Privacy Act of 1974; Systems of Records, 41089-41093 [2021-15883]

Download as PDF Federal Register / Vol. 86, No. 144 / Friday, July 30, 2021 / Notices number of FFLs subject to the reporting requirements of the Demand 2 program, the total respondents, responses, and burden hours for this collection have increased by 233, 932, and 466 respectively, since the last renewal in 2018. If additional information is required contact: Melody Braswell, Department Clearance Officer, United States Department of Justice, Justice Management Division, Policy and Planning Staff, Two Constitution Square, 145 N Street NE, 3E.405A, Washington, DC 20530. Dated: July 27, 2021. Melody Braswell, Department Clearance Officer for PRA, U.S. Department of Justice. [FR Doc. 2021–16317 Filed 7–29–21; 8:45 am] BILLING CODE 4410–FY–P DEPARTMENT OF JUSTICE [CPCLO Order No. 007–2021] Privacy Act of 1974; Systems of Records Justice Management Division, United States Department of Justice. ACTION: Notice of a new system of records. AGENCY: Pursuant to the Privacy Act of 1974 and Office of Management and Budget (OMB) Circular No. A–108, notice is hereby given that the Justice Management Division (JMD), a component within the United States Department of Justice (DOJ or Department), proposes to develop a new system of records titled Security Monitoring and Analytics Service Records, JUSTICE/JMD–026. JMD proposes to establish this system of records to provide external federal agency subscribers with the technical capability to protect their data from malicious or accidental threats using DOJ-managed systems. DATES: In accordance with 5 U.S.C. 552a(e)(4) and (11), this notice is effective upon publication, subject to a 30-day period in which to comment on the routine uses, described below. Please submit any comments by August 30, 2021. ADDRESSES: The public, OMB, and Congress are invited to submit any comments: By mail to the United States Department of Justice, Office of Privacy and Civil Liberties, ATTN: Privacy Analyst, 145 N St. NE, Suite 8W.300, Washington, DC 20530; by facsimile at 202–307–0693; or by email at privacy.compliance@usdoj.gov. To ensure proper handling, please lotter on DSK11XQN23PROD with NOTICES1 SUMMARY: VerDate Sep<11>2014 17:24 Jul 29, 2021 Jkt 253001 reference the above CPCLO Order No. on your correspondence. FOR FURTHER INFORMATION CONTACT: Nickolous Ward, DOJ Chief Information Security Officer, (202) 514–3101, 145 N Street NE, Washington, DC 20530. SUPPLEMENTARY INFORMATION: In accordance with the Federal Information Security Modernization Act of 2014, among other authorities, agencies are responsible for complying with information security policies and procedures requiring information security protections commensurate with the risk and magnitude of harm resulting from the unauthorized access, use, disclosure, disruption, modification, or destruction of agency information and information systems. See, e.g., 44 U.S.C. 3554 (2018). Executive Order No. 13800, Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure (May 2017), directs agency heads to show preference in their procurement for shared information technology (IT) services, to the extent permitted by law, including email, cloud, and cybersecurity services. Office of Management and Budget (OMB) Memorandum M–19–16, Centralized Mission Support Capabilities for the Federal Government (April 26, 2019), establishes the framework for implementing ‘‘Sharing Quality Services’’ across agencies. The Economy Act of 1932; 31 U.S.C. 1535, authorizes agencies to enter into agreements to obtain supplies or services from another agency. Consistent with these authorities, the JMD, Office of the Chief Information Officer (OCIO), Cybersecurity Services Staff (CSS), developed the Security Monitoring and Analytics Service (SMAS) system to provide DOJ-managed IT service offerings to other federal agencies wishing to leverage DOJ’s cybersecurity services, referred to as ‘‘external federal agency subscribers.’’ SMAS has a suite of technology products, which consists of a range of commercial off-the-shelf (COTS) software that provide insight into the subscribers’ operating environment. SMAS capabilities include, but are not limited to, asset discovery, vulnerability assessment, Network Intrusion Detection System (NIDS), Endpoint Detection and Response (EDR), and Security Information and Event Management (SIEM) event correlation and log management. SMAS also offers User Behavior Analytics (UBA) and User Activity Monitoring (UAM) tools to correlate security events, as part of the service offering. SMAS enables the identification and evaluation of PO 00000 Frm 00088 Fmt 4703 Sfmt 4703 41089 suspicious, unauthorized, or anomalous activity that may indicate malicious behavior and activity. DOJ provides this information directly to external federal agency subscribers for review and further evaluation. JMD monitors user activities and captures and stores files that might be related to suspicious, unauthorized, or anomalous activities. JMD ensures that possible security events or incidents are accurately identified, analyzed, guarded against, investigated, and shared with the external federal agency subscriber via secure means of communication (e.g., encrypted email). JMD established the system of records, Security Monitoring and Analytics Service Records, JUSTICE/ JMD–026, to cover records maintained by JMD while utilizing SMAS for its external federal agency subscribers. Specifically, JMD tracks external federal agency subscriber’s IT, information system, and/or network activity, including any access by users to any IT, information systems, and/or networks, whether authorized or unauthorized. Consistent with these requirements, JMD must ensure that it maintains accurate audit and activity records of the observable occurrences on external federal agency subscriber information systems and networks (also referred to as ‘‘events’’) that are significant and relevant to the security of the external federal agency subscriber’s information and information systems. These audit and activity records may include, but are not limited to, information that establishes what type of event occurred, when the event occurred, where the event occurred, the source of the event, the outcome of the event, and the identity of any individuals or subjects associated with the event. These records assist DOJ and external federal agency subscribers with protecting subscribers’ data and ensuring the secure operation of IT, information systems, and networks. Additionally, monitored events— whether detected utilizing information systems maintaining audit and activity records, reported to the Department or external federal agency subscriber by information system users, or reported to the Department or the external federal agency subscriber by the cybersecurity research community or members of the general public conducting good faith vulnerability discovery activities—may constitute occurrences that (1) actually or imminently jeopardize, without lawful authority, the integrity, confidentiality, or availability of information or an information system; or (2) constitute a violation or imminent threat of violation of law, security E:\FR\FM\30JYN1.SGM 30JYN1 41090 Federal Register / Vol. 86, No. 144 / Friday, July 30, 2021 / Notices policies, security procedures, or acceptable use policies. These records assist DOJ and external federal agency subscribers with tracking and documenting actual or suspected incidents, which may, in limited circumstances, include records of individuals reporting, or otherwise associated with, an actual or suspected incident. In accordance with 5 U.S.C. 552a(r), the Department has provided a report to OMB and Congress on this new system of records. Dated: July 20, 2021. Peter A. Winn, Acting Chief Privacy and Civil Liberties Officer, United States Department of Justice. Justice/JMD–026 SYSTEM NAME AND NUMBER: Security Monitoring and Analytics Service Records, JUSTICE/JMD–026. SECURITY CLASSIFICATION: Controlled Unclassified Information. lotter on DSK11XQN23PROD with NOTICES1 SYSTEM LOCATION: Records will be maintained electronically at Department of Justice offices, other sites utilized by the Department of Justice, and in information technology, information systems, or networks owned, operated by, or operated on behalf of the Department of Justice. Most records will be maintained electronically at one or more of the Department’s Core Enterprise Facilities (CEF), including, but not limited to: CEF East, Clarksburg, WV 26306; CEF West, Pocatello, ID 83201; or CEF–DC, Sterling, VA 20164. In the future, records may also be maintained by a Department-authorized cloud service provider if the Department decides that so doing will provide