Privacy Act of 1974; System of Records, 42667-42672 [2018-18290]
Download as PDF
Federal Register / Vol. 83, No. 164 / Thursday, August 23, 2018 / Notices
discussions and does not provide
guidance or reflect FDA’s current
thinking on this subject. The workshop
report was posted on FDA’s website on
July 11, 2018.
II. Electronic Access
Persons may obtain the summary
report at https://www.fda.gov/
RegulatoryInformation/LawsEnforced
byFDA/SignificantAmendmentstothe
FDCAct/FDARA/ucm598050.htm.
Dated: August 17, 2018.
Leslie Kux,
Associate Commissioner for Policy.
[FR Doc. 2018–18232 Filed 8–22–18; 8:45 am]
BILLING CODE 4164–01–P
DEPARTMENT OF HEALTH AND
HUMAN SERVICES
National Advisory Council on the
National Health Service Corps
Health Resources and Service
Administration (HRSA), Department of
Health and Human Services (HHS).
ACTION: Notice of meeting.
AGENCY:
The National Advisory
Council on the National Health Service
Corps (NACNHSC) has scheduled a
public meeting. Information about
NACNHSC and the agenda for this
meeting can be found on the NACNHSC
website at https://nhsc.hrsa.gov/about/
national-advisory-council-nhsc/
index.html.
SUMMARY:
September 17, 2018, 9:00 a.m.–
5:00 p.m. ET, and September 18, 2018,
9:00 a.m.–2:30 p.m., E.T.
ADDRESSES: This meeting will be held in
person and will offer virtual access
through teleconference and webinar.
The address for the meeting is 5600
Fishers Lane, Room 5W37, Rockville,
Maryland 20857.
• Conference call-in number: 1–800–
238–9007; passcode: 155333.
• Webinar link is https://
hrsa.connectsolutions.com/nacnhsc.
FOR FURTHER INFORMATION CONTACT:
Diane Fabiyi-King, Designated Federal
Official (DFO), Division of National
Health Service Corps, HRSA, 5600
Fishers Lane, Room 14N110, Rockville,
Maryland 20857; 301–443–3609; or
DFabiyi-King@hrsa.gov.
SUPPLEMENTARY INFORMATION:
NACNHSC consults, advises, and makes
recommendations to the HHS Secretary
and the HRSA Administrator with
respect to their responsibilities.
NACNHSC also reviews and comments
on regulations promulgated by the
Secretary under Subpart II, Part D of
daltland on DSKBBV9HB2PROD with NOTICES
DATES:
VerDate Sep<11>2014
19:43 Aug 22, 2018
Jkt 244001
Title III of the Public Health Service
Act.
During the September 2018 meetings,
NACNHSC will continue its discussion
from the May 15, 2018, meeting to
develop recommendations on the
current NHSC focus areas and finalize
policy recommendations to the
Secretary and the HRSA Administrator.
The current circumstances to strengthen
the healthcare workforce and NHSC’s
role in the expansion and improvement
of access to quality opioid and
substance use disorder treatment in
rural and underserved areas is an
important opportunity for NACNHSC to
add its voice. For this reason,
NACNHSC will develop comprehensive
policy recommendations and a
framework to articulate a clear vision
and mission statement that aligns with
the BHW and HRSA strategic plan. An
agenda will be posted on the NACNHSC
website prior to the meeting. Agenda
items are subject to change as priorities
dictate.
Members of the public will have the
opportunity to provide comments. Oral
comments will be honored in the order
they are requested and may be limited
as time allows. Requests to make oral
comments or provide written comments
to the NACNHSC should be sent to
Monica-Tia Bullock by email at
MBullock@hrsa.gov at least 3 business
days prior to the meeting. Council
members are given copies of all written
statements submitted from the public.
Any further public participation will be
solely at the discretion of the Chair,
with approval of the DFO. Registration
through the designated contact for the
public comment session is required.
Individuals who plan to attend and
need special assistance or another
reasonable accommodation should
notify Monica-Tia Bullock using the
email address listed above at least 10
business days prior to the meeting.
Since this meeting occurs in a federal
government building, attendees must go
through a security check to enter the
building. Non-U.S. Citizen attendees
must notify HRSA of their planned
attendance at least 10 business days
prior to the meeting in order to facilitate
their entry into the building. All
attendees are required to present
government-issued identification prior
to entry.
Amy P. McNulty,
Acting Director, Division of the Executive
Secretariat.
[FR Doc. 2018–18143 Filed 8–22–18; 8:45 am]
BILLING CODE 4165–15–P
PO 00000
Frm 00032
Fmt 4703
Sfmt 4703
42667
DEPARTMENT OF HEALTH AND
HUMAN SERVICES
Privacy Act of 1974; System of
Records
Office of Security and Strategic
Information (OSSI), Immediate Office of
the Secretary (IOS), Department of
Health and Human Services (HHS).
ACTION: Notice of a new system of
records.
AGENCY:
In accordance with the
requirements of the Privacy Act of 1974,
as amended (the Act), the Department of
Health and Human Services (HHS) is
providing notice of the establishment of
a new system of records, System No.
09–90–1701, HHS Insider Threat
Program Records. The new system of
records will cover records about
individuals, retrieved by personal
identifier, which are compiled and used
by the Department’s Office of Security
and Strategic Information (OSSI), within
the Immediate Office of the Secretary
(IOS), to administer the Department’s
insider threat program. Because the
records in this system of records include
investigatory material compiled for law
enforcement purposes and information
classified in the interest of national
security, elsewhere in today’s Federal
Register HHS has published a Notice of
Proposed Rulemaking (NPRM) to
exempt this system of records from
certain requirements of the Privacy Act,
pursuant to subsections (k)(1) and (k)(2)
of the Act. The system of records is
more fully described in the
SUPPLEMENTARY INFORMATION section of
this notice and in the System of Records
Notice (SORN) published in this notice.
DATES: This system of records is
applicable August 23, 2018 with the
exception of the routine uses and
exemptions. Written comments on the
SORN should be submitted by
September 24, 2018. If HHS receives no
significant adverse comment within the
specified comment period, the routine
uses will be applicable on September
24, 2018. If any timely significant
adverse comment is received, HHS will
publish a revised system of records. The
exemptions will be applicable following
publication of a Final Rule.
ADDRESSES: The public should address
written comments on the proposed
system of records to insiderthreat@
hhs.gov or to the HHS Office of Security
and Strategic Information (OSSI), 200
Independence Avenue SW, Washington,
DC 20201.
FOR FURTHER INFORMATION CONTACT:
General questions about the system of
records may be submitted to Michael
Schmoyer, Ph.D., Assistant Deputy
SUMMARY:
E:\FR\FM\23AUN1.SGM
23AUN1
42668
Federal Register / Vol. 83, No. 164 / Thursday, August 23, 2018 / Notices
Secretary for National Security, by
telephone, email, or mail, at (202) 690–
5756 or insiderthreat@hhs.gov or at HHS
Office of Security and Strategic
Information (OSSI), 200 Independence
Avenue SW, Washington, DC 20201.
SUPPLEMENTARY INFORMATION: Each
federal agency is mandated by
Presidential Executive Order 13587,
issued October 7, 2011, to establish an
insider threat detection and prevention
program to ensure the security of
classified networks and the responsible
sharing and safeguarding of classified
information consistent with appropriate
protections for privacy and civil
liberties. The order states in section 2.1:
daltland on DSKBBV9HB2PROD with NOTICES
The heads of agencies that operate or
access classified computer networks shall
have responsibility for appropriately sharing
and safeguarding classified information on
computer networks. As part of this
responsibility, they shall implement an
insider threat detection and prevention
program consistent with guidance and
standards developed by the Insider Threat
Task Force established in section 6 of this
order.
A threat need not be directed at
classified information to threaten
classified networks. Consequently,
insider threats include any of the
following: Attempted or actual
espionage, subversion, sabotage,
terrorism, or extremist activities
directed against the Department and its
personnel, facilities, information
resources, and activities; unauthorized
use of or intrusion into automated
information systems; unauthorized
disclosure of classified, controlled
unclassified, sensitive, or proprietary
information to technology; indicators of
potential insider threats or other
incidents that may indicate activities of
an insider threat; and other threats to
the Department, such as indicators of
potential for workplace violence or
misconduct.
The records that OSSI will compile to
administer HHS’ insider threat program
may be from any HHS component,
office, program, record or source, and
may include records pertaining to
information security, personnel
security, or systems security. The
records covered under System No. 09–
90–1701 include investigatory material
compiled for law enforcement purposes
and information classified in the
interest of national security.
