Privacy Act Regulation; Exemption for Insider Threat Program Records, 63445-63447 [2020-19950]

Download as PDF Federal Register / Vol. 85, No. 196 / Thursday, October 8, 2020 / Rules and Regulations 2020–20–17 General Electric Company: Amendment 39–21273; Docket No. FAA–2020–0902; Project Identifier AD– 2020–01174–E. (a) Effective Date This AD is effective October 23, 2020. (b) Affected ADs None. (j) Related Information For more information about this AD, contact Stephen Elwin, Aerospace Engineer, ECO Branch, FAA, 1200 District Avenue, Burlington, MA 01803; phone: 781–238– 7236; fax: 781–238–7199; email: stephen.l.elwin@faa.gov. (c) Applicability This AD applies to all General Electric Company GE90–110B1 and GE90–115B model turbofan engines. (d) Subject Joint Aircraft System Component (JASC) Code 7600, Engine Controls. (e) Unsafe Condition This AD was prompted by an in-service occurrence of loss of engine thrust control resulting in uncommanded high thrust. The FAA is issuing this AD to prevent dispatch of the airplane when certain faults caused by degradation of the MN4 integrated circuit in the full authority digital engine control (FADEC) are displayed and certain FADEC conditions are present. The unsafe condition, if not addressed, could result in loss of engine thrust control and reduced control of the airplane. (f) Compliance Comply with this AD within the compliance times specified, unless already done. (g) Required Actions After the effective date of this AD, notwithstanding the provisions of the operator’s minimum equipment list (MEL), dispatch of an airplane is prohibited if the engine indicating and crew alerting system (EICAS) displays the status message ‘‘ENG EEC C1 L’’ or ‘‘ENG EEC C1 R’’ and any condition is present that is listed in the Accomplishment Instructions, paragraphs 3.A.(2)(f), 3.A.3(a), or 3.A.(4) of GE GE90–100 Service Bulletin (SB) 73–0117 R01, dated August 5, 2020. khammond on DSKJM1Z7X2PROD with RULES send it to the attention of the person identified in paragraph (j) of this AD. You may email your request to: ANE-AD-AMOC@ faa.gov. (2) Before using any approved AMOC, notify your appropriate principal inspector, or lacking a principal inspector, the manager of the local flight standards district office/ certificate holding district office. (k) Material Incorporated by Reference (1) The Director of the Federal Register approved the incorporation by reference (IBR) of the service information listed in this paragraph under 5 U.S.C. 552(a) and 1 CFR part 51. (2) You must use this service information as applicable to do the actions required by this AD, unless the AD specifies otherwise. (i) General Electric Company (GE) GE90– 100 Service Bulletin 73–0117 R01, dated August 5, 2020. (ii) [Reserved] (3) For GE service information identified in this AD, contact General Electric Company, 1 Neumann Way, Cincinnati, OH 45215; phone: 513–552–3272; email: aviation.fleetsupport@ge.com; website: www.ge.com. (4) You may view this service information at FAA, Airworthiness Products Section, Operational Safety Branch, 1200 District Avenue, Burlington, MA 01803. For information on the availability of this material at the FAA, call 781–238–7759. (5) You may view this service information that is incorporated by reference at the National Archives and Records Administration (NARA). For information on the availability of this material at NARA, email: fedreg.legal@nara.gov, or go to: https://www.archives.gov/federal-register/cfr/ ibr-locations.html. (h) Terminating Action As terminating action for the requirements of paragraph (g) of this AD, within 120 days of the effective date of this AD, revise the existing FAA-approved MEL by incorporating into the MEL the dispatch restrictions listed in paragraph (g) of this AD as a required operation or maintenance procedure. Specific alternative MEL wording to accomplish the actions specified in paragraph (g) of this AD can be approved by the operator’s principal operations or maintenance inspector. Issued on September 25, 2020. Lance T. Gant, Director, Compliance & Airworthiness Division, Aircraft Certification Service. (i) Alternative Methods of Compliance (AMOCs) (1) The Manager, ECO