. foreign
policy interests.
CATEGORIES OF RECORDS IN THE SYSTEM:
Incident and investigative material relating to any category of
individual described above, including case files containing items such
as name, date and place of birth, citizenship, telephone numbers,
addresses, physical description (including height, weight, body type,
hair, clothing, gender, ethnicity, race, and other general and
distinguishing physical features), accent description, identification
media (such as passport, residency, or driver's license numbers),
vehicle registration and vehicle information; email address, family
identifiers (such as names of relatives and biographic information),
employer identifiers, applications for passports and employment,
photographs, biometric data (to include fingerprints, and
deoxyribonucleic acid (DNA) information), birth certificates, credit
checks, security evaluations and clearances, other agency reports and
informant reports; legal case pleadings and files; evidence collected
during investigations; polygraphs; network audit records, network use
records, email, chat conversations, and text messages sent using
Department devices or networks; social media account findings for
individuals undergoing security investigations; security violation
files; training reports; weapons assignment database; firing
proficiency and other security-related testing scores; availability for
special protective assignments; language proficiency scores;
intelligence reports; counterintelligence material; counterterrorism
material; internal Departmental memoranda; internal personnel, fiscal,
and other administrative documents; emergency contact information for
Department employees and contractors; Social Security number; specific
areas and times of authorized accessibility; escort authority; status
and level of security clearance; issuing agency and issue date; and for
all individuals: Date and times of building entrance and exit.
For visitors, information collected can include name, date of
birth, citizenship, identification type, identification number,
temporary badge number, host's name, office symbol, room number, and
telephone number. For public-private partnerships to exchange security
information, information collected can include name, address, telephone
number and email address.
Security files contain information needed to provide protective
services for the Secretary of State and visiting and resident foreign
officials and associated foreign official facilities, and to protect
the Department's official facilities and information assets. Security
files contain documents and reports furnished to the Department by
other agencies concerning individuals whose activities the other
agencies believe may have a bearing on U.S. foreign policy interests.
AUTHORITY FOR MAINTENANCE OF THE SYSTEM:
(a) 5 U.S.C. 301 (Government Organization and Employees)
(Departmental regulations); (b) 5 U.S.C. Chapter 73 (Suitability,
Security, and Conduct); (c) 5 U.S.C. 7531-33 (National Security); (d) 8
U.S.C. 1104 (Enforcement of immigration and nationality laws); (e) 18
U.S.C. 111 (Crimes and Criminal Procedures) (Assaulting, resisting, or
impeding certain officers or employees); (f) 18 U.S.C. 112 (Protection
of foreign officials, official guests, and internationally protected
persons); (g) 18 U.S.C. 201 (Bribery of public officials and
witnesses); (h) 18 U.S.C.1030 (Fraud and related activity in connection
with computers); (i) 18 U.S.C. 1114 (Protection of officers and
employees of the U.S.); (j) 18 U.S.C. 1116 (Murder or manslaughter of
foreign officials, official guests, or internationally protected
persons); (k) 18 U.S.C. 1117 (Conspiracy to murder); (l) 18 U.S.C.
