Privacy Act of 1974; System of Records, 10803-10808 [2019-05540]
Download as PDF
Federal Register / Vol. 84, No. 56 / Friday, March 22, 2019 / Notices
Consideration will be given to all
comments received by May 21, 2019.
ADDRESSES: You may submit comments,
identified by docket number and title,
by any of the following methods:
Federal eRulemaking Portal: https://
www.regulations.gov. Follow the
instructions for submitting comments.
Mail: Department of Defense, Office of
the Chief Management Officer,
Directorate for Oversight and
Compliance, 4800 Mark Center Drive,
Mailbox #24, Suite 08D09, Alexandria,
VA 22350–1700.
Instructions: All submissions received
must include the agency name, docket
number and title for this Federal
Register document. The general policy
for comments and other submissions
from members of the public is to make
these submissions available for public
viewing on the internet at https://
www.regulations.gov as they are
received without change, including any
personal identifiers or contact
information.
DATES:
To
request more information on this
proposed information collection or to
obtain a copy of the proposal and
associated collection instruments,
please write to the Office of the General
Counsel, ATTN: Standards of Conduct
Office (Mr. Green), 1600 Defense
Pentagon, Suite 3E783, Washington, DC
20301–1600.
SUPPLEMENTARY INFORMATION:
Title; Associated Form; and OMB
Number: Post Government Employment
Advice Opinion Request; DD Form
2945; OMB Control Number 0704–0467.
Needs and Uses: The information
collection requirement is necessary to
obtain minimal information on which to
base an opinion about post Government
employment of select former and
departing DoD employees seeking to
work for Defense Contractors within two
years after leaving DoD. The departing
or former DoD employee uses the form
to organize and provide employmentrelated information to an ethics official
who will use the information to render
an advisory opinion to the employee
requesting the opinion. The National
Defense Authorization Act for Fiscal
Year 2008, Public Law 110–181, section
847, requires that select DoD officials
and former DoD officials who, within
two years after leaving DoD, expect to
receive compensation from a DoD
Contractor, shall, before accepting such
compensation, request a written opinion
regarding the applicability of postemployment restrictions to activities
that the official or former official may
undertake on behalf of a contractor.
FOR FURTHER INFORMATION CONTACT:
VerDate Sep<11>2014
17:37 Mar 21, 2019
Jkt 247001
Affected Public: Individuals or
households.
Annual Burden Hours: 250.
Number of Respondents: 250.
Responses per Respondent: 1.
Annual Responses: 250.
Average Burden per Response: 60
minutes.
Frequency: On occasion.
The National Defense Authorization
Act for Fiscal Year 2008, Public Law
110–181, section 847, requires that
select DoD officials and former DoD
officials who, within two years after
leaving DoD, expects to receive
compensation from a DoD contractor,
shall, before accepting such
compensation, request a written opinion
regarding the applicability of postemployment restrictions to activities
that the official or former official may
undertake on behalf of a contractor.
The departing or former DoD
employee uses the form to organize and
provide employment-related
information to an ethics official who
will use the information to provide an
opinion to the employee on the
applicability of post-Government
employment restrictions. The
information requested is employmentrelated and identifying information
about the person requesting the opinion.
Dated: March 19, 2019.
Aaron T. Siegel,
Alternate OSD Federal Register Liaison
Officer, Department of Defense.
[FR Doc. 2019–05510 Filed 3–21–19; 8:45 am]
BILLING CODE 5001–06–P
DEPARTMENT OF DEFENSE
Office of the Secretary
[Docket ID DOD–2019–OS–0033]
Privacy Act of 1974; System of
Records
Office of the Secretary, DoD.
Notice of a Modified System of
Records.
AGENCY:
ACTION:
The Office of the Secretary of
Defense (OSD) proposes to modify a
system of records, titled ‘‘Department of
Defense (DoD) Insider Threat
Management and Analysis Center
(DITMAC) and DoD Component Insider
Threat Records System,’’ DUSDI 01DoD. This system enables DoD to
implement the requirements of
Executive Order (E.O.) 13587, Structural
Reforms to Improve the Security of
Classified Networks and the
Responsible Sharing and Safeguarding
of Classified Information; and
Presidential Memorandum dated
November 21, 2012, the National Insider
SUMMARY:
PO 00000
Frm 00034
Fmt 4703
Sfmt 4703
10803
Threat Policy and Minimum Standards
for Executive Branch Insider Threat
Programs. The system analyzes,
monitors, and audits insider threat
information to detect and mitigate DoD
insider threats to U.S. Government
installations, facilities, personnel,
missions, or resources. The system
supports the DITMAC and DoD
Component insider threat programs,
enables the identification of systemic
insider threat issues and challenges,
provides a basis for the development
and recommendation of solutions to
mitigate potential insider threats, and
assists in identifying best practices from
other Federal government insider threat
programs.
The proposed modification to the
system expands the population of
covered individuals to include
individuals with an active identification
card, pass or credential from a DoD
organization used to gain physical or
logical access to a DoD facility, network,
system or program. Modifications were
made to the following sections of this
system of records: System manager,
purpose, categories of individuals,
categories of records, and routine uses.
DATES: Comments will be accepted on or
before April 22, 2019. This proposed
action will be effective the date
following the end of the comment
period unless comments are received
which result in a contrary
determination.
You may submit comments,
identified by docket number and title,
by any of the following methods:
* Federal Rulemaking Portal: https://
www.regulations.gov. Follow the
instructions for submitting comments.
* Mail: Department of Defense, Office
of the Chief Management Officer,
Directorate for Oversight and
Compliance, 4800 Mark Center Drive,
Mailbox #24, Suite 08D09, Alexandria,
VA 22350–1700.
Instructions: All submissions received
must include the agency name and
docket number for this Federal Register
document. The general policy for
comments and other submissions from
members of the public is to make these
submissions available for public
viewing on the internet at https://
www.regulations.gov as they are
received without change, including any
personal identifiers or contact
information.
ADDRESSES:
Brad
Millick, Director, DoD Insider Threat
Program, Office of the Under Secretary
of Defense for Intelligence, 5000 Defense
Pentagon, Washington, DC 20301–5000
or by phone at (703) 692–3721.
FOR FURTHER INFORMATION CONTACT:
E:\FR\FM\22MRN1.SGM
22MRN1
10804
Federal Register / Vol. 84, No. 56 / Friday, March 22, 2019 / Notices
E.O.
13587 directs the implementation of a
Department-wide insider threat
detection and prevention program. The
DoD Insider Threat Program is
decentralized to enable DoD Component
Insider Threat Programs and the
DITMAC to analyze, monitor, and audit
insider threat information for detection
and mitigation. The program deters
insider activity endangering DoD and
U.S. Government installations, facilities,
personnel, missions, or resources.
Section 951 of the National Defense
Authorization Act for Fiscal Year 2017
(NDAA for FY17) expanded the
definition of an insider threat to anyone
who has, or once had, authorized access
to information, a facility, a network, a
person, or a resource of the Department.
In response to this expansion, DoD is
taking a measured approach and
expanding the ability of its Component
Insider Threat Programs and the
DITMAC to store insider threat related
information. This modification to the
system of records enables DoD to
comply with NDAA for FY17 by
expanding the population to include
individuals with an active identification
card, pass or credential by a DoD
organization used as proof of identity to
gain physical or logical access to a DoD
facility, network, system or program, in
addition to those eligible to access
classified information or hold sensitive
positions and persons with Common
Access Cards (CACs). This expansion
further fulfills the intent of E.O. 13587
and maintains a responsive posture to
the NDAA for FY17.
This revision leverages existing
federal laws, statutes, authorities,
policies, programs, systems,
architectures and resources in order to
counter those insiders who may use
their authorized access to compromise
or degrade DoD operations. The DoD
and its insider threat programs employ
risk management principles, tailored to
meet the distinct needs, mission, and
systems of its agencies, and include
appropriate protections for privacy, civil
rights, and civil liberties.
The OSD notices for systems of
records subject to the Privacy Act of
1974, as amended, are published in the
Federal Register and are available from
the address in FOR FURTHER INFORMATION
CONTACT or at the Defense Privacy, Civil
Liberties, and Transparency Division
website at https://dpcld.defense.gov/
privacy. The proposed systems reports,
as required by the Privacy Act, as
amended, were submitted on December
17, 2018, to the House Committee on
Oversight and Government Reform, the
Senate Committee on Homeland
Security and Governmental Affairs, and
SUPPLEMENTARY INFORMATION:
VerDate Sep<11>2014
17:37 Mar 21, 2019
Jkt 247001
the Office of Management and Budget
(OMB) pursuant to Section 6 to OMB
Circular No. A–108, ‘‘Federal Agency
Responsibilities for Review, Reporting,
and Publication under the Privacy Act,’’
revised December 23, 2016 (December
23, 2016, 81 FR 94424).