Branch, FAA, has the authority to approve AMOCs for this AD, if requested using the procedures found in 14 CFR 39.19. In accordance with 14 CFR 39.19, send your request to your principal inspector or local Flight Standards District Office, as appropriate. If sending information directly to the manager of the certification office, Privacy Act Regulation; Exemption for Insider Threat Program Records VerDate Sep<11>2014 16:24 Oct 07, 2020 Jkt 253001 [FR Doc. 2020–22267 Filed 10–7–20; 8:45 am] BILLING CODE 4910–13–P PENSION BENEFIT GUARANTY CORPORATION 29 CFR Part 4902 Pension Benefit Guaranty Corporation. ACTION: Final rule. AGENCY: The Pension Benefit Guaranty Corporation (PBGC) is adopting as final an interim final rule to amend PBGC’s Privacy Act regulation to exempt a system of records that supports a program of insider threat detection and data loss prevention. DATES: This final rule is effective October 8, 2020. FOR FURTHER INFORMATION CONTACT: Melissa Rifkin (rifkin.melissa@ pbgc.gov), Attorney, Regulatory Affairs Division, Office of the General Counsel, Pension Benefit Guaranty Corporation, 1200 K Street NW, Washington, DC 20005–4026; 202–229–6563; Shawn Hartley (hartley.shawn@pbgc.gov), Chief Privacy Officer, Office of the General Counsel, 202–229–6435. TTY users may call the Federal relay service toll-free at 800–877–8339 and ask to be connected to 202–229–6435. SUPPLEMENTARY INFORMATION: Executive Summary On July 9, 2019, PBGC published an interim final rule to amend PBGC’s regulation on Disclosure and Amendment of Records Pertaining to Individuals under the Privacy Act (29 CFR part 4902) to exempt from disclosure information contained in a new system of records for PBGC’s insider threat program.1 The exemption was needed because records in this new system include investigatory material compiled for law enforcement purposes. PBGC is adopting the interim final rule as final with minor, technical amendments. Authority for this rule is provided by section 4002(b)(3) of the Employee Retirement Income Security Act of 1974 (ERISA) and 5 U.S.C. 552a(k)(2). Background The Pension Benefit Guaranty Corporation (PBGC) administers the pension plan insurance programs under title IV of the Employee Retirement Income Security Act of 1974 (ERISA). As a Federal agency, PBGC is subject to the Privacy Act of 1974, 5 U.S.C. 552a (Privacy Act), in its collection, maintenance, use, and dissemination of any personally identifiable information that it maintains in a ‘‘system of records.’’ A system of records is defined under the Privacy Act as ‘‘a group of any records under the control of any agency from which information is retrieved by the name of the individual or by some identifying number, symbol, or other identifying particular assigned to the individual.’’ 2 On July 9, 2019, PBGC established a new system of records, ‘‘PBGC–26, SUMMARY: PO 00000 Frm 00023 Fmt 4700 Sfmt 4700 63445 1 84 FR 32618 (July 9, 2019). 5 U.S.C. 552a(a)(5). 2 See E:\FR\FM\08OCR1.SGM 08OCR1 63446 Federal Register / Vol. 85, No. 196 / Thursday, October 8, 2020 / Rules and Regulations PBGC Insider Threat and Data Loss Prevention—PBGC’’ 3 Executive Order 13587, issued October 7, 2011, requires Federal agencies to establish an insider threat detection and prevention program to ensure the security of classified networks and the responsible sharing and safeguarding of classified information consistent with appropriate protections for privacy and civil liberties. While PBGC does not have any classified networks, it does maintain a significant amount of Controlled Unclassified Information (CUI) that, under law, it is required to safeguard from unauthorized access or disclosure. One method utilized by PBGC to ensure that only those with a need-to-know have access to CUI is a set of tools to minimize data loss, whether inadvertent or intentional. This system collects and maintains Personally Identifiable Information (PII) in the course of scanning traffic leaving PBGC’s network and blocking traffic that violates PBGC’s policies to safeguard PII. This system covers ‘‘PBGC insiders,’’ who are individuals with access to PBGC resources, including facilities, information, equipment, networks, and