1541-1546 (Issuance without authority, false statement in application
and use of passport, forgery or false use of passport, misuse of
passport, safe conduct violation, fraud and misuse of visas, permits,
and other documents); (m) 22 U.S.C. 211a (Foreign Relations and
Intercourse) (Authority to grant, issue, and verify passports); (n) 22
U.S.C. 842, 846, 911 (Duties of Officers and Employees and Foreign
Service Officers) (Repealed, but applicable to past records); (o) 22
U.S.C. 2454 (Administration); (p) 22 U.S.C. 2651a (Organization of the
Department of State); (q) 22 U.S.C. 2658 (Rules and regulations;
promulgation by Secretary; delegation of authority) (Repealed, but
applicable to past records); (r) 22 U.S.C. 2709 (Special Agents); (s)
22 U.S.C. 2712 (Authority to control certain terrorism-related
services); (t) 22 U.S.C. 3921 (Management of the Foreign Service); (u)
22 U.S.C. 4802 (Diplomatic Security) (Responsibility of Secretary of
State), (v) 22 U.S.C. 4804(3)(D) (Responsibilities of Assistant
Secretary for Diplomatic Security) (Repealed, but applicable to past
records); (w) 22 U.S.C. 4831-4835 (Accountability review,
accountability review board, procedures, findings and recommendations
by a board, relation to other proceedings); (x) 44 U.S.C. 31 (Federal
Records Act of 1950, Sec. 506(a), as amended) (applicable to past
records); (y) 44 U.S.C. 3541 (Federal Information Security Management);
(z) Executive Order 10450 (Security requirements for government
employment); (aa) Executive Order 12107 (Relating to the Civil Service
Commission and Labor-Management in the Federal Service); (bb) Executive
Order 13526 and its predecessor orders (National Security Information);
(cc) Executive Order 12968 (Access to Classified Information); (dd)
Executive Order 13587 (Security of Classified Networks and
Information); (ee) Executive Order 13470 and its predecessor orders
(United States Intelligence Activities); (ff) 22 CFR Subchapter M
(International Traffic in Arms) (applicable to past records); (gg) 40
U.S.C. Chapter 10 (Federal Property and Administrative Services Act
(1949)); (hh) 31 U.S.C. (Internal Revenue Code); (ii) Pub. L. 99-399,
8/27/1986 (Omnibus Diplomatic Security and Antiterrorism Act of 1986,
as amended); (jj) Pub. L. 100-202, 12/22/1987 (Appropriations for
Departments of Commerce, Justice, and State) (applicable to past
records); (kk) Pub. L. 100-461, 10/1/1988 (Foreign Operations, Export
Financing, and
[[Page 77693]]
Related Programs Appropriations Act); (ll) Pub. L. 107-56, 10/26/2001
(USA PATRIOT Act--Uniting and Strengthening America by Providing
Appropriate Tools Required to Intercept and Obstruct Terrorism); (mm)
Pub. L. 108-21, 4/30/2003 (PROTECT Act--Prosecutorial Remedies and
Other Tools to End the Exploitation of Children Today Act of 2003);
(nn) Executive Order 12356 (National Security Information) (applicable
to past records); (oo) Executive Order 9397 (Numbering System for
Federal Accounts Relating to Individual Persons); (pp) HSPD-12, 8/27/
2004 (Homeland Security Presidential Directive); (qq) Executive Order
13356, 8/27/2004 (Strengthening the Sharing of Terrorism Information to
Protect Americans); (rr) Pub. L. 108-458 (Section 1016), 12/17/2004
(Intelligence Reform and Terrorism Prevention Act of 2004; (ss) Pub. L.
92-463: 5 U.S.C. App. (Federal Advisory Committee Act).
PURPOSE(S):
The records maintained in State-36, Security Records, capture data
related to incidents and threats affecting U.S. Government personnel,
U.S. Government information, or U.S. Government facilities world-wide,
for a variety of legal purposes including federal and state law
enforcement and counterterrorism purposes. The information maintained
in Security Records may be used to determine general suitability for
employment or retention in employment, to grant a contract or issue a
license, grant, or security clearance.
