Privacy Act; Implementation, 42627-42630 [2018-17888]

Download as PDF Federal Register / Vol. 83, No. 164 / Thursday, August 23, 2018 / Proposed Rules General and Administrative Provisions, and Regulation .04 under COMAR 26.11.08, Control of Incinerators contained in SIP Revision 16–04. As described previously, the amendments to COMAR 26.11.01.10, Continuous Opacity Monitoring Requirements, are as follows: (1) Add a new section 6 to COMAR 26.11.01.10A, Applicability and Exceptions; (2) amend section 3 under COMAR 26.11.01.10B, General Requirements for COMs; (3) add new sections 5 and 6 under COMAR 26.11.01.10B; and (4) remove COMAR 26.11.01.10F, which has been repealed by the State. The amendment to COMAR 26.11.08, Control of Incinerators, consists of an addition of a new section D to Regulation .04, Visible Emissions. EPA has made, and will continue to make, these materials generally available through https:// www.regulations.gov and at the EPA Region III Office (please contact the person identified in the FOR FURTHER INFORMATION CONTACT section of this preamble for more information). daltland on DSKBBV9HB2PROD with PROPOSALS V. Statutory and Executive Order Reviews Under the CAA, the Administrator is required to approve a SIP submission that complies with the provisions of the CAA and applicable federal regulations. 42 U.S.C. 7410(k); 40 CFR 52.02(a). Thus, in reviewing SIP submissions, EPA’s role is to approve state choices, provided that they meet the criteria of the CAA. Accordingly, this action merely approves state law as meeting federal requirements and does not impose additional requirements beyond those imposed by state law. For that reason, this proposed action: • Is not a ‘‘significant regulatory action’’ subject to review by the Office of Management and Budget under Executive Orders 12866 (58 FR 51735, October 4, 1993) and 13563 (76 FR 3821, January 21, 2011); • Is not an Executive Order 13771 (82 FR 9339, February 2, 2017) regulatory action because SIP approvals are exempted under Executive Order 12866. • Does not impose an information collection burden under the provisions of the Paperwork Reduction Act (44 U.S.C. 3501 et seq.); • Is certified as not having a significant economic impact on a substantial number of small entities under the Regulatory Flexibility Act (5 U.S.C. 601 et seq.); • Does not contain any unfunded mandate or significantly or uniquely affect small governments, as described in the Unfunded Mandates Reform Act of 1995 (Pub. L. 104–4); VerDate Sep<11>2014 16:29 Aug 22, 2018 Jkt 244001 • Does not have federalism implications as specified in Executive Order 13132 (64 FR 43255, August 10, 1999); • Is not an economically significant regulatory action based on health or safety risks subject to Executive Order 13045 (62 FR 19885, April 23, 1997); • Is not a significant regulatory action subject to Executive Order 13211 (66 FR 28355, May 22, 2001); • Is not subject to requirements of section 12(d) of the National Technology Transfer and Advancement Act of 1995 (15 U.S.C. 272 note) because application of those requirements would be inconsistent with the CAA; and • Does not provide EPA with the discretionary authority to address, as appropriate, disproportionate human health or environmental effects, using practicable and legally permissible methods, under Executive Order 12898 (59 FR 7629, February 16, 1994). In addition, this proposed rule, proposing to approve Maryland SIP Revision 16–04, COMs requirements for MWCs and Cement Plants, does not have tribal implications as specified by Executive Order 13175 (65 FR 67249, November 9, 2000), because the SIP is not approved to apply in Indian country located in the state, and EPA notes that it will not impose substantial direct costs on tribal governments or preempt tribal law. List of Subjects in 40 CFR Part 52 Environmental protection, Air pollution control, Incorporation by reference, Intergovernmental relations, Particulate matter, Reporting and recordkeeping requirements. Authority: 42 U.S.C. 7401 et seq. Dated: August 9, 2018. Cecil Rodrigues, Acting Regional Administrator, Region III. [FR Doc. 2018–18276 Filed 8–22–18; 8:45 am] BILLING CODE 6560–50–P DEPARTMENT OF HEALTH AND HUMAN SERVICES 45 CFR Part 5b RIN 0991–AC10 Privacy Act; Implementation Department of Health and Human Services. ACTION: Notice of proposed rulemaking. AGENCY: In accordance with the Privacy Act of 1974, as amended (the Act), the Department of Health and Human Services (HHS or Department) is proposing to exempt a new system of SUMMARY: PO 00000 Frm 00018 Fmt 4702 Sfmt 4702 42627 records, System No. 09–90–1701, HHS Insider Threat Program Records, from certain requirements of the Act. DATES: Comments on this notice must be received by September 24, 2018. ADDRESSES: The public should address written comments on this notice by email to hhsinth@hhs.gov or by mail to the HHS Office of Security and Strategic Information (OSSI), 200 Independence Avenue SW, Washington, DC 20201. FOR FURTHER INFORMATION CONTACT: General questions about the NPRM may be submitted to the Assistant Deputy Secretary for National Security by email to hhsinth@hhs.gov, by telephone to (202) 690–5756, or by mail to the HHS Office of Security and Strategic Information (OSSI), 200 Independence Avenue SW, Washington, DC 20201. SUPPLEMENTARY INFORMATION: I. Background on the Insider Threat Program and New System of Records 09–90–1701 Each federal agency is mandated by Presidential Executive Order 13587, issued October 7, 2011, to establish an insider threat detection and prevention program to ensure the security of classified networks and the responsible sharing and safeguarding of