Accordingly, HHS has published a
Notice of Proposed Rulemaking (NPRM)
in today’s Federal Register to exempt
such material in the new system of
records from certain Privacy Act
requirements, based on subsections
(k)(1) and (k)(2) of the Act.
VerDate Sep<11>2014
19:43 Aug 22, 2018
Jkt 244001
The Insider Threat Program system of
records includes investigatory material
compiled for law enforcement purposes
and information classified in the
interest of national security. While OSSI
does not perform criminal law
enforcement activity as its principal
function, OSSI may compile in System
No. 09–90–1701 material obtained from
other agencies or components which
perform as their principal function
activities pertaining to the enforcement
of criminal laws, and which have
exempted their records from certain
Privacy Act requirements, based on 5
U.S.C. 552a(j)(2). All other investigatory
material compiled for law enforcement
purposes is eligible to be exempted from
certain Privacy Act requirements based
on 5 U.S.C. 552a(k)(2). Information
classified in the interest of national
security is eligible to be exempted from
certain Privacy Act requirements, based
on 5 U.S.C. 552a(k)(1). The
Department’s NPRM published in
today’s Federal Register proposes to
establish these exemptions for System
No. 09–90–1701:
• Law enforcement investigatory
material compiled in this system of
records that is from another system of
records in which such material was
exempted from access and other
requirements of the Privacy Act (the
Act) based on 5 U.S.C. 552a(j)(2) will be
exempt in this system of records on the
same basis (5 U.S.C. 552a(j)(2)) and from
the same requirements as in the source
system. The requirements from which
records described in 5 U.S.C. 552a(j)(2)
are eligible to be exempted are: (c)(3)–
(4); (d)(1)–(4); (e)(1)–(3), (e)(4)(G)–(I),
(e)(5), (e)(8), (e)(12); (f); (g); and (h).
• All other law enforcement
investigatory material in System No. 09–
90–1701 will be exempt, based on 5
U.S.C. 552a(k)(2), from the requirements
in subsections (c)(3), (d)(1)–(4), (e)(1),
(e)(4)(G)–(I), and (f) of the Act. However,
if any individual is denied a right,
privilege, or benefit to which the
individual would otherwise be entitled
by Federal law or for which the
individual would otherwise be eligible,
access will be granted, except to the
extent that the disclosure would reveal
the identity of a source who furnished
information to the Government under an
express promise of confidentiality.
• Information in this system of
records that is classified in the interest
of national security will be exempt,
based on 5 U.S.C. 552a(k)(1), from the
requirements in subsections (c)(3),
(d)(1)–(4), (e)(1), (e)(4)(G)–(I), and (f) of
the Act.
Note that this system of records does
not cover investigatory material
compiled solely for the purpose of
PO 00000
Frm 00033
Fmt 4703
Sfmt 4703
determining suitability, eligibility, or
qualification for federal civilian
employment, military service, federal
contracts, or access to classified
information. Such material is covered
by other HHS systems of records (i.e.,
09–90–0002 with respect to HHS Office
of Inspector General determinations,
and 09–90–0020 as to all other HHS
determinations) which have been
exempted from access and other Privacy
Act requirements based on 5 U.S.C.
552a(k)(5).
SYSTEM NAME AND NUMBER
HHS Insider Threat Program Records,
09–90–1701
SECURITY CLASSIFICATION:
Classified and unclassified.
SYSTEM LOCATION:
HHS Office of Security and Strategic
Information (OSSI), 200 Independence
Avenue SW, Washington, DC 20201.
SYSTEM MANAGER(S):
Assistant Deputy Secretary for
National Security, HHS Office of
Security and Strategic Information
(OSSI), 200 Independence Avenue SW,
Washington, DC 20201.
AUTHORITY FOR MAINTENANCE OF THE SYSTEM:
E.O. 13587, Structural Reforms To
Improve the Security of Classified
Networks and the Responsible Sharing
and Safeguarding of Classified
Information (Oct. 7, 2011).
Presidential Memorandum, National
Insider Threat Policy and Minimum
Standards for Executive Branch Insider
Threat Programs (Nov. 21, 2012).
Intelligence Reform and Terrorism
Prevention Act of 2004, Public Law
108–458, 118 Stat. 3638; Intelligence
Authorization Act for FY 2010, Public
Law 111–259, 124 Stat. 2654.
28 U.S.C. 535, Investigation of Crimes
Involving Government Officers and
Employees; Limitations; 50 U.S.C. 3381,
Coordination of Counterintelligence
Activities; E.O. 10450, Security
Requirements for Government
Employment (Apr. 17, 1953); E.O.
12333, United States Intelligence
Activities (as amended); E.O. 12829,
National Industrial Security Program;
E.O. 12968, Access to Classified
Information (Aug. 2, 1995); E.O. 13467,
Reforming Processes Related to
Suitability for Government
Employment, Fitness for Contractor
Employees, and Eligibility for Access to
Classified National Security Information
(June 30, 2008); E.O. 13488, Granting
Reciprocity on Excepted Service and
Federal Contractor Employee Fitness
and Reinvestigating Individuals in
E:\FR\FM\23AUN1.SGM
23AUN1
Federal Register / Vol. 83, No. 164 / Thursday, August 23, 2018 / Notices
Positions of Public Trust (Jan. 16, 2009);
E.O. 13526, Classified National Security
Information (Dec. 29, 2009).
44 U.S.C. 3554, Federal Agency
Responsibilities; 44 U.S.C. 3557,
National Security Systems. E.O. 12333,
United States Intelligence Activities
(Dec. 4, 1981); E.O. 13556, Controlled
Unclassified Information (Nov. 4, 2010);
E.O. 13526, Classified National Security
Information (Dec. 29, 2009); E.O. 13388,
Further Strengthening the Sharing of
Terrorism Information To Protect
Americans (Oct. 25, 2005); E.O. 13587,
Structural Reforms to Improve the
Security of Classified Information
Networks and Responsible Sharing and
Safeguarding of Classified Information
(Oct. 7, 2011); E.O. 12829, National
Industrial Security Program (Jan. 6,
1993); E.O. 13549, Classified National
Security Information Programs for State,
Local, Tribal, and Private Sector Entities
(Aug. 18, 2010); E.O. 13636, Improving
Critical Infrastructure Cybersecurity
(Feb. 12, 2013); Committee on National
Security Systems Directive 504,
Directive on Protecting NSS from
Insider Threat (Feb. 4, 2014); Committee
on National Security Systems Directive
505, Supply Chain Risk Management
(SCRM) (Mar. 7, 2012); Committee on
National Security Systems Instruction
4009, Committee on National Security
Systems (CNSS) Glossary (Apr. 6, 2015);
Presidential Decision Directive/NSC–12
Security Awareness and Reporting of
Foreign Contacts (Aug. 5, 1993); HHS
Residual Standards of Conduct, 45 CFR
part 73 (May 20, 2015); Statement of
Organization, Functions, and
Delegations of Authority for the Office
of Security and Strategic Information, 71
FR 71004 (Nov. 28, 2012); HHS
Counterintelligence and Insider Threat
Policy (July 13, 2015); OS Policy for
Special Monitoring of Employee Use of
Information Technology Resources
(Nov. 7, 2013); HHS Policy for Handling
Security Incidents Related to the
Potential Unauthorized Disclosure of
Classified National Security Information
(June 20, 2013); HHS
Counterintelligence and Insider Threat
Policy (July 7, 2015); HHS Policy for
Handling Security Incidents Related to
the Potential Unauthorized Disclosure
of Classified National Security
Information (June 20, 2013).
daltland on DSKBBV9HB2PROD with NOTICES
PURPOSE(S) OF THE SYSTEM:
The purpose of the system is to
support a program of insider threat
detection and prevention that is
consistent with guidance and standards
developed by the National Insider
Threat Task Force, ensures the
responsible sharing and safeguarding of
information, and provides appropriate
VerDate Sep<11>2014
19:43 Aug 22, 2018
Jkt 244001
privacy and civil liberties protections.
Records will be used on a need-to-know
basis to manage insider threat matters;
facilitate inside threat investigations
and activities associated with
counterintelligence and
counterespionage complaints, inquiries
and investigations; identify threats to
Department resources, including threats
to the Department’s personnel, facilities,
and information assets (including, in
particular, classified networks and
information); track tips and referrals of
potential insider threats to internal and
external partners; provide information
for statistical reports; and meet other
insider threat program requirements.