ROUTINE USES OF RECORDS MAINTAINED IN THE SYSTEM, INCLUDING CATEGORIES
OF USERS AND PURPOSES OF SUCH USES:
The information in Security Records is used by:
(a) Department of State officials in the administration of their
responsibilities;
(b) Appropriate committees of Congress in furtherance of their
respective oversight functions;
(c) Department of Treasury; U.S. Office of Personnel Management;
Agency for International Development; Department of Commerce; Peace
Corps; Department of Defense; Central Intelligence Agency; Department
of Justice; Department of Homeland Security; National Counter Terrorism
Center; and other federal agencies inquiring pursuant to law or
Executive Order, in order to make a determination of general
suitability for employment or retention in employment, to grant a
contract or issue a license, grant, or security clearance;
(d) Any federal, state, municipal, foreign or international law
enforcement or other relevant agency or organization as needed for
security, law enforcement or counterterrorism purposes, such as: Threat
alerts and analyses, protective intelligence and counterintelligence
information, information relevant for screening purposes;
(e) Any other agency or department of the federal government
pursuant to statutory intelligence responsibilities or other lawful
purposes;
(f) Any other agency or department of the Executive Branch having
oversight or review authority with regard to its investigative
responsibilities;
(g) A federal, state, local, foreign, or international agency or
other public authority that investigates, prosecutes, or assists in
investigation or prosecution of violation of criminal law or enforces,
implements, or assists in enforcement or implementation of statute,
rule, regulation, or order;
(h) A federal, state, local or foreign agency or other public
authority or professional organization maintaining civil, criminal, and
other relevant enforcement or pertinent records such as current
licenses; information may be given to a consumer reporting agency:
(1) To obtain information, relevant enforcement records or other
pertinent records such as current licenses, or
(2) to obtain information relevant to an agency investigation, a
decision concerning the hiring or retention of an employee or other
personnel action, the issuance of a security clearance or the
initiation of administrative, civil, or criminal action;
(i) Officials of government agencies in the letting of a contract,
issuance of a license, grant or other benefit, and the establishment of
a claim;
(j) Any private or public source, witness, or subject from which
information is requested in the course of a legitimate agency
investigation or other inquiry, to the extent necessary to identify an
individual; to inform a source, witness or subject of the nature and
purpose of the investigation or other inquiry; and to identify the
information requested;
(k) An attorney or other designated representative of any source,
witness or subject described in paragraph (j) of the Privacy Act only
to the extent that the information would be provided to that category
of individual itself in the course of an investigation or other
inquiry;
(l) A federal agency following a response to its subpoena or to a
prosecution request that such record be released for the purpose of its
introduction to a grand jury or other criminal proceeding;
(m) Relevant information may be disclosed from this system to the
news media and general public in furtherance of a legitimate law
enforcement or public safety function as determined by the Department,
e.g., to assist in the location of federal fugitives, to provide
notification of arrests, to provide alerts, assessments, or similar
information on potential threats to life, health, or property, or to
keep the public appropriately informed of other law enforcement or
Department matters or other matters of legitimate public interest where
disclosure could not reasonably be expected to constitute an
unwarranted invasion of personal privacy and could not reasonably be
expected to prejudice the outcome of a pending or future trial;
(n) State, local, federal or non-governmental agencies and entities
as needed for purposes of emergency or disaster response; and
(o) U.S. government agencies within the framework of the National
Suspicious Activity Report (SAR) Initiative (NSI) regarding foreign
intelligence and terrorist threats, managed by the Department of
Justice.
The Department of State periodically publishes in the Federal
Register its standard routine uses that apply to all of its Privacy Act
systems of records. These notices appear in the form of a Prefatory
Statement. These standard routine uses apply to Security Records,
State-36.
POLICIES AND PRACTICES FOR STORING, RETRIEVING, ACCESSING, RETAINING,
AND DISPOSING OF RECORDS IN THE SYSTEM:
STORAGE:
Physical and electronic media.
RETRIEVABILITY:
By individual name, personal or biometric identifier, case number,
badge number, and Social Security number (for other than visitors), as
well as by each category of records in the system.
SAFEGUARDS:
All users are given cybersecurity awareness training which covers
the procedures for handling Sensitive But Unclassified information,
including personally identifiable information (PII). Annual refresher
training is mandatory. In addition, all Foreign Service and Civil
Service employees and those Locally Engaged Staff who handle PII are
required to take the FSI distance learning course instructing employees
on privacy and security requirements, including the rules of behavior
for handling PII and the potential consequences if it is handled
improperly. Before being granted access
[[Page 77694]]
to Security Records, a user must first be granted access to the
Department of State computer system, and user access is not granted
until a background investigation has been completed.