classified information consistent with appropriate protections for privacy and civil liberties. The order states in section 2.1: The heads of agencies that operate or access classified computer networks shall have responsibility for appropriately sharing and safeguarding classified information on computer networks. As part of this responsibility, they shall implement an insider threat detection and prevention program consistent with guidance and standards developed by the Insider Threat Task Force established in section 6 of this order. A threat need not be directed at classified information to threaten classified networks. Consequently, insider threats include any of the following: Attempted or actual espionage, subversion, sabotage, terrorism, or extremist activities directed against the Department and its personnel, facilities, information resources, and activities; unauthorized use of or intrusion into automated information systems; unauthorized disclosure of classified, controlled unclassified, sensitive, or proprietary information to technology; indicators of potential insider threats or other incidents that may indicate activities of an insider threat; and other threats to the Department, such as indicators of potential for workplace violence or misconduct. E:\FR\FM\23AUP1.SGM 23AUP1 daltland on DSKBBV9HB2PROD with PROPOSALS 42628 Federal Register / Vol. 83, No. 164 / Thursday, August 23, 2018 / Proposed Rules The office that will administer the Department’s Insider Threat Program, the Office of Security and Strategic Information (OSSI), serves as the Department’s Federal Intelligence Coordinating Office (FICO), which is responsible for coordinating the sharing and safeguarding of classified national security information between HHS and its operating divisions and with the Office of the Director of National Intelligence (ODNI) and its component agencies within the Intelligence Community. Within OSSI, the Directorate of Operations (Counterintelligence) will oversee the Insider Threat Program; its responsibilities include identifying, countering, mitigating, and deterring exploitation of HHS personnel, information, assets, and other equities by foreign intelligence and security services and agents, terrorists, and transnational criminal organizations working under the direction of a foreign entity. HHS counterintelligence efforts include (1) counterintelligence inquiries and preliminary investigations, (2) national security incident investigations, (3) counterintelligence analysis, (4) insider threats detection and mitigation efforts, (5) counterintelligence and insider threat awareness, and (6) technical threat detection and mitigation. The records that OSSI compiles to administer the HHS Insider Threat Program, which will be covered by System No. 09–90–1701, may be from any source, including from any HHS component, office, program, record or source, another government agency, or a member of the public; and may include records pertaining to information security, personnel security, or systems security. This system of records includes investigatory material compiled for law enforcement purposes and information classified in the interest of national security. Note that System No. 09–90–1701 will not cover investigatory material that OSSI compiles solely for the purpose of determining suitability, eligibility, or qualification for federal civilian employment, military service, federal contracts, or access to classified information, because such records are covered by other HHS systems of records; specifically: 09–90–0002 ‘‘Investigatory Material Compiled for Security and Suitability Purposes System’’ with respect to HHS Office of Inspector General determinations, and 09–90–0020 ‘‘Suitability for Employment Records’’ as to all other HHS determinations. The new system of records will consist of records compiled and used by VerDate Sep<11>2014 16:29 Aug 22, 2018 Jkt 244001 the Department’s Office of Security and Strategic Information (OSSI), within the Immediate Office of the Secretary (IOS), to administer the Department’s Insider Threat Program, including law enforcement investigatory material and classified intelligence information. Such records are eligible to be exempted from certain requirements of the Privacy Act under subsections (k)(1) and (k)(2) of the Act. The exemptions proposed for those records are necessary and appropriate to protect the integrity of insider threat investigations and records and prevent disclosure of information that would reveal investigation subjects, investigative and security techniques, national security information, security sensitive information, personal privacy information, and identities of confidential sources and law enforcement personnel involved in investigations. Elsewhere in today’s Federal Register HHS has published a System of Records Notice (SORN) for System No. 09–90–1701 for public notice and comment which describes the new system of records in more detail. The Privacy Act requirements from which HHS is proposing to exempt eligible records in System No. 09–90– 1701 are those contained in subsections (c)(3), (d)(1)–(4), (e)(1), (e)(4)(G), (H), and (I), and (f) of the Privacy Act, which require the agency to provide an accounting of disclosures; provide notification, access, and amendment rights, rules, and procedures; maintain only relevant and necessary information; and identify categories of record sources. If the HHS Insider Threat Program obtains law enforcement investigatory material from another Privacy Act system of records that has been exempted from Privacy Act requirements based on subsection (j)(2) of the Act, that material will be exempt in