Privacy Act; Implementation, 14622-14624 [2019-07122]

Download as PDF 14622 Federal Register / Vol. 84, No. 70 / Thursday, April 11, 2019 / Rules and Regulations Transfer and Advancement Act (NTTAA) (15 U.S.C. 272 note). VII. Congressional Review Act Pursuant to the Congressional Review Act (5 U.S.C. 801 et seq.), EPA will submit a report containing this rule and other required information to the U.S. Senate, the U.S. House of Representatives, and the Comptroller General of the United States prior to publication of the rule in the Federal Register. This action is not a ‘‘major rule’’ as defined by 5 U.S.C. 804(2). Environmental protection, Administrative practice and procedure, Agricultural commodities, Pesticides and pests, Reporting and recordkeeping requirements. are no U.S. registrations as of May 25, 2017 for use on pineapple and tea. 2 This tolerance expires on October 11, 2019. * * RIN 0991–AC10 Privacy Act; Implementation Department of Health and Human Services (HHS). ACTION: Final rule. 1. The authority citation for part 180 continues to read as follows: ■ Authority: 21 U.S.C. 321(q), 346a and 371. 2. In § 180.632, revise the table in paragraph (a) to read as follows: ■ The Department of Health and Human Services (HHS or Department) is issuing this final rule to make effective the exemptions that HHS proposed for certain records covered in a new Privacy Act system of records, System No. 09– 90–1701, HHS Insider Threat Program Records. This final rule is effective April 11, 2019. FOR FURTHER INFORMATION CONTACT: Michael W. Schmoyer, Assistant Deputy Secretary for National Security by email at insiderthreat@hhs.gov or telephone at (202) 690–5756, or by mail to the HHS Office of Security and Strategic Information (OSSI), 200 Independence Ave. SW, Washington, DC 20201. SUPPLEMENTARY INFORMATION: In accordance with 5 U.S.C. 552a (Privacy Act or Act), the exemptions were described in a Notice of Proposed Rulemaking (NPRM) published for public notice and comment at 83 FR 42627 (Aug. 23, 2018). The new system of records is described in a System of Records Notice (SORN) which was published for public notice and comment the same day, at 83 FR 42667 (Aug 23, 2018). Only law enforcement investigatory material and classified intelligence information were proposed to be exempted, based on subsections (k)(1) and (k)(2) of the Act, from the requirements contained in subsections (c)(3), (d)(1)-(4), (e)(1), (e)(4)(G), (H), and (I), and (f) of the Act, which require the agency to provide an accounting of disclosures; provide notification, access, and amendment rights, rules, and procedures; maintain only relevant and necessary information; and identify DATES: § 180.632 Fenazaquin; Tolerances for residues. (a) * * * Parts per million Jkt 247001 * 45 CFR Part 5b SUMMARY: 16:02 Apr 10, 2019 * BILLING CODE 6560–50–P Therefore, 40 CFR chapter I is amended as follows: VerDate Sep<11>2014 * [FR Doc. 2019–07173 Filed 4–10–19; 8:45 am] AGENCY: Almond, hulls .............................. Avocado ...................................... Berry, low growing, subgroup 13–07G ................................... Bushberry, subgroup 13–07B ..... Caneberry, subgroup 13–07A .... Fruit, Citrus, Group 10 except Grapefruit 2 .............................. Fruit, citrus, group 10–10 ........... Fruit, citrus, group 10–10, oil ..... Fruit, pome, group 11–10 ........... Fruit, small vine climbing, except fuzzy kiwifruit, subgroup 13– 07F .......................................... Fruit, stone, group 12–12 ........... Grape, raisin ............................... Hop, dried cones ........................ Nuts, Tree, Group 14–12 ........... Pea and bean, dried shelled, except soybean, subgroup 6C .... Pea and bean, succulent shelled, subgroup 6B .............. Peppermint, fresh leaves ............ Pineapple 1 .................................. Spearmint, fresh leaves .............. Tea, dried 1 ................................. Vegetable, cucurbit, group 9 ...... Vegetable, fruiting, group 8–10 .. 0.4 1 There Dated: March 28, 2019. Michael Goodis, Director, Registration Division, Office of Pesticide Programs. PART 180—[AMENDED] amozie on DSK9F9SC42PROD with RULES Vegetable, legume, edible podded, subgroup 6A ................... DEPARTMENT OF HEALTH AND HUMAN SERVICES List of Subjects in 40 CFR Part 180 Commodity Parts per million Commodity 4 0.15 2 0.8 0.7 0.5 0.4 20 0.6 0.7 2 0.8 30 0.02 0.3 0.03 10 0.2 10 9 0.3 0.3 PO 00000 Frm 00036 Fmt 4700 Sfmt 4700 categories of record sources. The NPRM also explained that if the HHS Insider Threat Program obtains law enforcement investigatory material from another Privacy Act system of records that has been exempted from Privacy Act requirements based on subsection (j)(2) of the Act, that material will be exempt in System No. 09–90–1701 to the same extent it is exempt in the source system, so it may be exempt from requirements in any of these subsections of the Act: (c)(3)–(4); (d)(1)–(4); (e)(1)–(3), (e)(4)(G)– (I), (e)(5), (e)(8), (e)(12); (f); (g); and (h). The comment period for the SORN and NPRM was open through September 24, 2018. No comments were received