CATEGORIES OF INDIVIDUALS COVERED BY THE
SYSTEM:
The categories of individuals covered
by this system are HHS insiders, defined
as any person with authorized access to
any HHS resource to include personnel,
facilities, information, equipment,
networks or systems. Such persons
include present and former HHS
employees, members of joint task forces
under the purview of HHS, contractors,
detailees, assignees, interns, visitors,
and guests.
For the purposes of this system of
records, sensitive information includes
information classified pursuant to
Executive Orders 13526, 12829, and
13549 and unclassified information that
requires safeguarding or dissemination
controls pursuant to and consistent with
law, regulations, and U.S. Governmentwide policies falling under the program
established by Executive Order 13556.
CATEGORIES OF RECORDS IN THE SYSTEM:
The system will include these
categories of records:
A. Records derived from lawful HHS
security investigations, including
authorized physical, personnel, and
communications security investigations,
and information systems security
analysis and reporting, such as:
• Responses to information requested
by official questionnaires (e.g., SF 86
Questionnaire for National Security
Positions) that include: Full name,
former names and aliases; date and
place of birth; social security number;
height and weight; hair and eye color;
gender; ethnicity and race; biometric
data; mother’s maiden name; personal
identity verification (PIV) number;
current and former home and work
addresses, phone numbers, and email
addresses; employment history; military
record information; selective service
registration record; residential history;
education history and degrees earned;
names of associates and references with
their contact information; citizenship
PO 00000
Frm 00034
Fmt 4703
Sfmt 4703
42669
information; passport information;
driver’s license information; identifying
numbers from access control passes or
identification cards; criminal history;
civil court actions; prior personnel
security eligibility, investigative, and
adjudicative information, including
information collected through
continuous evaluation; mental health
history; records related to drug or
alcohol use; financial record
information; credit reports; the name,
date and place of birth, social security
number, and citizenship information for
spouse or cohabitant; the name and
marriage information for current and
former spouse(s); the citizenship, name,
date and place of birth, and address for
relatives;
• Reports furnished to HHS or
collected by HHS in connection with
personnel security investigations,
continuous evaluation for eligibility for
access to classified information, and
insider threat detection programs
operated by HHS pursuant to Federal
laws and Executive Orders and HHS
policies, including information derived
from: Responses to information
requested on foreign contacts and
activities; association records;
information on loyalty to the United
States;
• Records relating to the management
and operation of HHS personnel and
physical security, including information
derived from: Personnel security
adjudications and financial disclosure
filings; nondisclosure agreements;
document control registries; courier
authorization requests; derivative
classification unique identifiers;
requests for access to sensitive
compartmented information (SCI);
security violation files; travel records;
foreign contact reports; briefing and
debriefing statements for special
programs, positions designated as
sensitive; polygraph examination
results; logs of computer activities on all
HHS information technology (IT)
systems or any IT systems accessed by
HHS personnel with security clearances;
facility access records; and
• Reports of investigation regarding
security violations, including:
Individual statements or affidavits and
correspondence; incident reports; drug
test results; investigative records of a
criminal, civil, or administrative nature;
letters, emails, memoranda and reports;
exhibits, evidence, statements, and
affidavits; inquiries relating to
suspected security violations; and
recommended remedial actions for
possible security violations.
B. Summaries or reports about
potential insider threats, from:
E:\FR\FM\23AUN1.SGM
23AUN1
daltland on DSKBBV9HB2PROD with NOTICES
42670
Federal Register / Vol. 83, No. 164 / Thursday, August 23, 2018 / Notices
• Reports of investigation regarding
security violations, including:
Statements, declarations, affidavits and
correspondence; incident reports;
investigative records of a criminal, civil
or administrative nature; letters, emails,
memoranda, and reports; exhibits and
evidence; and, recommended remedial
or corrective actions for security
violations; reports about potential
insider threats regarding: Personnel user
names and aliases, levels of network
access, audit data, information regarding
misuse of HHS devices, information
regarding unauthorized use of
removable media, and logs of printer,
copier, and facsimile machine use;
• Information collected through user
activity monitoring, which is the
technical capability to observe and
record the actions and activities of all
users, at any time, on a computer
network monitored by HHS, even if not
controlled by HHS, thereof in order to
deter, detect, and mitigate insider
threats as well as to support authorized
investigations. Such information may
include key strokes, screen captures,
and content transmitted via email, chat,
or data import or export;
• Reports about potential insider
threats from records of usage of
government telephone systems,
including the telephone number
initiating the call, the telephone number
receiving the call, and the date and time
of the call;
• Payroll information, travel
vouchers, benefits information, credit
reports, equal employment opportunity
complaints, performance evaluations,
disciplinary files, training records,
substance abuse and mental health
records of individuals undergoing law
enforcement action or presenting an
identifiable imminent threat, counseling
statements, outside work and activities
requests, and personal contact records;
and
• Particularly sensitive or protected
information, including information held
by special access programs, law
enforcement, inspector general, or other
investigative sources or programs.
Access to such information may require
additional approval by the senior HHS
official who is responsible for managing
and overseeing the program.
C. Information related to investigative
or analytical efforts by HHS insider
threat program personnel, including:
• Identifying threats to HHS
personnel, property, facilities, and
information; information obtained from
Intelligence Community members, the
Federal Bureau of Investigation, or from
other agencies or organizations about
individuals known or suspected of
being engaged in conduct constituting,
VerDate Sep<11>2014
19:43 Aug 22, 2018
Jkt 244001
preparing for, aiding, or relating to an
insider threat, including espionage or
unauthorized disclosure of classified
national security information;
• Publicly available information,
such as information regarding: Arrests
and detentions; real property;
bankruptcy; liens or holds on property;
vehicles; licensure (including
professional and pilot’s licenses,
firearms and explosive permits);
business licenses and filings; and from
social media;
• Information provided by record
subjects and individual members of the
public; and
• Information provided by
individuals who report known or
suspected insider threats.
D. Reports about potential insider
threats obtained through the
management and operation of the HHS
Operating or Staff Division insider
threat programs, including:
• Documentation pertaining to
investigative or analytical efforts by
HHS insider threat program personnel
to identify threats to HHS personnel,
property, facilities, and information;
• Records collated to examine
information technology events and other
information that could reveal potential
insider threat activities; and
• Travel records.
E. Reports about potential insider
threats obtained from other Federal
Government sources, including:
• Documentation obtained from
Intelligence Community members, the
Federal Bureau of Investigation, or from
other agencies or organizations
pertaining to individuals known or
suspected of being engaged in conduct
constituting, preparing for, aiding, or
relating to an insider threat, including
espionage or unauthorized disclosure of
classified national security information;
and
• Intelligence reports and database
query results relating to individuals
covered by this system.
RECORD SOURCE CATEGORIES:
Information in the system will be
received from Department officials,
employees, contractors, and other
individuals who are associated with or
represent HHS; officials from other
foreign, federal, tribal, state, and local
government agencies and organizations;
non-government, commercial, public,
and private agencies and organizations;
complainants, informants, suspects, and
witnesses; and from relevant records,
including counterintelligence and
security databases and files; personnel
security databases and files; HHS
human resources databases and files;
Office of the Chief Information Officer
PO 00000
Frm 00035
Fmt 4703
Sfmt 4703
and information assurance databases
and files; information collected through
user activity monitoring; HHS telephone
usage records; federal, state, tribal,
territorial, and local law enforcement
and investigatory records; Inspector
General records; available U.S.
Government intelligence and
counterintelligence reporting
information and analytic products
pertaining to adversarial threats; other
Federal agencies; and publicly available
information.
ROUTINE USES OF RECORDS MAINTAINED IN THE
SYSTEM, INCLUDING CATEGORIES OF USERS AND
PURPOSES OF SUCH USES:
HHS may disclose records about an
individual from this system of records
to parties outside HHS, without the
individual’s prior written consent,
pursuant to these routine uses:
1. Records may disclosed to agency
contractors, consultants, or others who
have been engaged by the agency to
assist with accomplishment of an HHS
function relating to the purposes of this
system of records and who need to have
access to the records in order to assist
HHS.
2. Records may be disclosed to any
person, organization, or governmental
entity in order to notify them of a
serious terrorist threat for the purpose of
guarding against or responding to the
threat.
3. Records may be disclosed to third
parties during the course of an
investigation to the extent necessary to
obtain information pertinent to the
investigation
4. Records may be disclosed to a
federal, state, or local agency, or other
appropriate entities or individuals, or
through established liaison channels to
selected foreign governments, in order
to enable the intelligence agency with
the relevant authority and responsibility
for the matter to carry out its
responsibilities under the National
Security Act of 1947 as amended, the
CIA act of 1949 as emended, Executive
Order 12333 or any successor order,
applicable national security directives,
or classified implementing procedures
approved by the Attorney General and
promulgated pursuant to such statutes,
orders or directives.