System No. 09–90–1701 to the same extent it is exempt in the source system, so may be exempt from any of these subsections of the Act: (c)(3)–(4); (d)(1)– (4); (e)(1)–(3), (e)(4)(G)–(I), (e)(5), (e)(8), (e)(12); (f); (g); and (h). II. Proposed Exemptions and Affected Records The Insider Threat Program system of records includes investigatory material compiled for law enforcement purposes and information classified in the interest of national security. While OSSI does not perform criminal law enforcement activity as its principal function, OSSI may compile in System No. 09–90–1701 material obtained from other agencies or components which perform as their principal function activities pertaining to the enforcement PO 00000 Frm 00019 Fmt 4702 Sfmt 4702 of criminal laws, and which have exempted their records from certain Privacy Act requirements, based on 5 U.S.C. 552a(j)(2). All other investigatory material compiled for law enforcement purposes is eligible to be exempted from certain Privacy Act requirements based on 5 U.S.C. 552a(k)(2). Information classified in the interest of national security is eligible to be exempted from certain Privacy Act requirements, based on 5 U.S.C. 552a(k)(1). Accordingly, the Department is establishing these exemptions for System No. 09–90–1701: • Law enforcement investigatory material that is from another system of records in which such material was exempted from access and other requirements of the Privacy Act (the Act), based on 5 U.S.C. 552a(j)(2), will be exempt in System No. 09–901701 on the same basis (5 U.S.C. 552a(j)(2)) and from the same requirements as in the source system, which may include any of these requirements of the Act: (c)(3)– (4); (d)(1)–(4); (e)(1)–(3), (e)(4)(G)–(I), (e)(5), (e)(8), (e)(12); (f); (g); and (h); • All other law enforcement investigatory material in System No. 09– 90–1701 will be exempt, based on 5 U.S.C. 552a(k)(2), from the requirements in subsections (c)(3), (d)(1)–(4), (e)(1), and (e)(4)(G)–(I), and (f) of the Act, However, if any individual is denied a right, privilege, or benefit to which the individual would otherwise be entitled by Federal law or for which the individual would otherwise be eligible, access will be granted, except to the extent that the disclosure would reveal the identity of a source who furnished information to the Government under an express promise of confidentiality; and • Information that is classified in the interest of national security will be exempt, based on 5 U.S.C. 552a(k)(1), from the requirements in subsections (c)(3), (d)(1)–(4), (e)(1), and (e)(4)(G)–(I), and (f) of the Act. III. Exemption Rationales These exemptions apply only to the extent that information in this system is subject to exemption pursuant to 5 U.S.C. 552a(k). Where HHS determines compliance would not appear to interfere with or adversely affect the purpose of this system to detect, deter, or mitigate insider threats, the applicable exemption may be waived by HHS in its sole discretion. Exemptions from the particular subsections are necessary and appropriate, and justified for the following reasons: • 5 U.S.C. 552a(c)(3) (the requirement to provide accountings of disclosures) and 5 U.S.C. 552a(d)(1)–(4) (requirements addressing notification, access, and amendment rights, E:\FR\FM\23AUP1.SGM 23AUP1 daltland on DSKBBV9HB2PROD with PROPOSALS Federal Register / Vol. 83, No. 164 / Thursday, August 23, 2018 / Proposed Rules collectively referred to herein as access requirements). Providing individual record subjects with accountings of disclosures and with notification, access, and amendment rights with respect to Insider Threat Program records could reveal the existence of an investigation, investigative interest, investigative techniques, details about an investigation, security-sensitive information such as information about security measures and security vulnerabilities, information that must remain non-public to protect national security or personal privacy-identities of law enforcement personnel, or other sensitive or classified information. Revealing such information to record subjects would thwart or impede pending and future law enforcement investigations and efforts to protect national security, and would violate personal privacy. Revealing the information would enable record subjects or other persons to evade detection and apprehension by security and law enforcement personnel; destroy, conceal, or tamper with evidence or fabricate testimony; or harass, intimidate, harm, coerce, or retaliate against witnesses, complainants, investigators, security personnel, law enforcement personnel, or their family members, their employees, or other individuals. With respect to investigatory material compiled for law enforcement purposes, the exemption pursuant to 5 U.S.C. 552a(k)(2) from access requirements in subsection (d) of the Act is statutorily limited. If any individual is denied a right, privilege, or benefit to which the individual would otherwise be entitled by Federal law or for which the individual would otherwise be eligible, access will be granted, except to the extent that the disclosure would reveal the identity of a source who furnished information to the Government under an express promise of confidentiality. • 5 U.S.C. 552a(e)(1) (the requirement to maintain only relevant and necessary information authorized by statute or Executive Order). It will not always be possible to determine at the time information is received or compiled in this system of records whether the information is or will be relevant and necessary to a law enforcement investigation or to protecting national security. For example, a tip or lead that