Dated: March 19, 2019.
Aaron T. Siegel,
Alternate OSD Federal Register Liaison
Officer, Department of Defense.
SYSTEM NAME AND NUMBER
Department of Defense (DoD) Insider
Threat Management and Analysis
Center (DITMAC) and DoD Component
Insider Threat Records System, DUSDI
01 DoD.
SECURITY CLASSIFICATION:
Unclassified.
SYSTEM LOCATION:
Primary location: Defense Security
Service (DSS), 27130 Telegraph Rd.,
Quantico, VA 22134–2253. Secondary
and Decentralized locations: Each of the
DoD Components including the
Departments of the Army, Air Force,
and Navy and staffs, field operating
agencies, major commands,
installations, and activities. Official
mailing addresses are published with
each Component’s compilation of
systems of records notices.
SYSTEM MANAGER(S):
Program Manager, Department of
Defense Insider Threat Management and
Analysis Center, Defense Security
Service, 27130 Telegraph Road,
Quantico, VA 22134–2253; email:
dss.ncr.dss-ci.mbx.ditmac@mail.mil;
phone: (571) 357–6850. DoD
Components including the Departments
of the Army, Air Force, and Navy and
staffs, field operating agencies, major
commands, installations, and activities.
Official mailing addresses are published
as an appendix to each Service’s
compilation of systems of records
notices.
AUTHORITY FOR MAINTENANCE OF THE SYSTEM:
10 U.S.C. 137, Under Secretary of
Defense for Intelligence; 44 U.S.C. 3554,
Federal agency responsibilities; 44
U.S.C. 3557, National security systems;
Public Law 112–81, Section 922,
National Defense Authorization Act for
Fiscal Year 2012 (NDAA for FY12),
Insider Threat Detection (10 U.S.C. 2224
note); Public Law 113–66, Section
907(c)(4)(H) (NDAA for FY14),
Personnel security (10 U.S.C. 1564
note); Public Law 114–92, Section 1086
(NDAA for FY16), Reform and
improvement of personnel security,
insider threat detection and prevention,
PO 00000
Frm 00035
Fmt 4703
Sfmt 4703
and physical security (10 U.S.C. 1564
note); Public Law 114–328, Section 951
(NDAA for FY17), Enhanced security
programs for Department of Defense
personnel and innovation initiatives (10
U.S.C. 1564 note); E.O. 12829, as
amended, National Industrial Security
Program; E.O. 12968, as amended,
Access to Classified Information; E.O.
13467, Reforming Processes Related to
Suitability for Government
Employment, Fitness for Contractor
Employees, and Eligibility for Access to
Classified National Security
Information; E.O. 9397, as amended,
Numbering System for Federal Accounts
Relating to Individual Persons; E.O.
13587, Structural Reforms to Improve
the Security of Classified Networks and
the Responsible Sharing and
Safeguarding of Classified Information;
Presidential Memorandum dated
November 21, 2012, National Insider
Threat Policy and Minimum Standards
for Executive Branch Insider Threat
Programs; and DoD Directive 5205.16,
The DoD Insider Threat Program; DoD
Instruction 5205.83, DoD Insider Threat
Management and Analysis Center
(DITMAC), Directive-type Memorandum
09–012, Interim Policy Guidance for
DoD Physical Access Control, as
amended.
PURPOSE(S) OF THE SYSTEM:
The DITMAC was established by the
Under Secretary of Defense for
Intelligence to consolidate and analyze
insider threat information reported by
DoD Component insider threat
programs. The DoD maintains this
system of records to assist with
managing DoD Component insider
threat programs and the DITMAC in
accordance with Executive Order (E.O.)
13587 and Section 951 of the National
Defense Authorization Act for Fiscal
Year 2017 (NDAA for FY17). E.O. 13587
requires Federal agencies to establish an
insider threat detection and prevention
program to ensure the security of
classified networks and the responsible
sharing and safeguarding of classified
information consistent with appropriate
protections for privacy and civil
liberties. Section 951 of the NDAA for
FY17 requires DoD insider threat
programs collect, store, and retain
information from various data sources,
including personnel security, physical
security, information security, law
enforcement, counterintelligence, user
activity monitoring, information
assurance, and other appropriate data
sources to detect and mitigate potential
insider threats.
Insider threats including espionage,
terrorism, the unauthorized disclosure
of national security information
E:\FR\FM\22MRN1.SGM
22MRN1
Federal Register / Vol. 84, No. 56 / Friday, March 22, 2019 / Notices
(including protected and sensitive
information), and the loss or
degradation of departmental resources
or capabilities can damage the United
States. The system will be used to
analyze, monitor, and audit insider
threat information for insider threat
detection and mitigation within the DoD
on persons eligible to access classified
information and or hold a sensitive
position. In addition, the system will
monitor the insider threats from
individuals with physical or logical
access to a DoD installation or
controlled information system via a
Common Access Card (CAC) to DoD and
U.S. Government installations, facilities,
personnel, missions, or resources.
The system will support DoD
Component insider threat programs,
enable the identification of systemic
insider threat issues and challenges and
provide a basis for the development and
recommendation of solutions to deter,
detect, and/or mitigate potential insider
threats. It will assist in identifying best
practices among other Federal
Government insider threat programs,
through the use of existing DoD
resources and functions and by
leveraging existing authorities, policies,
programs, systems, and architectures.
CATEGORIES OF INDIVIDUALS COVERED BY THE
SYSTEM:
The following categories of
individuals are covered: Individuals
with or previously granted access to
classified information or those currently
or previously holding a sensitive
position. These individuals include
active and reserve component
(including National Guard) military
personnel; civilian employees
(including non-appropriated fund
employees); DoD contractor personnel,
and officials or employees from Federal,
state, local, tribal and private sector
entities affiliated with or working with
DoD and granted access to classified
information by DoD or another
authorized Federal agency based on an
eligibility determination; individuals
embedded with DoD units operating
abroad eligible or previously eligible to
access classified information or hold
sensitive positions; active duty U.S.
Coast Guard and mobilized retired
military personnel, eligible or
previously eligible for access to
classified information or to hold
sensitive positions (DoD and when
operating with the military services or
DoD Components) and limited access
authorization grantees; individuals with
an active DoD CAC for authenticating
physical access to DoD installations or
logical access to DoD controlled
information systems; military family
VerDate Sep<11>2014
17:37 Mar 21, 2019
Jkt 247001
members and military retirees with
active Uniformed Services ID cards;
individuals with active DoD Civilian
Retiree cards; individuals with an active
identification card, pass or credential
from a DoD organization used as proof
of identification to gain physical or
logical access to a DoD facility, network,
system or program.
CATEGORIES OF RECORDS IN THE SYSTEM:
Records from DoD Components and
the DITMAC, including: Responses to
information requested by official
questionnaires and applications (e.g., SF
86 Questionnaire for National Security
Positions, DD 1173, DD 1173–1, DD
2765, DD 1172–2 Application for
Identification Card/DEERS Enrollment)
including: Individual’s full name,
former names and aliases; date and
place of birth; Social Security Number
(SSN); height and weight; hair and eye
color; gender; ethnicity and race;
biometric data; mother’s maiden name;
DoD identification number (DoD ID
Number); current and former home and
work addresses, phone numbers, and
email addresses; employment history;
military record information; branch of
service; selective service registration
record; education history and completed
degrees; names of associates and
references and their contact
information; citizenship information;
passport information; driver’s license
information; identifying numbers from
access control passes or identification
cards; alien registration number;
criminal history; civil court actions;
prior personnel security eligibility,
investigative, and adjudicative
information, including information
collected through continuous
evaluation; mental health history;
records related to drug and/or alcohol
use; financial record information; credit
reports; the name, date and place of
birth, social security number, and
citizenship information for spouse and/
or cohabitant; the name and marriage
information for current and former
spouse(s); the citizenship, name, date
and place of birth, and current address
for relatives. Information on foreign
contacts and activities; association
records; information on loyalty to the
United States; and other agency reports
furnished to DoD or collected by DoD in
connection with personnel security
investigations, continuous evaluation
for eligibility for access to classified
information, and insider threat
detection programs operated by DoD
Components pursuant to Federal laws
and Executive Orders and DoD
regulations. These records can include,
but are not limited to: Reports of
personnel security investigations
PO 00000
Frm 00036
Fmt 4703
Sfmt 4703
10805
completed by investigative service
providers (such as the Office of
Personnel Management). Polygraph
examination reports; nondisclosure
agreements; document control registries;
courier authorization requests;
derivative classification unique
identifiers; requests for access to
sensitive compartmented information
(SCI); facility access records; security
violation files; travel records; foreign
contact reports; briefing and debriefing
statements for special programs,
positions designated as sensitive, other
information and documents required in
connection with personnel security
adjudications; and financial disclosure
filings. DoD component information,
summaries or reports, and full reports,
about potential insider threats from:
Payroll information, travel vouchers,
benefits information, equal employment
opportunity complaints, performance
evaluations, disciplinary files (including
information related to reports of
misconduct or disciplinary actions and
or considerations), information related
to discharges, resignations, and
retirements in lieu of court-martial for
military members and information
related to discharges, resignations, and
retirements in lieu of disciplinary action
for civilians, information related to
disciplinary and administrative
negotiations and settlements, training
records, substance abuse and mental
health records of individuals
undergoing law enforcement action or
presenting an identifiable imminent
threat, counseling statements, outside
work and activities requests, and
personal contact records.
