Privacy Act of 1974; System of Records, 47533-47540 [2019-19449]

Download as PDF Federal Register / Vol. 84, No. 175 / Tuesday, September 10, 2019 / Notices All meetings are held at the Foreign Claims Settlement Commission, 441 G St. NW, Room 6234, Washington, DC. STATUS: Open. MATTERS TO BE CONSIDERED: 10:00 a.m.— Issuance of Proposed Decisions in claims against Iraq. 10:30 a.m.—Issuance of Proposed Decisions under the Guam World War II Loyalty Recognition Act, Title XVII, Public Law 114–328. CONTACT PERSON FOR MORE INFORMATION: Requests for information, or advance notices of intention to observe an open meeting, may be directed to: Patricia M. Hall, Foreign Claims Settlement Commission, 441 G St. NW, Room 6234, Washington, DC 20579. Telephone: (202) 616–6975. PLACE: Brian Simkin, Chief Counsel. [FR Doc. 2019–19635 Filed 9–6–19; 4:15 pm] BILLING CODE 4410–BA–P DEPARTMENT OF JUSTICE [CPCLO Order No. 006–2019] Privacy Act of 1974; System of Records Federal Bureau of Investigation, United States Department of Justice. ACTION: Notice of a modified system of records. AGENCY: Pursuant to the Privacy Act of 1974, and Office of Management and Budget (OMB) Circular No. A–108, notice is hereby given that the United States Department of Justice (Department or DOJ), Federal Bureau of Investigation (FBI), proposes to modify a system of records entitled National Crime Information Center (NCIC), JUSTICE/FBI–001, which was last published in the Federal Register on September 28, 1999 (64 FR 52343). The NCIC serves as a central information repository to assist criminal justice professionals in apprehending fugitives, locating missing persons, recovering stolen property, and identifying known or suspected terrorists. Law enforcement officers also use the information within NCIC to help protect the general public and themselves when carrying out their official duties. This system of records notice is being updated to better inform the public about the types of information within the NCIC and the uses of this information to further criminal justice purposes. DATES: In accordance with 5 U.S.C. 552a(e)(4) and (11), this system of khammond on DSKBBV9HB2PROD with NOTICES SUMMARY: VerDate Sep<11>2014 16:56 Sep 09, 2019 Jkt 247001 records begins on publication, subject to a 30-day period to comment on the routine use modifications described below. Please submit any comments by October 10, 2019. ADDRESSES: The public, OMB, and Congress are invited to submit any comments: By mail to the Department of Justice, Office of Privacy and Civil Liberties, ATTN: Privacy Analyst, 145 N St. NE, Suite 8w–300, Washington, DC 20530; by facsimile at 202–307–0693; or by email at privacy.compliance@ usdoj.gov. To ensure proper handling, please reference the above CPCLO Order No. on your correspondence. FOR FURTHER INFORMATION CONTACT: Katherine M. Bond, Assistant General Counsel, Privacy and Civil Liberties Unit, Office of the General Counsel, FBI, 935 Pennsylvania Avenue NW, Washington, DC 20535–0001; telephone (202) 324–3000. SUPPLEMENTARY INFORMATION: The FBI has revised this system of records notice to update information about this system. Established in 1967, the NCIC is a national criminal justice information system linking criminal (and authorized non-criminal) justice agencies located in the 50 states, the District of Columbia, U.S. territories and possessions, as well as selected foreign countries to facilitate the cooperative sharing of criminal justice information. See 28 CFR Sections 20.3(b) & (g) for definitions of ‘‘administration of criminal justice’’ and ‘‘criminal justice agency.’’ The NCIC provides a system to receive and maintain information contributed by participating agencies relating to criminal justice and national security missions. Information maintained in the NCIC is readily accessible for authorized purposes by authorized users via textbased queries (i.e., using names and other descriptive data). The purposes of maintaining records in the NCIC include combatting acts of terrorism; apprehending fugitives; solving crimes; locating missing persons; locating and returning stolen property; protecting individuals during declared emergency situations; protecting victims of domestic violence; monitoring registered sex offenders; conducting firearms, licensee, and explosive background checks; and enhancing the safety of law enforcement officers. This Notice modifies the previous publication of the NCIC System of Records Notice to (1) include new categories of records and individuals, (2) update routine uses, and (3) remove references to the Interstate Identification Index (III). Since the September 28, 1999, publication of notice of this System of Records, 64 FR 52343, PO 00000 Frm 00060 Fmt 4703 Sfmt 4703 47533 criminal justice agencies have requested that additional information be included in the NCIC to meet their needs. This additional information includes such new categories of individuals and categories of records as the National Sex Offender Registry, the Supervised Release File, the Identity Theft File, the Protective Interest File, the NICS Denied Transaction File, the Immigration Violator File, and the Violent Person File. Adding this information to the NCIC advances FBI’s mission and criminal justice investigation, as well as increasing officer safety by providing pertinent information to law enforcement officers regarding the individuals they encounter while on duty. This System of Records Notice also updates the routine uses for the information contained within the NCIC to educate the public on how the records will be shared with criminal justice agencies, authorized noncriminal justice agencies, and private organizations to further the purposes of combatting acts of terrorism; apprehending fugitives; solving crimes; locating missing persons; locating and returning stolen property; protecting individuals during declared emergency situations; protecting victims of domestic violence; monitoring registered sex offenders; conducting firearms, licensee, and explosive background checks; and enhancing the safety of law enforcement officers. For consolidation and transparency purposes, the routine uses applicable to the NCIC under the FBI’s Blanket Routine Uses (FBI–BRU, 66 FR 33558 (June 22, 2001), as amended by 70 FR 7513, 517 (Feb. 14, 2005) and 82 FR 24147 (May 25, 2017)) are also being included in the routine use portion of this notice. Finally, this modified System of Record Notice removes references to the Interstate Identification Index (III) and criminal history record information. Although the NCIC is used to retrieve criminal history record information from III through a federated search capability, III is not part of NCIC, and criminal history record information is no longer maintained within the NCIC, but is now maintained in the FBI’s Next Generation Identification (NGI) System, JUSTICE/FBI–009, 81 FR 27284 (May 5, 2016). A person who wishes to access his or her criminal history records should follow the procedures set forth in 28 CFR 16.30 et seq. In accordance with 5 U.S.C. 552a(r), the Department has provided a report to OMB and the Congress on this revised system of records notice. E:\FR\FM\10SEN1.SGM 10SEN1 47534 Federal Register / Vol. 84, No. 175 / Tuesday, September 10, 2019 / Notices Dated: August 28, 2019. Peter A. Winn Acting Chief Privacy and Civil Liberties Officer, United States Department of Justice. SYSTEM NAME AND NUMBER: National Crime Information Center (NCIC), JUSTICE/FBI–001. SECURITY CLASSIFICATION: Unclassified SYSTEM LOCATION: Records may be maintained at all locations at which the FBI operates or at which FBI operations are supported, including: J. Edgar Hoover Building, 935 Pennsylvania Avenue NW, Washington, DC 20535–0001; FBI Academy and FBI Laboratory, Quantico, VA 22135; FBI Criminal Justice Information Services (CJIS) Division, 1000 Custer Hollow Road, Clarksburg, WV 26306; FBI Records Management Division, 170 Marcel Drive, Winchester, VA 22602– 4843; and FBI field offices, legal attaches, information technology centers, and other components listed on the FBI’s internet website, https:// www.fbi.gov. Some or all system information may also be duplicated at other locations where the FBI has granted direct access for support of FBI missions, for purposes of system backup, emergency preparedness, and/ or continuity of operations. SYSTEM MANAGER(S): Director, Federal Bureau of Investigation, 935 Pennsylvania Avenue NW, Washington, DC 20535–0001; (202) 324–3000. khammond on DSKBBV9HB2PROD with NOTICES AUTHORITY FOR MAINTENANCE OF THE SYSTEM: Authorities for maintaining the system include 28 U.S.C. Chapter 33; and 28 CFR 0.85 and 28 CFR part 20. Additional authorities include 34 U.S.C. Chapter 10211; the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT) Act of 2001, Public Law 107–56, 115 Stat 272; the Intelligence Reform and Terrorism Prevention Act of 2004 (IRTPA), Public Law 108–458, 118 Stat 3638; the Implementing Regulations of the 9/11 Commission Act of 2007, Public Law 110–53, 121 Stat 266; Executive Order 13311, Homeland Security Information Sharing (July 29, 2003); Executive Order 13356, Strengthening the Sharing of Terrorism Information To Protect Americans (August 27, 2004); and Executive Order 13388, Further Strengthening the Sharing of Terrorism Information To Protect Americans (October 25, 2005). VerDate Sep<11>2014 16:56 Sep 09, 2019 Jkt 247001 PURPOSE(S) OF THE SYSTEM: Established in 1967, the NCIC is a national criminal justice information system linking criminal (and authorized non-criminal) justice agencies located in the 50 states, the District of Columbia, U.S. territories and possessions, as well as selected foreign countries, to facilitate the cooperative sharing of criminal justice information. The NCIC provides a system to receive and maintain information contributed by participating agencies relating to criminal justice and national security missions. Information maintained in the NCIC is readily accessible for authorized purposes by authorized users via textbased queries (i.e., using names and other descriptive data). The purposes of maintaining records in the NCIC include combatting acts of terrorism; apprehending fugitives; solving crimes; locating missing persons; locating and returning stolen property; protecting individuals during declared emergency situations; protecting victims of domestic violence; monitoring registered sex offenders; conducting firearms, licensee, and explosive background checks through the National Instant Criminal Background Check System (NICS); and enhancing the safety of law enforcement officers. CATEGORIES OF INDIVIDUALS COVERED BY THE SYSTEM: Categories of individuals covered by the system are: A. Wanted persons: 1. Individuals for whom federal warrants are outstanding. 2. Individuals who allegedly have committed or have been linked with an offense which is classified as a felony, misdemeanor, or other criminal offense under the existing penal statutes of the jurisdiction originating the entry and for whom a warrant has been issued with respect to the offense that was the basis of the entry; and probation and parole violators meeting these criteria. 3. Individuals for whom a ‘‘Temporary Felony Want’’ has been entered. Temporary felony want records allow a law enforcement agency to take prompt action to apprehend a person suspected of committing a felony when circumstances prevent the agency from immediately obtaining a warrant. Procedural safeguards for these Temporary Felony Wants include that they may only be entered in NCIC for the apprehension of a person who has committed, or the officer has reasonable grounds to believe has committed, a felony; the person may seek refuge by fleeing across jurisdictional boundaries; and (as noted) circumstances preclude the immediate procurement of an arrest PO 00000 Frm 00061 Fmt 4703 Sfmt 4703 warrant. A Temporary Felony Want shall be specifically identified as such and automatically expires 48 hours after entry. 4. Juveniles who (a) have been adjudicated delinquent and who have escaped or absconded from custody, even though no arrest warrants were issued; or (b) who have been charged with the commission of a delinquent act that would be a crime if committed by an adult, and who may have fled from the state where the act was committed. 5. Individuals who allegedly have committed or have been linked with an offense committed in a foreign country that would be a felony if committed in the United States, and for whom a warrant of arrest is outstanding, and (a) for which act an extradition treaty exists between the United States and that country, (b) are wanted by foreign authorities for a violent crime, or (c) are otherwise known or reasonably believed by foreign authorities to be violent, armed, or dangerous. 