on the NPRM and no comments were received on the SORN. No changes to the proposed exemptions or to the SORN were made following the public comment period. The specific rationales that support the exemptions as to each affected Privacy Act provision, remain as stated in the NPRM; the exemptions from the particular subsections are necessary and appropriate, and justified for the following reasons: • 5 U.S.C. 552a(c)(3) (the requirement to provide accountings of disclosures) and 5 U.S.C. 552a(d)(1)–(4) (requirements addressing notification, access, and amendment rights, collectively referred to herein as access requirements). Providing individual record subjects with accountings of disclosures and with notification, access, and amendment rights with respect to Insider Threat Program records could reveal the existence of an investigation, investigative interest, investigative techniques, details about an investigation, security-sensitive information such as information about security measures and security vulnerabilities, information that must remain non-public to protect national security or personal privacy-identities of law enforcement personnel, or other sensitive or classified information. Revealing such information to record subjects would thwart or impede pending and future law enforcement investigations and efforts to protect national security, and would violate personal privacy. Revealing the information would enable record subjects or other persons to evade detection and apprehension by security and law enforcement personnel; destroy, conceal, or tamper with evidence or fabricate testimony; or harass, intimidate, harm, coerce, or retaliate against witnesses, complainants, investigators, security personnel, law enforcement personnel, or their family members, their employees, or other individuals. With E:\FR\FM\11APR1.SGM 11APR1 amozie on DSK9F9SC42PROD with RULES Federal Register / Vol. 84, No. 70 / Thursday, April 11, 2019 / Rules and Regulations respect to investigatory material compiled for law enforcement purposes, the exemption pursuant to 5 U.S.C. 552a(k)(2) from access requirements in subsection (d) of the Act is statutorily limited. If any individual is denied a right, privilege, or benefit to which the individual would otherwise be entitled by federal law or for which the individual would otherwise be eligible, access will be granted, except to the extent that the disclosure would reveal the identity of a source who furnished information to the Government under an express promise of confidentiality. • 5 U.S.C. 552a(e)(1) (the requirement to maintain only relevant and necessary information authorized by statute or Executive Order). It will not always be possible to determine at the time information is received or compiled in this system of records whether the information is or will be relevant and necessary to a law enforcement investigation or to protecting national security. For example, a tip or lead that does not appear relevant or necessary to uncovering an insider threat by itself or at the time the tip or lead is received may prove to be relevant and necessary when combined with other information that reveals a pattern or that comes to light later. • 5 U.S.C. 552a(e)(4)(G) and (H) (the requirements to describe procedures by which subjects may be notified of whether the system of records contains records about them and seek access or amendment of a record). These requirements concern individual access to records, and the records are exempt under (c) and (d), as described above. To the extent that (e)(4)(G) and (H) are interpreted to require more detailed procedures regarding record notification, access, or amendment than have been published in the Federal Register, exemption from those provisions is necessary for the same rationale as applies to (c) and (d). • 5 U.S.C. 552a(e)(4)(I) (the requirement to describe the categories of record sources). To the extent that this subsection is interpreted to require a more detailed description regarding the record sources in this system than has been published in the Federal Register, exemption from this provision is necessary to protect the sources of law enforcement and intelligence information and to protect the privacy and safety of witnesses and informants and others who provide information to HHS. Further, greater specificity of sources of properly classified records could compromise national security. Moreover, because records used in the Insider Threat Program could come from any source, it is not possible to know VerDate Sep<11>2014 16:02 Apr 10, 2019 Jkt 247001 every category in advance in order to list them all in the SORN. Some record source categories may not be appropriate to make public in the SORN if, for example, revealing them could enable record subjects or other individuals to discover investigative techniques and devise ways to bypass them to evade detection and apprehension. • 5 U.S.C. 552a(f) (the requirement to promulgate rules to implement provisions of the Privacy Act). To the extent that this subsection is interpreted to require agency rules addressing the above exempted requirements, exemption