Particularly sensitive or protected
information, including information held
by special access programs, law
enforcement, inspector general, or other
investigative sources or programs.
Access to such information may require
additional approval by the senior DoD
official responsible for managing and
overseeing the program. Reports of
investigation regarding security
violations, including but not limited to:
Statements, declarations, affidavits and
correspondence; incident reports;
investigative records of a criminal, civil
or administrative nature; letters, emails,
memoranda, and reports; exhibits and
evidence; and, recommended remedial
or corrective actions for security
violations. Information, data (transiting
or stored) and activity, in part or in
combination collected through network
monitoring, cyber defense, information
security or any related activity
conducted for network protection on
DoD owned or operated systems,
networks, endpoints, cloud
E:\FR\FM\22MRN1.SGM
22MRN1
10806
Federal Register / Vol. 84, No. 56 / Friday, March 22, 2019 / Notices
infrastructure, or devices. Information
containing personnel user names and
aliases, levels of network access, audit
data, information regarding misuse of a
DoD device, information regarding
unauthorized use of removable media,
and logs of printer, copier, and facsimile
machine use; information collected
through user activity monitoring, which
is the technical capability to observe
and record the actions and activities of
all users, at any time, on a computer
network controlled by DoD or a
component thereof in order to deter,
detect, and/or mitigate insider threats as
well as to support authorized
investigations. Such information may
include key strokes, screen captures,
and content transmitted via email, chat,
or data import or export. DoD
component summaries of reports, and
full reports, about potential insider
threats from records of government
telephone system usage, including the
telephone number initiating and
receiving the call, and the date and time
of the call; Information obtained from
other Federal Government sources, such
as information regarding U.S. border
crossings and financial information
obtained from the Financial Crimes
Enforcement Network; Information
specific to the management and
operation of each DoD Component
insider threat program, including
information related to investigative or
analytical efforts by DoD insider threat
program personnel to identify threats to
DoD personnel, property, facilities, and
information, and information obtained
from Intelligence Community members,
the Federal Bureau of Investigation, or
from other agencies or organizations
about individuals known or suspected
of engaging in conduct constituting,
preparing for, aiding, or relating to an
insider threat including, but not limited
to espionage or unauthorized disclosure
of classified national security
information. Publicly available
information, such as information
regarding: Arrests and detentions; real
property; bankruptcy; liens or holds on
property; vehicles; licensure (including
professional and pilot’s licenses,
firearms and explosive permits);
business licenses and filings; Publicly
available social media information,
including electronic social media
information published or broadcast for
public consumption, available on
request to the public, accessible online
to the public, available to the public by
subscription or purchase, or is
otherwise lawfully accessible to the
public. It includes social media
information generally available to
persons in a military community even
VerDate Sep<11>2014
17:37 Mar 21, 2019
Jkt 247001
though the military community is not
open to the civilian general public.
Publicly available social media
information does not include
information only accessible by logging
into a private account of the individual
about whom the record pertains or by
requiring the individual to provide a
password to social media information
that is not publicly available. Workplace
performance information, including
performance management and appraisal
reviews and other performance based
measures. Information collected from
the DoD Defense Performance
Management and Appraisal Program,
and information related to reports
regarding harassment, discrimination,
and drug testing violations or results,
including but not limited to: Statements,
declarations, affidavits and
correspondence; incident reports;
investigative records of a criminal, civil
or administrative nature; letters, emails,
memoranda, and reports; exhibits and
evidence; and, recommended remedial
or corrective actions. Information
generated from Prevention, Assistance,
and Response elements operating at
DoD Installations: Information held by
DoD operated education institutions,
such as dean of students records,
housing records, financial information,
and other information maintained by an
DoD educational institution.
Information contained in, or developed
from, the Department of Defense
Identity Matching Engine for Security
and Analysis. Information contained in
physical access logs, to include visitor
logs, at all DoD Facilities, information
contained in a installations Carrier
Appointment System, and information
contained in, or developed from DoD
Electronic Physical Access Control
System.
RECORD SOURCE CATEGORIES:
Individuals; DoD Component program
offices including DoD contractor
databases, internal and external sources
including counterintelligence and
security databases and files, personnel
security databases and files, DoD
component human resources databases
and files, Office of the Chief Information
Officer and information assurance
databases and files, information
collected through user activity
monitoring, DoD telephone usage
records, Federal, state, tribal, territorial,
and local law enforcement and
investigatory records, Inspector General
records, available U.S. Government
intelligence and counterintelligence
reporting information and analytic
products pertaining to adversarial
threats, other Federal agencies, and
publicly available information,
PO 00000
Frm 00037
Fmt 4703
Sfmt 4703
including commercially available
subscription databases containing
public records.
ROUTINE USES OF RECORDS MAINTAINED IN THE
SYSTEM, INCLUDING CATEGORIES OF USERS AND
THE PURPOSES OF SUCH USES:
In addition to disclosures permitted
under 5 U.S.C. 552a(b) of the Privacy
Act of 1974, as amended, these records
may be disclosed outside DoD as a
routine use pursuant to 5 U.S.C.
552(b)(3) as follows:
a. To an appropriate federal, state,
local, tribal, territorial, foreign, or
international agency, if the information
is relevant and necessary to a requesting
agency’s decision concerning the hiring
or retention of an individual, or the
issuance of a security clearance, license,
contract, grant, delegation or
designation of authority, or other
benefit, or if the information is relevant
and necessary to a DoD decision
concerning the hiring or retention of an
employee, the issuance of a security
clearance, the reporting of an
investigation of an employee, the letting
of a contract, or the issuance of a
license, grant, delegation or designation
of authority, or other benefit and
disclosure is appropriate to the proper
performance of the official duties of the
person making the request.
b. To appropriate contractors,
grantees, experts, consultants,
companies, corporations and others
performing or working on a contract,
service, grant, cooperative agreement, or
other assignment for the Federal
Government, if the information is
relevant and necessary to the entities’
decision concerning the suitability, the
hiring or retention of an individual, or
issuance of a security clearance, license,
contract, grant, delegation or
designation of authority, or other
benefit, or if the information is relevant
and necessary to a DoD decision
concerning the suitability, the hiring or
retention of an employee, the issuance
of a security clearance, the reporting of
an investigation of an employee, the
letting of a contract, or the issuance of
a license, grant, delegation or
designation of authority, or other benefit
and disclosure is appropriate to the
proper performance of the official duties
of the person or entity making the
request, determination, decision or
judgment.
c. A record consisting of, or relating
to, terrorism information, homeland
security information,
counterintelligence, or law enforcement
information may be disclosed to a
Federal, state, local, tribal, territorial,
foreign government, multinational
agency, and to a private sector agent
E:\FR\FM\22MRN1.SGM
22MRN1
Federal Register / Vol. 84, No. 56 / Friday, March 22, 2019 / Notices
either in response to its request, or upon
the initiative of the DoD Component, for
purposes of sharing such information as
is necessary and relevant to the agency’s
investigations and inquiries related to
the detection, prevention, disruption,
preemption, and mitigation of the
effects of terrorist activities against the
territory, people, and interests of the
United States of America as
contemplated by the Intelligence Reform
and Terrorism Protection Act of 2004.
d. To any person, organization or
governmental entity (e.g., local
governments, first responders, American
Red Cross, etc.), in order to notify them
of or respond to a serious and imminent
terrorist or homeland security threat or
natural or manmade disaster as is
necessary and relevant for the purpose
of guarding against or responding to
such threat or disaster.