increased security and accessibility. In that event, any servers would be maintained within the Continental United States and the name and address of the Department-authorized cloud service provider will be made public, and for purposes of individual access and amendment, the location of the records will continue to be at the address listed above. Some or all system information may also be duplicated at other locations where the Department has granted direct access to support DOJ System Manager operations, system backup, emergency preparedness, and/or continuity of operations. For more specific information about the location of records maintained in this system of records, contact the system manager using the contact information listed in the ‘‘SYSTEM MANAGER(S)’’ paragraph, below. VerDate Sep<11>2014 17:24 Jul 29, 2021 Jkt 253001 SYSTEM MANAGER(S): DOJ Chief Information Security Officer, (202) 514–3101, 145 N Street NE, Washington, DC 20530. AUTHORITY FOR MAINTENANCE OF THE SYSTEM: The Federal Information Security Modernization Act of 2014, 44 U.S.C. 3551 et seq.; The Economy Act of 1932, as amended, 31 U.S.C.1535; Executive Order No. 13800, Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure (2017). PURPOSE(S) OF THE SYSTEM: The Department of Justice (DOJ) Security Monitoring and Analytics Service (SMAS) provides DOJ-managed cybersecurity services to external federal agency subscribers, giving subscribers the technical capability to protect their information, information technologies, information systems, and networks from malicious or accidental threats. SMAS enables the identification and evaluation of suspicious, unauthorized, or anomalous activity and/or vulnerabilities. Records in this system of records are used by system administrators and security personnel, or persons authorized to assist these personnel, for the purpose of: Reviewing and analyzing subscriber information and subscriber information system activity and access events for indications of inappropriate, unusual, or abnormal activity; tracking, documenting, and handling actual or suspected cybersecurity events and incidents; identifying and managing vulnerabilities; supporting audit reviews, analyses, reporting requirements, and after-the-fact investigations of cybersecurity events and incidents; planning and managing system services; and otherwise performing their official duties. Authorized personnel may use the records in this system for the purpose of investigating improper access or other improper activity related to information system access; and referring such record(s) to external federal agency subscribers. CATEGORIES OF INDIVIDUALS COVERED BY THE SYSTEM: A. SMAS authorized users, including DOJ employees, DOJ contractors, and employees and contractors of external federal agency subscribers with authorized access to SMAS to perform analysis on collected information; and B. The categories of individuals covered by this system encompass all individuals who are provided external federal agency subscriber information technology monitored by SMAS, who access external federal agency PO 00000 Frm 00089 Fmt 4703 Sfmt 4703 subscriber information systems monitored by SMAS, or who transmit information across external federal agency subscriber networks monitored by SMAS. Such individuals may include: (1) Individuals who use external federal agency subscriber information technology, information systems, and/or networks to send or receive information or related communications, access internet sites, or access any external federal agency subscriber information technologies, information systems, or information; (2) individuals from outside the external federal agency subscriber who communicate electronically with subscriber users, information technologies, information systems, and/ or networks; (3) individuals reporting, tracking, documenting and/or otherwise associated with actual or suspected cybersecurity incident and/or event activities; and (4) any individuals who attempt to access external federal agency subscriber information technologies, information systems, and/ or networks, with or without authorization. CATEGORIES OF RECORDS IN THE SYSTEM: Records in this system of records may include: A. Access and activity logs that establish what type of event occurred, when an event occurred, where an event occurred, the source of an event, the outcome of an event, and the identity of any individuals or subjects associated with an event. Such information includes, but is not limited to: Time stamps recording the data and time of access or activity; source and destination addresses; user, device, and process identifiers, including internet Protocol (IP) address, Media Access Control (MAC) address, and event descriptions; success/fail indications; filenames involved; full text recording of privileged commands; and/or access control or flow control rules invoked. Such information may be collected and aggregated by the operating system or application software locally within an information technology, information system, or network. B. Information relating to any individuals accessing an external federal agency subscriber’s information, information technologies, information systems, or networks monitored by SMAS. This includes: User names; persistent identifiers (such as a User ID); contact information, such as title, office, component, and agency; and the authorization of an individual’s access to systems, files, or applications, such as signed consent forms or Rules of Behavior forms, or access authentication E:\FR\FM\30JYN1.SGM 30JYN1 lotter on DSK11XQN23PROD with NOTICES1 Federal Register / Vol. 86, No. 144 / Friday, July 30, 2021 / Notices information (including but not limited to passwords, challenge questions/ answers used to confirm/validate a user’s identity, and other authentication factors). C. Records on the use of electronic mail, instant messaging, other chat services, electronic call detail information (including name, originating/receiving numbers, duration, and date/time of call), and electronic voicemail on an external federal agency subscriber’s information technologies, information systems, or networks monitored by SMAS. D. Records of internet access from any information technology connected to an external federal agency subscriber’s information system or network monitored by SMAS, or through authorized connections to external federal agency subscriber’s networks and information systems monitored by SMAS, including the IP address of the information technology being used to initiate the internet connection and the information accessed. E. Audit reviews, analyses, and reporting, including but not limited to, audits that result from monitoring of account usage, remote access, wireless connectivity, mobile device connection, configuration settings, system component inventory, physical access, and communications at the boundaries of information systems monitored by SMAS. F. Actual or suspected incident or event report information, including but not limited to: Information related to individuals reporting, tracking, documenting, and/or otherwise associated with a cybersecurity incident and/or event; information related to reporting, tracking, investigating, and/or addressing an incident or event (e.g., data/time of the incident or event; location of incident or event; type of incident or event; storage medium information; safeguard information; external/internal entity report tracking; data elements associated with the incident or event; information on individuals impacted; information on information system(s) impacted; remediation, response, or notification actions; lessons learned; risk of harm and compliance assessments); and information related to discovering, testing, reporting, tracking, investigating, and/or addressing a security vulnerability or indicator of a security vulnerability. RECORD SOURCE CATEGORIES: Records covered by this system of records are generated internally (i.e., information technology, information system, and/or network activity logs), VerDate Sep<11>2014 17:24 Jul 29, 2021 Jkt 253001 manually sourced from agency personnel, or sourced directly from the individual to whom the record pertains. ROUTINE USES OF RECORDS MAINTAINED IN THE SYSTEM, INCLUDING CATEGORIES OF USERS AND THE PURPOSES OF SUCH USES: In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside the Department as a routine use pursuant to 5 U.S.C. 552a(b)(3) under the circumstances or for the purposes described below, to the extent such disclosures are compatible with the purposes for which the information was collected: A. To an organization or individual in both the public or private sector where there is reason to believe the recipient is or could become the target