systems. This includes Federal employees and contractors. Records from this system will be used on a needto-know basis to manage insider threat matters; facilitate insider threat investigations and activities; identify threats to PBGC resources, including threats to PBGC’s personnel, facilities, and information assets; track tips and referrals of potential insider threats to internal and external partners; meet other insider threat program requirements; and investigate/manage the unauthorized or attempted unauthorized disclosure of PII. khammond on DSKJM1Z7X2PROD with RULES Exemption Under section 552a(k) of the Privacy Act, PBGC may promulgate regulations exempting information contained in certain systems of records from specified sections of the Privacy Act including the section mandating disclosure of information to an individual who has requested it. Among other systems, PBGC may exempt a system that is ‘‘investigatory material compiled for law enforcement purposes.’’ 4 Under this provision, PBGC has exempted, in § 4209.11 of its Privacy Act regulation, records of the investigations conducted by its Inspector General and contained in a system of records entitled ‘‘PBGC–17, 3 84 FR 32786 (July 9, 2019). 5 U.S.C. 552a(k)(2). 4 See VerDate Sep<11>2014 16:24 Oct 07, 2020 Office of Inspector General Investigative File System—PBGC.’’ The PBGC–26, PBGC Insider Threat and Data Loss Prevention—PBGC system contains: (1) Records derived from PBGC security investigations, (2) summaries or reports containing information about potential insider threats or the data loss prevention program, (3) information related to investigative or analytical efforts by PBGC insider threat program personnel, (4) reports about potential insider threats obtained through the management and operation of the PBGC insider threat program, and (5) reports about potential insider threats obtained from other Federal Government sources. The records contained in this new system include investigative material of actual, potential, or alleged criminal, civil, or administrative violations and law enforcement actions. These records are within the material permitted to be exempted under section 552a(k)(2) of the Privacy Act. On July 9, 2019, at, PBGC published an interim rule adding a new § 4902.12 to its Privacy Act regulation.5 This addition exempts PBGC–26, PBGC Insider Threat and Data Loss Prevention—PBGC, from 5 U.S.C. 552a(c)(3), (d), (e)(1), (e)(4)(G), (H), and (I) and (f). Exemption from these sections of the Privacy Act means that, with respect to records in the system, PBGC is not required to: (1) Disclose records to an individual upon request, (2) keep an accounting of individuals who request records, (3) maintain only records as necessary to accomplish an agency purpose, or (4) publish notice of certain revisions of the system of records. PBGC provided the public 30 days in which to comment on the amendment made by the interim final rule and received comments from one commenter. PBGC considered the comments but is not modifying the regulation. The commenter suggested that any data which is subject to breach or hacking should be made available to affected individuals and other interested persons, including the journalism community. Under 5 U.S.C. 552a(b), an agency is prohibited from disclosing any record contained in a system of records to any person unless it has obtained written consent from the subject of the record or the disclosure falls within one of the twelve exceptions articulated in that section. There is no exception that would permit PBGC to provide data that is subject to a ‘‘breach or hacking’’ to interested persons. Providing this 5 84 Jkt 253001 PO 00000 FR 32618 (July 9, 2019). Frm 00024 Fmt 4700 Sfmt 4700 information would be a violation of the Privacy Act. The commenter suggested that the use of collected data must be strictly limited to necessary purposes, and broad collection of personal data, for investigations of insider threats, without access for review or correction of improper or unnecessary data should not be permitted. PBGC only collects the information it is authorized to collect and uses it for the purposes identified in its system of