e. To complainants and/or victims to
the extent necessary to provide such
persons with information and
explanations concerning the progress
and/or results of the investigation or
case arising from the matters of which
they complained and/or of which they
were a victim.
f. To officials and agencies of the
Executive Branch of government, federal
contractors and grantees, for purposes of
conducting studies, research and
analyses of insider threat programs or
issues.
g. To contractors, grantees, experts,
consultants, students, and others
performing or working on a contract,
service, grant, cooperative agreement, or
other assignment for the Federal
Government when necessary to
accomplish an agency function related
to this system of records.
h. To designated officers and
employees of Federal, State, local,
territorial, tribal, international, or
foreign agencies maintaining civil,
criminal, enforcement, or other
pertinent information, such as current
licenses, if necessary to obtain
information relevant and necessary to a
DoD Component decision concerning
the hiring or retention of an employee,
the issuance of a security clearance, the
letting of a contract, or the issuance of
a license, grant, or other benefit.
i. To foreign law enforcement,
security, investigatory, or administrative
authorities to comply with requirements
imposed by, or to claim rights conferred
in international agreements and
arrangements, including those
regulating the stationing and status in
foreign countries of DoD military and
civilian personnel.
j. To any agency, organization, or
individual for the purposes of
performing audit or oversight of the DoD
VerDate Sep<11>2014
17:37 Mar 21, 2019
Jkt 247001
Insider Threat Program as authorized by
law and as necessary and relevant to
such audit or oversight functions.
k. To such recipients and under such
circumstances and procedures as are
mandated by Federal statute or treaty.
l. To third parties during the course
of an investigation to the extent
necessary to obtain information
pertinent to the investigation, provided
disclosure is appropriate to the proper
performance of the official duties of the
individual making the disclosure.
m. To a Federal agency or entity with
possible information relevant to an
allegation or investigation or was
consulted regarding an insider threat for
purposes of obtaining guidance,
additional information, or advice from
such Federal agency or entity regarding
the handling of an insider threat matter.
n. To the news media or the general
public, where the disclosure of factual
information would be in the public
interest and which would not constitute
an unwarranted invasion of personal
privacy.
o. To a Federal, state, or local agency,
or other appropriate entities or
individuals, or through established
liaison channels to selected foreign
governments, in order to enable an
intelligence agency to carry out its
responsibilities under the National
Security Act of 1947, as amended, the
Central Intelligence Act of 1949, as
amended, E.O. 12333 or any successor
order, applicable national security
directives, or classified implementing
procedures approved by the Attorney
General and promulgated pursuant to
such statutes, orders or directives.
p. To the appropriate Federal, State,
local, territorial, tribal, foreign, or
international law enforcement authority
or other appropriate entity where a
record, either alone or in conjunction
with other information, indicates a
violation or potential violation of law,
whether criminal, civil, or regulatory in
nature.
q. To the Department of Justice for the
purpose of representing the Department
of Defense, or its components, officers,
employees, or members in pending or
potential litigation to which the record
is pertinent.
r. To appropriate agencies, entities,
and persons when (1) the DoD suspects
or confirms a breach of the system of
records; (2) the DoD determines as a
result of the suspected or confirmed
breach there is a risk of harm to
individuals, the DoD (including its
information systems, programs, and
operations), the Federal Government, or
national security; and (3) the disclosure
made to such agencies, entities, and
persons is reasonably necessary to assist
PO 00000
Frm 00038
Fmt 4703
Sfmt 4703
10807
in connection with the DoD’s efforts to
respond to the suspected or confirmed
breach or to prevent, minimize, or
remedy such harm.
s. To another Federal agency or
Federal entity, when the DoD
determines information from this
system of records is reasonably
necessary to assist the recipient agency
or entity in (1) responding to a
suspected or confirmed breach or (2)
preventing, minimizing, or remedying
the risk of harm to individuals, the
recipient agency or entity (including its
information systems, programs and
operations), the Federal Government, or
national security, resulting from a
suspected or confirmed breach.
t. To a Member of Congress or staff
acting upon the Member’s behalf when
the Member or staff requests the
information on behalf of, and at the
request of, the individual who is the
subject of the record.
u. To the National Archives and
Records Administration for the purpose
of records management inspections
conducted under the authority of 44
U.S.C. 2904 and 2906.
v. In an appropriate proceeding before
a court, grand jury, or administrative or
adjudicative body or official, when the
DoD or other Agency representing the
DoD determines the records are relevant
and necessary to the proceeding; or in
an appropriate proceeding before an
administrative or adjudicative body
when the adjudicator determines the
records to be relevant to the proceeding.
POLICIES AND PRACTICES FOR STORAGE OF
RECORDS:
Records are maintained in paper and
electronic storage media, in accordance
with the safeguards mentioned below.
POLICIES AND PRACTICES FOR RETRIEVAL OF
RECORDS:
Information in this system may be
retrieved by name, SSN, and/or DoD ID
number.
POLICIES AND PRACTICES FOR RETENTION AND
DISPOSAL OF RECORDS:
System records are retained and
disposed of according to DoD records
maintenance and disposition schedules
and the requirements of the National
Archives and Records Administration
(General Records Schedule 5.6: Security
Records Transmittal No. 28 July 2017,
item 210–240).
ADMINISTRATIVE, PHYSICAL, AND TECHNICAL
SAFEGUARDS:
Military personnel, civilian
employees, or contract security
personnel guards protect information
technology systems. Physical access to
rooms maintaining information
E:\FR\FM\22MRN1.SGM
22MRN1
10808
Federal Register / Vol. 84, No. 56 / Friday, March 22, 2019 / Notices
technology systems is controlled by
combination lock and by identification
badges only issued to authorized
individuals. Electronic authorization
and authentication of users is provided
on a need-to-know basis and is required
at all points prior to accessing system
information. All data transfers and
information retrievals using remote
communication facilities require
encryption. Paper records are
maintained in safes and filing cabinets
located in a secure area and only
accessible by authorized personnel.
RECORD ACCESS PROCEDURES:
Individuals seeking access to records
about themselves contained in the
DITMAC system of record should
address written inquires to the Defense
Security Service, Office of FOIA and
Privacy, 27130 Telegraph Road,
Quantico, VA 22134–2253. Individuals
seeking information about themselves
contained in any specific DoD
Component’s insider threat program
system of records should address
written inquiries to the official mailing
address for that Component, which is
published with each Component’s
compilation of systems of records
notices. DoD Component addresses are
also listed at: https://dpcld.defense.gov/
Privacy/Privacy-Contacts/. Individuals
seeking information about themselves
contained in the DITMAC system of
records originating in another DoD
Component may be directed to the
originating DoD Component
maintaining the records. Individuals
should provide their full name (and any
alias and/or alternate name), SSN, and
date and place of birth, and the address
where the records are to be returned. In
addition, the requester must provide
either a notarized statement or an
unsworn declaration made in
accordance with 28 U.S.C. 1746, in the
following format:
If executed outside of the United
States: ‘‘I declare (or certify, verify, or
state) under penalty of perjury under the
laws of the United States of America
that the foregoing is true and correct.
Executed on (date). (Signature).’’
If executed within the United States,
its territories, possessions, or
commonwealths:
‘‘I declare (or certify, verify, or state)
under penalty of perjury that the
foregoing is true and correct. Executed
on (date). (Signature).’’
Attorneys or other persons acting on
behalf of an individual must provide
written authorization from that
individual for the representative to act
on their behalf.
VerDate Sep<11>2014
17:37 Mar 21, 2019
Jkt 247001
CONTESTING RECORD PROCEDURES:
The DoD rules for accessing records
and for contesting or appealing agency
determinations are published in DoD
Regulation 5400.11; 32 CFR 310; or may
be obtained from the Defense Privacy,
Civil Liberties, and Transparency
Division, 4800 Mark Center Drive;
ATTN: DPCLTD, Mailbox #24;
Alexandria, VA 22350–1700.
NOTIFICATION PROCEDURES:
Individuals seeking to determine
whether information about themselves
is contained in the DITMAC system of
records should address written inquires
to the Defense Security Service, Office
of FOIA and Privacy, 27130 Telegraph
Road, Quantico, VA 22134–2253.