of a particular criminal activity or conspiracy or other threat, to the extent the information is relevant to the protection of life, health, or property. Information may be similarly disclosed to other recipients who share the same interests as the target or who may be able to assist in protecting against or responding to the activity or conspiracy. B. To appropriate officials and employees of a federal agency for which the Department is authorized to provide a service, when disclosed in accordance with an interagency agreement and when necessary to accomplish an agency function articulated in the interagency agreement. C. To any person(s) or appropriate Federal, state, local, territorial, tribal, or foreign law enforcement authority authorized to assist in an approved investigation of or relating to the improper usage of DOJ information technologies, information systems, and/ or networks. D. To any person, organization, or governmental entity in order to notify them of a serious terrorist threat for the purpose of guarding against or responding to such a threat. E. To Federal, state, local, territorial, tribal, foreign, or international licensing agencies or associations which require information concerning the suitability or eligibility of an individual for a license or permit. F. Where a record, either alone or in conjunction with other information, indicates a violation or potential violation of law—criminal, civil, or regulatory in nature—the relevant records may be referred to the appropriate Federal, state, local, territorial, tribal, or foreign law enforcement authority or other appropriate entity charged with the PO 00000 Frm 00090 Fmt 4703 Sfmt 4703 41091 responsibility for investigating or prosecuting such violation or charged with enforcing or implementing such law. G. To complainants and/or victims to the extent necessary to provide such persons with information and explanations concerning the progress and/or results of the investigation or case arising from the matters of which they complained and/or of which they were a victim. H. To any person or entity that the Department has reason to believe possesses information regarding a matter within the jurisdiction of the Department, to the extent deemed to be necessary by the Department in order to elicit such information or cooperation from the recipient for use in the performance of an authorized activity. I. In an appropriate proceeding before a court, grand jury, or administrative or adjudicative body, when the Department of Justice determines that the records are arguably relevant to the proceeding; or in an appropriate proceeding before an administrative or adjudicative body when the adjudicator determines the records to be relevant to the proceeding. J. To an actual or potential party to litigation or the party’s authorized representative for the purpose of negotiation or discussion of such matters as settlement, plea bargaining, or in informal discovery proceedings. K. To the news media and the public, including disclosures pursuant to 28 CFR 50.2, unless it is determined that release of the specific information in the context of a particular case would constitute an unwarranted invasion of personal privacy. L. To contractors, grantees, experts, consultants, students, and others performing or working on a contract, service, grant, cooperative agreement, interagency agreement, or other assignment for the Federal government, when necessary to accomplish an agency function related to this system of records. M. To designated officers and employees of state, local, territorial, or tribal law enforcement or detention agencies in connection with the hiring or continued employment of an employee or contractor, where the employee or contractor would occupy or occupies a position of public trust as a law enforcement officer or detention officer having direct contact with the public or with prisoners or detainees, to the extent that the information is relevant and necessary to the recipient agency’s decision. N. To appropriate officials and employees of a federal agency or entity E:\FR\FM\30JYN1.SGM 30JYN1 lotter on DSK11XQN23PROD with NOTICES1 41092 Federal Register / Vol. 86, No. 144 / Friday, July 30, 2021 / Notices that requires information relevant to a decision concerning the hiring, appointment, or retention of an employee; the issuance, renewal, suspension, or revocation of a security clearance; the execution of a security or suitability investigation; the letting of a contract; or the issuance of a grant or benefit. O. To a former employee of the Department for purposes of: Responding to an official inquiry by a federal, state, or local government entity or professional licensing authority, in accordance with applicable Department regulations; or facilitating communications with a former employee that may be necessary for personnel-related or other official purposes where the Department requires information and/or consultation assistance from the former employee regarding a matter within that person’s former area of responsibility. P. To a Member of Congress or staff acting upon the Member’s behalf when the Member or staff requests the information on behalf of, and at the request of, the individual who is the subject of the record. Q. To the National Archives and Records Administration for purposes of records management inspections conducted under the authority of 44 U.S.C. 2904 and 2906. R. To appropriate agencies, entities, and persons when (1) the Department suspects or has confirmed that there has been a breach of the system of records; (2) the Department has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, the Department (including its information systems, programs, and operations), the Federal Government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with the Department’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm. S. To another federal agency or entity, when the Department determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the Federal Government, or national security, resulting from a suspected or confirmed breach. T. To any agency, organization, or individual for the purpose of performing authorized audit or oversight operations VerDate Sep<11>2014 17:24 Jul 29, 2021 Jkt 253001 of DOJ, and meeting related reporting requirements. U. To such recipients and under such circumstances and procedures as are mandated by federal statute or treaty. POLICIES AND PRACTICES FOR STORAGE OF RECORDS: Records are maintained in electronic storage media, in accordance with the safeguards mentioned below. POLICIES AND PRACTICES FOR RETRIEVAL OF RECORDS: Data shared with the external agency subscriber consists of report(s) on the automated alerts generated by the tools or manually collected through the hotline. At the request of the external agency subscriber, DOJ can provide custom reports, which may be grouped by username, host name, IP address or another key indicator. Records may be retrieved by identifying characteristics as part of information system security monitoring, cybersecurity incident response, user activity monitoring, or in support of other security activity. POLICIES AND PRACTICES FOR RETENTION AND DISPOSAL OF RECORDS: Records in this system are retained and disposed of in accordance with the schedule approved by the Archivist of the United States, General Records Schedule 3.2: Information Systems Security Records, Transmittal No. 26 September 2016, item 010–062 and General Records Schedule 5.6: Security Records, Transmittal No. 31 April 2020, item 210–240, for records created and maintained by federal agencies related to protecting the security of information technology systems and data, and responding to computer security incidents. Log data is maintained in Logging as a Service as the DOJ’s repository for 365 days. ADMINISTRATIVE, TECHNICAL, AND PHYSICAL SAFEGUARDS: Information in this system is safeguarded in accordance with appropriate laws, rules, and policies, including the Department’s automated systems security and access policies and Interconnection Security Agreements (ISAs) with the federal agency subscribers. Access to such information is limited to Department personnel, contractors, and other personnel who have an official need for access in order to perform their duties. Records are maintained in an access-controlled area, with direct access permitted to only authorized personnel. Electronic records are accessed only by authorized personnel with accounts on the Department’s network. Additionally, direct access to certain information may PO 00000 Frm 00091 Fmt 4703 Sfmt 4703 be restricted depending on a user’s role and responsibility within the organization and system. Any electronic data that contains personally identifiable information will be encrypted in accordance with applicable National Institute of Standards and Technology standards when transferred between DOJ and the subscriber agency. RECORD ACCESS PROCEDURES: A request for access to a record from this system of records must be submitted in writing and comply with 28 CFR part 16, and should be sent by mail to the Justice Management Division, ATTN: FOIA Contact, Room 1111, Robert F. Kennedy Department of Justice Building, 950 Pennsylvania Avenue NW, Washington, DC 20530– 0001, or by email at JMDFOIA@ usdoj.gov. The envelope and letter should be clearly marked ‘‘Privacy Act Access Request.’’ The request should include a general description of the records sought, and must include the requester’s full name, current address, and date and place of birth. The request must be signed and dated and either notarized or submitted under penalty of perjury. While no specific form is required, requesters may obtain a form (Form DOJ–361) for use in certification of identity from the FOIA/Privacy Act Mail Referral Unit, Justice Management Division, United States Department of Justice, 950 Pennsylvania Avenue NW, Washington, DC 20530–0001, or from the Department’s website at https:// www.justice.gov/oip/forms/cert_ind.pdf. Some information may be exempt from the access provisions as described in the ‘‘EXEMPTIONS PROMULGATED FOR THE SYSTEM’’ paragraph, below. An individual who is the subject of a record in this system may access any stored records that are not exempt from the access provisions. A determination whether a record may be accessed will be made at the time a request is received. CONTESTING RECORD PROCEDURES: Individuals seeking to contest or amend information maintained in the system should direct their requests to the address indicated in the ‘‘RECORD ACCESS PROCEDURES’’ section, above. The envelope and letter should be clearly marked ‘‘Privacy Act Amendment Request.’’ The request must comply with 28 CFR 16.46, and state clearly and concisely what information is being contested, the reasons for contesting it, and the proposed amendment to the information sought. Some information may be exempt from the amendment provisions as described E:\FR\FM\30JYN1.SGM 30JYN1 Federal Register / Vol. 86, No. 144 / Friday, July 30, 2021 / Notices in the ‘‘EXEMPTIONS PROMULGATED FOR THE SYSTEM’’ paragraph, below. An individual who is the subject of a record in this system may seek amendment of those records that are not exempt. A determination whether a record may be amended will be made at the time a request is received. NOTIFICATION PROCEDURES: Individuals may be notified if a record in this system of records pertains to them when the individuals request information utilizing the same procedures as those identified in the ‘‘RECORD ACCESS PROCEDURES’’ paragraph, above. EXEMPTIONS PROMULGATED FOR THE SYSTEM: The Attorney General will promulgate regulations exempting this system of records from subsections (c)(3), (d), (e)(1), (e)(4)(G), (H), and (I) and (f) of the Privacy Act of 1974, as amended, pursuant to 5 U.S.C. 552a(k)(2). These exemptions apply only to the extent that information in the system of records is subject to exemption, pursuant to 5 U.S.C. 552a(k)(2). The Department is in the process of promulgating regulations in accordance with the requirements of 5 U.S.C. 553(b), (c), and (e), that will be published in the Federal Register. HISTORY: None. [FR Doc. 2021–15883 Filed 7–29–21; 8:45 am] BILLING CODE 4410–NW–P DEPARTMENT OF JUSTICE 2021 Survey of Campus Law Enforcement Agencies (SCLEA); Correction Office of Justice Programs, Department of Justice. ACTION: Notice; correction. AGENCY: The Bureau of Justice Statistics, Office of Justice Programs, Department of Justice, submitted a 30day notice for publication in the Federal Register of July 23, 2021 soliciting comments to an information collection request to the Office of Management and Budget (OMB) for review and approval in accordance with the Paperwork Reduction Act of 1995. The document contained incorrect information. FOR FURTHER INFORMATION CONTACT: Elizabeth Davis, Statistician, Bureau of Justice Statistics, 810 Seventh Street NW, Washington, DC 20531 (email: Elizabeth.davis@usdoj.gov; telephone: 202–305–2667). SUPPLEMENTARY INFORMATION: lotter on DSK11XQN23PROD with NOTICES1 SUMMARY: VerDate Sep<11>2014 17:24 Jul 29, 2021 Jkt 253001 Correction In the Federal Register of July 23, 2021, in FR Doc 2021–15716, on page 39078, in the second column, correct the estimated number of respondents to read 2,067 and the total estimated burden for the collection to 2,067 hours. Dated: July 23, 2021. Melody Braswell, Department Clearance Officer for PRA, U.S. Department of Justice. [FR Doc. 2021–16077 Filed 7–29–21; 8:45 am] BILLING CODE 4410–18–P DEPARTMENT OF JUSTICE [OMB Number 1122–0016] Agency Information Collection Activities; Proposed eCollection eComments Requested; Extension of a Currently Approved Collection Office on Violence Against Women, Department of Justice. ACTION: 60-Day notice. AGENCY: The Office on Violence Against Women (OVW), Department of Justice, will be submitting the following information collection request to the Office of Management and Budget (OMB) for review and approval in accordance with the Paperwork Reduction Act of 1995. DATES: Comments are encouraged and will be accepted for 60 days until September 28, 2021. ADDRESSES: Written comments and recommendations for the proposed information collection should be sent within 30 days of publication of this notice to www.reginfo.gov/public/do/ PRAMain. Find this particular information collection by selecting ‘‘Currently under 30-day Review—Open for Public Comments’’ or by using the search function. SUPPLEMENTARY INFORMATION: Written comments and suggestions from the public and affected agencies concerning the proposed collection of information are encouraged. Your comments should address one or more of the following four points: (1) Evaluate whether the proposed collection of information is necessary for the proper performance of the functions of the agency, including whether the information will have practical utility; (2) evaluate the accuracy of the agency’s estimate of the burden of the proposed collection of information, including the validity of the methodology and assumptions used; SUMMARY: PO 00000 Frm 00092 Fmt 4703 Sfmt 4703 41093 (3) Enhance the quality, utility, and clarity of the information to be collected; and (4) Minimize the burden of the collection of information on those who are to respond, including through the use of appropriate automated, electronic, mechanical, or other technological collection techniques or other forms of information technology, e.g., permitting electronic submission of responses. Overview of This Information Collection (1) Type of Information Collection: Revision to Currently Approved Collection. (2) Title of the Form/Collection: SemiAnnual Progress Report for Grantees of the Transitional Housing Assistance Grant Program. (3) Agency form number, if any, and the applicable component of the Department of Justice sponsoring the collection: Form Number: 1122–0016. U.S. Department of Justice, Office on Violence Against Women (4) Affected public who will be asked or required to respond, as well as a brief abstract: The affected public includes the approximately 120 grantees of the Transitional Housing Assistance Grant Program (Transitional Housing Program) whose eligibility is determined by statute. This discretionary grant program provides transitional housing, short-term housing assistance, and related support services for individuals who are homeless, or in need of transitional housing or other housing assistance, as a result of fleeing a situation of domestic violence, dating violence, sexual assault, or stalking, and for whom emergency shelter services or other crisis intervention services are unavailable or insufficient. Eligible applicants are States, units of local government, Indian tribal governments, and other organizations, including domestic violence and sexual assault victim services providers, domestic violence or sexual assault coalitions, other nonprofit, nongovernmental organizations, or community-based and culturally specific organizations, that have a documented history of effective work concerning domestic violence, dating violence, sexual assault, or stalking. (5) An estimate of the total number of respondents and the amount of time estimated for an average respondent to respond/reply: It is estimated that it will take the 120 respondents (grantees) approximately one hour to complete the Semi-Annual Progress Report. The semiannual progress report is divided into sections that pertain to the different E:\FR\FM\30JYN1.SGM 30JYN1