5. Factual information the disclosure
of which would be in the public interest
and which would not constitute an
unwarranted invasion of personal
privacy may be disclosed to the news
media or the general public.
6. Where a record, either alone or in
conjunction with other information,
indicates a violation or potential
violation of law, whether civil, criminal,
or regulatory in nature, and whether
E:\FR\FM\23AUN1.SGM
23AUN1
daltland on DSKBBV9HB2PROD with NOTICES
Federal Register / Vol. 83, No. 164 / Thursday, August 23, 2018 / Notices
arising by general statute or by
regulation, rule, or order issued
pursuant thereto, the relevant records in
the system of records may be referred,
as a routine use, to the agency
concerned, whether federal, state, local,
tribal, territorial, or foreign, charged
with the responsibility of investigating
or prosecuting such violation or charged
with enforcing or implementing the
statute, or the rule, regulation, or order
issued pursuant thereto.
7. Records may be disclosed to an
appropriate federal, state, local, tribal,
territorial, foreign, or international
agency, if the information is relevant
and necessary to a requesting agency’s
decision concerning the hiring or
retention of an individual, or issuance
of a security clearance, license, contract,
grant, delegation or designation of
authority, or other benefit, or if the
information is relevant and necessary to
a HHS decision concerning the hiring or
retention of an employee, the issuance
of a security clearance, the reporting of
an investigation of an employee, the
letting of a contract, or the issuance of
a license, grant, delegation or
designation of authority, or other benefit
and disclosure is appropriate to the
proper performance of the official duties
of the person making the request.
8. Records may be disclosed to the
Department of Justice (DOJ) or to a court
or other tribunal when:
a. HHS or any of its components; or
b. any employee of HHS acting in the
employee’s official capacity; or
c. any employee of HHS acting in the
employee’s individual capacity where
the DOJ or HHS has agreed to represent
the employee; or
d. the United States Government, is a
party to a proceeding or has an interest
in such proceeding and the disclosure of
such records is deemed by the agency to
be relevant and necessary to the
proceeding.
9. Records may be disclosed to a
congressional office from the record of
an individual in response to a written
inquiry from the congressional office
made at the written request of that
individual.
10. Records may be disclosed to
representatives of the National Archives
and Records Administration during
records management inspections
conducted pursuant to 44 U.S.C. 2904
and 2906.
11. Records may be disclosed to
appropriate agencies, entities, and
persons when (1) HHS suspects or has
confirmed that there has been a breach
of the system of records, (2) HHS has
determined that as a result of the
suspected or confirmed breach there is
a risk of harm to individuals, HHS
VerDate Sep<11>2014
19:43 Aug 22, 2018
Jkt 244001
(including its information systems,
programs, and operations), the federal
government, or national security, and
(3) the disclosure made to such
agencies, entities, and persons is
reasonably necessary to assist in
connection with HHS’s efforts to
respond to the suspected or confirmed
breach or to prevent, minimize, or
remedy such harm.
12. Records may be disclosed to
another federal agency or federal entity,
when HHS determines that information
from this system of records is
reasonably necessary to assist the
recipient agency or entity in (1)
responding to a suspected or confirmed
breach or (2) preventing, minimizing, or
remedying the risk of harm to
individuals, the recipient agency or
entity (including its information
systems, programs, and operations), the
federal government, or national security,
resulting from a suspected or confirmed
breach.
13. Records may be disclosed to the
U.S. Department of Homeland Security
(DHS) if captured in an intrusion
detection system used by HHS and DHS
pursuant to a DHS cybersecurity
program that monitors internet traffic to
and from federal government computer
networks to prevent a variety of types of
cybersecurity incidents.
The disclosures authorized by
publication of the above routine uses
pursuant to 5 U.S.C. 552a(b)(3) are in
addition to the following disclosures
which HHS may make based on other
authorizations:
• Disclosures authorized by the
subject individual’s prior written
consent pursuant to 5 U.S.C. 552a(b).
For example, another agency conducting
a background investigation or
assessment may request information
from this system of records using the
consent form that the subject individual
signed.
• Disclosures authorized directly in
the Privacy Act at 5 U.S.C. 552a(b)(1),
(2) and (b)(4)–(11). For example, another
agency conducting a law enforcement
activity may request information from
this system of records by making the
request in accordance with 5 U.S.C.
552a(b)(7).
POLICIES AND PRACTICES FOR STORAGE OF
RECORDS:
Records will be stored in hard copy
files and electronic media.
POLICIES AND PRACTICES FOR RETRIEVAL OF
RECORDS:
Records will be retrieved by an
individual record subject’s name, SSN,
or PIV identification number.
PO 00000
Frm 00036
Fmt 4703
Sfmt 4703
42671
POLICIES AND PRACTICES FOR RETENTION AND
DISPOSAL OF RECORDS:
The records in this system of records
are covered by National Archives and
Records Administration General
Records Schedule 5.6, items 230 and
240. Records determined to be
associated with an insider threat or to
have potential to be associated with an
insider threat are destroyed 25 years
after the date the threat was discovered,
but a longer retention is authorized if
required for business use. User
attributable data collected to monitor
user activities on a network to enable
insider threat programs and activities to
identify and evaluate anomalous
activity, identify and assess misuse or
exploitation, or support authorized
inquiries and investigations, is
destroyed five years after an inquiry was
opened, but a longer retention is
authorized if required for business use.
ADMINISTRATIVE, TECHNICAL, AND PHYSICAL
SAFEGUARDS:
Safeguards will conform to the HHS
Information Security and Privacy
Program, https://www.hhs.gov/ocio/
securityprivacy/. Information
will be safeguarded in accordance with
applicable laws, rules and policies,
including the HHS Information
Technology Security Program
Handbook, all pertinent National
Institutes of Standards and Technology
(NIST) publications, and OMB Circular
A–130, Managing Information as a
Strategic Resource. Records will be
protected from unauthorized access
through appropriate administrative,
physical, and technical safeguards.
These safeguards include protecting the
facilities where records are stored or
accessed with security guards, badges
and cameras; securing hard-copy
records in locked file cabinets, file
rooms or offices during off-duty hours;
controlling access to physical locations
where records are maintained and used
by means of combination locks and
identification badges issued only to
authorized users; limiting access to
electronic databases to authorized users
based on roles and two-factor
authentication (user ID and password),
using a secured operating system
protected by encryption, firewalls, and
intrusion detection systems, requiring
encryption for records stored on
removable media, and training
personnel in Privacy Act and
information security requirements.
Records that are eligible for destruction
will be disposed of using secure
destruction methods prescribed by NIST
SP 800–88.
E:\FR\FM\23AUN1.SGM
23AUN1
42672
Federal Register / Vol. 83, No. 164 / Thursday, August 23, 2018 / Notices
RECORD ACCESS PROCEDURES:
An individual seeking access to
records about him or her in this system
of records should submit an access
request to the System Manager
identified in the ‘‘System Manager’’
section of this SORN, and must follow
the access procedures contained in the
HHS Privacy Act regulations, 45 CFR
part 5b (currently located in section
5b.5). The individual’s right of access
under the Privacy Act will be subject to
the exemptions promulgated for this
system of records. Records compiled in
reasonable anticipation of a civil action
or proceeding are excluded from the
Privacy Act access requirement in all
systems of records as provided in 5
U.S.C. 552a(d)(5).
CONTESTING RECORD PROCEDURES:
An individual seeking to amend a
record about him or her in this system
of records should submit an amendment
request to the System Manager indicated
in the ‘‘System Manager’’ section of this
SORN, and must follow the correction/
amendment procedures contained in the
HHS Privacy Act regulations, 45 CFR
part 5b (currently located in section
5b.7). The individual’s right of
amendment will be subject to the
exemptions promulgated for this system
of records.