6. Individuals who allegedly have committed or have been linked with an offense committed in Canada and for whom a Canada-Wide Warrant has been issued which meets the requirements of the Canada-United States Extradition Treaty. B. Sex offender registrants: Individuals who are required to register in a jurisdiction’s sex offender registry. C. Violent felons: Individuals with three or more convictions for a violent felony or serious drug offense as defined by 18 U.S.C. 924(e), and who were entered into the NCIC Violent Felon file between 1992 and 1998. D. Individuals on probation, parole, supervised release, pretrial supervision, or released on their own recognizance; and supervising officials for these individuals. E. Immigration violators: Criminal aliens who have been previously deported; aliens with outstanding administrative warrants of removal from the United States; aliens who have failed to comply with national security registration requirements; and other immigration violators. F. Missing persons: Individuals of any age who are missing and for whom there is a reasonable concern for the wellbeing of the person and/or others, such as: A missing person who suffers from a documented physical/mental disability; a person missing under circumstances indicating that the disappearance was not voluntary or that the person’s health or physical safety may be in danger; a missing child under the age of 21 reported to law enforcement; a person missing after a catastrophe; and, persons reasonably E:\FR\FM\10SEN1.SGM 10SEN1 khammond on DSKBBV9HB2PROD with NOTICES Federal Register / Vol. 84, No. 175 / Tuesday, September 10, 2019 / Notices believed to have information regarding missing persons. G. Persons of protective interest: Individuals designated by local, state, tribal, territorial, and federal law enforcement agencies with a protective mission as presenting credible threats to authorized protectees of those agencies. H. Members of criminal gangs: Individuals about whom law enforcement agencies have developed sufficient information to establish membership or other similar relationship in a particular criminal gang by either self-admission or pursuant to documented criteria approved by the FBI. For the purpose of this file, a gang is defined as a group of three or more persons with a common interest, bond, or activity characterized by criminal or delinquent conduct. I. Known or suspected terrorists: Individuals known or appropriately suspected to be or have been engaged in conduct constituting, in preparation for, in aid of, or related to domestic or international terrorism. J. Military Detainees: Individuals who were officially detained during military operations who pose an actual or possible threat to national security, but not persons detained as Enemy Prisoners of War. K. National Security Threat Actors: Individuals, organizations, groups, or networks assessed to be a threat to the safety, security, or national interests of the United States including cyber threat actors, foreign intelligence threat actors, military threat actors, transnational criminal actors, and weapons proliferators as defined in National Security Presidential Memorandum 7, issued on October 5, 2017, or any subsequent authority. L. Unidentified persons: Any unidentified deceased person or body parts, or any living person whose identity has not been ascertained (e.g., infant, amnesia victim, catastrophe victim). M. Persons related to protection orders: Individuals against whom a protection order has been issued and the protected persons. N. Owners of stolen property related to NCIC entries. O. Victims of identity theft. P. Individuals who have been disqualified from possessing, transferring, or receiving firearms or explosives, or have been denied a weapons permit under applicable state or federal law pursuant to the National Instant Criminal Background Check System (NICS). Q. Violent persons: Individuals who have been convicted of violent crimes, or have made credible threats, against VerDate Sep<11>2014 16:56 Sep 09, 2019 Jkt 247001 law enforcement and individuals who have been convicted of certain other violent crimes. R. Individuals associated with active FBI investigations such as suspects, subjects of interest, witnesses, or victims. S. FBI employees, U.S. government employees, and employees of local, state, tribal, or territorial law enforcement agencies. T. Individuals who are, or within the last five years were, under FBI investigation for terrorism. U. Individuals named in documents supporting NCIC entries (e.g. warrants, protection orders, terms and conditions of probation/supervised released, missing person reports). V. Subjects of Continuous Evaluation: Individuals required by statute, executive authority, or other legal authority to undergo continuous revetting to maintain employment or security clearance with a federal agency. W. Individuals who have provided their information to federal agencies for the purposes of immigration benefits or other government benefits which require ongoing suitability determinations (e.g. Trusted Traveler programs). X. Individuals who have been queried through the NCIC. This includes all individuals queried through the NCIC for purposes listed in the ‘‘Routine Uses’’ section of this notice. CATEGORIES OF RECORDS IN THE SYSTEM: The NCIC may contain records about individuals described by the categories listed above. Records may include all manner of identifying information, such as name, Social Security number, date of birth, place of birth, physical description, photograph, descriptive information about fingerprints and other biometrics which may be available (the biometrics themselves and not maintained within the NCIC), passport and/or driver’s license information, personal and business addresses and telephone numbers, and other personal identifiers. Records in the system may include details pertinent to particular file types, such as law enforcement information, visa/immigration information, and terrorism information; information relevant to the protection of health, safety, or property; physical or medical characteristics or other personal information deemed necessary to identify an individual, protect law enforcement officers, and identify and protect law enforcement subjects; and information relevant to responding to, mitigating, and recovering from disasters, emergencies, and catastrophes, as well as assisting in PO 00000 Frm 00062 Fmt 4703 Sfmt 4703 47535 other humanitarian efforts. Records may also include uploaded documents supporting NCIC entries (e.g. warrants, protection orders, terms and conditions of probation/supervised release, missing person reports). Specific files in the NCIC include: A. Vehicle File: 1. Stolen vehicles, including aircraft and trailers. 2. Vehicles wanted in conjunction with crimes. 3. Vehicles subject to seizure based on federal court orders. B. License Plate File (Stolen). C. Boat File (Stolen). D. Vehicle/Boat Part File: Seriallynumbered components of vehicles and boats reported to have been stolen. E. Gun File: 1. Stolen guns. 2. Recovered guns, when ownership has not been established. 3. Lost guns. 4. Guns believed to have been used during the commission of crimes. F. Article File (Stolen or Lost). G. Securities File: Serially numbered stolen, embezzled, used for ransom, or counterfeited securities. H. Wanted Person File: Described in ‘‘Categories of Individuals Covered by the System: A (1–4).’’ I. Foreign Fugitive File: Described in ‘‘Categories of Individuals Covered by the System: A. (5, 6).’’ J. National Sex Offender Registry: Described in ‘‘Categories of Individuals Covered by the System: B.’’ K. The Bureau of Alcohol, Tobacco, Firearms, and Explosives (ATF) Violent Felon File: Described in ‘‘Categories of Individuals Covered by the System: C.’’ (The ATF no longer enters data into this file, and these records have now been retired and are only accessible by the FBI.) L. Supervised Release File: Described in ‘‘Categories of Individuals Covered by the System: D.’’ M. Immigration Violator File: Described in ‘‘Categories of Individuals Covered by the System: E.’’ N. Missing Person File: Described in ‘‘Categories of Individuals Covered by the System: F.’’ O. Protective Interest File: Described in ‘‘Categories of individuals Covered by the System: G.’’ P. Gang File: Described in ‘‘Categories of Individuals Covered by the System: H.’’ Q. Known or Suspected Terrorist File: Described in ‘‘Categories of Individuals Covered by the System: I, J, and K.’’ R. Unidentified Person File: Described in ‘‘Categories of Individuals Covered by the System: L.’’ E:\FR\FM\10SEN1.SGM 10SEN1 47536 Federal Register / Vol. 84, No. 175 / Tuesday, September 10, 2019 / Notices S. Protection Order File: Described in ‘‘Categories of Individuals Covered by the System: M.’’ T. Identity Theft File: Described in ‘‘Categories of Individuals Covered by the System: O.’’ U. NICS Denied Transaction File: Described in ‘‘Categories of Individuals Covered by the System: P.’’ V. Image File: Identifying images (e.g., mug shots; scars, marks, tattoos; property photos; signatures) and documents to help identify persons and property related to entries in other NCIC files. W. Violent Person File: Described in ‘‘Categories of Individuals Covered by the System: Q.’’ X. System Tables and Charts: Although not part of particular files described herein, these tables and charts may contain data elements from the above files (e.g., license plate numbers, vehicle identification numbers); include individuals described in ‘‘Categories of Individuals Covered by the System’’ R, S, T, V, and W; and are used for system administration, investigative, and other authorized purposes. Y. Inactive Records: Records that are still generally available to all NCIC authorized users for historical reference after the records have expired or been cleared from the active NCIC files. Z. Retired Records: Records that have expired, been cleared, or been canceled from the active NCIC environment. These records are only directly accessible by FBI personnel and CJIS Systems Agencies. AA. Transaction Log: All transactions that enter, update, query, or access the records described above; rejected transactions; and system administrative messages. The Transaction Log now maintains the transaction history for the life of the system; however, the transaction history prior to 1990 was maintained for 10 years. Transaction logs may contain information regarding all ‘‘Categories of Individuals.’’ Search criteria from queries initiated by the National Instant Criminal Background Check System (NICS), JUSTICE/FBI– 018, are not logged. khammond on DSKBBV9HB2PROD with NOTICES RECORD SOURCE CATEGORIES: Local, state, tribal, territorial, federal, foreign, and international governmental agencies and authorized nongovernmental entities. ROUTINE USES OF RECORDS MAINTAINED IN THE SYSTEM, INCLUDING CATEGORIES OF USERS AND THE PURPOSE OF SUCH USES: These records or information contained therein may be disclosed as routine uses pursuant to 5 U.S.C. 552a(b)(3) of the Privacy Act as VerDate Sep<11>2014 16:56 Sep 09, 2019 Jkt 247001 described below. As routine uses specific to this system, the DOJ may disclose relevant system records or information to the extent such disclosures are compatible with a purpose for which the information was collected. Routine uses are not meant to be mutually exclusive and may sometimes overlap. A. To local, state, tribal, territorial, or federal law enforcement or criminal justice agencies (to include police, prosecution, penal, probation, or parole agencies, and the judiciary) or other authorized federal agencies where such disclosure: 1. May assist the recipient in the performance of its law enforcement, criminal justice, or national security functions, to include the screening of employees, contractors, or applicants for employment by criminal justice agencies; 2. May assist the FBI in performing a law enforcement or national security function; 3. May promote, assist, or otherwise serve the mutual efforts of the law enforcement, criminal justice, and national security communities, such as site security screening of visitors to criminal justice facilities and military installations; or 4. May serve a compatible civil law enforcement purpose. B. To authorized foreign governments or international agencies where such disclosure: 1. May assist the recipient in the performance of its law enforcement, criminal justice, or national functions; 2. May assist the FBI in performing a law enforcement or national security function; 3. May promote, assist, or otherwise serve the mutual efforts of the international community; or 4. May serve a compatible civil law enforcement purpose. C. To appropriate officials and employees of a federal agency or entity which requires information relevant to a decision concerning the hiring, appointment, or retention of an employee; the issuance, renewal, suspension, or revocation of a security clearance; the execution of a security or suitability investigation; the letting of a contract; or the issuance of a grant. D. To state and federal agencies when necessary to assist in detecting and preventing fraudulent receipt of government benefits (e.g., Department of Housing and Urban Development, Department of Veterans Affairs, or Social Security Administration). E. To the Department of State for the purpose of determining the eligibility of visa and passport applicants. PO 00000 Frm 00063 Fmt 4703 Sfmt 4703 F. To the Department of Homeland Security and its components for use in background investigations of individuals with access to secure areas of airports, aircraft, ports, and vessels; commercial drivers of hazardous materials; applicants for aircraft training; those responsible for screening airport passengers and property; those with security functions related to baggage and cargo; and other statutorily authorized populations. G. To authorized local, state, tribal, territorial, and federal agencies for the purposes of emergency child placement or emergency disaster response. H. To authorized non-governmental entities or subunits thereof that perform the administration of criminal justice for criminal justice purposes as defined in 28 CFR 20.3(b). I. To authorized local, state, tribal, territorial, federal, foreign, or international agencies for humanitarian purposes (e.g., vetting volunteers during natural disasters). J. To authorized agencies as required by federal statutes, treaties, executive orders and other presidential and executive directives, federal regulations, federal rules, or Attorney General Guidance. K. To authorized federal agencies for alien registration, immigration, naturalization, international travel, or similar matters related to national security. L. To designated points of contact at criminal justice agencies for background checks under the National Instant Criminal Background Check System (NICS). M. To local, state, tribal, territorial, or federal criminal justice officials for the conduct of firearms or explosivesrelated background checks when required to issue firearms or explosivesrelated licenses or permits according to a state statute or local ordinance, when checking firearms transferred to pawn shops, or when returning firearms to authorized recipients. N. To authorized non-criminal justice governmental agencies performing criminal justice dispatching functions or data processing/information services for local, state, tribal, territorial, federal, or foreign criminal justice agencies. O. To private contractors pursuant to specific agreements with local, state, tribal, territorial, federal, or foreign criminal justice or authorized noncriminal justice agencies for the purpose of providing services for the administration of criminal justice as defined in 28 CFR 20.3(b). P. To