Agencies

[Federal Register Volume 86, Number 144 (Friday, July 30, 2021)]
[Notices]
[Pages 41089-41093]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2021-15883]


-----------------------------------------------------------------------

DEPARTMENT OF JUSTICE

[CPCLO Order No. 007-2021]


Privacy Act of 1974; Systems of Records

AGENCY: Justice Management Division, United States Department of 
Justice.

ACTION: Notice of a new system of records.

-----------------------------------------------------------------------

SUMMARY: Pursuant to the Privacy Act of 1974 and Office of Management 
and Budget (OMB) Circular No. A-108, notice is hereby given that the 
Justice Management Division (JMD), a component within the United States 
Department of Justice (DOJ or Department), proposes to develop a new 
system of records titled Security Monitoring and Analytics Service 
Records, JUSTICE/JMD-026. JMD proposes to establish this system of 
records to provide external federal agency subscribers with the 
technical capability to protect their data from malicious or accidental 
threats using DOJ-managed systems.

DATES: In accordance with 5 U.S.C. 552a(e)(4) and (11), this notice is 
effective upon publication, subject to a 30-day period in which to 
comment on the routine uses, described below. Please submit any 
comments by August 30, 2021.

ADDRESSES: The public, OMB, and Congress are invited to submit any 
comments: By mail to the United States Department of Justice, Office of 
Privacy and Civil Liberties, ATTN: Privacy Analyst, 145 N St. NE, Suite 
8W.300, Washington, DC 20530; by facsimile at 202-307-0693; or by email 
at [email protected]. To ensure proper handling, please 
reference the above CPCLO Order No. on your correspondence.

FOR FURTHER INFORMATION CONTACT: Nickolous Ward, DOJ Chief Information 
Security Officer, (202) 514-3101, 145 N Street NE, Washington, DC 
20530.

SUPPLEMENTARY INFORMATION: In accordance with the Federal Information 
Security Modernization Act of 2014, among other authorities, agencies 
are responsible for complying with information security policies and 
procedures requiring information security protections commensurate with 
the risk and magnitude of harm resulting from the unauthorized access, 
use, disclosure, disruption, modification, or destruction of agency 
information and information systems. See, e.g., 44 U.S.C. 3554 (2018). 
Executive Order No. 13800, Strengthening the Cybersecurity of Federal 
Networks and Critical Infrastructure (May 2017), directs agency heads 
to show preference in their procurement for shared information 
technology (IT) services, to the extent permitted by law, including 
email, cloud, and cybersecurity services. Office of Management and 
Budget (OMB) Memorandum M-19-16, Centralized Mission Support 
Capabilities for the Federal Government (April 26, 2019), establishes 
the framework for implementing ``Sharing Quality Services'' across 
agencies. The Economy Act of 1932; 31 U.S.C. 1535, authorizes agencies 
to enter into agreements to obtain supplies or services from another 
agency.
    Consistent with these authorities, the JMD, Office of the Chief 
Information Officer (OCIO), Cybersecurity Services Staff (CSS), 
developed the Security Monitoring and Analytics Service (SMAS) system 
to provide DOJ-managed IT service offerings to other federal agencies 
wishing to leverage DOJ's cybersecurity services, referred to as 
``external federal agency subscribers.'' SMAS has a suite of technology 
products, which consists of a range of commercial off-the-shelf (COTS) 
software that provide insight into the subscribers' operating 
environment. SMAS capabilities include, but are not limited to, asset 
discovery, vulnerability assessment, Network Intrusion Detection System 
(NIDS), Endpoint Detection and Response (EDR), and Security Information 
and Event Management (SIEM) event correlation and log management. SMAS 
also offers User Behavior Analytics (UBA) and User Activity Monitoring 
(UAM) tools to correlate security events, as part of the service 
offering. SMAS enables the identification and evaluation of suspicious, 
unauthorized, or anomalous activity that may indicate malicious 
behavior and activity. DOJ provides this information directly to 
external federal agency subscribers for review and further evaluation. 
JMD monitors user activities and captures and stores files that might 
be related to suspicious, unauthorized, or anomalous activities. JMD 
ensures that possible security events or incidents are accurately 
identified, analyzed, guarded against, investigated, and shared with 
the external federal agency subscriber via secure means of 
communication (e.g., encrypted email).
    JMD established the system of records, Security Monitoring and 
Analytics Service Records, JUSTICE/JMD-026, to cover records maintained 
by JMD while utilizing SMAS for its external federal agency 
subscribers. Specifically, JMD tracks external federal agency 
subscriber's IT, information system, and/or network activity, including 
any access by users to any IT, information systems, and/or networks, 
whether authorized or unauthorized. Consistent with these requirements, 
JMD must ensure that it maintains accurate audit and activity records 
of the observable occurrences on external federal agency subscriber 
information systems and networks (also referred to as ``events'') that 
are significant and relevant to the security of the external federal 
agency subscriber's information and information systems. These audit 
and activity records may include, but are not limited to, information 
that establishes what type of event occurred, when the event occurred, 
where the event occurred, the source of the event, the outcome of the 
event, and the identity of any individuals or subjects associated with 
the event. These records assist DOJ and external federal agency 
subscribers with protecting subscribers' data and ensuring the secure 
operation of IT, information systems, and networks.
    Additionally, monitored events--whether detected utilizing 
information systems maintaining audit and activity records, reported to 
the Department or external federal agency subscriber by information 
system users, or reported to the Department or the external federal 
agency subscriber by the cybersecurity research community or members of 
the general public conducting good faith vulnerability discovery 
activities--may constitute occurrences that (1) actually or imminently 
jeopardize, without lawful authority, the integrity, confidentiality, 
or availability of information or an information system; or (2) 
constitute a violation or imminent threat of violation of law, security