records notices. PBGC has listed the sources of records it anticipates collecting; however, to the extent that listing a source would potentially compromise a source of law enforcement information, PBGC has exempted this system of records under 5 U.S.C. 552a(e)(4)(I). Moreover, PBGC has exempted records maintained in this system of records from access to and amendment of records because providing access and amendment rights to such records could compromise or lead to the compromise of information that could warrant an invasion of another’s privacy, reveal a sensitive investigative technique, potentially allow a suspect avoid detection or apprehension, or constitute potential danger to a confidential source or witness. Finally, the commenter stated that an objective third party should be an option for review of data if requested by an affected individual or group, subject to reasonable confidentiality protections necessary to protect any legitimate law enforcement or investigatory purposes. Any disclosure of insider threat information, including disclosure to an ‘‘objective third party,’’ could substantially compromise an investigation of insider threat activities. For example, that information may identify the subject of the investigation or a witness who was promised confidentiality. PBGC does not know who the ‘‘objective third party’’ is or with whom the information might be shared. Further, there are no ‘‘reasonable confidentiality protections’’ that would prevent that information from getting into the wrong hands. Moreover, if the ‘‘affected individual or group’’ means those persons who were subjected to an unauthorized or attempted unauthorized disclosure of PII, providing that information to an ‘‘objective third party’’ may invade the privacy of ‘‘the affected individual or group.’’ Finally, disclosure may also compromise the investigation by revealing law enforcement techniques and procedures. Accordingly, PBGC adopts the interim final rule as final with minor, technical amendments to remove the introductory E:\FR\FM\08OCR1.SGM 08OCR1 Federal Register / Vol. 85, No. 196 / Thursday, October 8, 2020 / Rules and Regulations text in § 4902.12(a) and redesignate the paragraphs. DEPARTMENT OF HOMELAND SECURITY Compliance With Rulemaking Guidelines Coast Guard The interim final rule was exempt from the requirements of prior notice and comment and a 30-day delay in effective date because it is a rule of ‘‘agency organization, procedure, or practice’’ and is limited to ‘‘agency organization, management, or personnel matters.’’ See 5 U.S.C. 553(a), (b), (d). The exemption from provisions of the Privacy Act provided by the interim final rule affects only PBGC insiders described above. Nonetheless, PBGC provided an opportunity for postpromulgation comment. As this rule is the finalization of an interim final rule and is a rule of agency organization, procedure, or practice, further request for comment and a 30-day delay in effective date are not required. Because this rule is exempt from notice and public comment requirements under 5 U.S.C. 553(b), it is also exempt from the requirements of Executive Order 12866 and Executive Order 13771,6 and the Regulatory Flexibility Act does not apply to this rule. See 5 U.S.C. 601(2), 603, 604. 33 CFR Part 165 List of Subjects in 29 CFR Part 4902 Privacy. In consideration of the foregoing, the interim rule amending 29 CFR part 4902 which was published at 84 FR 32618 on July 9, 2019, is adopted as final with the following change: PART 4902—DISCLOSURE AND AMENDMENT OF RECORDS PERTAINING TO INDIVIDUALS UNDER THE PRIVACY ACT 1. The authority citation will continue to read as follows: ■ Authority: 5 U.S.C. 552a, 29 U.S.C. 1302(b)(3). § 4902.12 [Amended] 2. In § 4902.12: ■ a. Remove the paragraph (a) subject heading; and ■ b. Redesignate paragraphs (a)(1) and (2) as paragraphs (a) and (b), respectively. khammond on DSKJM1Z7X2PROD with RULES ■ Issued in Washington, DC. Gordon Hartogensis, Director, Pension Benefit Guaranty Corporation. [FR Doc. 2020–19950 Filed 10–7–20; 8:45 am] BILLING CODE 7709–02–P 6 See section 3(d)(3) of Executive Order 12866 and section 4(b) of Executive Order 13771. VerDate Sep<11>2014 