the National Center for Missing and Exploited Children (NCMEC) when E:\FR\FM\10SEN1.SGM 10SEN1 khammond on DSKBBV9HB2PROD with NOTICES Federal Register / Vol. 84, No. 175 / Tuesday, September 10, 2019 / Notices acting within its statutory duty to support law enforcement agencies. Q. To local, state, tribal, territorial, and federal government social service agencies with child protection responsibilities for purposes of investigating or responding to reports of child abuse, neglect, or exploitation. R. To railroad or private college/ university police departments or subunits thereof which perform, and allocate a substantial portion of their annual budget to, the administration of criminal justice and whose appropriately trained employees hold police powers under state law for the administration of criminal justice as defined in 28 CFR 20.3(b). S. To civil or criminal courts for use in domestic violence or stalking cases. T. To social networking websites to prevent sex offenders from using these websites to entice children. This routine use applies only to disclosing records in the National Sex Offender Registry. U. To governmental and authorized non-governmental recipients of fingerprint-based background check results from the Next Generation Identification (NGI) System, when information in NCIC records may be relevant to authorized checks of the NGI System (e.g. criminal and non-criminal justice background checks). V. To the National Insurance Crime Bureau (NICB), a nongovernmental nonprofit agency, for use toward its mission of acting as a national clearinghouse for information on stolen vehicles and offering free assistance to law enforcement agencies concerning automobile thefts, identification, and recovery of stolen vehicles. W. To authorized private organizations determined to be involved in the administration of criminal justice where the records are necessary and relevant to carry out the administration of a criminal justice function. This routine use is limited to disclosure of the NCIC property files. X. To local, state, tribal, territorial, and federal criminal justice agency officials for the purpose of screening visitors to critical infrastructure facilities. Y. To local, state, tribal, territorial, federal, foreign, or international licensing agencies or associations which require information concerning the suitability or eligibility of an individual for a license or permit. Z. To such agencies, entities, and persons as the FBI deems appropriate and relevant to ensure the continuity of government functions in the event of any actual or potential disruption of normal government operations. This use encompasses all situations in which VerDate Sep<11>2014 16:56 Sep 09, 2019 Jkt 247001 government operations may be disrupted, including: Military, terrorist, cyber, or other attacks, natural or manmade disasters, and other national or local emergencies; inclement weather and other acts of nature; infrastructure/ utility outages; failures, renovations, or maintenance of buildings or building systems; problems arising from planning, testing or other development efforts; and other operational interruptions. This also includes all related prevention activities, pre-event planning, preparation, backup/ redundancy, training and exercises, and post-event operations, mitigation, and recovery. AA. To such agencies, entities, and persons as the DOJ or FBI may consider necessary or appropriate incident to development and testing of FBI information systems and system functionality and integrity, including prototype testing, operational testing, interoperability testing, and vulnerability testing. BB. To such agencies, entities, and persons as the FBI may consider necessary or appropriate for research or statistical purposes. CC. To any agency, entity, or person in either the public or private sector, domestic, foreign, or multinational, if deemed by the FBI to be reasonable and helpful to elicit information or cooperation from the recipient for use by the FBI in the performance of an authorized function. DD. If any system record, on its face or in conjunction with other information, indicates a violation or potential violation of law (whether civil or criminal), regulation, rule, order, or contract, the pertinent record may be disclosed to the appropriate entity (whether local, state, tribal, territorial, federal, foreign, or international), that is charged with the responsibility of investigating, prosecuting, and/or enforcing such law, regulation, rule, order, or contract. EE. To contractors, grantees, experts, consultants, students, or others performing or working on a contract, service, grant, cooperative agreement, or other assignment for the Federal Government, when necessary to accomplish an agency function. FF. To the news media or members of the general public in furtherance of a legitimate law enforcement or public safety function as determined by the FBI, e.g., to assist in locating fugitives; to provide notifications of arrests; to provide alerts, assessments, or similar information on potential threats to life, health, or property; or to keep the public appropriately informed of other law enforcement or FBI matters or other PO 00000 Frm 00064 Fmt 4703 Sfmt 4703 47537 matters of legitimate public interest where disclosure could not reasonably be expected to constitute an unwarranted invasion of personal privacy. (The availability of information in pending criminal or civil cases will be governed by the provisions of 28 CFR 50.2.) GG. To a court or adjudicative body, in matters in which any of the following entities is or could be a party to the litigation, is likely to be affected by the litigation, or has an official interest in the litigation, and disclosure of system records has been determined by the FBI to be arguably relevant to the litigation: (a) The FBI or any FBI employee in his or her official capacity, (b) any FBI employee in his or her individual capacity where the Department of Justice has agreed to represent the employee, or (c) the United States. Similar disclosures may be made in analogous situations related to assistance provided to the Federal Government by non-FBI employees. HH. To an actual or potential party or his or her attorney for the purpose of negotiating or discussing such matters as settlement of the case or matter, and for formal or informal discovery proceedings, in matters in which the FBI has an official interest and in which the FBI determines records in the system to be arguably relevant. II. To such recipients and under such circumstances and procedures as are mandated by Federal statute, Executive Order, or treaty. JJ. To a requesting Member of Congress or a person on his or her staff acting on the Member’s behalf when the request is made on behalf of and at the request of the individual who is the subject of the record. KK. To the National Archives and Records Administration (NARA) for records management inspections and such other purposes conducted under the authority of 44 U.S.C. 2904 and 2906. LL. To any agency, organization, or individual for the purposes of performing authorized audit or oversight operations of the FBI and meeting related reporting requirements. MM. The DOJ may disclose relevant and necessary information to a former employee of the Department for purposes of: Responding to an official inquiry by a local, state, or federal government entity or professional licensing authority, in accordance with applicable Department regulations; or facilitating communications with a former employee that may be necessary for personnel-related or other official purposes where the Department requires information and/or consultation E:\FR\FM\10SEN1.SGM 10SEN1 khammond on DSKBBV9HB2PROD with NOTICES 47538 Federal Register / Vol. 84, No. 175 / Tuesday, September 10, 2019 / Notices assistance from the former employee regarding a matter within that person’s former area of responsibility. (Such disclosures will be effected under procedures established in title 28, Code of Federal Regulations, sections 16.300– 301 and DOJ Order 2710.8C, including any future revisions.) NN. To the White House (the President, Vice President, their staffs, and other entities of the Executive Office of the President (EOP)), and, during Presidential transitions, the President-Elect and Vice-President Elect and their designees for appointment, employment, security, and access purposes compatible with the purposes for which the records were collected by the FBI, e.g., disclosure of information to assist the White House in making a determination whether an individual should be: (1) Granted, denied, or permitted to continue in employment on the White House Staff; (2) given a Presidential appointment or Presidential recognition; (3) provided access, or continued access, to classified or sensitive information; or (4) permitted access, or continued access, to personnel or facilities of the White House/EOP complex. System records may be disclosed also to the White House and, during Presidential transitions, to the President Elect and Vice-President Elect and their designees, for Executive Branch coordination of activities which relate to or have an effect upon the carrying out of the constitutional, statutory, or other official or ceremonial duties of the President, President Elect, VicePresident or Vice-President Elect. OO. To complainants and/or victims to the extent deemed appropriate by the FBI to provide such persons with information and explanations concerning the progress and/or results of the investigations or cases arising from the matters of which they complained and/or of which they were victims. PP. To designated officers and employees of state, local (including the District of Columbia), or tribal law enforcement or detention agencies in connection with the hiring or continued employment of an employee or contractor, where the employee or contractor would occupy or occupies a position of public trust as a law enforcement officer or detention officer having direct contact with the public or with prisoners or detainees, to the extent that the information is relevant and necessary to the recipient agency’s decision. QQ. To appropriate agencies, entities, and persons when (1) the Department suspects or has confirmed that there has VerDate Sep<11>2014 16:56 Sep 09, 2019 Jkt 247001 been a breach of the system of records; (2) the Department has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DOJ (including its information systems, programs, and operations), the Federal Government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with the Department’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm. RR. To another Federal agency or Federal entity, when the Department determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach. POLICIES AND PRACTICES FOR STORAGE OF RECORDS: Computerized records are stored electronically on hard disk, removable storage devices or other digital media. Some information may be retained in hard copy format and stored in individual file folders and file cabinets with controlled access, and/or other appropriate GSA-approved security containers. POLICIES AND PRACTICES FOR RETRIEVAL OF RECORDS: Information is retrieved by name or other identifying information. NCIC data may be directly accessed and retrieved by authorized NCIC users by means of remote on-line electronic queries submitted to the NCIC via authorized telecommunications channels. NCIC users are primarily located within the United States, but they also include United States users overseas, as well as foreign users in authorized foreign/ international entities. NCIC data may also be retrieved by automated referral of queries made to other authorized interoperable systems, when the users of the other systems would also be authorized access to the NCIC. NCIC data may also be accessed and retrieved locally by authorized DOJ personnel. Information accessed locally may be used for authorized DOJ purposes, and/ or may be forwarded to other authorized NCIC users for whom direct access is not available. Authorized FBI personnel and CJIS Systems Agencies (agencies which assume responsibility for and PO 00000 Frm 00065 Fmt 4703 Sfmt 4703 enforce system security with regard to all other agencies in a specific state or territory) have enhanced search capabilities and can retrieve all records within the NCIC. POLICIES AND PROCEDURES FOR RETENTION AND DISPOSAL OF RECORDS: Records in this system are maintained and disposed of in accordance with appropriate authority of the National Archives and Records Administration. Generally, records are kept for 110 years or until no longer needed for reference purposes. The NCIC transaction log will be maintained until the system is discontinued. ADMINISTRATIVE, TECHNICAL, AND PHYSICAL SAFEGUARDS: A. NCIC records are controlled in accordance with OMB Circular A–130 and National Institute of Standards and Technology 800–37 and 800–53 requirements. Associated FBI information technology (IT) systems are certified and accredited pursuant to the Federal Information Security Modernization Act. The system’s technical security design supports and secures IT functionality in accordance with federal guidelines and commercial best practices. B. The FBI is responsible for managing the communications between the NCIC and constituent user systems. Encryption is used to secure all communications between the NCIC and other FBI systems that are not co-located with the system. Network boundary protections including firewalls, intrusion detection systems, and proxy devices are also deployed between FBI systems and the constituent systems. Any constituent system that is accessing the NCIC via a ‘‘public network’’ segment must meet the approved form of data encryption and authentication. All constituent IT systems with connectivity to the system must employ virus protection software. C. All FBI employees and contractors who will develop, manage, use, or operate an FBI system receive a computer security awareness briefing prior to being granted any type of FBI system access and are provided with security awareness and privacy training at least annually. All FBI employees receive a complete background investigation prior to being hired and other authorized system support personnel, such as