[[Page 41090]]

policies, security procedures, or acceptable use policies. These 
records assist DOJ and external federal agency subscribers with 
tracking and documenting actual or suspected incidents, which may, in 
limited circumstances, include records of individuals reporting, or 
otherwise associated with, an actual or suspected incident.
    In accordance with 5 U.S.C. 552a(r), the Department has provided a 
report to OMB and Congress on this new system of records.

    Dated: July 20, 2021.
Peter A. Winn,
Acting Chief Privacy and Civil Liberties Officer, United States 
Department of Justice.
Justice/JMD-026

SYSTEM NAME AND NUMBER:
    Security Monitoring and Analytics Service Records, JUSTICE/JMD-026.

SECURITY CLASSIFICATION:
    Controlled Unclassified Information.

SYSTEM LOCATION:
    Records will be maintained electronically at Department of Justice 
offices, other sites utilized by the Department of Justice, and in 
information technology, information systems, or networks owned, 
operated by, or operated on behalf of the Department of Justice. Most 
records will be maintained electronically at one or more of the 
Department's Core Enterprise Facilities (CEF), including, but not 
limited to: CEF East, Clarksburg, WV 26306; CEF West, Pocatello, ID 
83201; or CEF-DC, Sterling, VA 20164. In the future, records may also 
be maintained by a Department-authorized cloud service provider if the 
Department decides that so doing will provide increased security and 
accessibility. In that event, any servers would be maintained within 
the Continental United States and the name and address of the 
Department-authorized cloud service provider will be made public, and 
for purposes of individual access and amendment, the location of the 
records will continue to be at the address listed above.
    Some or all system information may also be duplicated at other 
locations where the Department has granted direct access to support DOJ 
System Manager operations, system backup, emergency preparedness, and/
or continuity of operations. For more specific information about the 
location of records maintained in this system of records, contact the 
system manager using the contact information listed in the ``SYSTEM 
MANAGER(S)'' paragraph, below.

SYSTEM MANAGER(S):
    DOJ Chief Information Security Officer, (202) 514-3101, 145 N 
Street NE, Washington, DC 20530.

AUTHORITY FOR MAINTENANCE OF THE SYSTEM:
    The Federal Information Security Modernization Act of 2014, 44 
U.S.C. 3551 et seq.; The Economy Act of 1932, as amended, 31 
U.S.C.1535; Executive Order No. 13800, Strengthening the Cybersecurity 
of Federal Networks and Critical Infrastructure (2017).

PURPOSE(S) OF THE SYSTEM:
    The Department of Justice (DOJ) Security Monitoring and Analytics 
Service (SMAS) provides DOJ-managed cybersecurity services to external 
federal agency subscribers, giving subscribers the technical capability 
to protect their information, information technologies, information 
systems, and networks from malicious or accidental threats. SMAS 
enables the identification and evaluation of suspicious, unauthorized, 
or anomalous activity and/or vulnerabilities. Records in this system of 
records are used by system administrators and security personnel, or 
persons authorized to assist these personnel, for the purpose of: 
Reviewing and analyzing subscriber information and subscriber 
information system activity and access events for indications of 
inappropriate, unusual, or abnormal activity; tracking, documenting, 
and handling actual or suspected cybersecurity events and incidents; 
identifying and managing vulnerabilities; supporting audit reviews, 
analyses, reporting requirements, and after-the-fact investigations of 
cybersecurity events and incidents; planning and managing system 
services; and otherwise performing their official duties. Authorized 
personnel may use the records in this system for the purpose of 
investigating improper access or other improper activity related to 
information system access; and referring such record(s) to external 
federal agency subscribers.

CATEGORIES OF INDIVIDUALS COVERED BY THE SYSTEM:
    A. SMAS authorized users, including DOJ employees, DOJ contractors, 
and employees and contractors of external federal agency subscribers 
with authorized access to SMAS to perform analysis on collected 
information; and
    B. The categories of individuals covered by this system encompass 
all individuals who are provided external federal agency subscriber 
information technology monitored by SMAS, who access external federal 
agency subscriber information systems monitored by SMAS, or who 
transmit information across external federal agency subscriber networks 
monitored by SMAS. Such individuals may include: (1) Individuals who 
use external federal agency subscriber information technology, 
information systems, and/or networks to send or receive information or 
related communications, access internet sites, or access any external 
federal agency subscriber information technologies, information 
systems, or information; (2) individuals from outside the external 
federal agency subscriber who communicate electronically with 
subscriber users, information technologies, information systems, and/or 
networks; (3) individuals reporting, tracking, documenting and/or 
otherwise associated with actual or suspected cybersecurity incident 
and/or event activities; and (4) any individuals who attempt to access 
external federal agency subscriber information technologies, 
information systems, and/or networks, with or without authorization.