Remote access to the Department of State network from non-
Department owned systems is authorized only through a Department-
approved access program. Remote access to the network is configured
with the Office of Management and Budget Memorandum M-07-16 security
requirements, which include but are not limited to two-factor
authentication and time out function.
All Department of State employees and contractors with authorized
access have undergone a thorough background security investigation.
Access to the Department of State, its annexes, and posts abroad is
controlled by security guards and admission is limited to those
individuals possessing a valid identification card or individuals under
proper escort. All paper records containing personal information are
maintained in secured file cabinets in restricted areas, access to
which is limited to authorized personnel. Access to computerized files
is password-protected and under the direct supervision of the system
manager. The system manager has the capability of printing audit trails
of access from the computer media, thereby permitting regular and ad
hoc monitoring of computer usage. When it is determined that a user no
longer needs access, the user account is disabled.
RETENTION AND DISPOSAL:
Retention of these records varies depending upon the specific kind
of record involved. The records are retired or destroyed in accordance
with published schedules of the Department of State and as approved by
the National Archives and Records Administration. More specific
information may be obtained by writing to the Director; Office of
Information Programs and Services; A/GIS/IPS; SA-2; Department of
State; 515 22nd Street NW., Washington, DC 20522-8100.
SYSTEM MANAGER AND ADDRESS:
Principal Deputy Assistant Secretary for Diplomatic Security and
Director for the Diplomatic Security Service; Department of State; SA-
20; 23rd Floor; 1801 North Lynn Street, Washington, DC 20522-2008 for
the Harry S. Truman Building, domestic annexes, field offices and
missions; Security Officers at respective U.S. Embassies, Consulates,
and missions overseas.
NOTIFICATION PROCEDURE:
Individuals who have reason to believe that the Bureau of
Diplomatic Security may have security/investigative records pertaining
to themselves should write to the Director; Office of Information
Programs and Services; A/GIS/IPS; SA-2; Department of State; 515 22nd
Street NW., Washington, DC 20522-8100. The individual must specify that
he/she wishes Security Records to be checked. At a minimum, the
individual must include: Name; date and place of birth; current mailing
address and zip code; signature; and a brief description of the
circumstances which may have caused the creation of the record.
RECORD ACCESS AND AMENDMENT PROCEDURES:
Individuals who wish to gain access to or amend records pertaining
to themselves should write to the Director; Office of Information
Programs and Services (address above).
CONTESTING RECORD PROCEDURES:
See above.
RECORD SOURCE CATEGORIES:
These records contain information obtained from the individual;
persons having knowledge of the individual; persons having knowledge of
incidents or other matters of investigative interest to the Department;
other U.S. law enforcement agencies and court systems; pertinent
records of other federal, state, or local agencies or foreign
governments; pertinent records of private firms or organizations; the
intelligence community; and other public sources. The records also
contain information obtained from interviews, review of records, and
other authorized investigative techniques.
SYSTEMS EXEMPTED FROM CERTAIN PROVISIONS OF THE ACT:
Any other exempt records from other agencies' systems of records
that are recompiled into this system are also considered exempt to the
extent they are claimed as such in the original systems.
Pursuant to 5 U.S.C. 552a (j)(2), records in this system may be
exempted from subsections (c)(3) and (4), (d), (e)(1), (2), (3), and
(e)(4)(G), (H), and (I), and (f) of the Privacy Act. Pursuant to 5
U.S.C. 552a (k)(1), (k)(2), and (k)(5), records in this system may be
exempted from subsections (c)(3), (d)(1), (d)(2), (d)(3), (d)(4),
(d)(5), (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I), (f)(1), (f)(2),
(f)(3), (f)(4), and (f)(5).
See 22 CFR 171.
[FR Doc. 2015-31527 Filed 12-14-15; 8:45 am]
BILLING CODE 4710-43-P