from this provision is also necessary to protect the sources of law enforcement and intelligence information and to protect the privacy and safety of witnesses and informants and others who provide information to HHS. Greater specificity in rulemaking regarding properly classified records could compromise national security. Accordingly, based on 5 U.S.C. 552a(k)(1) and (k)(2) and the specific rationales indicated above, HHS is now exempting law enforcement investigatory material and classified intelligence information in system of records 09–90–1701 HHS Insider Threat Program Records from subsections (c)(3), (d)(1)–(4), (e)(1), (e)(4)(G), (H), and (I), and (f) of the Act, which contain requirements to provide an accounting of disclosures; provide notification, access, and amendment rights, rules, and procedures; maintain only relevant and necessary information; and identify categories of record sources. In addition, HHS affirms that if the HHS Insider Threat Program obtains law enforcement investigatory material from another Privacy Act system of records that has been exempted from Privacy Act requirements based on subsection (j)(2) of the Act, that material will be exempt in System No. 09–90–1701 to the same extent it is exempt in the source system. Notwithstanding these exemptions, consideration will be given to any requests for notification, access, and amendment that are addressed to the System Manager, as provided in the SORN for system of records 09–90– 1701, and to accounting of disclosure requests. Where HHS determines that compliance with a request would not interfere with or adversely affect the purpose of this system of records to detect, deter, or mitigate insider threats, the applicable exemption may be waived by HHS in its sole discretion. The Federal Register notice containing the SORN proposed for new system of records 09–90–1701 provides for that SORN to be effective upon publication of this final rule. No PO 00000 Frm 00037 Fmt 4700 Sfmt 4700 14623 changes were made to the SORN as a result of public comments and, therefore, the SORN, as published at 83 FR 42667 (Aug. 23, 2018), is now effective. Analysis of Impacts The agency has reviewed this rule under Executive Orders 12866 and 13563, which direct agencies to assess costs and benefits of available regulatory alternatives and, if regulation is necessary, to maximize the net benefits. The agency believes that this rule is not a significant regulatory action under Executive Order 12866, and therefore does not constitute an Executive Order 13771 regulatory action, because it will not (1) have an annual effect on the economy of $100 million or more or adversely affect in a material way the economy, a sector of the economy, productivity, competition, jobs, the environment, public health or safety, or state, local or tribal governments or communities; (2) create a serious inconsistency or otherwise interfere with an action taken or planned by another agency; (3) materially alter the budgetary impact of entitlements, grants, user fees or loan programs, or the rights and obligations of recipients thereof; or (4) raise novel legal or policy issues arising out of legal mandates, the President’s priorities, or the principles set forth in Executive Order 12866. The Regulatory Flexibility Act requires agencies to analyze regulatory options that would minimize any significant impact of a rule on small entities. Because the rule imposes no duties or obligations on small entities, the Department certifies that the rule will not have a significant economic impact on a substantial number of small entities. Section 202(a) of the Unfunded Mandates Reform Act of 1995 requires that agencies prepare a written statement, which includes an assessment of anticipated costs and benefits, before proposing ‘‘any rule that includes any Federal mandate that may result in the expenditure by State, local, and tribal governments, in the aggregate, or by the private sector, of $100,000,000 or more (adjusted annually for inflation) in any one year.’’ The current threshold after adjustment for inflation is $144 million, using the most current (2015) Implicit Price Deflator for the Gross Domestic Product. The Department does not expect that this final rule would result in any one-year expenditure that would meet or exceed this amount. List of Subjects in 45 CFR Part 5b Privacy. E:\FR\FM\11APR1.SGM 11APR1 14624 Federal Register / Vol. 84, No. 70 / Thursday, April 11, 2019 / Rules and Regulations For the reasons stated in the preamble, the Department amends part 5b of title 45 of the Code of Federal Regulations as follows: PART 5b—PRIVACY ACT REGULATIONS 1. The authority citation for part 5b continues to read as follows: ■ 2. Section 5b.11 is amended by adding paragraph (b)(2)(viii)(A) and reserved paragraph (b)(2)(viii)(B) to read as follows: ■ SUPPLEMENTARY INFORMATION: Correction Exempt systems. * * * * (b) * * * (2) * * * (viii) Pursuant to subsections (k)(1) and (k)(2) of the Act: (A) HHS Insider Threat Program Records, 09–90–1701. (B) [Reserved] * * * * * In the Federal Register of March 26, 2019, in FR Doc. 2019–05620, on