does not appear relevant or necessary to uncovering an insider threat by itself or at the time the tip or lead is received may prove to be relevant and necessary when combined with other information that reveals a pattern or that comes to light later. VerDate Sep<11>2014 16:29 Aug 22, 2018 Jkt 244001 • 5 U.S.C. 552a(e)(4)(G) and (H) (the requirements to describe procedures by which subjects may be notified of whether the system of records contains records about them and seek access or amendment of a record). These requirements concern individual access to records, and the records are exempt under (c) and (d), as described above. To the extent that (e)(4)(G) and (H) are interpreted to require more detailed procedures regarding record notification, access, or amendment than have been published in the Federal Register, exemption from those provisions is necessary for the same rationale as applies to (c) and (d). • 5 U.S.C. 552a(e)(4)(I) (the requirement to describe the categories of record sources). To the extent that this subsection is interpreted to require a more detailed description regarding the record sources in this system than has been published in the Federal Register, exemption from this provision is necessary to protect the sources of law enforcement and intelligence information and to protect the privacy and safety of witnesses and informants and others who provide information to HHS. Further, greater specificity of sources of properly classified records could compromise national security. Moreover, because records used in the Insider Threat Program could come from any source, it is not possible to know every category in advance in order to list them all in the SORN. Some record source categories may not be appropriate to make public in the SORN if, for example, revealing them could enable record subjects or other individuals to discover investigative techniques and devise ways to bypass them to evade detection and apprehension. • 5 U.S.C. 552a(f) (the requirement to promulgate rules to implement provisions of the Privacy Act). To the extent that this subsection is interpreted to require agency rules addressing the above exempted requirements, exemption from this provision is also necessary to protect the sources of law enforcement and intelligence information and to protect the privacy and safety of witnesses and informants and others who provide information to HHS. Greater specificity in rulemaking regarding properly classified records could compromise national security. IV. Analysis of Impacts The agency has reviewed this rule under Executive Orders 12866 and 13563, which direct agencies to assess costs and benefits of available regulatory alternatives and, if regulation is necessary, to maximize the net benefits. PO 00000 Frm 00020 Fmt 4702 Sfmt 4702 42629 The agency believes that this rule is not a significant regulatory action under Executive Order 12866, and therefore does not constitute an Executive Order 13771 regulatory action, because it will not (1) have an annual effect on the economy of $100 million or more or adversely affect in a material way the economy, a sector of the economy, productivity, competition, jobs, the environment, public health or safety, or State, local or tribal governments or communities; (2) create a serious inconsistency or otherwise interfere with an action taken or planned by another agency; (3) materially alter the budgetary impact of entitlements, grants, user fees or loan programs, or the rights and obligations of recipients thereof; or (4) raise novel legal or policy issues arising out of legal mandates, the President’s priorities, or the principles set forth in Executive Order 12866. The Regulatory Flexibility Act requires agencies to analyze regulatory options that would minimize any significant impact of a rule on small entities. Because the rule imposes no duties or obligations on small entities, the Department certifies that the rule will not have a significant economic impact on a substantial number of small entities. Section 202(a) of the Unfunded Mandates Reform Act of 1995 requires that agencies prepare a written statement, which includes an assessment of anticipated costs and benefits, before proposing ‘‘any rule that includes any Federal mandate that may result in the expenditure by State, local, and tribal governments, in the aggregate, or by the private sector, of $100,000,000 or more (adjusted annually for inflation) in any one year.’’ The current threshold after adjustment for inflation is $144 million, using the most current (2015) Implicit Price Deflator for the Gross Domestic Product. The Department does not expect that this final rule would result in any one-year expenditure that would meet or exceed this amount. List of Subjects in 45 CFR Part 5b Privacy. For the reasons stated in the preamble, the Department’s Privacy Act Regulations, part 5b of 45 CFR Subtitle A, are proposed to be amended as follows: PART 5b—PRIVACY ACT REGULATIONS 1. The authority citation for Part 5b continues to read as follows: ■ Authority: 5 U.S.C. 301, 5 U.S.C. 552a. E:\FR\FM\23AUP1.SGM 23AUP1 42630 Federal Register / Vol. 83, No. 164 / Thursday, August 23, 2018 / Proposed Rules 2. Section 5b.11 is amended by adding paragraph (b)(2)(viii)(A) to read as follows: ■ § 5b.11 Exempt systems. * * * * * (b) * * * (2) * * * (viii) * * * (A) HHS Insider Threat Program Records, 09–90–1701. Dated: June 29, 2018. Michael Schmoyer, Assistant Deputy Secretary for National Security. Dated: August 13, 2018. Alex M. Azar II, Secretary. [FR Doc. 2018–17888 Filed 8–22–18; 8:45 am] BILLING CODE 4151–17–P FEDERAL COMMUNICATIONS COMMISSION Federal Communications Commission. Eliot Greenwald, Deputy Chief, Disability Rights Office, Consumer and Governmental Affairs Bureau. 