NOTIFICATION PROCEDURES:
An individual who wishes to know if
this system contains records about him
or her should submit a notification
request to the System Manager indicated
in the ‘‘System Manager’’ section of this
SORN, and must follow the notification
procedures contained in the HHS
Privacy Act regulations, 45 CFR part 5b
(currently located in section 5b.5). The
individual’s right to notification will be
subject to the exemptions promulgated
for this system of records.
daltland on DSKBBV9HB2PROD with NOTICES
EXEMPTIONS PROMULGATED FOR THE SYSTEM:
Upon completion of the Department’s
pending rulemaking (i.e., when a Final
Rule has been published in the Federal
Register and has become effective based
on the Notice of Proposed Rulemaking
published elsewhere in today’s Federal
Register), this system of records will be
exempt from access and other
requirements of the Privacy Act, as
follows:
• Material compiled in this system of
records that is from another system of
records in which such material was
exempted from access and other
requirements of the Privacy Act (the
Act) based on 5 U.S.C. 552a(j)(2) will be
exempt in this system of records on the
same basis (5 U.S.C. 552a(j)(2)) and from
the same requirements as in the source
VerDate Sep<11>2014
19:43 Aug 22, 2018
Jkt 244001
system. The requirements from which
records described in 5 U.S.C. 552a(j)(2)
are eligible to be exempted are: (c)(3)–
(4); (d)(1)–(4); (e)(1)–(3), (e)(4)(G)–(I),
(e)(5), (e)(8), (e)(12); (f); (g); and (h).
• All other law enforcement
investigatory material in System No. 09–
90–1701 will be exempt, based on 5
U.S.C. 552a(k)(2), from the requirements
in subsections (c)(3), (d)(1)–(4), (e)(1),
(e)(4)(G)–(I), and (f) of the Act. However,
if any individual is denied a right,
privilege, or benefit to which the
individual would otherwise be entitled
by Federal law or for which the
individual would otherwise be eligible,
access will be granted, except to the
extent that the disclosure would reveal
the identity of a source who furnished
information to the Government under an
express promise of confidentiality.
• Information in this system of
records that is classified in the interest
of national security will be exempt,
based on 5 U.S.C. 552a(k)(1), from the
requirements in subsections (c)(3),
(d)(1)–(4), (e)(1), (e)(4)(G)–(I), and (f) of
the Act.
HISTORY:
None.
Dated: June 29, 2018.
Michael Schmoyer,
Assistant Deputy Secretary for National
Security.
[FR Doc. 2018–18290 Filed 8–22–18; 8:45 am]
BILLING CODE 4151–17–P
DEPARTMENT OF HEALTH AND
HUMAN SERVICES
National Institutes of Health
National Institute on Aging; Notice of
Closed Meeting
Pursuant to section 10(d) of the
Federal Advisory Committee Act, as
amended, notice is hereby given of the
following meeting.
The meeting will be closed to the
public in accordance with the
provisions set forth in sections
552b(c)(4) and 552b(c)(6), Title 5 U.S.C.,
as amended. The grant applications and
the discussions could disclose
confidential trade secrets or commercial
property such as patentable material,
and personal information concerning
individuals associated with the grant
applications, the disclosure of which
would constitute a clearly unwarranted
invasion of personal privacy.
Name of Committee: National Institute on
Aging Special Emphasis Panel; Aspirin and
Aging.
Date: October 11, 2018.
Time: 12:00 p.m. to 4:00 p.m.
PO 00000
Frm 00037
Fmt 4703
Sfmt 4703
Agenda: To review and evaluate grant
applications.
Place: National Institute on Aging,
Gateway Building, Suite 2W200, 7201
Wisconsin Avenue, Bethesda, MD 20892.
Contact Person: Greg Bissonette, Ph.D.,
Scientific Review Officer, National Institute
on Aging, National Institutes of Health,
Gateway Building, Suite 2W200, 7201
Wisconsin Avenue, Bethesda, MD 20892,
301–402–1622, bissonettegb@mail.nih.gov.
(Catalogue of Federal Domestic Assistance
Program Nos. 93.866, Aging Research,
National Institutes of Health, HHS)
Dated: August 17, 2018.
Melanie J. Pantoja,
Program Analyst, Office of Federal Advisory
Committee Policy.
[FR Doc. 2018–18174 Filed 8–22–18; 8:45 am]
BILLING CODE 4140–01–P
DEPARTMENT OF HEALTH AND
HUMAN SERVICES
National Institutes of Health
Center for Scientific Review; Notice of
Closed Meeting
Pursuant to section 10(d) of the
Federal Advisory Committee Act, as
amended, notice is hereby given of the
following meeting.
The meeting will be closed to the
public in accordance with the
provisions set forth in sections
552b(c)(4) and 552b(c)(6), Title 5 U.S.C.,
as amended. The grant applications and
the discussions could disclose
confidential trade secrets or commercial
property such as patentable material,
and personal information concerning
individuals associated with the grant
applications, the disclosure of which
would constitute a clearly unwarranted
invasion of personal privacy.
Name of Committee: Center for Scientific
Review Special Emphasis Panel; PAR Panel
Shared Instruments: NMR Spectrometers and
X-ray Crystallography Equipment.
Date: September 20–21, 2018.
Time: 8:00 a.m. to 5:00 p.m.
Agenda: To review and evaluate grant
applications.
Place: National Institutes of Health, 6701
Rockledge Drive, Bethesda, MD 20892,
(Virtual Meeting).
Contact Person: David R Jollie, Ph.D.,
Scientific Review Officer, Center for
Scientific Review, National Institutes of
Health, 6701 Rockledge Drive, Room 4150,
MSC 7806, Bethesda, MD 20892, (301)–435–
1722, jollieda@csr.nih.gov.
(Catalogue of Federal Domestic Assistance
Program Nos. 93.306, Comparative Medicine;
93.333, Clinical Research, 93.306, 93.333,
93.337, 93.393–93.396, 93.837–93.844,
93.846–93.878, 93.892, 93.893, National
Institutes of Health, HHS)
E:\FR\FM\23AUN1.SGM
23AUN1
Agencies
[Federal Register Volume 83, Number 164 (Thursday, August 23, 2018)]
[Notices]
[Pages 42667-42672]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2018-18290]
-----------------------------------------------------------------------
DEPARTMENT OF HEALTH AND HUMAN SERVICES
Privacy Act of 1974; System of Records
AGENCY: Office of Security and Strategic Information (OSSI), Immediate
Office of the Secretary (IOS), Department of Health and Human Services
(HHS).
ACTION: Notice of a new system of records.
-----------------------------------------------------------------------
SUMMARY: In accordance with the requirements of the Privacy Act of
1974, as amended (the Act), the Department of Health and Human Services
(HHS) is providing notice of the establishment of a new system of
records, System No. 09-90-1701, HHS Insider Threat Program Records. The
new system of records will cover records about individuals, retrieved
by personal identifier, which are compiled and used by the Department's
Office of Security and Strategic Information (OSSI), within the
Immediate Office of the Secretary (IOS), to administer the Department's
insider threat program. Because the records in this system of records
include investigatory material compiled for law enforcement purposes
and information classified in the interest of national security,
elsewhere in today's Federal Register HHS has published a Notice of
Proposed Rulemaking (NPRM) to exempt this system of records from
certain requirements of the Privacy Act, pursuant to subsections (k)(1)
and (k)(2) of the Act. The system of records is more fully described in
the SUPPLEMENTARY INFORMATION section of this notice and in the System
of Records Notice (SORN) published in this notice.
DATES: This system of records is applicable August 23, 2018 with the
exception of the routine uses and exemptions. Written comments on the
SORN should be submitted by September 24, 2018. If HHS receives no
significant adverse comment within the specified comment period, the
routine uses will be applicable on September 24, 2018. If any timely
significant adverse comment is received, HHS will publish a revised
system of records. The exemptions will be applicable following
publication of a Final Rule.
ADDRESSES: The public should address written comments on the proposed
system of records to [email protected] or to the HHS Office of
Security and Strategic Information (OSSI), 200 Independence Avenue SW,
Washington, DC 20201.
FOR FURTHER INFORMATION CONTACT: General questions about the system of
records may be submitted to Michael Schmoyer, Ph.D., Assistant Deputy
[[Page 42668]]
Secretary for National Security, by telephone, email, or mail, at (202)
690-5756 or [email protected] or at HHS Office of Security and
Strategic Information (OSSI), 200 Independence Avenue SW, Washington,
DC 20201.
SUPPLEMENTARY INFORMATION: Each federal agency is mandated by
Presidential Executive Order 13587, issued October 7, 2011, to
establish an insider threat detection and prevention program to ensure
the security of classified networks and the responsible sharing and
safeguarding of classified information consistent with appropriate
protections for privacy and civil liberties. The order states in
section 2.1:
The heads of agencies that operate or access classified computer
networks shall have responsibility for appropriately sharing and
safeguarding classified information on computer networks. As part of
this responsibility, they shall implement an insider threat
detection and prevention program consistent with guidance and
standards developed by the Insider Threat Task Force established in
section 6 of this order.