contractors, receive comparable vetting. All FBI employees and system support personnel are cautioned not to divulge confidential information or any information contained in FBI files. Failure to abide by these provisions violates FBI E:\FR\FM\10SEN1.SGM 10SEN1 khammond on DSKBBV9HB2PROD with NOTICES Federal Register / Vol. 84, No. 175 / Tuesday, September 10, 2019 / Notices directives and DOJ regulations and may violate certain civil and criminal statutes. D. NCIC users are required to comply with the CJIS Security Policy, which establishes standards to ensure the confidentiality, integrity, and availability of system data throughout the user community. The CJIS Security Policy requires state and national fingerprint-based record checks upon initial employment or assignment for all personnel who have authorized access to the system and those who have direct responsibility to configure and maintain computer systems and networks with direct access to the system. User computer sites and related infrastructures must have adequate physical security at all times to protect against any unauthorized access to or routine viewing of computer devices, access devices, and printed and stored data. Automated logs must be maintained on all systems transactions and security audits for operational systems must be conducted at least once every three years. E. A CJIS Systems Agency (CSA) is a duly authorized local, state, tribal, territorial, federal, or foreign criminal justice agency on the CJIS network infrastructure providing state-wide (or equivalent) service to its users. The CSA is responsible for establishing and administering an IT security program throughout the CSA’s user community. The CSA is responsible to set, maintain, and enforce the following: Standards for the selection, supervision, and separation of personnel who have CJIS systems access; policy governing the operation of hardware, software, and other components used to process, store, or transmit NCIC information to ensure the priority, integrity, and availability of service; security controls governing the operation of computers, circuits, and telecommunications terminals used to process, store, or transmit FBI data; and standards that provide for audits, the discipline of CJIS Security Policy violators, and the monitoring of networks accessing CJIS systems to detect security incidents. Each CSA must provide a signed written agreement to the FBI CJIS Division before participating in CJIS records information programs. This agreement includes the standards and sanctions governing utilization of CJIS systems. F. Each agency is assigned an originating agency identifier (ORI) to access the NCIC. The system creates and maintains transaction logs, which are monitored and reviewed to detect any possible misuse of system data. The FBI CJIS Audit Unit conducts a triennial compliance audit of each CSA and a VerDate Sep<11>2014 16:56 Sep 09, 2019 Jkt 247001 sample of agencies served by the CSA to ensure compliance with the FBI CJIS Security Policy and other CJIS policies. The FBI CJIS Audit Unit may also conduct ad hoc audits based on reports of violations. In addition, each CSA is responsible for conducting its own compliance audits of the criminal and non-criminal justice agencies within the CSA’s user community. RECORD ACCESS PROCEDURES: The Attorney General has exempted this system of records from the notification, access, amendment, and contest procedures of the Privacy Act. These exemptions apply only to the extent that the information in this system is subject to exemption pursuant to 5 U.S.C. 552a (j) or (k). Where compliance would not appear to interfere with or adversely affect the purposes of the system, or the overall law enforcement/intelligence process, the applicable exemption (in whole or in part) may be waived by the FBI in its sole discretion. All requests for access should follow the guidance provided on the FBI’s website at https://www.fbi.gov/services/ records-management/foipa. A request for access to a record from this system of records must be submitted in writing and comply with 28 CFR part 16. Individuals may mail, fax, or electronically submit a request, clearly marked ‘‘Privacy Act Access Request,’’ to the FBI, ATTN: FOI/PA Request, Record/Information Dissemination Section, 170 Marcel Drive, Winchester, VA 22602–4843; facsimile: 540–868– 4995/6/7; electronically: https:// www.fbi.gov/services/recordsmanagement/foipa/requesting-fbirecords. The request should include a general description of the records sought, and must include the requester’s full name, current address, and date and place of birth. The request must be signed and dated and either notarized or submitted under penalty of perjury. While no specific form is required, requesters may obtain a form (Form DOJ–361) for use in certification of identity, which can be located at the above link. In the initial request, the requester may also include any other identifying data that the requester may wish to furnish to assist the FBI in making a reasonable search. The request should include a return address for use by the FBI in responding; requesters are also encouraged to include a telephone number to facilitate FBI contacts related to processing the request. A determination of whether a record may be accessed will be made after a request is received. PO 00000 Frm 00066 Fmt 4703 Sfmt 4703 47539 CONTESTING RECORD PROCEDURES: The Attorney General has exempted this system of records from the notification, access, amendment, and contest procedures of the Privacy Act. These exemptions apply only to the extent that the information in this system is subject to exemption pursuant to 5 U.S.C. 552a(j) or (k). Where compliance would not appear to interfere with or adversely affect the purposes of the system, or the overall law enforcement/intelligence process, the applicable exemption (in whole or in part) may be waived by the DOJ in its sole discretion. Individuals desiring to contest or amend information maintained in the system should direct their requests according to the RECORD ACCESS PROCEDURES paragraph above, stating clearly and concisely what information is being contested, the reasons for contesting it, and the proposed amendment to the information sought. The envelope and letter should be clearly marked ‘‘Privacy Act Amendment Request’’ and comply with 28 CFR 16.46 (Request for Amendment or Correction of Records). Some information may be exempt from contesting record procedures as described in the EXEMPTIONS PROMULGATED FOR THE SYSTEM paragraph, below. An individual who is the subject of a record in this system may amend those records that are not exempt. A determination whether a record may be amended will be made at the time a request is received. NOTIFICATION PROCEDURES: Same as RECORD ACCESS PROCEDURES paragraph, above. EXEMPTIONS PROMULGATED FOR THE SYSTEM: The Attorney General has exempted this system from subsections (c)(3) and (4); (d); (e)(1), (2), (3), (4)(G), (H), and (I), (5), and (8); (f), and (g) of the Privacy Act, 5 U.S.C. 552a. These exemptions apply only to the extent that information in a record is subject to exemption pursuant to 5 U.S.C. 552a(j) and/or (k). Revisions to the previously enacted rules in 28 CFR 16.96 (g–i) are being proposed in accordance with the requirements listed in 5 U.S.C. 553(b), (c), and (e) and published in the Federal Register. In addition, the DOJ will continue to assert all exemptions claimed under 5 U.S.C. 552a(j) and/or (k), or other applicable lawful authority, by an originating agency from which the DOJ obtains records, where one or more reasons underlying an original exemption remain valid. A determination of whether a record will be exempted will be made at the time E:\FR\FM\10SEN1.SGM 10SEN1 47540 Federal Register / Vol. 84, No. 175 / Tuesday, September 10, 2019 / Notices a request for notice, access, and/or correction is received. HISTORY: National Crime Information Center (NCIC), JUSTICE/FBI–001, 64 FR 52343 (Sept. 28, 1999), as amended by 66 FR 8425 (Jan. 31, 2001), and 82 FR 24147 (May 25, 2017). [FR Doc. 2019–19449 Filed 9–9–19; 8:45 am] BILLING CODE 4410–CW–P DEPARTMENT OF LABOR Agency Information Collection Activities; Submission for OMB Review; Comment Request; Required Elements of an Unemployment Insurance (UI) Reemployment Services and Eligibility Assessment (RESEA) Grant State Plan Office of the Secretary Notice of availability; request for comments. ACTION: The Department of Labor (DOL) is submitting the Employment and Training Administration (ETA) sponsored information collection request (ICR) proposal titled, ‘‘Required Elements of an Unemployment Insurance (UI) Reemployment Services and Eligibility Assessment (RESEA) Grant State Plan,’’ to the Office of Management and Budget (OMB) for review and approval for use in accordance with the Paperwork Reduction Act (PRA) of 1995. Public comments on the ICR are invited. DATES: The OMB will consider all written comments that agency receives on or before October 10, 2019. ADDRESSES: A copy of this ICR with applicable supporting documentation; including a description of the likely respondents, proposed frequency of response, and estimated total burden may be obtained free of charge from the RegInfo.gov website at https:// www.reginfo.gov/public/do/ PRAViewICR?ref_nbr=201906-1205-004 (this link will only become active on the day following publication of this notice) or by contacting Frederick Licari by telephone at 202–693–8073, TTY 202– 693–8064, (this is not a toll-free number) or by email at DOL_PRA_ PUBLIC@dol.gov. Submit comments about this request by mail to the Office of Information and Regulatory Affairs, Attn: OMB Desk Officer for DOL–ETA, Office of Management and Budget, Room 10235, 725 17th Street NW, Washington, DC 20503; by Fax: 202–395–5806 (this is not a toll-free number); or by email: OIRA_submission@omb.eop.gov. khammond on DSKBBV9HB2PROD with NOTICES SUMMARY: VerDate Sep<11>2014 16:56 Sep 09, 2019 Jkt 247001 Commenters are encouraged, but not required, to send a courtesy copy of any comments by mail or courier to the U.S. Department of Labor-OASAM, Office of the Chief Information Officer, Attn: Departmental Information Compliance Management Program, Room N1301, 200 Constitution Avenue NW, Washington, DC 20210; or by email: DOL_PRA_PUBLIC@dol.gov. FOR FURTHER INFORMATION CONTACT: Frederick Licari by telephone at 202– 693–8073, TTY 202–693–8064, (these are not toll-free numbers) or by email at DOL_PRA_PUBLIC@dol.gov. SUPPLEMENTARY INFORMATION: This ICR seeks PRA authority for the Required Elements of an Unemployment Insurance (UI) Reemployment Services and Eligibility Assessment (RESEA) Grant State Plan information collection. The Department of Labor, ETA is submitting this Information Collection Request (ICR) to implement and collect an annual Reemployment Services and Eligibility Assessment (RESEA) state plan as described in Section 306(e) of the Social Security Act (SSA). On February 9, 2018, the President signed the Bipartisan Budget Act of 2018, Public Law 115–123 (BBA), which included amendments to the SSA that create a permanent authorization for the RESEA program. The recently enacted Section 306 of the SSA introduced several new program requirements including the requirement that states must submit an annual state plan to be considered eligible for funding. Section 306(e), SSA provides the authorization and specific requirements of the state plane. See 42 U.S.C. 306(e). This proposed information collection is subject to the PRA. A Federal agency generally cannot conduct or sponsor a collection of information, and the public is generally not required to respond to an information collection, unless the OMB, under the PRA, approves it and displays a currently valid OMB Control Number. In addition, notwithstanding any other provisions of law, no person shall generally be subject to penalty for failing to comply with a collection of information if the collection of information does not display a valid Control Number. See 5 CFR 1320.5(a) and 1320.6. For additional information, see the related notice published in the Federal Register on April 5, 2019 (84 FR 13720). Interested parties are encouraged to send comments to the OMB, Office of Information and Regulatory Affairs at the address shown in the ADDRESSES section within thirty-(30) days of publication of this notice in the Federal Register. In order to help ensure PO 00000 Frm 00067 Fmt 4703 Sfmt 4703 appropriate consideration, comments should mention OMB ICR Reference Number 201906–1205–004. The OMB is particularly interested in comments that: • Evaluate whether the proposed collection of information is necessary for the proper performance of the functions of the agency, including whether the information will have practical utility: • Evaluate the accuracy of the agency’s estimate of the burden of the proposed collection of information, including the validity of the methodology and assumptions used; • Enhance the quality, utility, and clarity of the information to be collected; and • Minimize the burden of the collection of information on those who are to respond, including through the use of appropriate automated, electronic, mechanical, or other technological collection techniques or other forms of information technology, e.g., permitting electronic submission of responses. Agency: DOL–ETA. Title of Collection: Required Elements of an Unemployment Insurance (UI) Reemployment Services and Eligibility Assessment (RESEA) Grant State Plan. OMB ICR Reference Number: 201906– 1205–004. Affected Public: State Workforce Agencies. Total Estimated Number of Respondents: 53. Total Estimated Number of Responses: 53. Total Estimated Annual Time Burden: 2,120 hours. Total Estimated Annual Other Costs Burden: $0. Authority: 44 U.S.C. 3507(a)(1)(D). Dated: August 28, 2019. Frederick Licari, Departmental Clearance Officer. [FR Doc. 2019–19498 Filed 9–9–19; 8:45 am] BILLING CODE 4510–FW–P NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice: 19–051] Planetary Science Advisory Committee; Meeting National Aeronautics and Space Administration. ACTION: Notice of meeting. AGENCY: In accordance with the Federal Advisory Committee Act, as amended, the National Aeronautics and Space Administration (NASA) SUMMARY: E:\FR\FM\10SEN1.SGM 10SEN1