47 CFR Part 64 [CG Docket Nos. 13–24 and 03–123; DA 18– 818] Petitions for Reconsideration of Action in Rulemaking Proceeding Federal Communications Commission. ACTION: Petitions for reconsideration. AGENCY: daltland on DSKBBV9HB2PROD with PROPOSALS VerDate Sep<11>2014 16:29 Aug 22, 2018 Jkt 244001 [FR Doc. 2018–18248 Filed 8–22–18; 8:45 am] BILLING CODE 6712–01–P DEPARTMENT OF TRANSPORTATION Federal Motor Carrier Safety Administration The Consumer and Governmental Affairs Bureau seeks comment on two Petitions for Reconsideration (Petitions). DATES: Oppositions to the Petitions must be filed on or before September 7, 2018. Replies to oppositions must be filed on or before September 17, 2018. ADDRESSES: Federal Communications Commission, 445 12th Street SW, Washington, DC 20554. FOR FUTHER INFORMATION CONTACT: Michael Scott, Consumer and Governmental Affairs Bureau, at: (202) 418–1264; email: Michael.Scott@fcc.gov. SUPPLEMENTARY INFORMATION: This is a summary of the Commission’s document, DA 18–818, released August 6, 2018. The full text of the Petitions is available for viewing and copying at the FCC Reference Information Center, 445 12th Street SW, Room CY–A257, Washington, DC 20554. It also may be accessed online via the Commission’s Electronic Comment Filing System at: https://ecfsapi.fcc.gov/file/10727293 1103590/Sprint%20Petition%20for%20 Reconsideration%20 REDACTED%20VERSION%20 filed%20072718.pdf and https:// ecfsapi.fcc.gov/file/107091809005003/ SUMMARY: Sprint%20Petition%20re%20ASR %20filed%20070918.pdf. The Commission will not send a Congressional Review Act (CRA) submission to Congress or the Government Accountability Office pursuant to the CRA, 5 U.S.C. because no rules are being adopted by the Commission. Subject: IP CTS Modernization Reform, Report and Order and Declaratory Ruling, FCC 18–79, published at 83 FR 30082, June 27, 2018, in CG Docket Nos. 13–24 and 03– 123. This document is being published pursuant to 47 CFR 1.429(e). See also 47 CFR 1.4(b)(1) and 1.429(f), (g). Number of Petitions Filed: 2. Petitions for Reconsideration have been filed in the Commission’s Rulemaking proceeding by Scott R. Freiermuth, on behalf of Sprint Corporation. 49 CFR Part 395 [Docket No. FMCSA–2018–0248] RIN 2126–AC19 Hours of Service Federal Motor Carrier Safety Administration (FMCSA), DOT. ACTION: Notification of public listening session. AGENCY: The FMCSA announces that it will hold a public listening session concerning potential changes to its hours-of-service (HOS) rules for truck drivers. This will be the first in a series of listening sessions on this topic. On August 21, 2018, FMCSA issued an Advance Notice of Proposed Rulemaking (ANPRM) seeking public comment on four specific aspects of the HOS rules for which the Agency is considering changes: The short-haul HOS limit; the HOS exception for adverse driving conditions; the 30minute rest break provision; and the split-sleeper berth rule to allow drivers to split their required time in the sleeper berth. In addition, the Agency requested public comment on petitions for rulemaking from the Owner-Operator Independent Drivers Association SUMMARY: PO 00000 Frm 00021 Fmt 4702 Sfmt 4702 (OOIDA) and TruckerNation.org (TruckerNation). The Agency encourages vendors of electronic logging devices (ELDs) to participate to address potential implementation issues should changes to the HOS rules be made. The listening session will be held in Dallas, Texas, and will be webcast for the benefit of those not able to attend in person. The listening session will allow interested persons to present comments, views, and relevant research on topics mentioned above. All comments will be transcribed and placed in the rulemaking docket for the FMCSA’s consideration. DATES: The listening session will be August 24, 2018, in Dallas, TX., at the Kay Bailey Hutchison Convention Center, 650 S Griffin St, Dallas, TX 75202. The session will begin at 3 p.m. local time and end at 5 p.m., or earlier, if all participants wishing to express their views have done so. Subsequent documents will be published to announce dates, times, and locations of the other sessions. ADDRESSES: The August 24, 2018, meeting will be held at the Kay Bailey Hutchison Convention Center, 650 S Griffin St, Dallas, TX 75202. You may submit comments identified by Docket Number FMCSA-2018-0248 using any of the following methods: • Federal eRulemaking Portal: https:// www.regulations.gov. Follow the online instructions for submitting comments. • Mail: Docket Management Facility, U.S. Department of Transportation, 1200 New Jersey Avenue SE, West Building, Ground Floor, Room W12–140, Washington, DC 20590–0001. • Hand Delivery or Courier: West Building, Ground Floor, Room W12– 140, 1200 New Jersey Avenue SE, Washington, DC, between 9 a.m. and 5 p.m., Monday through Friday, except Federal holidays. • Fax: 202–493–2251. • Submissions Containing Confidential Business Information (CBI): Mr. Brian Dahlin, Chief, Regulatory Analysis Division, 1200 New Jersey Avenue SE, Washington, DC 20590. To avoid duplication, please use only one of these four methods. See the ‘‘Public Participation and Request for Comments’’ portion of the SUPPLEMENTARY INFORMATION section for instructions on submitting comments, including collection of information comments for the Office of Information and Regulatory Affairs, OMB. FOR FURTHER INFORMATION CONTACT: For information on the listening session, contact Ms. Shannon L. Watson, Senior Advisor to the Associate Administrator for Policy, Federal Motor Carrier Safety E:\FR\FM\23AUP1.SGM 23AUP1

