Privacy Act of 1974; Notice of a Modified System of Records, 70819-70822 [2022-25420]
Download as PDF
Federal Register / Vol. 87, No. 223 / Monday, November 21, 2022 / Notices
section of this
document for alternate instructions.
Instructions: Please submit comments
only and cite Information Collection
3090–0310, Nondiscrimination in
Federal Financial Assistance Programs,
GSA 3702, in all correspondence related
to this collection. Comments received
generally will be posted without change
to https://www.regulations.gov, including
any personal and/or business
confidential information provided. To
confirm receipt of your comment(s),
please check www.regulations.gov,
approximately two-to-three days after
submission to verify posting.
FOR FURTHER INFORMATION CONTACT:
Stephanie Stoltzfus Treier, Deputy
Associate Administrator, Office of Civil
Rights, at telephone 202–501–0767 or
via email to civilrights@gsa.gov.
SUPPLEMENTARY INFORMATION:
INFORMATION CONTACT
lotter on DSK11XQN23PROD with NOTICES1
A. Purpose
GSA has mission responsibilities
related to monitoring and enforcing
compliance with Federal civil rights
laws and regulations that apply to
Federal financial assistance programs
administered by GSA. Specifically,
those laws provide that no person on
the ground of race, color, national
origin, disability, sex or age shall be
excluded from participation in, be
denied the benefits of, or be otherwise
subjected to discrimination under any
program in connection with which
Federal financial assistance is extended
under laws administered in whole, or in
part, by GSA.
These mission responsibilities
generate the requirement to request and
obtain certain data from recipients of
Federal surplus property for the purpose
of determining compliance, such as the
number of individuals that speak nonEnglish languages encountered by the
recipient’s program(s) and how the
recipient is addressing meaningful
access for individuals that are Limited
English Proficient; whether the
recipients provide disability access in
compliance with applicable laws and
standards; whether there has been
complaints or lawsuits filed against the
recipient based on prohibited
discrimination; whether there has been
any findings of discrimination; and
whether the recipient’s facilities are
accessible to qualified individuals with
disabilities.
B. Annual Reporting Burden
Respondents: 1,200.
Responses per Respondent: 1.
Total Responses: 1,200.
Hours per Response: 2.
Total Burden Hours: 2,400.
VerDate Sep<11>2014
21:25 Nov 18, 2022
Jkt 259001
C. Public Comments
Public comments are particularly
invited on: Whether this collection of
information will have practical utility;
whether our estimate of the public
burden of this collection of information
is accurate, and based on valid
assumptions and methodology; ways to
enhance the quality, utility, and clarity
of the information to be collected; and
ways in which we can minimize the
burden of the collection of information
on those who are to respond, through
the use of appropriate technological
collection techniques or other forms of
information technology.
Obtaining Copies of Proposals:
Requesters may obtain a copy of the
information collection documents from
the GSA Regulatory Secretariat Division
by calling 202–501–4755 or emailing
GSARegSec@gsa.gov. Please cite OMB
Control No. 3090–0310,
Nondiscrimination in Federal Financial
Assistance Programs, GSA 3702, in all
correspondence.
Beth Anne Killoran,
Deputy Chief Information Officer.
[FR Doc. 2022–25277 Filed 11–18–22; 8:45 am]
BILLING CODE 6820–34–P
GENERAL SERVICES
ADMINISTRATION
[Notice–ID–2022–02; Docket No. 2022–0002;
Sequence No. 29]
Privacy Act of 1974; Notice of a
Modified System of Records
Office of the Chief Privacy
Officer, General Services
Administration (GSA).
ACTION: Notice of a modified system of
records.
AGENCY:
GSA proposes to modify a
system of records subject to the Privacy
Act of 1974, as amended. Login.gov is a
secure sign-in service with the
capability to authenticate and identity
proof users before the user is granted
access to participating government
websites or applications. GSA is
modifying the categories of records in
the system, the policies and practices
for retrieval and routine uses of records,
and removing outdated references to
National Institute of Standards and
Technology (NIST) technical standards.
This modification is intended to revise
and replace all notices previously
describing this system of records.
DATES: Submit comments on or before:
December 21, 2022.