CATEGORIES OF RECORDS IN THE SYSTEM:
    Records in this system of records may include:
    A. Access and activity logs that establish what type of event 
occurred, when an event occurred, where an event occurred, the source 
of an event, the outcome of an event, and the identity of any 
individuals or subjects associated with an event. Such information 
includes, but is not limited to: Time stamps recording the data and 
time of access or activity; source and destination addresses; user, 
device, and process identifiers, including internet Protocol (IP) 
address, Media Access Control (MAC) address, and event descriptions; 
success/fail indications; filenames involved; full text recording of 
privileged commands; and/or access control or flow control rules 
invoked. Such information may be collected and aggregated by the 
operating system or application software locally within an information 
technology, information system, or network.
    B. Information relating to any individuals accessing an external 
federal agency subscriber's information, information technologies, 
information systems, or networks monitored by SMAS. This includes: User 
names; persistent identifiers (such as a User ID); contact information, 
such as title, office, component, and agency; and the authorization of 
an individual's access to systems, files, or applications, such as 
signed consent forms or Rules of Behavior forms, or access 
authentication

[[Page 41091]]

information (including but not limited to passwords, challenge 
questions/answers used to confirm/validate a user's identity, and other 
authentication factors).
    C. Records on the use of electronic mail, instant messaging, other 
chat services, electronic call detail information (including name, 
originating/receiving numbers, duration, and date/time of call), and 
electronic voicemail on an external federal agency subscriber's 
information technologies, information systems, or networks monitored by 
SMAS.
    D. Records of internet access from any information technology 
connected to an external federal agency subscriber's information system 
or network monitored by SMAS, or through authorized connections to 
external federal agency subscriber's networks and information systems 
monitored by SMAS, including the IP address of the information 
technology being used to initiate the internet connection and the 
information accessed.
    E. Audit reviews, analyses, and reporting, including but not 
limited to, audits that result from monitoring of account usage, remote 
access, wireless connectivity, mobile device connection, configuration 
settings, system component inventory, physical access, and 
communications at the boundaries of information systems monitored by 
SMAS.
    F. Actual or suspected incident or event report information, 
including but not limited to: Information related to individuals 
reporting, tracking, documenting, and/or otherwise associated with a 
cybersecurity incident and/or event; information related to reporting, 
tracking, investigating, and/or addressing an incident or event (e.g., 
data/time of the incident or event; location of incident or event; type 
of incident or event; storage medium information; safeguard 
information; external/internal entity report tracking; data elements 
associated with the incident or event; information on individuals 
impacted; information on information system(s) impacted; remediation, 
response, or notification actions; lessons learned; risk of harm and 
compliance assessments); and information related to discovering, 
testing, reporting, tracking, investigating, and/or addressing a 
security vulnerability or indicator of a security vulnerability.

RECORD SOURCE CATEGORIES:
    Records covered by this system of records are generated internally 
(i.e., information technology, information system, and/or network 
activity logs), manually sourced from agency personnel, or sourced 
directly from the individual to whom the record pertains.

ROUTINE USES OF RECORDS MAINTAINED IN THE SYSTEM, INCLUDING CATEGORIES 
OF USERS AND THE PURPOSES OF SUCH USES:
    In addition to those disclosures generally permitted under 5 U.S.C. 
552a(b) of the Privacy Act, all or a portion of the records or 
information contained in this system may be disclosed outside the 
Department as a routine use pursuant to 5 U.S.C. 552a(b)(3) under the 
circumstances or for the purposes described below, to the extent such 
disclosures are compatible with the purposes for which the information 
was collected:
    A. To an organization or individual in both the public or private 
sector where there is reason to believe the recipient is or could 
become the target of a particular criminal activity or conspiracy or 
other threat, to the extent the information is relevant to the 
protection of life, health, or property. Information may be similarly 
disclosed to other recipients who share the same interests as the 
target or who may be able to assist in protecting against or responding 
to the activity or conspiracy.
    B. To appropriate officials and employees of a federal agency for 
which the Department is authorized to provide a service, when disclosed 
in accordance with an interagency agreement and when necessary to 
accomplish an agency function articulated in the interagency agreement.
    C. To any person(s) or appropriate Federal, state, local, 
territorial, tribal, or foreign law enforcement authority authorized to 
assist in an approved investigation of or relating to the improper 
usage of DOJ information technologies, information systems, and/or 
networks.
    D. To any person, organization, or governmental entity in order to 
notify them of a serious terrorist threat for the purpose of guarding 
against or responding to such a threat.
    E. To Federal, state, local, territorial, tribal, foreign, or 
international licensing agencies or associations which require 
information concerning the suitability or eligibility of an individual 
for a license or permit.
    F. Where a record, either alone or in conjunction with other 
information, indicates a violation or potential violation of law--
criminal, civil, or regulatory in nature--the relevant records may be 
referred to the appropriate Federal, state, local, territorial, tribal, 
or foreign law enforcement authority or other appropriate entity 
charged with the responsibility for investigating or prosecuting such 
violation or charged with enforcing or implementing such law.
    G. To complainants and/or victims to the extent necessary to 
provide such persons with information and explanations concerning the 
progress and/or results of the investigation or case arising from the 
matters of which they complained and/or of which they were a victim.
    H. To any person or entity that the Department has reason to 
believe possesses information regarding a matter within the 
jurisdiction of the Department, to the extent deemed to be necessary by 
the Department in order to elicit such information or cooperation from 
the recipient for use in the performance of an authorized activity.
    I. In an appropriate proceeding before a court, grand jury, or 
administrative or adjudicative body, when the Department of Justice 
determines that the records are arguably relevant to the proceeding; or 
in an appropriate proceeding before an administrative or adjudicative 
body when the adjudicator determines the records to be relevant to the 
proceeding.
    J. To an actual or potential party to litigation or the party's 
authorized representative for the purpose of negotiation or discussion 
of such matters as settlement, plea bargaining, or in informal 
discovery proceedings.
    K. To the news media and the public, including disclosures pursuant 
to 28 CFR 50.2, unless it is determined that release of the specific 
information in the context of a particular case would constitute an 
unwarranted invasion of personal privacy.
    L. To contractors, grantees, experts, consultants, students, and 
others performing or working on a contract, service, grant, cooperative 
agreement, interagency agreement, or other assignment for the Federal 
government, when necessary to accomplish an agency function related to 
this system of records.
    M. To designated officers and employees of state, local, 
territorial, or tribal law enforcement or detention agencies in 
connection with the hiring or continued employment of an employee or 
contractor, where the employee or contractor would occupy or occupies a 
position of public trust as a law enforcement officer or detention 
officer having direct contact with the public or with prisoners or 
detainees, to the extent that the information is relevant and necessary 
to the recipient agency's decision.
    N. To appropriate officials and employees of a federal agency or 
entity