Individuals seeking to determine
whether information about themselves
is contained in any specific DoD
Component’s insider threat program
system of records should address
written inquiries to the official mailing
address for that Component, which is
published with each Component’s
compilation of systems of records
notices. DoD Component addresses are
also listed at: https://dpcld.defense.gov/
Privacy/Privacy-Contacts/. Signed,
written requests must contain the full
name (and any alias and/or alternate
names used), SSN, and date and place
of birth. In addition, the requester must
provide either a notarized statement or
an unsworn declaration made in
accordance with 28 U.S.C. 1746, in the
following format:
If executed outside of the United
States: ‘‘I declare (or certify, verify, or
state) under penalty of perjury under the
laws of the United States of America
that the foregoing is true and correct.
Executed on (date). (Signature).’’
If executed within the United States,
its territories, possessions, or
commonwealths: ‘‘I declare (or certify,
verify, or state) under penalty of perjury
that the foregoing is true and correct.
Executed on (date). (Signature).’’
EXEMPTIONS PROMULGATED FOR THE SYSTEM:
The DoD has exempted records
maintained in DUSDI 01-DoD, the
‘‘Department of Defense (DoD) Insider
Threat Management and Analysis
Center (DITMAC) and DoD Component
Insider Threat Records System,’’ from
subsections (c)(3) and (4); (d)(1), (2), (3),
and (4); (e)(1), (2), (3), (4)(G), (H), and
(I), (5), and (8); (f); and (g) of the Privacy
Act pursuant to 5 U.S.C. 552a(j)(2) and
(k)(1), (2), (4), (5), (6), (7). In addition,
exempt records received from other
systems of records in the course of
DITMAC or Component record checks
may, in turn, become part of the case
records in this system. When records are
PO 00000
Frm 00039
Fmt 4703
Sfmt 4703
exempt from disclosure in systems of
records for record sources accessed by
this system, DoD also claims the same
exemptions for any copies of such
records received by and stored in this
system.
An exemption rule for this system has
been promulgated in accordance with
requirements of 5 U.S.C. 553(b)(1), (2),
and (3), (c) and (e) and published in 32
CFR part 310. For additional
information contact the system manager.
HISTORY:
March 21, 2018, 83 FR 12345;
September 23, 2016, 81 FR 65631; May
19, 2016, 81 FR 31614.
[FR Doc. 2019–05540 Filed 3–21–19; 8:45 am]
BILLING CODE 5001–06–P
DEPARTMENT OF ENERGY
[FE Docket No. 15–96–LNG]
Port Arthur LNG, LLC: Application To
Amend Application for Long-Term,
Multi-Contract Authorization To Export
Liquefied Natural Gas To Non-Free
Trade Agreement Nations
Office of Fossil Energy, DOE.
Notice of amendment.
AGENCY:
ACTION:
The Office of Fossil Energy
(FE) of the Department of Energy (DOE)
gives notice of receipt of an application
for amendment (Amendment), filed on
October 18, 2018, by Port Arthur LNG,
LLC (Port Arthur LNG) of its pending
application in this proceeding.
Previously, on June 15, 2015, Port
Arthur LNG filed an application
(Application) requesting authorization
to export domestically produced
liquefied natural gas (LNG) from a
proposed natural gas processing,
liquefaction, and export project it
intends to construct, own, and operate
in Port Arthur, Texas (Project), to any
country with which the United States
does not have a free trade agreement
(FTA) requiring national treatment for
trade in natural gas, and with which
trade is not prohibited by U.S. law or
policy (non-FTA countries). The
Amendment requests a ‘‘design
increase,’’ i.e., to increase the export
volume requested in the Application by
181 billion cubic feet per year (Bcf/yr)
of natural gas, to a total requested
volume of 698 Bcf/yr (1.91 billion cubic
feet per day (Bcf/d)). This proposed
increase will align Port Arthur LNG’s
requested non-FTA export volume with
the requested liquefaction capacity for
the Project in an application filed with
the Federal Energy Regulatory
Commission (FERC).
SUMMARY:
E:\FR\FM\22MRN1.SGM
22MRN1
Agencies
[Federal Register Volume 84, Number 56 (Friday, March 22, 2019)]
[Notices]
[Pages 10803-10808]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2019-05540]
-----------------------------------------------------------------------
DEPARTMENT OF DEFENSE
Office of the Secretary
[Docket ID DOD-2019-OS-0033]
Privacy Act of 1974; System of Records
AGENCY: Office of the Secretary, DoD.
ACTION: Notice of a Modified System of Records.
-----------------------------------------------------------------------
SUMMARY: The Office of the Secretary of Defense (OSD) proposes to
modify a system of records, titled ``Department of Defense (DoD)
Insider Threat Management and Analysis Center (DITMAC) and DoD
Component Insider Threat Records System,'' DUSDI 01-DoD. This system
enables DoD to implement the requirements of Executive Order (E.O.)
13587, Structural Reforms to Improve the Security of Classified
Networks and the Responsible Sharing and Safeguarding of Classified
Information; and Presidential Memorandum dated November 21, 2012, the
National Insider Threat Policy and Minimum Standards for Executive
Branch Insider Threat Programs. The system analyzes, monitors, and
audits insider threat information to detect and mitigate DoD insider
threats to U.S. Government installations, facilities, personnel,
missions, or resources. The system supports the DITMAC and DoD
Component insider threat programs, enables the identification of
systemic insider threat issues and challenges, provides a basis for the
development and recommendation of solutions to mitigate potential
insider threats, and assists in identifying best practices from other
Federal government insider threat programs.
The proposed modification to the system expands the population of
covered individuals to include individuals with an active
identification card, pass or credential from a DoD organization used to
gain physical or logical access to a DoD facility, network, system or
program. Modifications were made to the following sections of this
system of records: System manager, purpose, categories of individuals,
categories of records, and routine uses.
DATES: Comments will be accepted on or before April 22, 2019. This
proposed action will be effective the date following the end of the
comment period unless comments are received which result in a contrary
determination.
ADDRESSES: You may submit comments, identified by docket number and
title, by any of the following methods:
* Federal Rulemaking Portal: https://www.regulations.gov. Follow the
instructions for submitting comments.
* Mail: Department of Defense, Office of the Chief Management
Officer, Directorate for Oversight and Compliance, 4800 Mark Center
Drive, Mailbox #24, Suite 08D09, Alexandria, VA 22350-1700.
Instructions: All submissions received must include the agency name
and docket number for this Federal Register document. The general
policy for comments and other submissions from members of the public is
to make these submissions available for public viewing on the internet
at https://www.regulations.gov as they are received without change,
including any personal identifiers or contact information.
FOR FURTHER INFORMATION CONTACT: Brad Millick, Director, DoD Insider
Threat Program, Office of the Under Secretary of Defense for
Intelligence, 5000 Defense Pentagon, Washington, DC 20301-5000 or by
phone at (703) 692-3721.
[[Page 10804]]
SUPPLEMENTARY INFORMATION: E.O. 13587 directs the implementation of a
Department-wide insider threat detection and prevention program. The
DoD Insider Threat Program is decentralized to enable DoD Component
Insider Threat Programs and the DITMAC to analyze, monitor, and audit
insider threat information for detection and mitigation. The program
deters insider activity endangering DoD and U.S. Government
installations, facilities, personnel, missions, or resources.
Section 951 of the National Defense Authorization Act for Fiscal
Year 2017 (NDAA for FY17) expanded the definition of an insider threat
to anyone who has, or once had, authorized access to information, a
facility, a network, a person, or a resource of the Department. In
response to this expansion, DoD is taking a measured approach and
expanding the ability of its Component Insider Threat Programs and the
DITMAC to store insider threat related information. This modification
to the system of records enables DoD to comply with NDAA for FY17 by
expanding the population to include individuals with an active
identification card, pass or credential by a DoD organization used as
proof of identity to gain physical or logical access to a DoD facility,
network, system or program, in addition to those eligible to access
classified information or hold sensitive positions and persons with
Common Access Cards (CACs). This expansion further fulfills the intent
of E.O. 13587 and maintains a responsive posture to the NDAA for FY17.
This revision leverages existing federal laws, statutes,
authorities, policies, programs, systems, architectures and resources
in order to counter those insiders who may use their authorized access
to compromise or degrade DoD operations. The DoD and its insider threat
programs employ risk management principles, tailored to meet the
distinct needs, mission, and systems of its agencies, and include
appropriate protections for privacy, civil rights, and civil liberties.