Agencies

[Federal Register Volume 84, Number 175 (Tuesday, September 10, 2019)]
[Notices]
[Pages 47533-47540]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2019-19449]


-----------------------------------------------------------------------

DEPARTMENT OF JUSTICE

[CPCLO Order No. 006-2019]


Privacy Act of 1974; System of Records

AGENCY: Federal Bureau of Investigation, United States Department of 
Justice.

ACTION: Notice of a modified system of records.

-----------------------------------------------------------------------

SUMMARY: Pursuant to the Privacy Act of 1974, and Office of Management 
and Budget (OMB) Circular No. A-108, notice is hereby given that the 
United States Department of Justice (Department or DOJ), Federal Bureau 
of Investigation (FBI), proposes to modify a system of records entitled 
National Crime Information Center (NCIC), JUSTICE/FBI-001, which was 
last published in the Federal Register on September 28, 1999 (64 FR 
52343). The NCIC serves as a central information repository to assist 
criminal justice professionals in apprehending fugitives, locating 
missing persons, recovering stolen property, and identifying known or 
suspected terrorists. Law enforcement officers also use the information 
within NCIC to help protect the general public and themselves when 
carrying out their official duties. This system of records notice is 
being updated to better inform the public about the types of 
information within the NCIC and the uses of this information to further 
criminal justice purposes.

DATES: In accordance with 5 U.S.C. 552a(e)(4) and (11), this system of 
records begins on publication, subject to a 30-day period to comment on 
the routine use modifications described below. Please submit any 
comments by October 10, 2019.

ADDRESSES: The public, OMB, and Congress are invited to submit any 
comments: By mail to the Department of Justice, Office of Privacy and 
Civil Liberties, ATTN: Privacy Analyst, 145 N St. NE, Suite 8w-300, 
Washington, DC 20530; by facsimile at 202-307-0693; or by email at 
[email protected]. To ensure proper handling, please 
reference the above CPCLO Order No. on your correspondence.

FOR FURTHER INFORMATION CONTACT: Katherine M. Bond, Assistant General 
Counsel, Privacy and Civil Liberties Unit, Office of the General 
Counsel, FBI, 935 Pennsylvania Avenue NW, Washington, DC 20535-0001; 
telephone (202) 324-3000.

SUPPLEMENTARY INFORMATION: The FBI has revised this system of records 
notice to update information about this system. Established in 1967, 
the NCIC is a national criminal justice information system linking 
criminal (and authorized non-criminal) justice agencies located in the 
50 states, the District of Columbia, U.S. territories and possessions, 
as well as selected foreign countries to facilitate the cooperative 
sharing of criminal justice information. See 28 CFR Sections 20.3(b) & 
(g) for definitions of ``administration of criminal justice'' and 
``criminal justice agency.'' The NCIC provides a system to receive and 
maintain information contributed by participating agencies relating to 
criminal justice and national security missions. Information maintained 
in the NCIC is readily accessible for authorized purposes by authorized 
users via text-based queries (i.e., using names and other descriptive 
data). The purposes of maintaining records in the NCIC include 
combatting acts of terrorism; apprehending fugitives; solving crimes; 
locating missing persons; locating and returning stolen property; 
protecting individuals during declared emergency situations; protecting 
victims of domestic violence; monitoring registered sex offenders; 
conducting firearms, licensee, and explosive background checks; and 
enhancing the safety of law enforcement officers.
    This Notice modifies the previous publication of the NCIC System of 
Records Notice to (1) include new categories of records and 
individuals, (2) update routine uses, and (3) remove references to the 
Interstate Identification Index (III). Since the September 28, 1999, 
publication of notice of this System of Records, 64 FR 52343, criminal 
justice agencies have requested that additional information be included 
in the NCIC to meet their needs. This additional information includes 
such new categories of individuals and categories of records as the 
National Sex Offender Registry, the Supervised Release File, the 
Identity Theft File, the Protective Interest File, the NICS Denied 
Transaction File, the Immigration Violator File, and the Violent Person 
File. Adding this information to the NCIC advances FBI's mission and 
criminal justice investigation, as well as increasing officer safety by 
providing pertinent information to law enforcement officers regarding 
the individuals they encounter while on duty.
    This System of Records Notice also updates the routine uses for the 
information contained within the NCIC to educate the public on how the 
records will be shared with criminal justice agencies, authorized non-
criminal justice agencies, and private organizations to further the 
purposes of combatting acts of terrorism; apprehending fugitives; 
solving crimes; locating missing persons; locating and returning stolen 
property; protecting individuals during declared emergency situations; 
protecting victims of domestic violence; monitoring registered sex 
offenders; conducting firearms, licensee, and explosive background 
checks; and enhancing the safety of law enforcement officers. For 
consolidation and transparency purposes, the routine uses applicable to 
the NCIC under the FBI's Blanket Routine Uses (FBI-BRU, 66 FR 33558 
(June 22, 2001), as amended by 70 FR 7513, 517 (Feb. 14, 2005) and 82 
FR 24147 (May 25, 2017)) are also being included in the routine use 
portion of this notice.
    Finally, this modified System of Record Notice removes references 
to the Interstate Identification Index (III) and criminal history 
record information. Although the NCIC is used to retrieve criminal 
history record information from III through a federated search 
capability, III is not part of NCIC, and criminal history record 
information is no longer maintained within the NCIC, but is now 
maintained in the FBI's Next Generation Identification (NGI) System, 
JUSTICE/FBI-009, 81 FR 27284 (May 5, 2016). A person who wishes to 
access his or her criminal history records should follow the procedures 
set forth in 28 CFR 16.30 et seq.
    In accordance with 5 U.S.C. 552a(r), the Department has provided a 
report to OMB and the Congress on this revised system of records 
notice.


[[Page 47534]]


    Dated: August 28, 2019.
Peter A. Winn
Acting Chief Privacy and Civil Liberties Officer, United States 
Department of Justice.

SYSTEM NAME AND NUMBER:
    National Crime Information Center (NCIC), JUSTICE/FBI-001.

SECURITY CLASSIFICATION:
    Unclassified

SYSTEM LOCATION:
    Records may be maintained at all locations at which the FBI 
operates or at which FBI operations are supported, including: J. Edgar 
Hoover Building, 935 Pennsylvania Avenue NW, Washington, DC 20535-0001; 
FBI Academy and FBI Laboratory, Quantico, VA 22135; FBI Criminal 
Justice Information Services (CJIS) Division, 1000 Custer Hollow Road, 
Clarksburg, WV 26306; FBI Records Management Division, 170 Marcel 
Drive, Winchester, VA 22602-4843; and FBI field offices, legal 
attaches, information technology centers, and other components listed 
on the FBI's internet website, https://www.fbi.gov. Some or all system 
information may also be duplicated at other locations where the FBI has 
granted direct access for support of FBI missions, for purposes of 
system backup, emergency preparedness, and/or continuity of operations.

SYSTEM MANAGER(S):
    Director, Federal Bureau of Investigation, 935 Pennsylvania Avenue 
NW, Washington, DC 20535-0001; (202) 324-3000.

AUTHORITY FOR MAINTENANCE OF THE SYSTEM:
    Authorities for maintaining the system include 28 U.S.C. Chapter 
33; and 28 CFR 0.85 and 28 CFR part 20. Additional authorities include 
34 U.S.C. Chapter 10211; the Uniting and Strengthening America by 
Providing Appropriate Tools Required to Intercept and Obstruct 
Terrorism (USA PATRIOT) Act of 2001, Public Law 107-56, 115 Stat 272; 
the Intelligence Reform and Terrorism Prevention Act of 2004 (IRTPA), 
Public Law 108-458, 118 Stat 3638; the Implementing Regulations of the 
9/11 Commission Act of 2007, Public Law 110-53, 121 Stat 266; Executive 
Order 13311, Homeland Security Information Sharing (July 29, 2003); 
Executive Order 13356, Strengthening the Sharing of Terrorism 
Information To Protect Americans (August 27, 2004); and Executive Order 
13388, Further Strengthening the Sharing of Terrorism Information To 
Protect Americans (October 25, 2005).

PURPOSE(S) OF THE SYSTEM:
    Established in 1967, the NCIC is a national criminal justice 
information system linking criminal (and authorized non-criminal) 
justice agencies located in the 50 states, the District of Columbia, 
U.S. territories and possessions, as well as selected foreign 
countries, to facilitate the cooperative sharing of criminal justice 
information. The NCIC provides a system to receive and maintain 
information contributed by participating agencies relating to criminal 
justice and national security missions. Information maintained in the 
NCIC is readily accessible for authorized purposes by authorized users 
via text-based queries (i.e., using names and other descriptive data). 
The purposes of maintaining records in the NCIC include combatting acts 
of terrorism; apprehending fugitives; solving crimes; locating missing 
persons; locating and returning stolen property; protecting individuals 
during declared emergency situations; protecting victims of domestic 
violence; monitoring registered sex offenders; conducting firearms, 
licensee, and explosive background checks through the National Instant 
Criminal Background Check System (NICS); and enhancing the safety of 
law enforcement officers.