ADDRESSES: Submit comments
identified by ‘‘Notice–ID–2022–02,
SUMMARY:
PO 00000
Frm 00050
Fmt 4703
Sfmt 4703
70819
Notice of Modified System of Records’’
via. Submit comments via https://
www.regulations.gov, the Federal
eRulemaking portal, by searching for
Notice–ID–2022–02, Notice of Modified
System of Records. Select the link
‘‘Comment Now’’ that corresponds with
‘‘Notice–ID–2022–02, Notice of
Modified System of Records.’’ Follow
the instructions provided on the screen.
Please include your name, company
name (if any), and ‘‘Notice–ID–2022–02,
Notice of Modified System of Records’’
on your attached document.
FOR FURTHER INFORMATION CONTACT:
Richard Speidel, Chief Privacy Officer,
GSA, by email at gsa.privacyact@gsa.gov
or by phone at 202–969–5830.
SUPPLEMENTARY INFORMATION: GSA
proposes to alter language in this system
of records to remove an outdated NIST
technical standard, and instead use
plain language to describe the system’s
authentication and identity proofing
process.
In 2019, the Office of Management
and Budget (OMB) published
Memorandum 2019–17 (M–19–17),
which withdrew Memorandum 2004–04
(M–04–04) and specified the most
recent version of NIST SP 800–63 as
authoritative for defining levels
associated with the rigor of various
digital identity related functions. OMB
directed agencies to transition from the
prior use of Levels of Assurance (LOAs)
from M–04–04 in favor of
Authentication Assurance Levels
(AALs), Identity Assurance Levels
(IALs), and Federation Assurance Levels
(FALs).
To prevent future potential
misalignment between Federal guidance
and this system of record notice
(SORN), this revision removes
references to NIST standards and
instead uses plain language descriptions
of Login.gov’s authentication and
identity proofing process. This revision
also adds categories of records and two
new routine uses related to research
studies and fraud prevention operations,
and details the records management
practices for those new records.
Specifically:
• references to Level of Assurance
(LOA) are removed because that is an
outdated NIST technical standard and
Login.gov instead uses plain language
descriptions of its authentication and
identity proofing process;
• use of records to increase coverage
and access to authentication and
identity proofing services to the public,
including studies evaluating impacts to
equitable access by identity verification.
• use of records to support fraud
prevention operations to preserve
E:\FR\FM\21NON1.SGM
21NON1
70820
Federal Register / Vol. 87, No. 223 / Monday, November 21, 2022 / Notices
integrity of the authentication and
identity proofing system.
Richard Speidel,
Chief Privacy Officer, Office of the Deputy
Chief Information Officer, General Services
Administration.
SYSTEM NAME AND NUMBER:
GSA/TTS–1 (Login.gov)
SECURITY CLASSIFICATION:
Unclassified.
SYSTEM LOCATION:
General Services Administration
owns Login.gov, which is housed in
secure data centers in the continental
United States. Contact the System
Manager listed below for additional
information.
SYSTEM MANAGER(S):
Daniel Lopez-Braus, Director,
Login.gov, TTS, Office of Solutions,
General Services Administration, 1800 F
Street NW, Washington, DC 20405.
https://www.Login.gov.
AUTHORITY FOR MAINTENANCE OF THE SYSTEM:
E-Government Act of 2002 (Pub. L.
107–347, 44 U.S.C. 3501 note), 6 U.S.C.
1523 (b)(1)(A)–(E), and 40 U.S.C. 501.
PURPOSES(S) OF THE SYSTEM:
The purposes of the system are:
• to provide a secure sign-in service
with the capability to authenticate and
identity proof users before the user is
granted access to participating
government websites or applications;
• to prevent fraud and to protect the
integrity of the Login.gov system; and
• to conduct studies into
enhancements to the secure sign-in
service, including demographic studies
of the equitable performance of new
technologies.