page 11226, in the first column, the compliance dates are corrected to read as set forth in the DATES section above and the first paragraph of the ‘‘Compliance’’ section in SUPPLEMENTARY INFORMATION is corrected to read: Michael Schmoyer, Assistant Deputy Secretary for National Security. Dated: April 4, 2019. Alex M. Azar II, Secretary. ‘‘Compliance ‘‘The amendments of the Commission’s rules as set forth in this document are effective 30 days after publication of a notice in the Federal Register announcing approval by the Office of Management and Budget (OMB). Compliance will not be required for §§ 52.15(f)(1)(ii) and (f)(8), 52.103(d), and 64.1200(l)(1) until after approval by the OMB of information collection requirements contained in §§ 52.15(f)(8) and 64.1200(l)(1). The compliance date for §§ 52.15(f)(1)(ii) and (f)(8), 52.103(d), and 64.1200(l)(1) will be specified in a document published in the Federal Register. Compliance will not be required for § 64.1200(l)(2) until after approval by OMB and the reassigned numbers database administrator is ready to begin accepting reports of the data collected in accordance with § 64.1200(l)(1). The Commission will publish another document in the Federal Register announcing the compliance date for the requirements contained in § 64.1200(l)(2).’’ * [FR Doc. 2019–07122 Filed 4–10–19; 8:45 am] BILLING CODE 4151–17–P FEDERAL COMMUNICATIONS COMMISSION 47 CFR Parts 52 and 64 [CG Docket No. 17–59; FCC 18–177] Advanced Methods To Target and Eliminate Unlawful Robocalls Federal Communications Commission. ACTION: Final rule; correction. AGENCY: The Federal Communications Commission (Commission) published a document in the Federal Register of March 26, 2019 (84 FR 11226), regarding the establishment of a single, comprehensive database that will contain the most recent permanent disconnection date for toll free numbers and for each number allocated to or ported to each provider that receives North American Numbering Plan U.S. geographic numbers. The document contained references to an incorrect rule section for compliance. This document corrects those inaccurate references. DATES: This correction is effective April 11, 2019. The compliance dates for the final rule published March 26, 2019, at SUMMARY: amozie on DSK9F9SC42PROD with RULES Josh Zeldis, Consumer Policy Division, Consumer and Governmental Affairs Bureau (CGB), at (202) 418–0715, email: Josh.Zeldis@fcc.gov. FOR FURTHER INFORMATION CONTACT: Authority: 5 U.S.C. 301, 5 U.S.C. 552a. § 5b.11 84 FR 11226, are corrected as follows: Compliance date: Compliance will not be required for §§ 52.15(f)(1)(ii) and (f)(8), 52.103(d), and 64.1200(l)(1) and (2) until the Commission publishes documents in the Federal Register announcing the compliance dates. VerDate Sep<11>2014 16:02 Apr 10, 2019 Jkt 247001 Federal Communications Commission. Katura Jackson, Federal Register Liaison Officer, Office of the Secretary. [FR Doc. 2019–06961 Filed 4–10–19; 8:45 am] BILLING CODE 6712–01–P PO 00000 Frm 00038 Fmt 4700 Sfmt 4700 GENERAL SERVICES ADMINISTRATION 48 CFR Parts 511, 516, 532, 538, 546 and 552 [GSAR Amendment 2008–02; GSAR Case 2008–G517; Docket No. 2008–0007; Sequence No. 02] RIN 3090–AI68 General Services Administration Acquisition Regulation; GSAR Case 2008–G517; Cooperative PurchasingAcquisition of Security and Law Enforcement Related Goods and Services (Schedule 84) by State and Local Governments Through Federal Supply Schedules Office of Acquisition Policy, General Services Administration (GSA). ACTION: Final rule. AGENCY: The General Services Administration (GSA) is adopting as final, without change, an interim rule amending the General Services Administration Acquisition Regulation (GSAR) to implement The Local Preparedness Acquisition Act of 2008. The Act authorizes the Administrator of General Services to provide for the use by State or local governments of Federal Supply Schedules of the GSA safety equipment and services. DATES: Effective Date: May 13, 2019. FOR FURTHER INFORMATION CONTACT: Mr. Thomas O’Linn, Procurement Analyst, at 202–445–0390, for clarification of content. For information pertaining to status or publication schedules, contact the Regulatory Secretariat Division at 202–501–4755. Please cite GSAR Case 2008–G517. SUPPLEMENTARY INFORMATION: SUMMARY: I. Background As part of GSA’s regulatory reform efforts, GSA has been performing a comprehensive review of the regulatory requirements in the GSAR. As a part of these efforts, GSA discovered that a Federal Register notification had not been published to finalize this interim rule. As a result, GSA included as part of the Fall edition of the Unified Agenda of Federal Regulatory and Deregulatory Actions in the Federal Register at 83 FR 58086 on November 16, 2018 its intention to publish a final rule notification in the Federal Register. The purpose of this rule is the straightforward implementation of the statutory authority provided by Public Law 110–248, The Local Preparedness Acquisition Act to open Schedule 84 or any amended or subsequent version of that Federal supply classification group E:\FR\FM\11APR1.SGM 11APR1