16:24 Oct 07, 2020 Jkt 253001 [Docket No. USCG–2020–0579] Safety Zone, Brandon Road Lock and Dam to Lake Michigan Including Des Plaines River, Chicago Sanitary and Ship Canal, Chicago River, and Calumet-Saganashkee Channel, Chicago, IL Coast Guard, DHS. Notice of enforcement of regulation. AGENCY: ACTION: The Coast Guard will enforce a segment of the Safety Zone; Brandon Road Lock and Dam to Lake Michigan including Des Plaines River, Chicago Sanitary and Ship Canal, Chicago River, Calumet-Saganashkee Channel on all waters of the Chicago Sanitary and Ship Canal and South Branch of the Chicago River between mile marker 296 and mile marker 296.7 during specified times from September 25, 2020 through October 29, 2020. This action is necessary and intended to protect the safety of life and property on navigable waters prior to, during, and immediately after planned US Army Corps of Engineers work at the Electric Barrier. During the enforcement period listed below, entry into, transiting, or anchoring within the safety zone is prohibited unless authorized by the Captain of the Port Lake Michigan or a designated representative. DATES: The regulations in 33 CFR 165.930 will be enforced from 7 a.m. through 11 a.m. and 1 p.m. through 5 p.m. daily without actual notice from October 8, 2020 through 5 p.m. on October 29, 2020. For purposes of enforcement, actual notice will be used 7 a.m. through 11 a.m. and 1 p.m. through 5 p.m. daily from September 25, 2020 through October 8, 2020. FOR FURTHER INFORMATION CONTACT: If you have questions about this notice of enforcement, call or email LT Tiziana Garner, Waterways Management Division, Marine Safety Unit Chicago, at 630–986–2155, email address D09-DGMSUChicago-Waterways@uscg.mil. SUPPLEMENTARY INFORMATION: The Coast Guard will enforce a segment of the Safety Zone; Brandon Road Lock and Dam to Lake Michigan including Des Plaines River, Chicago Sanitary and Ship Canal, Chicago River, CalumetSaganashkee Channel on all waters of the Chicago Sanitary and Ship Canal and South Branch of the Chicago River SUMMARY: PO 00000 Frm 00025 Fmt 4700 Sfmt 4700 63447 between mile marker 296 and mile marker 296.7 during specified times from September 25, 2020 through October 29, 2020. This action is necessary and intended to protect the safety of life and property on navigable waters prior to, during, and immediately after planned US Army Corps of Engineers work at the Electric Barrier. During the enforcement period, entry into, transiting, or anchoring within the safety zone is prohibited unless authorized by the Captain of the Port Lake Michigan or a designated representative. This notice of enforcement is issued under the authority of 33 CFR 165.930 and 5 U.S.C. 552(a). In addition to this notice of enforcement in the Federal Register, the Coast Guard will provide notification of this enforcement period via Broadcast Notice to Mariners, Local Notice to Mariners, distribution in leaflet form, and on-scene oral notice. Additionally, the Captain of the Port Lake Michigan may notify representatives from the maritime industry through telephonic and email notifications. If the Captain of the Port or a designated representative determines that the regulated area need not be enforced for the full duration stated in this notice, he or she may use a Broadcast Notice to Mariners to grant general permission to enter the regulated area. The Captain of the Port Lake Michigan or a designated on-scene representative may be contacted via Channel 16 or at (414) 747–7182. Dated: September 16, 2020. Donald P. Montoro, Captain, U.S. Coast Guard, Captain of the Port, Lake Michigan. [FR Doc. 2020–20790 Filed 10–7–20; 8:45 am] BILLING CODE 9110–04–P ENVIRONMENTAL PROTECTION AGENCY 40 CFR Part 62 [EPA–R10–OAR–2020–0074; FRL–10011– 40–Region 10] Approval and Promulgation of State Plans for Designated Facilities and Pollutants; Oregon Department of Environmental Quality; Control of Emissions From Existing Municipal Solid Waste Landfills Environmental Protection Agency (EPA). ACTION: Final rule. AGENCY: The Environmental Protection Agency (EPA) is taking final action to approve a state plan submitted by the SUMMARY: E:\FR\FM\08OCR1.SGM 08OCR1