CATEGORIES OF INDIVIDUALS COVERED BY THE
SYSTEM:
Individuals covered by this system of
records include members of the public
seeking electronic access to a website or
application from a federal, state, or local
agency that has integrated with
Login.gov (‘‘partner agency’’) and
participants in studies commissioned by
GSA to evaluate equitable performance
of new identity verification and fraud
prevention technologies.
lotter on DSK11XQN23PROD with NOTICES1
CATEGORIES OF RECORDS IN THE SYSTEM:
The system contains information
provided by individuals who create and
use Login.gov accounts. There are two
types of accounts in the Login.gov
system: records related to the process of
authenticating a Login.gov user’s
account, and records related to the
process in which an individual’s
identity is verified.
VerDate Sep<11>2014
21:25 Nov 18, 2022
Jkt 259001
For accounts for which Login.gov is
authenticating the user, the system
collects and maintains:
• email address,
• password,
• and phone number (optionally).
For accounts that require a verified
identity, the system collects and
maintains:
• photographs of their governmentissued ID, to include all personal
information and images on the ID.
Photographs are stored in an encrypted
format, and are only accessed to
investigate suspected or confirmed
fraud;
• Social Security Number (SSN); and
• phone number or postal address.
Each third-party identity proofing
service will send information back to
Login.gov about its attempt to identity
proof the user, including:
• Transaction ID;
• pass/fail indicator;
• date/time of transaction; and
• status codes associated with the
transaction data.
Each partner agency whose services
the user accesses via Login.gov may add
its own unique identifier to that user’s
account information.
To protect the public and the integrity
of the system, Login.gov needs to detect
and prevent fraud while providing
redress to users who were unable to
complete identity verification. To that
end, Login.gov will also obtain a
collection of information about the
device (a ‘‘Device ID’’) including, for
example browser type and internet
protocol (IP) address) and usage patterns
(e.g., keyboard, mouse, or touchscreen
behavior) used to access their Login.gov
account. The Device ID and usage
patterns are assessed by a third-party
fraud prevention service along with the
other information collected by
Login.gov. The third-party fraud
prevention services provide Login.gov
risk scores for all of the information
assessed, and also provide other
identifying attributes that have been
associated with that same Device ID in
the past. Those identifying attributes
include, but are not limited to, names,
addresses, phone numbers, and SSNs
that have been associated with the
Device ID.
Separate from Login.gov’s active signon service, GSA may also conduct
studies in which it temporarily collects
information from voluntary participants
to evaluate the equitable performance of
new technologies and guide service
improvements. In addition to the
categories of records previously
described, collection of information for
studies could include, but is not limited
to:
PO 00000
Frm 00051
Fmt 4703
Sfmt 4703
• demographic information such as
race, ethnicity, gender, income, age, and
education; and
• biometric information to verify that
the applicant matches the identity
documents (e.g., a photograph or video
of the user).
RECORD SOURCE CATEGORIES:
The sources for information in the
system include individual Login.gov
users, participants in GSAcommissioned studies, third-party
identity-proofing services, partner
agencies, and third-party fraud
prevention services. Individual users
and research participants provide
information needed to authenticate
themselves, verify their identity, or
voluntarily respond to research surveys.
Each third-party identity proofing
service provides transaction details
about their attempt to identity proof a
user. Partner agencies may provide their
own unique identifier to that user’s
account information. Third party fraud
prevention services provide risk scores
and identity attributes associated with a
user’s Device ID.
ROUTINE USES OF RECORDS MAINTAINED IN THE
SYSTEM, INCLUDING CATEGORIES OF USERS AND
PURPOSES OF SUCH USES:
In addition to those disclosures
generally permitted under 5 U.S.C.
552a(b) of the Privacy Act, all or a
portion of the records or information
contained in this system may be
disclosed to authorized entities, as is
determined to be relevant and
necessary, outside GSA as a routine use
pursuant to 5 U.S.C. 552a(b)(3) as
follows:
a. To the Department of Justice or
other Federal agency conducting
litigation or in proceedings before any
court, adjudicative or administrative
body, when: (a) GSA or any component
thereof, or (b) any employee of GSA in
his/her official capacity, or (c) any
employee of GSA in his/her individual
capacity where DOJ or GSA has agreed
to represent the employee, or (d) the
United States or any agency thereof, is
a party to the litigation or has an interest
in such litigation, and GSA determines
that the records are both relevant and
necessary to the litigation.