CATEGORIES OF INDIVIDUALS COVERED BY THE SYSTEM:
    Categories of individuals covered by the system are:
    A. Wanted persons:
    1. Individuals for whom federal warrants are outstanding.
    2. Individuals who allegedly have committed or have been linked 
with an offense which is classified as a felony, misdemeanor, or other 
criminal offense under the existing penal statutes of the jurisdiction 
originating the entry and for whom a warrant has been issued with 
respect to the offense that was the basis of the entry; and probation 
and parole violators meeting these criteria.
    3. Individuals for whom a ``Temporary Felony Want'' has been 
entered. Temporary felony want records allow a law enforcement agency 
to take prompt action to apprehend a person suspected of committing a 
felony when circumstances prevent the agency from immediately obtaining 
a warrant. Procedural safeguards for these Temporary Felony Wants 
include that they may only be entered in NCIC for the apprehension of a 
person who has committed, or the officer has reasonable grounds to 
believe has committed, a felony; the person may seek refuge by fleeing 
across jurisdictional boundaries; and (as noted) circumstances preclude 
the immediate procurement of an arrest warrant. A Temporary Felony Want 
shall be specifically identified as such and automatically expires 48 
hours after entry.
    4. Juveniles who (a) have been adjudicated delinquent and who have 
escaped or absconded from custody, even though no arrest warrants were 
issued; or (b) who have been charged with the commission of a 
delinquent act that would be a crime if committed by an adult, and who 
may have fled from the state where the act was committed.
    5. Individuals who allegedly have committed or have been linked 
with an offense committed in a foreign country that would be a felony 
if committed in the United States, and for whom a warrant of arrest is 
outstanding, and (a) for which act an extradition treaty exists between 
the United States and that country, (b) are wanted by foreign 
authorities for a violent crime, or (c) are otherwise known or 
reasonably believed by foreign authorities to be violent, armed, or 
dangerous.
    6. Individuals who allegedly have committed or have been linked 
with an offense committed in Canada and for whom a Canada-Wide Warrant 
has been issued which meets the requirements of the Canada-United 
States Extradition Treaty.
    B. Sex offender registrants: Individuals who are required to 
register in a jurisdiction's sex offender registry.
    C. Violent felons: Individuals with three or more convictions for a 
violent felony or serious drug offense as defined by 18 U.S.C. 924(e), 
and who were entered into the NCIC Violent Felon file between 1992 and 
1998.
    D. Individuals on probation, parole, supervised release, pretrial 
supervision, or released on their own recognizance; and supervising 
officials for these individuals.
    E. Immigration violators: Criminal aliens who have been previously 
deported; aliens with outstanding administrative warrants of removal 
from the United States; aliens who have failed to comply with national 
security registration requirements; and other immigration violators.
    F. Missing persons: Individuals of any age who are missing and for 
whom there is a reasonable concern for the well-being of the person 
and/or others, such as: A missing person who suffers from a documented 
physical/mental disability; a person missing under circumstances 
indicating that the disappearance was not voluntary or that the 
person's health or physical safety may be in danger; a missing child 
under the age of 21 reported to law enforcement; a person missing after 
a catastrophe; and, persons reasonably

[[Page 47535]]

believed to have information regarding missing persons.
    G. Persons of protective interest: Individuals designated by local, 
state, tribal, territorial, and federal law enforcement agencies with a 
protective mission as presenting credible threats to authorized 
protectees of those agencies.
    H. Members of criminal gangs: Individuals about whom law 
enforcement agencies have developed sufficient information to establish 
membership or other similar relationship in a particular criminal gang 
by either self-admission or pursuant to documented criteria approved by 
the FBI. For the purpose of this file, a gang is defined as a group of 
three or more persons with a common interest, bond, or activity 
characterized by criminal or delinquent conduct.
    I. Known or suspected terrorists: Individuals known or 
appropriately suspected to be or have been engaged in conduct 
constituting, in preparation for, in aid of, or related to domestic or 
international terrorism.
    J. Military Detainees: Individuals who were officially detained 
during military operations who pose an actual or possible threat to 
national security, but not persons detained as Enemy Prisoners of War.
    K. National Security Threat Actors: Individuals, organizations, 
groups, or networks assessed to be a threat to the safety, security, or 
national interests of the United States including cyber threat actors, 
foreign intelligence threat actors, military threat actors, 
transnational criminal actors, and weapons proliferators as defined in 
National Security Presidential Memorandum 7, issued on October 5, 2017, 
or any subsequent authority.
    L. Unidentified persons: Any unidentified deceased person or body 
parts, or any living person whose identity has not been ascertained 
(e.g., infant, amnesia victim, catastrophe victim).
    M. Persons related to protection orders: Individuals against whom a 
protection order has been issued and the protected persons.
    N. Owners of stolen property related to NCIC entries.
    O. Victims of identity theft.
    P. Individuals who have been disqualified from possessing, 
transferring, or receiving firearms or explosives, or have been denied 
a weapons permit under applicable state or federal law pursuant to the 
National Instant Criminal Background Check System (NICS).
    Q. Violent persons: Individuals who have been convicted of violent 
crimes, or have made credible threats, against law enforcement and 
individuals who have been convicted of certain other violent crimes.
    R. Individuals associated with active FBI investigations such as 
suspects, subjects of interest, witnesses, or victims.
    S. FBI employees, U.S. government employees, and employees of 
local, state, tribal, or territorial law enforcement agencies.
    T. Individuals who are, or within the last five years were, under 
FBI investigation for terrorism.
    U. Individuals named in documents supporting NCIC entries (e.g. 
warrants, protection orders, terms and conditions of probation/
supervised released, missing person reports).
    V. Subjects of Continuous Evaluation: Individuals required by 
statute, executive authority, or other legal authority to undergo 
continuous revetting to maintain employment or security clearance with 
a federal agency.
    W. Individuals who have provided their information to federal 
agencies for the purposes of immigration benefits or other government 
benefits which require ongoing suitability determinations (e.g. Trusted 
Traveler programs).
    X. Individuals who have been queried through the NCIC. This 
includes all individuals queried through the NCIC for purposes listed 
in the ``Routine Uses'' section of this notice.

CATEGORIES OF RECORDS IN THE SYSTEM:
    The NCIC may contain records about individuals described by the 
categories listed above. Records may include all manner of identifying 
information, such as name, Social Security number, date of birth, place 
of birth, physical description, photograph, descriptive information 
about fingerprints and other biometrics which may be available (the 
biometrics themselves and not maintained within the NCIC), passport 
and/or driver's license information, personal and business addresses 
and telephone numbers, and other personal identifiers. Records in the 
system may include details pertinent to particular file types, such as 
law enforcement information, visa/immigration information, and 
terrorism information; information relevant to the protection of 
health, safety, or property; physical or medical characteristics or 
other personal information deemed necessary to identify an individual, 
protect law enforcement officers, and identify and protect law 
enforcement subjects; and information relevant to responding to, 
mitigating, and recovering from disasters, emergencies, and 
catastrophes, as well as assisting in other humanitarian efforts. 
Records may also include uploaded documents supporting NCIC entries 
(e.g. warrants, protection orders, terms and conditions of probation/
supervised release, missing person reports). Specific files in the NCIC 
include:
    A. Vehicle File:
    1. Stolen vehicles, including aircraft and trailers.
    2. Vehicles wanted in conjunction with crimes.
    3. Vehicles subject to seizure based on federal court orders.
    B. License Plate File (Stolen).
    C. Boat File (Stolen).
    D. Vehicle/Boat Part File: Serially-numbered components of vehicles 
and boats reported to have been stolen.
    E. Gun File:
    1. Stolen guns.
    2. Recovered guns, when ownership has not been established.
    3. Lost guns.
    4. Guns believed to have been used during the commission of crimes.
    F. Article File (Stolen or Lost).
    G. Securities File: Serially numbered stolen, embezzled, used for 
ransom, or counterfeited securities.
    H. Wanted Person File: Described in ``Categories of Individuals 
Covered by the System: A (1-4).''
    I. Foreign Fugitive File: Described in ``Categories of Individuals 
Covered by the System: A. (5, 6).''
    J. National Sex Offender Registry: Described in ``Categories of 
Individuals Covered by the System: B.''
    K. The Bureau of Alcohol, Tobacco, Firearms, and Explosives (ATF) 
Violent Felon File: Described in ``Categories of Individuals Covered by 
the System: C.'' (The ATF no longer enters data into this file, and 
these records have now been retired and are only accessible by the 
FBI.)
    L. Supervised Release File: Described in ``Categories of 
Individuals Covered by the System: D.''
    M. Immigration Violator File: Described in ``Categories of 
Individuals Covered by the System: E.''
    N. Missing Person File: Described in ``Categories of Individuals 
Covered by the System: F.''
    O. Protective Interest File: Described in ``Categories of 
individuals Covered by the System: G.''
    P. Gang File: Described in ``Categories of Individuals Covered by 
the System: H.''
    Q. Known or Suspected Terrorist File: Described in ``Categories of 
Individuals Covered by the System: I, J, and K.''
    R. Unidentified Person File: Described in ``Categories of 
Individuals Covered by the System: L.''

[[Page 47536]]

    S. Protection Order File: Described in ``Categories of Individuals 
Covered by the System: M.''
    T. Identity Theft File: Described in ``Categories of Individuals 
Covered by the System: O.''
    U. NICS Denied Transaction File: Described in ``Categories of 
Individuals Covered by the System: P.''
    V. Image File: Identifying images (e.g., mug shots; scars, marks, 
tattoos; property photos; signatures) and documents to help identify 
persons and property related to entries in other NCIC files.
    W. Violent Person File: Described in ``Categories of Individuals 
Covered by the System: Q.''
    X. System Tables and Charts: Although not part of particular files 
described herein, these tables and charts may contain data elements 
from the above files (e.g., license plate numbers, vehicle 
identification numbers); include individuals described in ``Categories 
of Individuals Covered by the System'' R, S, T, V, and W; and are used 
for system administration, investigative, and other authorized 
purposes.
    Y. Inactive Records: Records that are still generally available to 
all NCIC authorized users for historical reference after the records 
have expired or been cleared from the active NCIC files.
    Z. Retired Records: Records that have expired, been cleared, or 
been canceled from the active NCIC environment. These records are only 
directly accessible by FBI personnel and CJIS Systems Agencies.
    AA. Transaction Log: All transactions that enter, update, query, or 
access the records described above; rejected transactions; and system 
administrative messages. The Transaction Log now maintains the 
transaction history for the life of the system; however, the 
transaction history prior to 1990 was maintained for 10 years. 
Transaction logs may contain information regarding all ``Categories of 
Individuals.'' Search criteria from queries initiated by the National 
Instant Criminal Background Check System (NICS), JUSTICE/FBI-018, are 
not logged.

RECORD SOURCE CATEGORIES:
    Local, state, tribal, territorial, federal, foreign, and 
international governmental agencies and authorized non-governmental 
entities.