Agencies

[Federal Register Volume 85, Number 196 (Thursday, October 8, 2020)]
[Rules and Regulations]
[Pages 63445-63447]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2020-19950]


=======================================================================
-----------------------------------------------------------------------

PENSION BENEFIT GUARANTY CORPORATION

29 CFR Part 4902


Privacy Act Regulation; Exemption for Insider Threat Program 
Records

AGENCY: Pension Benefit Guaranty Corporation.

ACTION: Final rule.

-----------------------------------------------------------------------

SUMMARY: The Pension Benefit Guaranty Corporation (PBGC) is adopting as 
final an interim final rule to amend PBGC's Privacy Act regulation to 
exempt a system of records that supports a program of insider threat 
detection and data loss prevention.

DATES: This final rule is effective October 8, 2020.

FOR FURTHER INFORMATION CONTACT: Melissa Rifkin 
([email protected]), Attorney, Regulatory Affairs Division, 
Office of the General Counsel, Pension Benefit Guaranty Corporation, 
1200 K Street NW, Washington, DC 20005-4026; 202-229-6563; Shawn 
Hartley ([email protected]), Chief Privacy Officer, Office of the 
General Counsel, 202-229-6435. TTY users may call the Federal relay 
service toll-free at 800-877-8339 and ask to be connected to 202-229-
6435.

SUPPLEMENTARY INFORMATION:

Executive Summary

    On July 9, 2019, PBGC published an interim final rule to amend 
PBGC's regulation on Disclosure and Amendment of Records Pertaining to 
Individuals under the Privacy Act (29 CFR part 4902) to exempt from 
disclosure information contained in a new system of records for PBGC's 
insider threat program.\1\ The exemption was needed because records in 
this new system include investigatory material compiled for law 
enforcement purposes. PBGC is adopting the interim final rule as final 
with minor, technical amendments.
---------------------------------------------------------------------------

    \1\ 84 FR 32618 (July 9, 2019).
---------------------------------------------------------------------------

    Authority for this rule is provided by section 4002(b)(3) of the 
Employee Retirement Income Security Act of 1974 (ERISA) and 5 U.S.C. 
552a(k)(2).

Background

    The Pension Benefit Guaranty Corporation (PBGC) administers the 
pension plan insurance programs under title IV of the Employee 
Retirement Income Security Act of 1974 (ERISA). As a Federal agency, 
PBGC is subject to the Privacy Act of 1974, 5 U.S.C. 552a (Privacy 
Act), in its collection, maintenance, use, and dissemination of any 
personally identifiable information that it maintains in a ``system of 
records.'' A system of records is defined under the Privacy Act as ``a 
group of any records under the control of any agency from which 
information is retrieved by the name of the individual or by some 
identifying number, symbol, or other identifying particular assigned to 
the individual.'' \2\
---------------------------------------------------------------------------

    \2\ See 5 U.S.C. 552a(a)(5).
---------------------------------------------------------------------------

    On July 9, 2019, PBGC established a new system of records, ``PBGC-
26,

[[Page 63446]]

PBGC Insider Threat and Data Loss Prevention--PBGC'' \3\
---------------------------------------------------------------------------

    \3\ 84 FR 32786 (July 9, 2019).
---------------------------------------------------------------------------