Agencies

[Federal Register Volume 83, Number 164 (Thursday, August 23, 2018)]
[Proposed Rules]
[Pages 42627-42630]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2018-17888]


=======================================================================
-----------------------------------------------------------------------

DEPARTMENT OF HEALTH AND HUMAN SERVICES

45 CFR Part 5b

RIN 0991-AC10


Privacy Act; Implementation

AGENCY: Department of Health and Human Services.

ACTION: Notice of proposed rulemaking.

-----------------------------------------------------------------------

SUMMARY: In accordance with the Privacy Act of 1974, as amended (the 
Act), the Department of Health and Human Services (HHS or Department) 
is proposing to exempt a new system of records, System No. 09-90-1701, 
HHS Insider Threat Program Records, from certain requirements of the 
Act.

DATES: Comments on this notice must be received by September 24, 2018.

ADDRESSES: The public should address written comments on this notice by 
email to [email protected] or by mail to the HHS Office of Security and 
Strategic Information (OSSI), 200 Independence Avenue SW, Washington, 
DC 20201.

FOR FURTHER INFORMATION CONTACT: General questions about the NPRM may 
be submitted to the Assistant Deputy Secretary for National Security by 
email to [email protected], by telephone to (202) 690-5756, or by mail to 
the HHS Office of Security and Strategic Information (OSSI), 200 
Independence Avenue SW, Washington, DC 20201.

SUPPLEMENTARY INFORMATION:

I. Background on the Insider Threat Program and New System of Records 
09-90-1701

    Each federal agency is mandated by Presidential Executive Order 
13587, issued October 7, 2011, to establish an insider threat detection 
and prevention program to ensure the security of classified networks 
and the responsible sharing and safeguarding of classified information 
consistent with appropriate protections for privacy and civil 
liberties. The order states in section 2.1:
    The heads of agencies that operate or access classified computer 
networks shall have responsibility for appropriately sharing and 
safeguarding classified information on computer networks. As part of 
this responsibility, they shall implement an insider threat detection 
and prevention program consistent with guidance and standards developed 
by the Insider Threat Task Force established in section 6 of this 
order.
    A threat need not be directed at classified information to threaten 
classified networks. Consequently, insider threats include any of the 
following: Attempted or actual espionage, subversion, sabotage, 
terrorism, or extremist activities directed against the Department and 
its personnel, facilities, information resources, and activities; 
unauthorized use of or intrusion into automated information systems; 
unauthorized disclosure of classified, controlled unclassified, 
sensitive, or proprietary information to technology; indicators of 
potential insider threats or other incidents that may indicate 
activities of an insider threat; and other threats to the Department, 
such as indicators of potential for workplace violence or misconduct.

[[Page 42628]]

    The office that will administer the Department's Insider Threat 
Program, the Office of Security and Strategic Information (OSSI), 
serves as the Department's Federal Intelligence Coordinating Office 
(FICO), which is responsible for coordinating the sharing and 
safeguarding of classified national security information between HHS 
and its operating divisions and with the Office of the Director of 
National Intelligence (ODNI) and its component agencies within the 
Intelligence Community. Within OSSI, the Directorate of Operations 
(Counterintelligence) will oversee the Insider Threat Program; its 
responsibilities include identifying, countering, mitigating, and 
deterring exploitation of HHS personnel, information, assets, and other 
equities by foreign intelligence and security services and agents, 
terrorists, and transnational criminal organizations working under the 
direction of a foreign entity. HHS counterintelligence efforts include 
(1) counterintelligence inquiries and preliminary investigations, (2) 
national security incident investigations, (3) counterintelligence 
analysis, (4) insider threats detection and mitigation efforts, (5) 
counterintelligence and insider threat awareness, and (6) technical 
threat detection and mitigation.
    The records that OSSI compiles to administer the HHS Insider Threat 
Program, which will be covered by System No. 09-90-1701, may be from 
any source, including from any HHS component, office, program, record 
or source, another government agency, or a member of the public; and 
may include records pertaining to information security, personnel 
security, or systems security. This system of records includes 
investigatory material compiled for law enforcement purposes and 
information classified in the interest of national security.
    Note that System No. 09-90-1701 will not cover investigatory 
material that OSSI compiles solely for the purpose of determining 
suitability, eligibility, or qualification for federal civilian 
employment, military service, federal contracts, or access to 
classified information, because such records are covered by other HHS 
systems of records; specifically: 09-90-0002 ``Investigatory Material 
Compiled for Security and Suitability Purposes System'' with respect to 
HHS Office of Inspector General determinations, and 09-90-0020 
``Suitability for Employment Records'' as to all other HHS 
determinations.
    The new system of records will consist of records compiled and used 
by the Department's Office of Security and Strategic Information 
(OSSI), within the Immediate Office of the Secretary (IOS), to 
administer the Department's Insider Threat Program, including law 
enforcement investigatory material and classified intelligence 
information. Such records are eligible to be exempted from certain 
requirements of the Privacy Act under subsections (k)(1) and (k)(2) of 
the Act. The exemptions proposed for those records are necessary and 
appropriate to protect the integrity of insider threat investigations 
and records and prevent disclosure of information that would reveal 
investigation subjects, investigative and security techniques, national 
security information, security sensitive information, personal privacy 
information, and identities of confidential sources and law enforcement 
personnel involved in investigations. Elsewhere in today's Federal 
Register HHS has published a System of Records Notice (SORN) for System 
No. 09-90-1701 for public notice and comment which describes the new 
system of records in more detail.
    The Privacy Act requirements from which HHS is proposing to exempt 
eligible records in System No. 09-90-1701 are those contained in 
subsections (c)(3), (d)(1)-(4), (e)(1), (e)(4)(G), (H), and (I), and 
(f) of the Privacy Act, which require the agency to provide an 
accounting of disclosures; provide notification, access, and amendment 
rights, rules, and procedures; maintain only relevant and necessary 
information; and identify categories of record sources. If the HHS 
Insider Threat Program obtains law enforcement investigatory material 
from another Privacy Act system of records that has been exempted from 
Privacy Act requirements based on subsection (j)(2) of the Act, that 
material will be exempt in System No. 09-90-1701 to the same extent it 
is exempt in the source system, so may be exempt from any of these 
subsections of the Act: (c)(3)-(4); (d)(1)-(4); (e)(1)-(3), (e)(4)(G)-
(I), (e)(5), (e)(8), (e)(12); (f); (g); and (h).