[[Page 41092]]

that requires information relevant to a decision concerning the hiring, 
appointment, or retention of an employee; the issuance, renewal, 
suspension, or revocation of a security clearance; the execution of a 
security or suitability investigation; the letting of a contract; or 
the issuance of a grant or benefit.
    O. To a former employee of the Department for purposes of: 
Responding to an official inquiry by a federal, state, or local 
government entity or professional licensing authority, in accordance 
with applicable Department regulations; or facilitating communications 
with a former employee that may be necessary for personnel-related or 
other official purposes where the Department requires information and/
or consultation assistance from the former employee regarding a matter 
within that person's former area of responsibility.
    P. To a Member of Congress or staff acting upon the Member's behalf 
when the Member or staff requests the information on behalf of, and at 
the request of, the individual who is the subject of the record.
    Q. To the National Archives and Records Administration for purposes 
of records management inspections conducted under the authority of 44 
U.S.C. 2904 and 2906.
    R. To appropriate agencies, entities, and persons when (1) the 
Department suspects or has confirmed that there has been a breach of 
the system of records; (2) the Department has determined that as a 
result of the suspected or confirmed breach there is a risk of harm to 
individuals, the Department (including its information systems, 
programs, and operations), the Federal Government, or national 
security; and (3) the disclosure made to such agencies, entities, and 
persons is reasonably necessary to assist in connection with the 
Department's efforts to respond to the suspected or confirmed breach or 
to prevent, minimize, or remedy such harm.
    S. To another federal agency or entity, when the Department 
determines that information from this system of records is reasonably 
necessary to assist the recipient agency or entity in (1) responding to 
a suspected or confirmed breach or (2) preventing, minimizing, or 
remedying the risk of harm to individuals, the recipient agency or 
entity (including its information systems, programs, and operations), 
the Federal Government, or national security, resulting from a 
suspected or confirmed breach.
    T. To any agency, organization, or individual for the purpose of 
performing authorized audit or oversight operations of DOJ, and meeting 
related reporting requirements.
    U. To such recipients and under such circumstances and procedures 
as are mandated by federal statute or treaty.

POLICIES AND PRACTICES FOR STORAGE OF RECORDS:
    Records are maintained in electronic storage media, in accordance 
with the safeguards mentioned below.

POLICIES AND PRACTICES FOR RETRIEVAL OF RECORDS:
    Data shared with the external agency subscriber consists of 
report(s) on the automated alerts generated by the tools or manually 
collected through the hotline. At the request of the external agency 
subscriber, DOJ can provide custom reports, which may be grouped by 
username, host name, IP address or another key indicator. Records may 
be retrieved by identifying characteristics as part of information 
system security monitoring, cybersecurity incident response, user 
activity monitoring, or in support of other security activity.

POLICIES AND PRACTICES FOR RETENTION AND DISPOSAL OF RECORDS:
    Records in this system are retained and disposed of in accordance 
with the schedule approved by the Archivist of the United States, 
General Records Schedule 3.2: Information Systems Security Records, 
Transmittal No. 26 September 2016, item 010-062 and General Records 
Schedule 5.6: Security Records, Transmittal No. 31 April 2020, item 
210-240, for records created and maintained by federal agencies related 
to protecting the security of information technology systems and data, 
and responding to computer security incidents. Log data is maintained 
in Logging as a Service as the DOJ's repository for 365 days.

ADMINISTRATIVE, TECHNICAL, AND PHYSICAL SAFEGUARDS:
    Information in this system is safeguarded in accordance with 
appropriate laws, rules, and policies, including the Department's 
automated systems security and access policies and Interconnection 
Security Agreements (ISAs) with the federal agency subscribers. Access 
to such information is limited to Department personnel, contractors, 
and other personnel who have an official need for access in order to 
perform their duties. Records are maintained in an access-controlled 
area, with direct access permitted to only authorized personnel. 
Electronic records are accessed only by authorized personnel with 
accounts on the Department's network. Additionally, direct access to 
certain information may be restricted depending on a user's role and 
responsibility within the organization and system. Any electronic data 
that contains personally identifiable information will be encrypted in 
accordance with applicable National Institute of Standards and 
Technology standards when transferred between DOJ and the subscriber 
agency.

RECORD ACCESS PROCEDURES:
    A request for access to a record from this system of records must 
be submitted in writing and comply with 28 CFR part 16, and should be 
sent by mail to the Justice Management Division, ATTN: FOIA Contact, 
Room 1111, Robert F. Kennedy Department of Justice Building, 950 
Pennsylvania Avenue NW, Washington, DC 20530-0001, or by email at 
[email protected]. The envelope and letter should be clearly marked 
``Privacy Act Access Request.'' The request should include a general 
description of the records sought, and must include the requester's 
full name, current address, and date and place of birth. The request 
must be signed and dated and either notarized or submitted under 
penalty of perjury. While no specific form is required, requesters may 
obtain a form (Form DOJ-361) for use in certification of identity from 
the FOIA/Privacy Act Mail Referral Unit, Justice Management Division, 
United States Department of Justice, 950 Pennsylvania Avenue NW, 
Washington, DC 20530-0001, or from the Department's website at https://www.justice.gov/oip/forms/cert_ind.pdf. Some information may be exempt 
from the access provisions as described in the ``EXEMPTIONS PROMULGATED 
FOR THE SYSTEM'' paragraph, below. An individual who is the subject of 
a record in this system may access any stored records that are not 
exempt from the access provisions. A determination whether a record may 
be accessed will be made at the time a request is received.

CONTESTING RECORD PROCEDURES:
    Individuals seeking to contest or amend information maintained in 
the system should direct their requests to the address indicated in the 
``RECORD ACCESS PROCEDURES'' section, above. The envelope and letter 
should be clearly marked ``Privacy Act Amendment Request.'' The request 
must comply with 28 CFR 16.46, and state clearly and concisely what 
information is being contested, the reasons for contesting it, and the 
proposed amendment to the information sought. Some information may be 
exempt from the amendment provisions as described

[[Page 41093]]

in the ``EXEMPTIONS PROMULGATED FOR THE SYSTEM'' paragraph, below. An 
individual who is the subject of a record in this system may seek 
amendment of those records that are not exempt. A determination whether 
a record may be amended will be made at the time a request is received.

NOTIFICATION PROCEDURES:
    Individuals may be notified if a record in this system of records 
pertains to them when the individuals request information utilizing the 
same procedures as those identified in the ``RECORD ACCESS PROCEDURES'' 
paragraph, above.

EXEMPTIONS PROMULGATED FOR THE SYSTEM:
    The Attorney General will promulgate regulations exempting this 
system of records from subsections (c)(3), (d), (e)(1), (e)(4)(G), (H), 
and (I) and (f) of the Privacy Act of 1974, as amended, pursuant to 5 
U.S.C. 552a(k)(2). These exemptions apply only to the extent that 
information in the system of records is subject to exemption, pursuant 
to 5 U.S.C. 552a(k)(2). The Department is in the process of 
promulgating regulations in accordance with the requirements of 5 
U.S.C. 553(b), (c), and (e), that will be published in the Federal 
Register.

HISTORY:
    None.

[FR Doc. 2021-15883 Filed 7-29-21; 8:45 am]
BILLING CODE 4410-NW-P


This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.