    Executive Order 13587, issued October 7, 2011, requires Federal 
agencies to establish an insider threat detection and prevention 
program to ensure the security of classified networks and the 
responsible sharing and safeguarding of classified information 
consistent with appropriate protections for privacy and civil 
liberties. While PBGC does not have any classified networks, it does 
maintain a significant amount of Controlled Unclassified Information 
(CUI) that, under law, it is required to safeguard from unauthorized 
access or disclosure. One method utilized by PBGC to ensure that only 
those with a need-to-know have access to CUI is a set of tools to 
minimize data loss, whether inadvertent or intentional. This system 
collects and maintains Personally Identifiable Information (PII) in the 
course of scanning traffic leaving PBGC's network and blocking traffic 
that violates PBGC's policies to safeguard PII.
    This system covers ``PBGC insiders,'' who are individuals with 
access to PBGC resources, including facilities, information, equipment, 
networks, and systems. This includes Federal employees and contractors. 
Records from this system will be used on a need-to-know basis to manage 
insider threat matters; facilitate insider threat investigations and 
activities; identify threats to PBGC resources, including threats to 
PBGC's personnel, facilities, and information assets; track tips and 
referrals of potential insider threats to internal and external 
partners; meet other insider threat program requirements; and 
investigate/manage the unauthorized or attempted unauthorized 
disclosure of PII.

Exemption

    Under section 552a(k) of the Privacy Act, PBGC may promulgate 
regulations exempting information contained in certain systems of 
records from specified sections of the Privacy Act including the 
section mandating disclosure of information to an individual who has 
requested it. Among other systems, PBGC may exempt a system that is 
``investigatory material compiled for law enforcement purposes.'' \4\ 
Under this provision, PBGC has exempted, in Sec.  4209.11 of its 
Privacy Act regulation, records of the investigations conducted by its 
Inspector General and contained in a system of records entitled ``PBGC-
17, Office of Inspector General Investigative File System--PBGC.''
---------------------------------------------------------------------------

    \4\ See 5 U.S.C. 552a(k)(2).
---------------------------------------------------------------------------

    The PBGC-26, PBGC Insider Threat and Data Loss Prevention--PBGC 
system contains: (1) Records derived from PBGC security investigations, 
(2) summaries or reports containing information about potential insider 
threats or the data loss prevention program, (3) information related to 
investigative or analytical efforts by PBGC insider threat program 
personnel, (4) reports about potential insider threats obtained through 
the management and operation of the PBGC insider threat program, and 
(5) reports about potential insider threats obtained from other Federal 
Government sources. The records contained in this new system include 
investigative material of actual, potential, or alleged criminal, 
civil, or administrative violations and law enforcement actions. These 
records are within the material permitted to be exempted under section 
552a(k)(2) of the Privacy Act.
    On July 9, 2019, at, PBGC published an interim rule adding a new 
Sec.  4902.12 to its Privacy Act regulation.\5\ This addition exempts 
PBGC-26, PBGC Insider Threat and Data Loss Prevention--PBGC, from 5 
U.S.C. 552a(c)(3), (d), (e)(1), (e)(4)(G), (H), and (I) and (f). 
Exemption from these sections of the Privacy Act means that, with 
respect to records in the system, PBGC is not required to: (1) Disclose 
records to an individual upon request, (2) keep an accounting of 
individuals who request records, (3) maintain only records as necessary 
to accomplish an agency purpose, or (4) publish notice of certain 
revisions of the system of records.
---------------------------------------------------------------------------

    \5\ 84 FR 32618 (July 9, 2019).
---------------------------------------------------------------------------