A threat need not be directed at classified information to threaten
classified networks. Consequently, insider threats include any of the
following: Attempted or actual espionage, subversion, sabotage,
terrorism, or extremist activities directed against the Department and
its personnel, facilities, information resources, and activities;
unauthorized use of or intrusion into automated information systems;
unauthorized disclosure of classified, controlled unclassified,
sensitive, or proprietary information to technology; indicators of
potential insider threats or other incidents that may indicate
activities of an insider threat; and other threats to the Department,
such as indicators of potential for workplace violence or misconduct.
The records that OSSI will compile to administer HHS' insider
threat program may be from any HHS component, office, program, record
or source, and may include records pertaining to information security,
personnel security, or systems security. The records covered under
System No. 09-90-1701 include investigatory material compiled for law
enforcement purposes and information classified in the interest of
national security. Accordingly, HHS has published a Notice of Proposed
Rulemaking (NPRM) in today's Federal Register to exempt such material
in the new system of records from certain Privacy Act requirements,
based on subsections (k)(1) and (k)(2) of the Act.
The Insider Threat Program system of records includes investigatory
material compiled for law enforcement purposes and information
classified in the interest of national security. While OSSI does not
perform criminal law enforcement activity as its principal function,
OSSI may compile in System No. 09-90-1701 material obtained from other
agencies or components which perform as their principal function
activities pertaining to the enforcement of criminal laws, and which
have exempted their records from certain Privacy Act requirements,
based on 5 U.S.C. 552a(j)(2). All other investigatory material compiled
for law enforcement purposes is eligible to be exempted from certain
Privacy Act requirements based on 5 U.S.C. 552a(k)(2). Information
classified in the interest of national security is eligible to be
exempted from certain Privacy Act requirements, based on 5 U.S.C.
552a(k)(1). The Department's NPRM published in today's Federal Register
proposes to establish these exemptions for System No. 09-90-1701:
Law enforcement investigatory material compiled in this
system of records that is from another system of records in which such
material was exempted from access and other requirements of the Privacy
Act (the Act) based on 5 U.S.C. 552a(j)(2) will be exempt in this
system of records on the same basis (5 U.S.C. 552a(j)(2)) and from the
same requirements as in the source system. The requirements from which
records described in 5 U.S.C. 552a(j)(2) are eligible to be exempted
are: (c)(3)-(4); (d)(1)-(4); (e)(1)-(3), (e)(4)(G)-(I), (e)(5), (e)(8),
(e)(12); (f); (g); and (h).
All other law enforcement investigatory material in System
No. 09-90-1701 will be exempt, based on 5 U.S.C. 552a(k)(2), from the
requirements in subsections (c)(3), (d)(1)-(4), (e)(1), (e)(4)(G)-(I),
and (f) of the Act. However, if any individual is denied a right,
privilege, or benefit to which the individual would otherwise be
entitled by Federal law or for which the individual would otherwise be
eligible, access will be granted, except to the extent that the
disclosure would reveal the identity of a source who furnished
information to the Government under an express promise of
confidentiality.
Information in this system of records that is classified
in the interest of national security will be exempt, based on 5 U.S.C.
552a(k)(1), from the requirements in subsections (c)(3), (d)(1)-(4),
(e)(1), (e)(4)(G)-(I), and (f) of the Act.
Note that this system of records does not cover investigatory
material compiled solely for the purpose of determining suitability,
eligibility, or qualification for federal civilian employment, military
service, federal contracts, or access to classified information. Such
material is covered by other HHS systems of records (i.e., 09-90-0002
with respect to HHS Office of Inspector General determinations, and 09-
90-0020 as to all other HHS determinations) which have been exempted
from access and other Privacy Act requirements based on 5 U.S.C.
552a(k)(5).
SYSTEM NAME AND NUMBER
HHS Insider Threat Program Records, 09-90-1701
SECURITY CLASSIFICATION:
Classified and unclassified.
SYSTEM LOCATION:
HHS Office of Security and Strategic Information (OSSI), 200
Independence Avenue SW, Washington, DC 20201.
SYSTEM MANAGER(S):
Assistant Deputy Secretary for National Security, HHS Office of
Security and Strategic Information (OSSI), 200 Independence Avenue SW,
Washington, DC 20201.
AUTHORITY FOR MAINTENANCE OF THE SYSTEM:
E.O. 13587, Structural Reforms To Improve the Security of
Classified Networks and the Responsible Sharing and Safeguarding of
Classified Information (Oct. 7, 2011).
Presidential Memorandum, National Insider Threat Policy and Minimum
Standards for Executive Branch Insider Threat Programs (Nov. 21, 2012).
Intelligence Reform and Terrorism Prevention Act of 2004, Public
Law 108-458, 118 Stat. 3638; Intelligence Authorization Act for FY
2010, Public Law 111-259, 124 Stat. 2654.
28 U.S.C. 535, Investigation of Crimes Involving Government
Officers and Employees; Limitations; 50 U.S.C. 3381, Coordination of
Counterintelligence Activities; E.O. 10450, Security Requirements for
Government Employment (Apr. 17, 1953); E.O. 12333, United States
Intelligence Activities (as amended); E.O. 12829, National Industrial
Security Program; E.O. 12968, Access to Classified Information (Aug. 2,
1995); E.O. 13467, Reforming Processes Related to Suitability for
Government Employment, Fitness for Contractor Employees, and
Eligibility for Access to Classified National Security Information
(June 30, 2008); E.O. 13488, Granting Reciprocity on Excepted Service
and Federal Contractor Employee Fitness and Reinvestigating Individuals
in
[[Page 42669]]
Positions of Public Trust (Jan. 16, 2009); E.O. 13526, Classified
National Security Information (Dec. 29, 2009).
44 U.S.C. 3554, Federal Agency Responsibilities; 44 U.S.C. 3557,
National Security Systems. E.O. 12333, United States Intelligence
Activities (Dec. 4, 1981); E.O. 13556, Controlled Unclassified
Information (Nov. 4, 2010); E.O. 13526, Classified National Security
Information (Dec. 29, 2009); E.O. 13388, Further Strengthening the
Sharing of Terrorism Information To Protect Americans (Oct. 25, 2005);
E.O. 13587, Structural Reforms to Improve the Security of Classified
Information Networks and Responsible Sharing and Safeguarding of
Classified Information (Oct. 7, 2011); E.O. 12829, National Industrial
Security Program (Jan. 6, 1993); E.O. 13549, Classified National
Security Information Programs for State, Local, Tribal, and Private
Sector Entities (Aug. 18, 2010); E.O. 13636, Improving Critical
Infrastructure Cybersecurity (Feb. 12, 2013); Committee on National
Security Systems Directive 504, Directive on Protecting NSS from
Insider Threat (Feb. 4, 2014); Committee on National Security Systems
Directive 505, Supply Chain Risk Management (SCRM) (Mar. 7, 2012);
Committee on National Security Systems Instruction 4009, Committee on
National Security Systems (CNSS) Glossary (Apr. 6, 2015); Presidential
Decision Directive/NSC-12 Security Awareness and Reporting of Foreign
Contacts (Aug. 5, 1993); HHS Residual Standards of Conduct, 45 CFR part
73 (May 20, 2015); Statement of Organization, Functions, and
Delegations of Authority for the Office of Security and Strategic
Information, 71 FR 71004 (Nov. 28, 2012); HHS Counterintelligence and
Insider Threat Policy (July 13, 2015); OS Policy for Special Monitoring
of Employee Use of Information Technology Resources (Nov. 7, 2013); HHS
Policy for Handling Security Incidents Related to the Potential
Unauthorized Disclosure of Classified National Security Information
(June 20, 2013); HHS Counterintelligence and Insider Threat Policy
(July 7, 2015); HHS Policy for Handling Security Incidents Related to
the Potential Unauthorized Disclosure of Classified National Security
Information (June 20, 2013).
PURPOSE(S) OF THE SYSTEM:
The purpose of the system is to support a program of insider threat
detection and prevention that is consistent with guidance and standards
developed by the National Insider Threat Task Force, ensures the
responsible sharing and safeguarding of information, and provides
appropriate privacy and civil liberties protections. Records will be
used on a need-to-know basis to manage insider threat matters;
facilitate inside threat investigations and activities associated with
counterintelligence and counterespionage complaints, inquiries and
investigations; identify threats to Department resources, including
threats to the Department's personnel, facilities, and information
assets (including, in particular, classified networks and information);
track tips and referrals of potential insider threats to internal and
external partners; provide information for statistical reports; and
meet other insider threat program requirements.