The OSD notices for systems of records subject to the Privacy Act
of 1974, as amended, are published in the Federal Register and are
available from the address in FOR FURTHER INFORMATION CONTACT or at the
Defense Privacy, Civil Liberties, and Transparency Division website at
https://dpcld.defense.gov/privacy. The proposed systems reports, as
required by the Privacy Act, as amended, were submitted on December 17,
2018, to the House Committee on Oversight and Government Reform, the
Senate Committee on Homeland Security and Governmental Affairs, and the
Office of Management and Budget (OMB) pursuant to Section 6 to OMB
Circular No. A-108, ``Federal Agency Responsibilities for Review,
Reporting, and Publication under the Privacy Act,'' revised December
23, 2016 (December 23, 2016, 81 FR 94424).
Dated: March 19, 2019.
Aaron T. Siegel,
Alternate OSD Federal Register Liaison Officer, Department of Defense.
SYSTEM NAME AND NUMBER
Department of Defense (DoD) Insider Threat Management and Analysis
Center (DITMAC) and DoD Component Insider Threat Records System, DUSDI
01 DoD.
SECURITY CLASSIFICATION:
Unclassified.
SYSTEM LOCATION:
Primary location: Defense Security Service (DSS), 27130 Telegraph
Rd., Quantico, VA 22134-2253. Secondary and Decentralized locations:
Each of the DoD Components including the Departments of the Army, Air
Force, and Navy and staffs, field operating agencies, major commands,
installations, and activities. Official mailing addresses are published
with each Component's compilation of systems of records notices.
SYSTEM MANAGER(S):
Program Manager, Department of Defense Insider Threat Management
and Analysis Center, Defense Security Service, 27130 Telegraph Road,
Quantico, VA 22134-2253; email: dss.ncr.dss-ci.mbx.ditmac@mail.mil;
phone: (571) 357-6850. DoD Components including the Departments of the
Army, Air Force, and Navy and staffs, field operating agencies, major
commands, installations, and activities. Official mailing addresses are
published as an appendix to each Service's compilation of systems of
records notices.
AUTHORITY FOR MAINTENANCE OF THE SYSTEM:
10 U.S.C. 137, Under Secretary of Defense for Intelligence; 44
U.S.C. 3554, Federal agency responsibilities; 44 U.S.C. 3557, National
security systems; Public Law 112-81, Section 922, National Defense
Authorization Act for Fiscal Year 2012 (NDAA for FY12), Insider Threat
Detection (10 U.S.C. 2224 note); Public Law 113-66, Section
907(c)(4)(H) (NDAA for FY14), Personnel security (10 U.S.C. 1564 note);
Public Law 114-92, Section 1086 (NDAA for FY16), Reform and improvement
of personnel security, insider threat detection and prevention, and
physical security (10 U.S.C. 1564 note); Public Law 114-328, Section
951 (NDAA for FY17), Enhanced security programs for Department of
Defense personnel and innovation initiatives (10 U.S.C. 1564 note);
E.O. 12829, as amended, National Industrial Security Program; E.O.
12968, as amended, Access to Classified Information; E.O. 13467,
Reforming Processes Related to Suitability for Government Employment,
Fitness for Contractor Employees, and Eligibility for Access to
Classified National Security Information; E.O. 9397, as amended,
Numbering System for Federal Accounts Relating to Individual Persons;
E.O. 13587, Structural Reforms to Improve the Security of Classified
Networks and the Responsible Sharing and Safeguarding of Classified
Information; Presidential Memorandum dated November 21, 2012, National
Insider Threat Policy and Minimum Standards for Executive Branch
Insider Threat Programs; and DoD Directive 5205.16, The DoD Insider
Threat Program; DoD Instruction 5205.83, DoD Insider Threat Management
and Analysis Center (DITMAC), Directive-type Memorandum 09-012, Interim
Policy Guidance for DoD Physical Access Control, as amended.
PURPOSE(S) OF THE SYSTEM:
The DITMAC was established by the Under Secretary of Defense for
Intelligence to consolidate and analyze insider threat information
reported by DoD Component insider threat programs. The DoD maintains
this system of records to assist with managing DoD Component insider
threat programs and the DITMAC in accordance with Executive Order
(E.O.) 13587 and Section 951 of the National Defense Authorization Act
for Fiscal Year 2017 (NDAA for FY17). E.O. 13587 requires Federal
agencies to establish an insider threat detection and prevention
program to ensure the security of classified networks and the
responsible sharing and safeguarding of classified information
consistent with appropriate protections for privacy and civil
liberties. Section 951 of the NDAA for FY17 requires DoD insider threat
programs collect, store, and retain information from various data
sources, including personnel security, physical security, information
security, law enforcement, counterintelligence, user activity
monitoring, information assurance, and other appropriate data sources
to detect and mitigate potential insider threats.
Insider threats including espionage, terrorism, the unauthorized
disclosure of national security information
[[Page 10805]]
(including protected and sensitive information), and the loss or
degradation of departmental resources or capabilities can damage the
United States. The system will be used to analyze, monitor, and audit
insider threat information for insider threat detection and mitigation
within the DoD on persons eligible to access classified information and
or hold a sensitive position. In addition, the system will monitor the
insider threats from individuals with physical or logical access to a
DoD installation or controlled information system via a Common Access
Card (CAC) to DoD and U.S. Government installations, facilities,
personnel, missions, or resources.
The system will support DoD Component insider threat programs,
enable the identification of systemic insider threat issues and
challenges and provide a basis for the development and recommendation
of solutions to deter, detect, and/or mitigate potential insider
threats. It will assist in identifying best practices among other
Federal Government insider threat programs, through the use of existing
DoD resources and functions and by leveraging existing authorities,
policies, programs, systems, and architectures.
CATEGORIES OF INDIVIDUALS COVERED BY THE SYSTEM:
The following categories of individuals are covered: Individuals
with or previously granted access to classified information or those
currently or previously holding a sensitive position. These individuals
include active and reserve component (including National Guard)
military personnel; civilian employees (including non-appropriated fund
employees); DoD contractor personnel, and officials or employees from
Federal, state, local, tribal and private sector entities affiliated
with or working with DoD and granted access to classified information
by DoD or another authorized Federal agency based on an eligibility
determination; individuals embedded with DoD units operating abroad
eligible or previously eligible to access classified information or
hold sensitive positions; active duty U.S. Coast Guard and mobilized
retired military personnel, eligible or previously eligible for access
to classified information or to hold sensitive positions (DoD and when
operating with the military services or DoD Components) and limited
access authorization grantees; individuals with an active DoD CAC for
authenticating physical access to DoD installations or logical access
to DoD controlled information systems; military family members and
military retirees with active Uniformed Services ID cards; individuals
with active DoD Civilian Retiree cards; individuals with an active
identification card, pass or credential from a DoD organization used as
proof of identification to gain physical or logical access to a DoD
facility, network, system or program.
CATEGORIES OF RECORDS IN THE SYSTEM:
Records from DoD Components and the DITMAC, including: Responses to
information requested by official questionnaires and applications
(e.g., SF 86 Questionnaire for National Security Positions, DD 1173, DD
1173-1, DD 2765, DD 1172-2 Application for Identification Card/DEERS
Enrollment) including: Individual's full name, former names and
aliases; date and place of birth; Social Security Number (SSN); height
and weight; hair and eye color; gender; ethnicity and race; biometric
data; mother's maiden name; DoD identification number (DoD ID Number);
current and former home and work addresses, phone numbers, and email
addresses; employment history; military record information; branch of
service; selective service registration record; education history and
completed degrees; names of associates and references and their contact
information; citizenship information; passport information; driver's
license information; identifying numbers from access control passes or
identification cards; alien registration number; criminal history;
civil court actions; prior personnel security eligibility,
investigative, and adjudicative information, including information
collected through continuous evaluation; mental health history; records
related to drug and/or alcohol use; financial record information;
credit reports; the name, date and place of birth, social security
number, and citizenship information for spouse and/or cohabitant; the
name and marriage information for current and former spouse(s); the
citizenship, name, date and place of birth, and current address for
relatives. Information on foreign contacts and activities; association
records; information on loyalty to the United States; and other agency
reports furnished to DoD or collected by DoD in connection with
personnel security investigations, continuous evaluation for
eligibility for access to classified information, and insider threat
detection programs operated by DoD Components pursuant to Federal laws
and Executive Orders and DoD regulations. These records can include,
but are not limited to: Reports of personnel security investigations
completed by investigative service providers (such as the Office of
Personnel Management). Polygraph examination reports; nondisclosure
agreements; document control registries; courier authorization
requests; derivative classification unique identifiers; requests for
access to sensitive compartmented information (SCI); facility access
records; security violation files; travel records; foreign contact
reports; briefing and debriefing statements for special programs,
positions designated as sensitive, other information and documents
required in connection with personnel security adjudications; and
financial disclosure filings. DoD component information, summaries or
reports, and full reports, about potential insider threats from:
Payroll information, travel vouchers, benefits information, equal
employment opportunity complaints, performance evaluations,
disciplinary files (including information related to reports of
misconduct or disciplinary actions and or considerations), information
related to discharges, resignations, and retirements in lieu of court-
martial for military members and information related to discharges,
resignations, and retirements in lieu of disciplinary action for
civilians, information related to disciplinary and administrative
negotiations and settlements, training records, substance abuse and
mental health records of individuals undergoing law enforcement action
or presenting an identifiable imminent threat, counseling statements,
outside work and activities requests, and personal contact records.