    PBGC provided the public 30 days in which to comment on the 
amendment made by the interim final rule and received comments from one 
commenter. PBGC considered the comments but is not modifying the 
regulation.
    The commenter suggested that any data which is subject to breach or 
hacking should be made available to affected individuals and other 
interested persons, including the journalism community. Under 5 U.S.C. 
552a(b), an agency is prohibited from disclosing any record contained 
in a system of records to any person unless it has obtained written 
consent from the subject of the record or the disclosure falls within 
one of the twelve exceptions articulated in that section. There is no 
exception that would permit PBGC to provide data that is subject to a 
``breach or hacking'' to interested persons. Providing this information 
would be a violation of the Privacy Act.
    The commenter suggested that the use of collected data must be 
strictly limited to necessary purposes, and broad collection of 
personal data, for investigations of insider threats, without access 
for review or correction of improper or unnecessary data should not be 
permitted. PBGC only collects the information it is authorized to 
collect and uses it for the purposes identified in its system of 
records notices. PBGC has listed the sources of records it anticipates 
collecting; however, to the extent that listing a source would 
potentially compromise a source of law enforcement information, PBGC 
has exempted this system of records under 5 U.S.C. 552a(e)(4)(I). 
Moreover, PBGC has exempted records maintained in this system of 
records from access to and amendment of records because providing 
access and amendment rights to such records could compromise or lead to 
the compromise of information that could warrant an invasion of 
another's privacy, reveal a sensitive investigative technique, 
potentially allow a suspect avoid detection or apprehension, or 
constitute potential danger to a confidential source or witness.
    Finally, the commenter stated that an objective third party should 
be an option for review of data if requested by an affected individual 
or group, subject to reasonable confidentiality protections necessary 
to protect any legitimate law enforcement or investigatory purposes. 
Any disclosure of insider threat information, including disclosure to 
an ``objective third party,'' could substantially compromise an 
investigation of insider threat activities. For example, that 
information may identify the subject of the investigation or a witness 
who was promised confidentiality. PBGC does not know who the 
``objective third party'' is or with whom the information might be 
shared. Further, there are no ``reasonable confidentiality 
protections'' that would prevent that information from getting into the 
wrong hands. Moreover, if the ``affected individual or group'' means 
those persons who were subjected to an unauthorized or attempted 
unauthorized disclosure of PII, providing that information to an 
``objective third party'' may invade the privacy of ``the affected 
individual or group.'' Finally, disclosure may also compromise the 
investigation by revealing law enforcement techniques and procedures.
    Accordingly, PBGC adopts the interim final rule as final with 
minor, technical amendments to remove the introductory

[[Page 63447]]

text in Sec.  4902.12(a) and redesignate the paragraphs.

Compliance With Rulemaking Guidelines

    The interim final rule was exempt from the requirements of prior 
notice and comment and a 30-day delay in effective date because it is a 
rule of ``agency organization, procedure, or practice'' and is limited 
to ``agency organization, management, or personnel matters.'' See 5 
U.S.C. 553(a), (b), (d). The exemption from provisions of the Privacy 
Act provided by the interim final rule affects only PBGC insiders 
described above. Nonetheless, PBGC provided an opportunity for post-
promulgation comment. As this rule is the finalization of an interim 
final rule and is a rule of agency organization, procedure, or 
practice, further request for comment and a 30-day delay in effective 
date are not required. Because this rule is exempt from notice and 
public comment requirements under 5 U.S.C. 553(b), it is also exempt 
from the requirements of Executive Order 12866 and Executive Order 
13771,\6\ and the Regulatory Flexibility Act does not apply to this 
rule. See 5 U.S.C. 601(2), 603, 604.
---------------------------------------------------------------------------

    \6\ See section 3(d)(3) of Executive Order 12866 and section 
4(b) of Executive Order 13771.
---------------------------------------------------------------------------

List of Subjects in 29 CFR Part 4902

    Privacy.

    In consideration of the foregoing, the interim rule amending 29 CFR 
part 4902 which was published at 84 FR 32618 on July 9, 2019, is 
adopted as final with the following change:

PART 4902--DISCLOSURE AND AMENDMENT OF RECORDS PERTAINING TO 
INDIVIDUALS UNDER THE PRIVACY ACT

0
1. The authority citation will continue to read as follows:

    Authority: 5 U.S.C. 552a, 29 U.S.C. 1302(b)(3).


Sec.  4902.12   [Amended]

0
2. In Sec.  4902.12:
0
a. Remove the paragraph (a) subject heading; and
0
b. Redesignate paragraphs (a)(1) and (2) as paragraphs (a) and (b), 
respectively.

    Issued in Washington, DC.
Gordon Hartogensis,
Director, Pension Benefit Guaranty Corporation.
[FR Doc. 2020-19950 Filed 10-7-20; 8:45 am]
BILLING CODE 7709-02-P


This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.