ROUTINE USES OF RECORDS MAINTAINED IN THE SYSTEM, INCLUDING CATEGORIES 
OF USERS AND THE PURPOSE OF SUCH USES:
    These records or information contained therein may be disclosed as 
routine uses pursuant to 5 U.S.C. 552a(b)(3) of the Privacy Act as 
described below. As routine uses specific to this system, the DOJ may 
disclose relevant system records or information to the extent such 
disclosures are compatible with a purpose for which the information was 
collected. Routine uses are not meant to be mutually exclusive and may 
sometimes overlap.
    A. To local, state, tribal, territorial, or federal law enforcement 
or criminal justice agencies (to include police, prosecution, penal, 
probation, or parole agencies, and the judiciary) or other authorized 
federal agencies where such disclosure:
    1. May assist the recipient in the performance of its law 
enforcement, criminal justice, or national security functions, to 
include the screening of employees, contractors, or applicants for 
employment by criminal justice agencies;
    2. May assist the FBI in performing a law enforcement or national 
security function;
    3. May promote, assist, or otherwise serve the mutual efforts of 
the law enforcement, criminal justice, and national security 
communities, such as site security screening of visitors to criminal 
justice facilities and military installations; or
    4. May serve a compatible civil law enforcement purpose.
    B. To authorized foreign governments or international agencies 
where such disclosure:
    1. May assist the recipient in the performance of its law 
enforcement, criminal justice, or national functions;
    2. May assist the FBI in performing a law enforcement or national 
security function;
    3. May promote, assist, or otherwise serve the mutual efforts of 
the international community; or
    4. May serve a compatible civil law enforcement purpose.
    C. To appropriate officials and employees of a federal agency or 
entity which requires information relevant to a decision concerning the 
hiring, appointment, or retention of an employee; the issuance, 
renewal, suspension, or revocation of a security clearance; the 
execution of a security or suitability investigation; the letting of a 
contract; or the issuance of a grant.
    D. To state and federal agencies when necessary to assist in 
detecting and preventing fraudulent receipt of government benefits 
(e.g., Department of Housing and Urban Development, Department of 
Veterans Affairs, or Social Security Administration).
    E. To the Department of State for the purpose of determining the 
eligibility of visa and passport applicants.
    F. To the Department of Homeland Security and its components for 
use in background investigations of individuals with access to secure 
areas of airports, aircraft, ports, and vessels; commercial drivers of 
hazardous materials; applicants for aircraft training; those 
responsible for screening airport passengers and property; those with 
security functions related to baggage and cargo; and other statutorily 
authorized populations.
    G. To authorized local, state, tribal, territorial, and federal 
agencies for the purposes of emergency child placement or emergency 
disaster response.
    H. To authorized non-governmental entities or subunits thereof that 
perform the administration of criminal justice for criminal justice 
purposes as defined in 28 CFR 20.3(b).
    I. To authorized local, state, tribal, territorial, federal, 
foreign, or international agencies for humanitarian purposes (e.g., 
vetting volunteers during natural disasters).
    J. To authorized agencies as required by federal statutes, 
treaties, executive orders and other presidential and executive 
directives, federal regulations, federal rules, or Attorney General 
Guidance.
    K. To authorized federal agencies for alien registration, 
immigration, naturalization, international travel, or similar matters 
related to national security.
    L. To designated points of contact at criminal justice agencies for 
background checks under the National Instant Criminal Background Check 
System (NICS).
    M. To local, state, tribal, territorial, or federal criminal 
justice officials for the conduct of firearms or explosives-related 
background checks when required to issue firearms or explosives-related 
licenses or permits according to a state statute or local ordinance, 
when checking firearms transferred to pawn shops, or when returning 
firearms to authorized recipients.
    N. To authorized non-criminal justice governmental agencies 
performing criminal justice dispatching functions or data processing/
information services for local, state, tribal, territorial, federal, or 
foreign criminal justice agencies.
    O. To private contractors pursuant to specific agreements with 
local, state, tribal, territorial, federal, or foreign criminal justice 
or authorized non-criminal justice agencies for the purpose of 
providing services for the administration of criminal justice as 
defined in 28 CFR 20.3(b).
    P. To the National Center for Missing and Exploited Children 
(NCMEC) when

[[Page 47537]]

acting within its statutory duty to support law enforcement agencies.
    Q. To local, state, tribal, territorial, and federal government 
social service agencies with child protection responsibilities for 
purposes of investigating or responding to reports of child abuse, 
neglect, or exploitation.
    R. To railroad or private college/university police departments or 
subunits thereof which perform, and allocate a substantial portion of 
their annual budget to, the administration of criminal justice and 
whose appropriately trained employees hold police powers under state 
law for the administration of criminal justice as defined in 28 CFR 
20.3(b).
    S. To civil or criminal courts for use in domestic violence or 
stalking cases.
    T. To social networking websites to prevent sex offenders from 
using these websites to entice children. This routine use applies only 
to disclosing records in the National Sex Offender Registry.
    U. To governmental and authorized non-governmental recipients of 
fingerprint-based background check results from the Next Generation 
Identification (NGI) System, when information in NCIC records may be 
relevant to authorized checks of the NGI System (e.g. criminal and non-
criminal justice background checks).
    V. To the National Insurance Crime Bureau (NICB), a nongovernmental 
nonprofit agency, for use toward its mission of acting as a national 
clearinghouse for information on stolen vehicles and offering free 
assistance to law enforcement agencies concerning automobile thefts, 
identification, and recovery of stolen vehicles.
    W. To authorized private organizations determined to be involved in 
the administration of criminal justice where the records are necessary 
and relevant to carry out the administration of a criminal justice 
function. This routine use is limited to disclosure of the NCIC 
property files.
    X. To local, state, tribal, territorial, and federal criminal 
justice agency officials for the purpose of screening visitors to 
critical infrastructure facilities.
    Y. To local, state, tribal, territorial, federal, foreign, or 
international licensing agencies or associations which require 
information concerning the suitability or eligibility of an individual 
for a license or permit.
    Z. To such agencies, entities, and persons as the FBI deems 
appropriate and relevant to ensure the continuity of government 
functions in the event of any actual or potential disruption of normal 
government operations. This use encompasses all situations in which 
government operations may be disrupted, including: Military, terrorist, 
cyber, or other attacks, natural or manmade disasters, and other 
national or local emergencies; inclement weather and other acts of 
nature; infrastructure/utility outages; failures, renovations, or 
maintenance of buildings or building systems; problems arising from 
planning, testing or other development efforts; and other operational 
interruptions. This also includes all related prevention activities, 
pre-event planning, preparation, backup/redundancy, training and 
exercises, and post-event operations, mitigation, and recovery.
    AA. To such agencies, entities, and persons as the DOJ or FBI may 
consider necessary or appropriate incident to development and testing 
of FBI information systems and system functionality and integrity, 
including prototype testing, operational testing, interoperability 
testing, and vulnerability testing.
    BB. To such agencies, entities, and persons as the FBI may consider 
necessary or appropriate for research or statistical purposes.
    CC. To any agency, entity, or person in either the public or 
private sector, domestic, foreign, or multinational, if deemed by the 
FBI to be reasonable and helpful to elicit information or cooperation 
from the recipient for use by the FBI in the performance of an 
authorized function.
    DD. If any system record, on its face or in conjunction with other 
information, indicates a violation or potential violation of law 
(whether civil or criminal), regulation, rule, order, or contract, the 
pertinent record may be disclosed to the appropriate entity (whether 
local, state, tribal, territorial, federal, foreign, or international), 
that is charged with the responsibility of investigating, prosecuting, 
and/or enforcing such law, regulation, rule, order, or contract.
    EE. To contractors, grantees, experts, consultants, students, or 
others performing or working on a contract, service, grant, cooperative 
agreement, or other assignment for the Federal Government, when 
necessary to accomplish an agency function.
    FF. To the news media or members of the general public in 
furtherance of a legitimate law enforcement or public safety function 
as determined by the FBI, e.g., to assist in locating fugitives; to 
provide notifications of arrests; to provide alerts, assessments, or 
similar information on potential threats to life, health, or property; 
or to keep the public appropriately informed of other law enforcement 
or FBI matters or other matters of legitimate public interest where 
disclosure could not reasonably be expected to constitute an 
unwarranted invasion of personal privacy. (The availability of 
information in pending criminal or civil cases will be governed by the 
provisions of 28 CFR 50.2.)
    GG. To a court or adjudicative body, in matters in which any of the 
following entities is or could be a party to the litigation, is likely 
to be affected by the litigation, or has an official interest in the 
litigation, and disclosure of system records has been determined by the 
FBI to be arguably relevant to the litigation: (a) The FBI or any FBI 
employee in his or her official capacity, (b) any FBI employee in his 
or her individual capacity where the Department of Justice has agreed 
to represent the employee, or (c) the United States. Similar 
disclosures may be made in analogous situations related to assistance 
provided to the Federal Government by non-FBI employees.
    HH. To an actual or potential party or his or her attorney for the 
purpose of negotiating or discussing such matters as settlement of the 
case or matter, and for formal or informal discovery proceedings, in 
matters in which the FBI has an official interest and in which the FBI 
determines records in the system to be arguably relevant.
    II. To such recipients and under such circumstances and procedures 
as are mandated by Federal statute, Executive Order, or treaty.
    JJ. To a requesting Member of Congress or a person on his or her 
staff acting on the Member's behalf when the request is made on behalf 
of and at the request of the individual who is the subject of the 
record.
    KK. To the National Archives and Records Administration (NARA) for 
records management inspections and such other purposes conducted under 
the authority of 44 U.S.C. 2904 and 2906.
    LL. To any agency, organization, or individual for the purposes of 
performing authorized audit or oversight operations of the FBI and 
meeting related reporting requirements.
    MM. The DOJ may disclose relevant and necessary information to a 
former employee of the Department for purposes of: Responding to an 
official inquiry by a local, state, or federal government entity or 
professional licensing authority, in accordance with applicable 
Department regulations; or facilitating communications with a former 
employee that may be necessary for personnel-related or other official 
purposes where the Department requires information and/or consultation

[[Page 47538]]

assistance from the former employee regarding a matter within that 
person's former area of responsibility. (Such disclosures will be 
effected under procedures established in title 28, Code of Federal 
Regulations, sections 16.300-301 and DOJ Order 2710.8C, including any 
future revisions.)
    NN. To the White House (the President, Vice President, their 
staffs, and other entities of the Executive Office of the President 
(EOP)), and, during Presidential transitions, the President-Elect and 
Vice-President Elect and their designees for appointment, employment, 
security, and access purposes compatible with the purposes for which 
the records were collected by the FBI, e.g., disclosure of information 
to assist the White House in making a determination whether an 
individual should be: (1) Granted, denied, or permitted to continue in 
employment on the White House Staff; (2) given a Presidential 
appointment or Presidential recognition; (3) provided access, or 
continued access, to classified or sensitive information; or (4) 
permitted access, or continued access, to personnel or facilities of 
the White House/EOP complex. System records may be disclosed also to 
the White House and, during Presidential transitions, to the President 
Elect and Vice-President Elect and their designees, for Executive 
Branch coordination of activities which relate to or have an effect 
upon the carrying out of the constitutional, statutory, or other 
official or ceremonial duties of the President, President Elect, Vice-
President or Vice-President Elect.
    OO. To complainants and/or victims to the extent deemed appropriate 
by the FBI to provide such persons with information and explanations 
concerning the progress and/or results of the investigations or cases 
arising from the matters of which they complained and/or of which they 
were victims.
    PP. To designated officers and employees of state, local (including 
the District of Columbia), or tribal law enforcement or detention 
agencies in connection with the hiring or continued employment of an 
employee or contractor, where the employee or contractor would occupy 
or occupies a position of public trust as a law enforcement officer or 
detention officer having direct contact with the public or with 
prisoners or detainees, to the extent that the information is relevant 
and necessary to the recipient agency's decision.
    QQ. To appropriate agencies, entities, and persons when (1) the 
Department suspects or has confirmed that there has been a breach of 
the system of records; (2) the Department has determined that as a 
result of the suspected or confirmed breach there is a risk of harm to 
individuals, DOJ (including its information systems, programs, and 
operations), the Federal Government, or national security; and (3) the 
disclosure made to such agencies, entities, and persons is reasonably 
necessary to assist in connection with the Department's efforts to 
respond to the suspected or confirmed breach or to prevent, minimize, 
or remedy such harm.
    RR. To another Federal agency or Federal entity, when the 
Department determines that information from this system of records is 
reasonably necessary to assist the recipient agency or entity in (1) 
responding to a suspected or confirmed breach or (2) preventing, 
minimizing, or remedying the risk of harm to individuals, the recipient 
agency or entity (including its information systems, programs, and 
operations), the Federal Government, or national security, resulting 
from a suspected or confirmed breach.