Particularly sensitive or protected information, including
information held by special access programs, law enforcement, inspector
general, or other investigative sources or programs. Access to such
information may require additional approval by the senior DoD official
responsible for managing and overseeing the program. Reports of
investigation regarding security violations, including but not limited
to: Statements, declarations, affidavits and correspondence; incident
reports; investigative records of a criminal, civil or administrative
nature; letters, emails, memoranda, and reports; exhibits and evidence;
and, recommended remedial or corrective actions for security
violations. Information, data (transiting or stored) and activity, in
part or in combination collected through network monitoring, cyber
defense, information security or any related activity conducted for
network protection on DoD owned or operated systems, networks,
endpoints, cloud
[[Page 10806]]
infrastructure, or devices. Information containing personnel user names
and aliases, levels of network access, audit data, information
regarding misuse of a DoD device, information regarding unauthorized
use of removable media, and logs of printer, copier, and facsimile
machine use; information collected through user activity monitoring,
which is the technical capability to observe and record the actions and
activities of all users, at any time, on a computer network controlled
by DoD or a component thereof in order to deter, detect, and/or
mitigate insider threats as well as to support authorized
investigations. Such information may include key strokes, screen
captures, and content transmitted via email, chat, or data import or
export. DoD component summaries of reports, and full reports, about
potential insider threats from records of government telephone system
usage, including the telephone number initiating and receiving the
call, and the date and time of the call; Information obtained from
other Federal Government sources, such as information regarding U.S.
border crossings and financial information obtained from the Financial
Crimes Enforcement Network; Information specific to the management and
operation of each DoD Component insider threat program, including
information related to investigative or analytical efforts by DoD
insider threat program personnel to identify threats to DoD personnel,
property, facilities, and information, and information obtained from
Intelligence Community members, the Federal Bureau of Investigation, or
from other agencies or organizations about individuals known or
suspected of engaging in conduct constituting, preparing for, aiding,
or relating to an insider threat including, but not limited to
espionage or unauthorized disclosure of classified national security
information. Publicly available information, such as information
regarding: Arrests and detentions; real property; bankruptcy; liens or
holds on property; vehicles; licensure (including professional and
pilot's licenses, firearms and explosive permits); business licenses
and filings; Publicly available social media information, including
electronic social media information published or broadcast for public
consumption, available on request to the public, accessible online to
the public, available to the public by subscription or purchase, or is
otherwise lawfully accessible to the public. It includes social media
information generally available to persons in a military community even
though the military community is not open to the civilian general
public. Publicly available social media information does not include
information only accessible by logging into a private account of the
individual about whom the record pertains or by requiring the
individual to provide a password to social media information that is
not publicly available. Workplace performance information, including
performance management and appraisal reviews and other performance
based measures. Information collected from the DoD Defense Performance
Management and Appraisal Program, and information related to reports
regarding harassment, discrimination, and drug testing violations or
results, including but not limited to: Statements, declarations,
affidavits and correspondence; incident reports; investigative records
of a criminal, civil or administrative nature; letters, emails,
memoranda, and reports; exhibits and evidence; and, recommended
remedial or corrective actions. Information generated from Prevention,
Assistance, and Response elements operating at DoD Installations:
Information held by DoD operated education institutions, such as dean
of students records, housing records, financial information, and other
information maintained by an DoD educational institution. Information
contained in, or developed from, the Department of Defense Identity
Matching Engine for Security and Analysis. Information contained in
physical access logs, to include visitor logs, at all DoD Facilities,
information contained in a installations Carrier Appointment System,
and information contained in, or developed from DoD Electronic Physical
Access Control System.
RECORD SOURCE CATEGORIES:
Individuals; DoD Component program offices including DoD contractor
databases, internal and external sources including counterintelligence
and security databases and files, personnel security databases and
files, DoD component human resources databases and files, Office of the
Chief Information Officer and information assurance databases and
files, information collected through user activity monitoring, DoD
telephone usage records, Federal, state, tribal, territorial, and local
law enforcement and investigatory records, Inspector General records,
available U.S. Government intelligence and counterintelligence
reporting information and analytic products pertaining to adversarial
threats, other Federal agencies, and publicly available information,
including commercially available subscription databases containing
public records.
ROUTINE USES OF RECORDS MAINTAINED IN THE SYSTEM, INCLUDING CATEGORIES
OF USERS AND THE PURPOSES OF SUCH USES:
In addition to disclosures permitted under 5 U.S.C. 552a(b) of the
Privacy Act of 1974, as amended, these records may be disclosed outside
DoD as a routine use pursuant to 5 U.S.C. 552(b)(3) as follows:
a. To an appropriate federal, state, local, tribal, territorial,
foreign, or international agency, if the information is relevant and
necessary to a requesting agency's decision concerning the hiring or
retention of an individual, or the issuance of a security clearance,
license, contract, grant, delegation or designation of authority, or
other benefit, or if the information is relevant and necessary to a DoD
decision concerning the hiring or retention of an employee, the
issuance of a security clearance, the reporting of an investigation of
an employee, the letting of a contract, or the issuance of a license,
grant, delegation or designation of authority, or other benefit and
disclosure is appropriate to the proper performance of the official
duties of the person making the request.
b. To appropriate contractors, grantees, experts, consultants,
companies, corporations and others performing or working on a contract,
service, grant, cooperative agreement, or other assignment for the
Federal Government, if the information is relevant and necessary to the
entities' decision concerning the suitability, the hiring or retention
of an individual, or issuance of a security clearance, license,
contract, grant, delegation or designation of authority, or other
benefit, or if the information is relevant and necessary to a DoD
decision concerning the suitability, the hiring or retention of an
employee, the issuance of a security clearance, the reporting of an
investigation of an employee, the letting of a contract, or the
issuance of a license, grant, delegation or designation of authority,
or other benefit and disclosure is appropriate to the proper
performance of the official duties of the person or entity making the
request, determination, decision or judgment.
c. A record consisting of, or relating to, terrorism information,
homeland security information, counterintelligence, or law enforcement
information may be disclosed to a Federal, state, local, tribal,
territorial, foreign government, multinational agency, and to a private
sector agent
[[Page 10807]]
either in response to its request, or upon the initiative of the DoD
Component, for purposes of sharing such information as is necessary and
relevant to the agency's investigations and inquiries related to the
detection, prevention, disruption, preemption, and mitigation of the
effects of terrorist activities against the territory, people, and
interests of the United States of America as contemplated by the
Intelligence Reform and Terrorism Protection Act of 2004.
d. To any person, organization or governmental entity (e.g., local
governments, first responders, American Red Cross, etc.), in order to
notify them of or respond to a serious and imminent terrorist or
homeland security threat or natural or manmade disaster as is necessary
and relevant for the purpose of guarding against or responding to such
threat or disaster.
e. To complainants and/or victims to the extent necessary to
provide such persons with information and explanations concerning the
progress and/or results of the investigation or case arising from the
matters of which they complained and/or of which they were a victim.
f. To officials and agencies of the Executive Branch of government,
federal contractors and grantees, for purposes of conducting studies,
research and analyses of insider threat programs or issues.
g. To contractors, grantees, experts, consultants, students, and
others performing or working on a contract, service, grant, cooperative
agreement, or other assignment for the Federal Government when
necessary to accomplish an agency function related to this system of
records.
h. To designated officers and employees of Federal, State, local,
territorial, tribal, international, or foreign agencies maintaining
civil, criminal, enforcement, or other pertinent information, such as
current licenses, if necessary to obtain information relevant and
necessary to a DoD Component decision concerning the hiring or
retention of an employee, the issuance of a security clearance, the
letting of a contract, or the issuance of a license, grant, or other
benefit.
i. To foreign law enforcement, security, investigatory, or
administrative authorities to comply with requirements imposed by, or
to claim rights conferred in international agreements and arrangements,
including those regulating the stationing and status in foreign
countries of DoD military and civilian personnel.