CATEGORIES OF INDIVIDUALS COVERED BY THE SYSTEM:
The categories of individuals covered by this system are HHS
insiders, defined as any person with authorized access to any HHS
resource to include personnel, facilities, information, equipment,
networks or systems. Such persons include present and former HHS
employees, members of joint task forces under the purview of HHS,
contractors, detailees, assignees, interns, visitors, and guests.
For the purposes of this system of records, sensitive information
includes information classified pursuant to Executive Orders 13526,
12829, and 13549 and unclassified information that requires
safeguarding or dissemination controls pursuant to and consistent with
law, regulations, and U.S. Government-wide policies falling under the
program established by Executive Order 13556.
CATEGORIES OF RECORDS IN THE SYSTEM:
The system will include these categories of records:
A. Records derived from lawful HHS security investigations,
including authorized physical, personnel, and communications security
investigations, and information systems security analysis and
reporting, such as:
Responses to information requested by official
questionnaires (e.g., SF 86 Questionnaire for National Security
Positions) that include: Full name, former names and aliases; date and
place of birth; social security number; height and weight; hair and eye
color; gender; ethnicity and race; biometric data; mother's maiden
name; personal identity verification (PIV) number; current and former
home and work addresses, phone numbers, and email addresses; employment
history; military record information; selective service registration
record; residential history; education history and degrees earned;
names of associates and references with their contact information;
citizenship information; passport information; driver's license
information; identifying numbers from access control passes or
identification cards; criminal history; civil court actions; prior
personnel security eligibility, investigative, and adjudicative
information, including information collected through continuous
evaluation; mental health history; records related to drug or alcohol
use; financial record information; credit reports; the name, date and
place of birth, social security number, and citizenship information for
spouse or cohabitant; the name and marriage information for current and
former spouse(s); the citizenship, name, date and place of birth, and
address for relatives;
Reports furnished to HHS or collected by HHS in connection
with personnel security investigations, continuous evaluation for
eligibility for access to classified information, and insider threat
detection programs operated by HHS pursuant to Federal laws and
Executive Orders and HHS policies, including information derived from:
Responses to information requested on foreign contacts and activities;
association records; information on loyalty to the United States;
Records relating to the management and operation of HHS
personnel and physical security, including information derived from:
Personnel security adjudications and financial disclosure filings;
nondisclosure agreements; document control registries; courier
authorization requests; derivative classification unique identifiers;
requests for access to sensitive compartmented information (SCI);
security violation files; travel records; foreign contact reports;
briefing and debriefing statements for special programs, positions
designated as sensitive; polygraph examination results; logs of
computer activities on all HHS information technology (IT) systems or
any IT systems accessed by HHS personnel with security clearances;
facility access records; and
Reports of investigation regarding security violations,
including: Individual statements or affidavits and correspondence;
incident reports; drug test results; investigative records of a
criminal, civil, or administrative nature; letters, emails, memoranda
and reports; exhibits, evidence, statements, and affidavits; inquiries
relating to suspected security violations; and recommended remedial
actions for possible security violations.
B. Summaries or reports about potential insider threats, from:
[[Page 42670]]
Reports of investigation regarding security violations,
including: Statements, declarations, affidavits and correspondence;
incident reports; investigative records of a criminal, civil or
administrative nature; letters, emails, memoranda, and reports;
exhibits and evidence; and, recommended remedial or corrective actions
for security violations; reports about potential insider threats
regarding: Personnel user names and aliases, levels of network access,
audit data, information regarding misuse of HHS devices, information
regarding unauthorized use of removable media, and logs of printer,
copier, and facsimile machine use;
Information collected through user activity monitoring,
which is the technical capability to observe and record the actions and
activities of all users, at any time, on a computer network monitored
by HHS, even if not controlled by HHS, thereof in order to deter,
detect, and mitigate insider threats as well as to support authorized
investigations. Such information may include key strokes, screen
captures, and content transmitted via email, chat, or data import or
export;
Reports about potential insider threats from records of
usage of government telephone systems, including the telephone number
initiating the call, the telephone number receiving the call, and the
date and time of the call;
Payroll information, travel vouchers, benefits
information, credit reports, equal employment opportunity complaints,
performance evaluations, disciplinary files, training records,
substance abuse and mental health records of individuals undergoing law
enforcement action or presenting an identifiable imminent threat,
counseling statements, outside work and activities requests, and
personal contact records; and
Particularly sensitive or protected information, including
information held by special access programs, law enforcement, inspector
general, or other investigative sources or programs. Access to such
information may require additional approval by the senior HHS official
who is responsible for managing and overseeing the program.
C. Information related to investigative or analytical efforts by
HHS insider threat program personnel, including:
Identifying threats to HHS personnel, property,
facilities, and information; information obtained from Intelligence
Community members, the Federal Bureau of Investigation, or from other
agencies or organizations about individuals known or suspected of being
engaged in conduct constituting, preparing for, aiding, or relating to
an insider threat, including espionage or unauthorized disclosure of
classified national security information;
Publicly available information, such as information
regarding: Arrests and detentions; real property; bankruptcy; liens or
holds on property; vehicles; licensure (including professional and
pilot's licenses, firearms and explosive permits); business licenses
and filings; and from social media;
Information provided by record subjects and individual
members of the public; and
Information provided by individuals who report known or
suspected insider threats.
D. Reports about potential insider threats obtained through the
management and operation of the HHS Operating or Staff Division insider
threat programs, including:
Documentation pertaining to investigative or analytical
efforts by HHS insider threat program personnel to identify threats to
HHS personnel, property, facilities, and information;
Records collated to examine information technology events
and other information that could reveal potential insider threat
activities; and
Travel records.
E. Reports about potential insider threats obtained from other
Federal Government sources, including:
Documentation obtained from Intelligence Community
members, the Federal Bureau of Investigation, or from other agencies or
organizations pertaining to individuals known or suspected of being
engaged in conduct constituting, preparing for, aiding, or relating to
an insider threat, including espionage or unauthorized disclosure of
classified national security information; and
Intelligence reports and database query results relating
to individuals covered by this system.
RECORD SOURCE CATEGORIES:
Information in the system will be received from Department
officials, employees, contractors, and other individuals who are
associated with or represent HHS; officials from other foreign,
federal, tribal, state, and local government agencies and
organizations; non-government, commercial, public, and private agencies
and organizations; complainants, informants, suspects, and witnesses;
and from relevant records, including counterintelligence and security
databases and files; personnel security databases and files; HHS human
resources databases and files; Office of the Chief Information Officer
and information assurance databases and files; information collected
through user activity monitoring; HHS telephone usage records; federal,
state, tribal, territorial, and local law enforcement and investigatory
records; Inspector General records; available U.S. Government
intelligence and counterintelligence reporting information and analytic
products pertaining to adversarial threats; other Federal agencies; and
publicly available information.
ROUTINE USES OF RECORDS MAINTAINED IN THE SYSTEM, INCLUDING CATEGORIES
OF USERS AND PURPOSES OF SUCH USES:
HHS may disclose records about an individual from this system of
records to parties outside HHS, without the individual's prior written
consent, pursuant to these routine uses:
1. Records may disclosed to agency contractors, consultants, or
others who have been engaged by the agency to assist with
accomplishment of an HHS function relating to the purposes of this
system of records and who need to have access to the records in order
to assist HHS.
2. Records may be disclosed to any person, organization, or
governmental entity in order to notify them of a serious terrorist
threat for the purpose of guarding against or responding to the threat.
3. Records may be disclosed to third parties during the course of
an investigation to the extent necessary to obtain information
pertinent to the investigation
4. Records may be disclosed to a federal, state, or local agency,
or other appropriate entities or individuals, or through established
liaison channels to selected foreign governments, in order to enable
the intelligence agency with the relevant authority and responsibility
for the matter to carry out its responsibilities under the National
Security Act of 1947 as amended, the CIA act of 1949 as emended,
Executive Order 12333 or any successor order, applicable national
security directives, or classified implementing procedures approved by
the Attorney General and promulgated pursuant to such statutes, orders
or directives.
5. Factual information the disclosure of which would be in the
public interest and which would not constitute an unwarranted invasion
of personal privacy may be disclosed to the news media or the general
public.
6. Where a record, either alone or in conjunction with other
information, indicates a violation or potential violation of law,
whether civil, criminal, or regulatory in nature, and whether
[[Page 42671]]
arising by general statute or by regulation, rule, or order issued
pursuant thereto, the relevant records in the system of records may be
referred, as a routine use, to the agency concerned, whether federal,
state, local, tribal, territorial, or foreign, charged with the
responsibility of investigating or prosecuting such violation or
charged with enforcing or implementing the statute, or the rule,
regulation, or order issued pursuant thereto.