Agencies

[Federal Register Volume 84, Number 70 (Thursday, April 11, 2019)]
[Rules and Regulations]
[Pages 14622-14624]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2019-07122]


=======================================================================
-----------------------------------------------------------------------

DEPARTMENT OF HEALTH AND HUMAN SERVICES

45 CFR Part 5b

RIN 0991-AC10


Privacy Act; Implementation

AGENCY: Department of Health and Human Services (HHS).

ACTION: Final rule.

-----------------------------------------------------------------------

SUMMARY: The Department of Health and Human Services (HHS or 
Department) is issuing this final rule to make effective the exemptions 
that HHS proposed for certain records covered in a new Privacy Act 
system of records, System No. 09-90-1701, HHS Insider Threat Program 
Records.

DATES: This final rule is effective April 11, 2019.

FOR FURTHER INFORMATION CONTACT: Michael W. Schmoyer, Assistant Deputy 
Secretary for National Security by email at [email protected] or 
telephone at (202) 690-5756, or by mail to the HHS Office of Security 
and Strategic Information (OSSI), 200 Independence Ave. SW, Washington, 
DC 20201.

SUPPLEMENTARY INFORMATION: In accordance with 5 U.S.C. 552a (Privacy 
Act or Act), the exemptions were described in a Notice of Proposed 
Rulemaking (NPRM) published for public notice and comment at 83 FR 
42627 (Aug. 23, 2018). The new system of records is described in a 
System of Records Notice (SORN) which was published for public notice 
and comment the same day, at 83 FR 42667 (Aug 23, 2018). Only law 
enforcement investigatory material and classified intelligence 
information were proposed to be exempted, based on subsections (k)(1) 
and (k)(2) of the Act, from the requirements contained in subsections 
(c)(3), (d)(1)-(4), (e)(1), (e)(4)(G), (H), and (I), and (f) of the 
Act, which require the agency to provide an accounting of disclosures; 
provide notification, access, and amendment rights, rules, and 
procedures; maintain only relevant and necessary information; and 
identify categories of record sources. The NPRM also explained that if 
the HHS Insider Threat Program obtains law enforcement investigatory 
material from another Privacy Act system of records that has been 
exempted from Privacy Act requirements based on subsection (j)(2) of 
the Act, that material will be exempt in System No. 09-90-1701 to the 
same extent it is exempt in the source system, so it may be exempt from 
requirements in any of these subsections of the Act: (c)(3)-(4); 
(d)(1)-(4); (e)(1)-(3), (e)(4)(G)-(I), (e)(5), (e)(8), (e)(12); (f); 
(g); and (h).
    The comment period for the SORN and NPRM was open through September 
24, 2018. No comments were received on the NPRM and no comments were 
received on the SORN. No changes to the proposed exemptions or to the 
SORN were made following the public comment period.
    The specific rationales that support the exemptions as to each 
affected Privacy Act provision, remain as stated in the NPRM; the 
exemptions from the particular subsections are necessary and 
appropriate, and justified for the following reasons:
     5 U.S.C. 552a(c)(3) (the requirement to provide 
accountings of disclosures) and 5 U.S.C. 552a(d)(1)-(4) (requirements 
addressing notification, access, and amendment rights, collectively 
referred to herein as access requirements). Providing individual record 
subjects with accountings of disclosures and with notification, access, 
and amendment rights with respect to Insider Threat Program records 
could reveal the existence of an investigation, investigative interest, 
investigative techniques, details about an investigation, security-
sensitive information such as information about security measures and 
security vulnerabilities, information that must remain non-public to 
protect national security or personal privacy-identities of law 
enforcement personnel, or other sensitive or classified information. 
Revealing such information to record subjects would thwart or impede 
pending and future law enforcement investigations and efforts to 
protect national security, and would violate personal privacy. 
Revealing the information would enable record subjects or other persons 
to evade detection and apprehension by security and law enforcement 
personnel; destroy, conceal, or tamper with evidence or fabricate 
testimony; or harass, intimidate, harm, coerce, or retaliate against 
witnesses, complainants, investigators, security personnel, law 
enforcement personnel, or their family members, their employees, or 
other individuals. With