j. To any agency, organization, or individual for the purposes of
performing audit or oversight of the DoD Insider Threat Program as
authorized by law and as necessary and relevant to such audit or
oversight functions.
k. To such recipients and under such circumstances and procedures
as are mandated by Federal statute or treaty.
l. To third parties during the course of an investigation to the
extent necessary to obtain information pertinent to the investigation,
provided disclosure is appropriate to the proper performance of the
official duties of the individual making the disclosure.
m. To a Federal agency or entity with possible information relevant
to an allegation or investigation or was consulted regarding an insider
threat for purposes of obtaining guidance, additional information, or
advice from such Federal agency or entity regarding the handling of an
insider threat matter.
n. To the news media or the general public, where the disclosure of
factual information would be in the public interest and which would not
constitute an unwarranted invasion of personal privacy.
o. To a Federal, state, or local agency, or other appropriate
entities or individuals, or through established liaison channels to
selected foreign governments, in order to enable an intelligence agency
to carry out its responsibilities under the National Security Act of
1947, as amended, the Central Intelligence Act of 1949, as amended,
E.O. 12333 or any successor order, applicable national security
directives, or classified implementing procedures approved by the
Attorney General and promulgated pursuant to such statutes, orders or
directives.
p. To the appropriate Federal, State, local, territorial, tribal,
foreign, or international law enforcement authority or other
appropriate entity where a record, either alone or in conjunction with
other information, indicates a violation or potential violation of law,
whether criminal, civil, or regulatory in nature.
q. To the Department of Justice for the purpose of representing the
Department of Defense, or its components, officers, employees, or
members in pending or potential litigation to which the record is
pertinent.
r. To appropriate agencies, entities, and persons when (1) the DoD
suspects or confirms a breach of the system of records; (2) the DoD
determines as a result of the suspected or confirmed breach there is a
risk of harm to individuals, the DoD (including its information
systems, programs, and operations), the Federal Government, or national
security; and (3) the disclosure made to such agencies, entities, and
persons is reasonably necessary to assist in connection with the DoD's
efforts to respond to the suspected or confirmed breach or to prevent,
minimize, or remedy such harm.
s. To another Federal agency or Federal entity, when the DoD
determines information from this system of records is reasonably
necessary to assist the recipient agency or entity in (1) responding to
a suspected or confirmed breach or (2) preventing, minimizing, or
remedying the risk of harm to individuals, the recipient agency or
entity (including its information systems, programs and operations),
the Federal Government, or national security, resulting from a
suspected or confirmed breach.
t. To a Member of Congress or staff acting upon the Member's behalf
when the Member or staff requests the information on behalf of, and at
the request of, the individual who is the subject of the record.
u. To the National Archives and Records Administration for the
purpose of records management inspections conducted under the authority
of 44 U.S.C. 2904 and 2906.
v. In an appropriate proceeding before a court, grand jury, or
administrative or adjudicative body or official, when the DoD or other
Agency representing the DoD determines the records are relevant and
necessary to the proceeding; or in an appropriate proceeding before an
administrative or adjudicative body when the adjudicator determines the
records to be relevant to the proceeding.
POLICIES AND PRACTICES FOR STORAGE OF RECORDS:
Records are maintained in paper and electronic storage media, in
accordance with the safeguards mentioned below.
POLICIES AND PRACTICES FOR RETRIEVAL OF RECORDS:
Information in this system may be retrieved by name, SSN, and/or
DoD ID number.
POLICIES AND PRACTICES FOR RETENTION AND DISPOSAL OF RECORDS:
System records are retained and disposed of according to DoD
records maintenance and disposition schedules and the requirements of
the National Archives and Records Administration (General Records
Schedule 5.6: Security Records Transmittal No. 28 July 2017, item 210-
240).
ADMINISTRATIVE, PHYSICAL, AND TECHNICAL SAFEGUARDS:
Military personnel, civilian employees, or contract security
personnel guards protect information technology systems. Physical
access to rooms maintaining information
[[Page 10808]]
technology systems is controlled by combination lock and by
identification badges only issued to authorized individuals. Electronic
authorization and authentication of users is provided on a need-to-know
basis and is required at all points prior to accessing system
information. All data transfers and information retrievals using remote
communication facilities require encryption. Paper records are
maintained in safes and filing cabinets located in a secure area and
only accessible by authorized personnel.
RECORD ACCESS PROCEDURES:
Individuals seeking access to records about themselves contained in
the DITMAC system of record should address written inquires to the
Defense Security Service, Office of FOIA and Privacy, 27130 Telegraph
Road, Quantico, VA 22134-2253. Individuals seeking information about
themselves contained in any specific DoD Component's insider threat
program system of records should address written inquiries to the
official mailing address for that Component, which is published with
each Component's compilation of systems of records notices. DoD
Component addresses are also listed at: https://dpcld.defense.gov/Privacy/Privacy-Contacts/. Individuals seeking information about
themselves contained in the DITMAC system of records originating in
another DoD Component may be directed to the originating DoD Component
maintaining the records. Individuals should provide their full name
(and any alias and/or alternate name), SSN, and date and place of
birth, and the address where the records are to be returned. In
addition, the requester must provide either a notarized statement or an
unsworn declaration made in accordance with 28 U.S.C. 1746, in the
following format:
If executed outside of the United States: ``I declare (or certify,
verify, or state) under penalty of perjury under the laws of the United
States of America that the foregoing is true and correct. Executed on
(date). (Signature).''
If executed within the United States, its territories, possessions,
or commonwealths:
``I declare (or certify, verify, or state) under penalty of perjury
that the foregoing is true and correct. Executed on (date).
(Signature).''
Attorneys or other persons acting on behalf of an individual must
provide written authorization from that individual for the
representative to act on their behalf.
CONTESTING RECORD PROCEDURES:
The DoD rules for accessing records and for contesting or appealing
agency determinations are published in DoD Regulation 5400.11; 32 CFR
310; or may be obtained from the Defense Privacy, Civil Liberties, and
Transparency Division, 4800 Mark Center Drive; ATTN: DPCLTD, Mailbox
#24; Alexandria, VA 22350-1700.
NOTIFICATION PROCEDURES:
Individuals seeking to determine whether information about
themselves is contained in the DITMAC system of records should address
written inquires to the Defense Security Service, Office of FOIA and
Privacy, 27130 Telegraph Road, Quantico, VA 22134-2253. Individuals
seeking to determine whether information about themselves is contained
in any specific DoD Component's insider threat program system of
records should address written inquiries to the official mailing
address for that Component, which is published with each Component's
compilation of systems of records notices. DoD Component addresses are
also listed at: https://dpcld.defense.gov/Privacy/Privacy-Contacts/.
Signed, written requests must contain the full name (and any alias and/
or alternate names used), SSN, and date and place of birth. In
addition, the requester must provide either a notarized statement or an
unsworn declaration made in accordance with 28 U.S.C. 1746, in the
following format:
If executed outside of the United States: ``I declare (or certify,
verify, or state) under penalty of perjury under the laws of the United
States of America that the foregoing is true and correct. Executed on
(date). (Signature).''
If executed within the United States, its territories, possessions,
or commonwealths: ``I declare (or certify, verify, or state) under
penalty of perjury that the foregoing is true and correct. Executed on
(date). (Signature).''
EXEMPTIONS PROMULGATED FOR THE SYSTEM:
The DoD has exempted records maintained in DUSDI 01-DoD, the
``Department of Defense (DoD) Insider Threat Management and Analysis
Center (DITMAC) and DoD Component Insider Threat Records System,'' from
subsections (c)(3) and (4); (d)(1), (2), (3), and (4); (e)(1), (2),
(3), (4)(G), (H), and (I), (5), and (8); (f); and (g) of the Privacy
Act pursuant to 5 U.S.C. 552a(j)(2) and (k)(1), (2), (4), (5), (6),
(7). In addition, exempt records received from other systems of records
in the course of DITMAC or Component record checks may, in turn, become
part of the case records in this system. When records are exempt from
disclosure in systems of records for record sources accessed by this
system, DoD also claims the same exemptions for any copies of such
records received by and stored in this system.
An exemption rule for this system has been promulgated in
accordance with requirements of 5 U.S.C. 553(b)(1), (2), and (3), (c)
and (e) and published in 32 CFR part 310. For additional information
contact the system manager.
HISTORY:
March 21, 2018, 83 FR 12345; September 23, 2016, 81 FR 65631; May
19, 2016, 81 FR 31614.
[FR Doc. 2019-05540 Filed 3-21-19; 8:45 am]
BILLING CODE 5001-06-P