7. Records may be disclosed to an appropriate federal, state,
local, tribal, territorial, foreign, or international agency, if the
information is relevant and necessary to a requesting agency's decision
concerning the hiring or retention of an individual, or issuance of a
security clearance, license, contract, grant, delegation or designation
of authority, or other benefit, or if the information is relevant and
necessary to a HHS decision concerning the hiring or retention of an
employee, the issuance of a security clearance, the reporting of an
investigation of an employee, the letting of a contract, or the
issuance of a license, grant, delegation or designation of authority,
or other benefit and disclosure is appropriate to the proper
performance of the official duties of the person making the request.
8. Records may be disclosed to the Department of Justice (DOJ) or
to a court or other tribunal when:
a. HHS or any of its components; or
b. any employee of HHS acting in the employee's official capacity;
or
c. any employee of HHS acting in the employee's individual capacity
where the DOJ or HHS has agreed to represent the employee; or
d. the United States Government, is a party to a proceeding or has
an interest in such proceeding and the disclosure of such records is
deemed by the agency to be relevant and necessary to the proceeding.
9. Records may be disclosed to a congressional office from the
record of an individual in response to a written inquiry from the
congressional office made at the written request of that individual.
10. Records may be disclosed to representatives of the National
Archives and Records Administration during records management
inspections conducted pursuant to 44 U.S.C. 2904 and 2906.
11. Records may be disclosed to appropriate agencies, entities, and
persons when (1) HHS suspects or has confirmed that there has been a
breach of the system of records, (2) HHS has determined that as a
result of the suspected or confirmed breach there is a risk of harm to
individuals, HHS (including its information systems, programs, and
operations), the federal government, or national security, and (3) the
disclosure made to such agencies, entities, and persons is reasonably
necessary to assist in connection with HHS's efforts to respond to the
suspected or confirmed breach or to prevent, minimize, or remedy such
harm.
12. Records may be disclosed to another federal agency or federal
entity, when HHS determines that information from this system of
records is reasonably necessary to assist the recipient agency or
entity in (1) responding to a suspected or confirmed breach or (2)
preventing, minimizing, or remedying the risk of harm to individuals,
the recipient agency or entity (including its information systems,
programs, and operations), the federal government, or national
security, resulting from a suspected or confirmed breach.
13. Records may be disclosed to the U.S. Department of Homeland
Security (DHS) if captured in an intrusion detection system used by HHS
and DHS pursuant to a DHS cybersecurity program that monitors internet
traffic to and from federal government computer networks to prevent a
variety of types of cybersecurity incidents.
The disclosures authorized by publication of the above routine uses
pursuant to 5 U.S.C. 552a(b)(3) are in addition to the following
disclosures which HHS may make based on other authorizations:
Disclosures authorized by the subject individual's prior
written consent pursuant to 5 U.S.C. 552a(b). For example, another
agency conducting a background investigation or assessment may request
information from this system of records using the consent form that the
subject individual signed.
Disclosures authorized directly in the Privacy Act at 5
U.S.C. 552a(b)(1), (2) and (b)(4)-(11). For example, another agency
conducting a law enforcement activity may request information from this
system of records by making the request in accordance with 5 U.S.C.
552a(b)(7).
POLICIES AND PRACTICES FOR STORAGE OF RECORDS:
Records will be stored in hard copy files and electronic media.
POLICIES AND PRACTICES FOR RETRIEVAL OF RECORDS:
Records will be retrieved by an individual record subject's name,
SSN, or PIV identification number.
POLICIES AND PRACTICES FOR RETENTION AND DISPOSAL OF RECORDS:
The records in this system of records are covered by National
Archives and Records Administration General Records Schedule 5.6, items
230 and 240. Records determined to be associated with an insider threat
or to have potential to be associated with an insider threat are
destroyed 25 years after the date the threat was discovered, but a
longer retention is authorized if required for business use. User
attributable data collected to monitor user activities on a network to
enable insider threat programs and activities to identify and evaluate
anomalous activity, identify and assess misuse or exploitation, or
support authorized inquiries and investigations, is destroyed five
years after an inquiry was opened, but a longer retention is authorized
if required for business use.
ADMINISTRATIVE, TECHNICAL, AND PHYSICAL SAFEGUARDS:
Safeguards will conform to the HHS Information Security and Privacy
Program, https://www.hhs.gov/ocio/securityprivacy/.
Information will be safeguarded in accordance with applicable laws,
rules and policies, including the HHS Information Technology Security
Program Handbook, all pertinent National Institutes of Standards and
Technology (NIST) publications, and OMB Circular A-130, Managing
Information as a Strategic Resource. Records will be protected from
unauthorized access through appropriate administrative, physical, and
technical safeguards. These safeguards include protecting the
facilities where records are stored or accessed with security guards,
badges and cameras; securing hard-copy records in locked file cabinets,
file rooms or offices during off-duty hours; controlling access to
physical locations where records are maintained and used by means of
combination locks and identification badges issued only to authorized
users; limiting access to electronic databases to authorized users
based on roles and two-factor authentication (user ID and password),
using a secured operating system protected by encryption, firewalls,
and intrusion detection systems, requiring encryption for records
stored on removable media, and training personnel in Privacy Act and
information security requirements. Records that are eligible for
destruction will be disposed of using secure destruction methods
prescribed by NIST SP 800-88.
[[Page 42672]]
RECORD ACCESS PROCEDURES:
An individual seeking access to records about him or her in this
system of records should submit an access request to the System Manager
identified in the ``System Manager'' section of this SORN, and must
follow the access procedures contained in the HHS Privacy Act
regulations, 45 CFR part 5b (currently located in section 5b.5). The
individual's right of access under the Privacy Act will be subject to
the exemptions promulgated for this system of records. Records compiled
in reasonable anticipation of a civil action or proceeding are excluded
from the Privacy Act access requirement in all systems of records as
provided in 5 U.S.C. 552a(d)(5).
CONTESTING RECORD PROCEDURES:
An individual seeking to amend a record about him or her in this
system of records should submit an amendment request to the System
Manager indicated in the ``System Manager'' section of this SORN, and
must follow the correction/amendment procedures contained in the HHS
Privacy Act regulations, 45 CFR part 5b (currently located in section
5b.7). The individual's right of amendment will be subject to the
exemptions promulgated for this system of records.
NOTIFICATION PROCEDURES:
An individual who wishes to know if this system contains records
about him or her should submit a notification request to the System
Manager indicated in the ``System Manager'' section of this SORN, and
must follow the notification procedures contained in the HHS Privacy
Act regulations, 45 CFR part 5b (currently located in section 5b.5).
The individual's right to notification will be subject to the
exemptions promulgated for this system of records.
EXEMPTIONS PROMULGATED FOR THE SYSTEM:
Upon completion of the Department's pending rulemaking (i.e., when
a Final Rule has been published in the Federal Register and has become
effective based on the Notice of Proposed Rulemaking published
elsewhere in today's Federal Register), this system of records will be
exempt from access and other requirements of the Privacy Act, as
follows:
Material compiled in this system of records that is from
another system of records in which such material was exempted from
access and other requirements of the Privacy Act (the Act) based on 5
U.S.C. 552a(j)(2) will be exempt in this system of records on the same
basis (5 U.S.C. 552a(j)(2)) and from the same requirements as in the
source system. The requirements from which records described in 5
U.S.C. 552a(j)(2) are eligible to be exempted are: (c)(3)-(4); (d)(1)-
(4); (e)(1)-(3), (e)(4)(G)-(I), (e)(5), (e)(8), (e)(12); (f); (g); and
(h).
All other law enforcement investigatory material in System
No. 09-90-1701 will be exempt, based on 5 U.S.C. 552a(k)(2), from the
requirements in subsections (c)(3), (d)(1)-(4), (e)(1), (e)(4)(G)-(I),
and (f) of the Act. However, if any individual is denied a right,
privilege, or benefit to which the individual would otherwise be
entitled by Federal law or for which the individual would otherwise be
eligible, access will be granted, except to the extent that the
disclosure would reveal the identity of a source who furnished
information to the Government under an express promise of
confidentiality.
Information in this system of records that is classified
in the interest of national security will be exempt, based on 5 U.S.C.
552a(k)(1), from the requirements in subsections (c)(3), (d)(1)-(4),
(e)(1), (e)(4)(G)-(I), and (f) of the Act.
HISTORY:
None.
Dated: June 29, 2018.
Michael Schmoyer,
Assistant Deputy Secretary for National Security.
[FR Doc. 2018-18290 Filed 8-22-18; 8:45 am]
BILLING CODE 4151-17-P