II. Proposed Exemptions and Affected Records

    The Insider Threat Program system of records includes investigatory 
material compiled for law enforcement purposes and information 
classified in the interest of national security. While OSSI does not 
perform criminal law enforcement activity as its principal function, 
OSSI may compile in System No. 09-90-1701 material obtained from other 
agencies or components which perform as their principal function 
activities pertaining to the enforcement of criminal laws, and which 
have exempted their records from certain Privacy Act requirements, 
based on 5 U.S.C. 552a(j)(2). All other investigatory material compiled 
for law enforcement purposes is eligible to be exempted from certain 
Privacy Act requirements based on 5 U.S.C. 552a(k)(2). Information 
classified in the interest of national security is eligible to be 
exempted from certain Privacy Act requirements, based on 5 U.S.C. 
552a(k)(1). Accordingly, the Department is establishing these 
exemptions for System No. 09-90-1701:
     Law enforcement investigatory material that is from 
another system of records in which such material was exempted from 
access and other requirements of the Privacy Act (the Act), based on 5 
U.S.C. 552a(j)(2), will be exempt in System No. 09-901701 on the same 
basis (5 U.S.C. 552a(j)(2)) and from the same requirements as in the 
source system, which may include any of these requirements of the Act: 
(c)(3)-(4); (d)(1)-(4); (e)(1)-(3), (e)(4)(G)-(I), (e)(5), (e)(8), 
(e)(12); (f); (g); and (h);
     All other law enforcement investigatory material in System 
No. 09-90-1701 will be exempt, based on 5 U.S.C. 552a(k)(2), from the 
requirements in subsections (c)(3), (d)(1)-(4), (e)(1), and (e)(4)(G)-
(I), and (f) of the Act, However, if any individual is denied a right, 
privilege, or benefit to which the individual would otherwise be 
entitled by Federal law or for which the individual would otherwise be 
eligible, access will be granted, except to the extent that the 
disclosure would reveal the identity of a source who furnished 
information to the Government under an express promise of 
confidentiality; and
     Information that is classified in the interest of national 
security will be exempt, based on 5 U.S.C. 552a(k)(1), from the 
requirements in subsections (c)(3), (d)(1)-(4), (e)(1), and (e)(4)(G)-
(I), and (f) of the Act.

III. Exemption Rationales

    These exemptions apply only to the extent that information in this 
system is subject to exemption pursuant to 5 U.S.C. 552a(k). Where HHS 
determines compliance would not appear to interfere with or adversely 
affect the purpose of this system to detect, deter, or mitigate insider 
threats, the applicable exemption may be waived by HHS in its sole 
discretion. Exemptions from the particular subsections are necessary 
and appropriate, and justified for the following reasons:
     5 U.S.C. 552a(c)(3) (the requirement to provide 
accountings of disclosures) and 5 U.S.C. 552a(d)(1)-(4) (requirements 
addressing notification, access, and amendment rights,

[[Page 42629]]