[[Page 14623]]

respect to investigatory material compiled for law enforcement 
purposes, the exemption pursuant to 5 U.S.C. 552a(k)(2) from access 
requirements in subsection (d) of the Act is statutorily limited. If 
any individual is denied a right, privilege, or benefit to which the 
individual would otherwise be entitled by federal law or for which the 
individual would otherwise be eligible, access will be granted, except 
to the extent that the disclosure would reveal the identity of a source 
who furnished information to the Government under an express promise of 
confidentiality.
     5 U.S.C. 552a(e)(1) (the requirement to maintain only 
relevant and necessary information authorized by statute or Executive 
Order). It will not always be possible to determine at the time 
information is received or compiled in this system of records whether 
the information is or will be relevant and necessary to a law 
enforcement investigation or to protecting national security. For 
example, a tip or lead that does not appear relevant or necessary to 
uncovering an insider threat by itself or at the time the tip or lead 
is received may prove to be relevant and necessary when combined with 
other information that reveals a pattern or that comes to light later.
     5 U.S.C. 552a(e)(4)(G) and (H) (the requirements to 
describe procedures by which subjects may be notified of whether the 
system of records contains records about them and seek access or 
amendment of a record). These requirements concern individual access to 
records, and the records are exempt under (c) and (d), as described 
above. To the extent that (e)(4)(G) and (H) are interpreted to require 
more detailed procedures regarding record notification, access, or 
amendment than have been published in the Federal Register, exemption 
from those provisions is necessary for the same rationale as applies to 
(c) and (d).
     5 U.S.C. 552a(e)(4)(I) (the requirement to describe the 
categories of record sources). To the extent that this subsection is 
interpreted to require a more detailed description regarding the record 
sources in this system than has been published in the Federal Register, 
exemption from this provision is necessary to protect the sources of 
law enforcement and intelligence information and to protect the privacy 
and safety of witnesses and informants and others who provide 
information to HHS. Further, greater specificity of sources of properly 
classified records could compromise national security. Moreover, 
because records used in the Insider Threat Program could come from any 
source, it is not possible to know every category in advance in order 
to list them all in the SORN. Some record source categories may not be 
appropriate to make public in the SORN if, for example, revealing them 
could enable record subjects or other individuals to discover 
investigative techniques and devise ways to bypass them to evade 
detection and apprehension.
     5 U.S.C. 552a(f) (the requirement to promulgate rules to 
implement provisions of the Privacy Act). To the extent that this 
subsection is interpreted to require agency rules addressing the above 
exempted requirements, exemption from this provision is also necessary 
to protect the sources of law enforcement and intelligence information 
and to protect the privacy and safety of witnesses and informants and 
others who provide information to HHS. Greater specificity in 
rulemaking regarding properly classified records could compromise 
national security.
    Accordingly, based on 5 U.S.C. 552a(k)(1) and (k)(2) and the 
specific rationales indicated above, HHS is now exempting law 
enforcement investigatory material and classified intelligence 
information in system of records 09-90-1701 HHS Insider Threat Program 
Records from subsections (c)(3), (d)(1)-(4), (e)(1), (e)(4)(G), (H), 
and (I), and (f) of the Act, which contain requirements to provide an 
accounting of disclosures; provide notification, access, and amendment 
rights, rules, and procedures; maintain only relevant and necessary 
information; and identify categories of record sources. In addition, 
HHS affirms that if the HHS Insider Threat Program obtains law 
enforcement investigatory material from another Privacy Act system of 
records that has been exempted from Privacy Act requirements based on 
subsection (j)(2) of the Act, that material will be exempt in System 
No. 09-90-1701 to the same extent it is exempt in the source system.
    Notwithstanding these exemptions, consideration will be given to 
any requests for notification, access, and amendment that are addressed 
to the System Manager, as provided in the SORN for system of records 
09-90-1701, and to accounting of disclosure requests. Where HHS 
determines that compliance with a request would not interfere with or 
adversely affect the purpose of this system of records to detect, 
deter, or mitigate insider threats, the applicable exemption may be 
waived by HHS in its sole discretion.
    The Federal Register notice containing the SORN proposed for new 
system of records 09-90-1701 provides for that SORN to be effective 
upon publication of this final rule. No changes were made to the SORN 
as a result of public comments and, therefore, the SORN, as published 
at 83 FR 42667 (Aug. 23, 2018), is now effective.