POLICIES AND PRACTICES FOR STORAGE OF RECORDS:
    Computerized records are stored electronically on hard disk, 
removable storage devices or other digital media. Some information may 
be retained in hard copy format and stored in individual file folders 
and file cabinets with controlled access, and/or other appropriate GSA-
approved security containers.

POLICIES AND PRACTICES FOR RETRIEVAL OF RECORDS:
    Information is retrieved by name or other identifying information. 
NCIC data may be directly accessed and retrieved by authorized NCIC 
users by means of remote on-line electronic queries submitted to the 
NCIC via authorized telecommunications channels. NCIC users are 
primarily located within the United States, but they also include 
United States users overseas, as well as foreign users in authorized 
foreign/international entities. NCIC data may also be retrieved by 
automated referral of queries made to other authorized interoperable 
systems, when the users of the other systems would also be authorized 
access to the NCIC. NCIC data may also be accessed and retrieved 
locally by authorized DOJ personnel. Information accessed locally may 
be used for authorized DOJ purposes, and/or may be forwarded to other 
authorized NCIC users for whom direct access is not available. 
Authorized FBI personnel and CJIS Systems Agencies (agencies which 
assume responsibility for and enforce system security with regard to 
all other agencies in a specific state or territory) have enhanced 
search capabilities and can retrieve all records within the NCIC.

POLICIES AND PROCEDURES FOR RETENTION AND DISPOSAL OF RECORDS:
    Records in this system are maintained and disposed of in accordance 
with appropriate authority of the National Archives and Records 
Administration. Generally, records are kept for 110 years or until no 
longer needed for reference purposes. The NCIC transaction log will be 
maintained until the system is discontinued.

ADMINISTRATIVE, TECHNICAL, AND PHYSICAL SAFEGUARDS:
    A. NCIC records are controlled in accordance with OMB Circular A-
130 and National Institute of Standards and Technology 800-37 and 800-
53 requirements. Associated FBI information technology (IT) systems are 
certified and accredited pursuant to the Federal Information Security 
Modernization Act. The system's technical security design supports and 
secures IT functionality in accordance with federal guidelines and 
commercial best practices.
    B. The FBI is responsible for managing the communications between 
the NCIC and constituent user systems. Encryption is used to secure all 
communications between the NCIC and other FBI systems that are not co-
located with the system. Network boundary protections including 
firewalls, intrusion detection systems, and proxy devices are also 
deployed between FBI systems and the constituent systems. Any 
constituent system that is accessing the NCIC via a ``public network'' 
segment must meet the approved form of data encryption and 
authentication. All constituent IT systems with connectivity to the 
system must employ virus protection software.
    C. All FBI employees and contractors who will develop, manage, use, 
or operate an FBI system receive a computer security awareness briefing 
prior to being granted any type of FBI system access and are provided 
with security awareness and privacy training at least annually. All FBI 
employees receive a complete background investigation prior to being 
hired and other authorized system support personnel, such as 
contractors, receive comparable vetting. All FBI employees and system 
support personnel are cautioned not to divulge confidential information 
or any information contained in FBI files. Failure to abide by these 
provisions violates FBI

[[Page 47539]]

directives and DOJ regulations and may violate certain civil and 
criminal statutes.
    D. NCIC users are required to comply with the CJIS Security Policy, 
which establishes standards to ensure the confidentiality, integrity, 
and availability of system data throughout the user community. The CJIS 
Security Policy requires state and national fingerprint-based record 
checks upon initial employment or assignment for all personnel who have 
authorized access to the system and those who have direct 
responsibility to configure and maintain computer systems and networks 
with direct access to the system. User computer sites and related 
infrastructures must have adequate physical security at all times to 
protect against any unauthorized access to or routine viewing of 
computer devices, access devices, and printed and stored data. 
Automated logs must be maintained on all systems transactions and 
security audits for operational systems must be conducted at least once 
every three years.
    E. A CJIS Systems Agency (CSA) is a duly authorized local, state, 
tribal, territorial, federal, or foreign criminal justice agency on the 
CJIS network infrastructure providing state-wide (or equivalent) 
service to its users. The CSA is responsible for establishing and 
administering an IT security program throughout the CSA's user 
community. The CSA is responsible to set, maintain, and enforce the 
following: Standards for the selection, supervision, and separation of 
personnel who have CJIS systems access; policy governing the operation 
of hardware, software, and other components used to process, store, or 
transmit NCIC information to ensure the priority, integrity, and 
availability of service; security controls governing the operation of 
computers, circuits, and telecommunications terminals used to process, 
store, or transmit FBI data; and standards that provide for audits, the 
discipline of CJIS Security Policy violators, and the monitoring of 
networks accessing CJIS systems to detect security incidents. Each CSA 
must provide a signed written agreement to the FBI CJIS Division before 
participating in CJIS records information programs. This agreement 
includes the standards and sanctions governing utilization of CJIS 
systems.
    F. Each agency is assigned an originating agency identifier (ORI) 
to access the NCIC. The system creates and maintains transaction logs, 
which are monitored and reviewed to detect any possible misuse of 
system data. The FBI CJIS Audit Unit conducts a triennial compliance 
audit of each CSA and a sample of agencies served by the CSA to ensure 
compliance with the FBI CJIS Security Policy and other CJIS policies. 
The FBI CJIS Audit Unit may also conduct ad hoc audits based on reports 
of violations. In addition, each CSA is responsible for conducting its 
own compliance audits of the criminal and non-criminal justice agencies 
within the CSA's user community.

RECORD ACCESS PROCEDURES:
    The Attorney General has exempted this system of records from the 
notification, access, amendment, and contest procedures of the Privacy 
Act. These exemptions apply only to the extent that the information in 
this system is subject to exemption pursuant to 5 U.S.C. 552a (j) or 
(k). Where compliance would not appear to interfere with or adversely 
affect the purposes of the system, or the overall law enforcement/
intelligence process, the applicable exemption (in whole or in part) 
may be waived by the FBI in its sole discretion.
    All requests for access should follow the guidance provided on the 
FBI's website at https://www.fbi.gov/services/records-management/foipa. 
A request for access to a record from this system of records must be 
submitted in writing and comply with 28 CFR part 16. Individuals may 
mail, fax, or electronically submit a request, clearly marked ``Privacy 
Act Access Request,'' to the FBI, ATTN: FOI/PA Request, Record/
Information Dissemination Section, 170 Marcel Drive, Winchester, VA 
22602-4843; facsimile: 540-868-4995/6/7; electronically: https://www.fbi.gov/services/records-management/foipa/requesting-fbi-records. 
The request should include a general description of the records sought, 
and must include the requester's full name, current address, and date 
and place of birth. The request must be signed and dated and either 
notarized or submitted under penalty of perjury. While no specific form 
is required, requesters may obtain a form (Form DOJ-361) for use in 
certification of identity, which can be located at the above link. In 
the initial request, the requester may also include any other 
identifying data that the requester may wish to furnish to assist the 
FBI in making a reasonable search. The request should include a return 
address for use by the FBI in responding; requesters are also 
encouraged to include a telephone number to facilitate FBI contacts 
related to processing the request. A determination of whether a record 
may be accessed will be made after a request is received.

CONTESTING RECORD PROCEDURES:
    The Attorney General has exempted this system of records from the 
notification, access, amendment, and contest procedures of the Privacy 
Act. These exemptions apply only to the extent that the information in 
this system is subject to exemption pursuant to 5 U.S.C. 552a(j) or 
(k). Where compliance would not appear to interfere with or adversely 
affect the purposes of the system, or the overall law enforcement/
intelligence process, the applicable exemption (in whole or in part) 
may be waived by the DOJ in its sole discretion.
    Individuals desiring to contest or amend information maintained in 
the system should direct their requests according to the RECORD ACCESS 
PROCEDURES paragraph above, stating clearly and concisely what 
information is being contested, the reasons for contesting it, and the 
proposed amendment to the information sought. The envelope and letter 
should be clearly marked ``Privacy Act Amendment Request'' and comply 
with 28 CFR 16.46 (Request for Amendment or Correction of Records). 
Some information may be exempt from contesting record procedures as 
described in the EXEMPTIONS PROMULGATED FOR THE SYSTEM paragraph, 
below. An individual who is the subject of a record in this system may 
amend those records that are not exempt. A determination whether a 
record may be amended will be made at the time a request is received.

NOTIFICATION PROCEDURES:
    Same as RECORD ACCESS PROCEDURES paragraph, above.

EXEMPTIONS PROMULGATED FOR THE SYSTEM:
    The Attorney General has exempted this system from subsections 
(c)(3) and (4); (d); (e)(1), (2), (3), (4)(G), (H), and (I), (5), and 
(8); (f), and (g) of the Privacy Act, 5 U.S.C. 552a. These exemptions 
apply only to the extent that information in a record is subject to 
exemption pursuant to 5 U.S.C. 552a(j) and/or (k). Revisions to the 
previously enacted rules in 28 CFR 16.96 (g-i) are being proposed in 
accordance with the requirements listed in 5 U.S.C. 553(b), (c), and 
(e) and published in the Federal Register. In addition, the DOJ will 
continue to assert all exemptions claimed under 5 U.S.C. 552a(j) and/or 
(k), or other applicable lawful authority, by an originating agency 
from which the DOJ obtains records, where one or more reasons 
underlying an original exemption remain valid. A determination of 
whether a record will be exempted will be made at the time

[[Page 47540]]

a request for notice, access, and/or correction is received.

HISTORY:
    National Crime Information Center (NCIC), JUSTICE/FBI-001, 64 FR 
52343 (Sept. 28, 1999), as amended by 66 FR 8425 (Jan. 31, 2001), and 
82 FR 24147 (May 25, 2017).

[FR Doc. 2019-19449 Filed 9-9-19; 8:45 am]
 BILLING CODE 4410-CW-P


This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.