collectively referred to herein as access requirements). Providing 
individual record subjects with accountings of disclosures and with 
notification, access, and amendment rights with respect to Insider 
Threat Program records could reveal the existence of an investigation, 
investigative interest, investigative techniques, details about an 
investigation, security-sensitive information such as information about 
security measures and security vulnerabilities, information that must 
remain non-public to protect national security or personal privacy-
identities of law enforcement personnel, or other sensitive or 
classified information. Revealing such information to record subjects 
would thwart or impede pending and future law enforcement 
investigations and efforts to protect national security, and would 
violate personal privacy. Revealing the information would enable record 
subjects or other persons to evade detection and apprehension by 
security and law enforcement personnel; destroy, conceal, or tamper 
with evidence or fabricate testimony; or harass, intimidate, harm, 
coerce, or retaliate against witnesses, complainants, investigators, 
security personnel, law enforcement personnel, or their family members, 
their employees, or other individuals. With respect to investigatory 
material compiled for law enforcement purposes, the exemption pursuant 
to 5 U.S.C. 552a(k)(2) from access requirements in subsection (d) of 
the Act is statutorily limited. If any individual is denied a right, 
privilege, or benefit to which the individual would otherwise be 
entitled by Federal law or for which the individual would otherwise be 
eligible, access will be granted, except to the extent that the 
disclosure would reveal the identity of a source who furnished 
information to the Government under an express promise of 
confidentiality.
     5 U.S.C. 552a(e)(1) (the requirement to maintain only 
relevant and necessary information authorized by statute or Executive 
Order). It will not always be possible to determine at the time 
information is received or compiled in this system of records whether 
the information is or will be relevant and necessary to a law 
enforcement investigation or to protecting national security. For 
example, a tip or lead that does not appear relevant or necessary to 
uncovering an insider threat by itself or at the time the tip or lead 
is received may prove to be relevant and necessary when combined with 
other information that reveals a pattern or that comes to light later.
     5 U.S.C. 552a(e)(4)(G) and (H) (the requirements to 
describe procedures by which subjects may be notified of whether the 
system of records contains records about them and seek access or 
amendment of a record). These requirements concern individual access to 
records, and the records are exempt under (c) and (d), as described 
above. To the extent that (e)(4)(G) and (H) are interpreted to require 
more detailed procedures regarding record notification, access, or 
amendment than have been published in the Federal Register, exemption 
from those provisions is necessary for the same rationale as applies to 
(c) and (d).
     5 U.S.C. 552a(e)(4)(I) (the requirement to describe the 
categories of record sources). To the extent that this subsection is 
interpreted to require a more detailed description regarding the record 
sources in this system than has been published in the Federal Register, 
exemption from this provision is necessary to protect the sources of 
law enforcement and intelligence information and to protect the privacy 
and safety of witnesses and informants and others who provide 
information to HHS. Further, greater specificity of sources of properly 
classified records could compromise national security. Moreover, 
because records used in the Insider Threat Program could come from any 
source, it is not possible to know every category in advance in order 
to list them all in the SORN. Some record source categories may not be 
appropriate to make public in the SORN if, for example, revealing them 
could enable record subjects or other individuals to discover 
investigative techniques and devise ways to bypass them to evade 
detection and apprehension.
     5 U.S.C. 552a(f) (the requirement to promulgate rules to 
implement provisions of the Privacy Act). To the extent that this 
subsection is interpreted to require agency rules addressing the above 
exempted requirements, exemption from this provision is also necessary 
to protect the sources of law enforcement and intelligence information 
and to protect the privacy and safety of witnesses and informants and 
others who provide information to HHS. Greater specificity in 
rulemaking regarding properly classified records could compromise 
national security.

IV. Analysis of Impacts

    The agency has reviewed this rule under Executive Orders 12866 and 
13563, which direct agencies to assess costs and benefits of available 
regulatory alternatives and, if regulation is necessary, to maximize 
the net benefits. The agency believes that this rule is not a 
significant regulatory action under Executive Order 12866, and 
therefore does not constitute an Executive Order 13771 regulatory 
action, because it will not (1) have an annual effect on the economy of 
$100 million or more or adversely affect in a material way the economy, 
a sector of the economy, productivity, competition, jobs, the 
environment, public health or safety, or State, local or tribal 
governments or communities; (2) create a serious inconsistency or 
otherwise interfere with an action taken or planned by another agency; 
(3) materially alter the budgetary impact of entitlements, grants, user 
fees or loan programs, or the rights and obligations of recipients 
thereof; or (4) raise novel legal or policy issues arising out of legal 
mandates, the President's priorities, or the principles set forth in 
Executive Order 12866.
    The Regulatory Flexibility Act requires agencies to analyze 
regulatory options that would minimize any significant impact of a rule 
on small entities. Because the rule imposes no duties or obligations on 
small entities, the Department certifies that the rule will not have a 
significant economic impact on a substantial number of small entities.
    Section 202(a) of the Unfunded Mandates Reform Act of 1995 requires 
that agencies prepare a written statement, which includes an assessment 
of anticipated costs and benefits, before proposing ``any rule that 
includes any Federal mandate that may result in the expenditure by 
State, local, and tribal governments, in the aggregate, or by the 
private sector, of $100,000,000 or more (adjusted annually for 
inflation) in any one year.'' The current threshold after adjustment 
for inflation is $144 million, using the most current (2015) Implicit 
Price Deflator for the Gross Domestic Product. The Department does not 
expect that this final rule would result in any one-year expenditure 
that would meet or exceed this amount.

List of Subjects in 45 CFR Part 5b

    Privacy.

    For the reasons stated in the preamble, the Department's Privacy 
Act Regulations, part 5b of 45 CFR Subtitle A, are proposed to be 
amended as follows:

PART 5b--PRIVACY ACT REGULATIONS

0
1. The authority citation for Part 5b continues to read as follows:

    Authority: 5 U.S.C. 301, 5 U.S.C. 552a.


[[Page 42630]]


0
2. Section 5b.11 is amended by adding paragraph (b)(2)(viii)(A) to read 
as follows:


Sec.  5b.11  Exempt systems.

* * * * *
    (b) * * *
    (2) * * *
    (viii) * * *
    (A) HHS Insider Threat Program Records, 09-90-1701.


    Dated: June 29, 2018.
Michael Schmoyer,
Assistant Deputy Secretary for National Security.

    Dated: August 13, 2018.
Alex M. Azar II,
Secretary.
[FR Doc. 2018-17888 Filed 8-22-18; 8:45 am]
BILLING CODE 4151-17-P


This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.