Analysis of Impacts

    The agency has reviewed this rule under Executive Orders 12866 and 
13563, which direct agencies to assess costs and benefits of available 
regulatory alternatives and, if regulation is necessary, to maximize 
the net benefits. The agency believes that this rule is not a 
significant regulatory action under Executive Order 12866, and 
therefore does not constitute an Executive Order 13771 regulatory 
action, because it will not (1) have an annual effect on the economy of 
$100 million or more or adversely affect in a material way the economy, 
a sector of the economy, productivity, competition, jobs, the 
environment, public health or safety, or state, local or tribal 
governments or communities; (2) create a serious inconsistency or 
otherwise interfere with an action taken or planned by another agency; 
(3) materially alter the budgetary impact of entitlements, grants, user 
fees or loan programs, or the rights and obligations of recipients 
thereof; or (4) raise novel legal or policy issues arising out of legal 
mandates, the President's priorities, or the principles set forth in 
Executive Order 12866.
    The Regulatory Flexibility Act requires agencies to analyze 
regulatory options that would minimize any significant impact of a rule 
on small entities. Because the rule imposes no duties or obligations on 
small entities, the Department certifies that the rule will not have a 
significant economic impact on a substantial number of small entities.
    Section 202(a) of the Unfunded Mandates Reform Act of 1995 requires 
that agencies prepare a written statement, which includes an assessment 
of anticipated costs and benefits, before proposing ``any rule that 
includes any Federal mandate that may result in the expenditure by 
State, local, and tribal governments, in the aggregate, or by the 
private sector, of $100,000,000 or more (adjusted annually for 
inflation) in any one year.'' The current threshold after adjustment 
for inflation is $144 million, using the most current (2015) Implicit 
Price Deflator for the Gross Domestic Product. The Department does not 
expect that this final rule would result in any one-year expenditure 
that would meet or exceed this amount.

List of Subjects in 45 CFR Part 5b

    Privacy.


[[Page 14624]]


    For the reasons stated in the preamble, the Department amends part 
5b of title 45 of the Code of Federal Regulations as follows:

PART 5b--PRIVACY ACT REGULATIONS

0
1. The authority citation for part 5b continues to read as follows:

    Authority: 5 U.S.C. 301, 5 U.S.C. 552a.

0
2. Section 5b.11 is amended by adding paragraph (b)(2)(viii)(A) and 
reserved paragraph (b)(2)(viii)(B) to read as follows:


Sec.  5b.11   Exempt systems.

* * * * *
    (b) * * *
    (2) * * *
    (viii) Pursuant to subsections (k)(1) and (k)(2) of the Act:
    (A) HHS Insider Threat Program Records, 09-90-1701.
    (B) [Reserved]
* * * * *

Michael Schmoyer,
Assistant Deputy Secretary for National Security.
    Dated: April 4, 2019.
Alex M. Azar II,
Secretary.
[FR Doc. 2019-07122 Filed 4-10-19; 8:45 am]
 BILLING CODE 4151-17-P


This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.