b. To third parties providing remote
or in-person authentication and identity
proofing services, inclusive of other
federal agencies providing such
services, as necessary to authenticate
and/or identity proof an individual for
access to a participating government
website or application;
c. To an appropriate Federal, State,
tribal, local, international, or foreign law
enforcement agency or other appropriate
E:\FR\FM\21NON1.SGM
21NON1
lotter on DSK11XQN23PROD with NOTICES1
Federal Register / Vol. 87, No. 223 / Monday, November 21, 2022 / Notices
authority charged with investigating or
prosecuting a violation or enforcing or
implementing a law, rule, regulation, or
order, where a record, either on its face
or in conjunction with other
information, indicates a violation or
potential violation of law, which
includes criminal, civil, or regulatory
violations and such disclosure is proper
and consistent with the official duties of
the person making the disclosure.
d. To a Member of Congress or his or
her staff in response to a request made
on behalf of and at the request of the
individual who is the subject of the
record.
e. To the Office of Management and
Budget (OMB), Office of Inspector
General (OIG), and the Government
Accountability Office (GAO) in
accordance with their responsibilities
for evaluation or oversight of Federal
programs.
f. To an expert, consultant, or
contractor of GSA in the performance of
a federal duty to which the information
is relevant.
g. To the National Archives and
Records Administration (NARA) for
records management purposes.
h. To appropriate agencies, entities,
and persons when (1) GSA suspects or
has confirmed that there has been a
breach of the system of records; (2) GSA
has determined that as a result of the
suspected or confirmed breach there is
a risk of harm to individuals, GSA
(including its information systems,
programs and operations), the Federal
Government, or national security; and
(3) the disclosure made to such
agencies, entities, and persons is
reasonably necessary to assist in
connection with GSA’s efforts to
respond to the suspected or confirmed
breach or to prevent, minimize, or
remedy such harm.
i. To another Federal agency or
Federal entity, when GSA determines
that information from this system of
records is reasonably necessary to assist
the recipient agency or entity in (1)
responding to a suspected or confirmed
breach or (2) preventing, minimizing, or
remedying the risk of harm to
individuals, the recipient agency or
entity (including its information
systems, programs, and operations), the
Federal Government, or national
security, resulting from a suspected or
confirmed breach.
j. To the Government Publishing
Office (GPO), when Login.gov needs to
mail a user an address confirmation
form or if a user requests mailed
notifications of account changes or of
proofing attempts.
k. To other federal agencies and thirdparty fraud prevention services as
VerDate Sep<11>2014
21:25 Nov 18, 2022
Jkt 259001
necessary to detect and investigate
suspected fraud, including providing
redress to users.
l. To third-party identity proofing
services and fraud prevention services
when participating in studies
commissioned by the GSA to evaluate
the equitable performance of new
technologies and guide service
improvements.
POLICIES AND PRACTICES FOR STORAGE OF
RECORDS:
All records are stored electronically in
databases. User account information is
encrypted in transit and at rest.
POLICIES AND PRACTICES FOR RETRIEVAL OF
RECORDS:
Records retrieval practices vary based
on the type or category of record in the
system.
a. When a user logs in, Login.gov
retrieves their email and phone number
(if provided) to send the user a one-time
passcode.
b. When a user accesses a
participating government website or
application that requires the user’s
identity attributes, the following
retrieval practice occurs:
i. The user successfully logs into their
account (enabling decryption and
retrieval of certain records);
ii. Login.gov decrypts and retrieves
the user’s verified personal information
(full name, date of birth, postal address,
and Social Security Number); and
iii. Login.gov requests that the user
provide consent to share the personal
information requested by the
participating government site.
c. When a user with verified identity
is recovering access to their account, the
following retrieval practice occurs:
i. The user successfully authenticates
their account when requesting to reset
their Login.gov password;
ii. The user provides their personal
recovery code (enabling decryption and
retrieval of the records) and selects a
new password;
iii. Login.gov retrieves the user’s
verified personal information (full
name, date of birth, postal address, and
Social Security Number);
iv. These attributes are then encrypted
with the user’s new password.
d. When Login.gov is performing
fraud investigation and redress, the
following retrieval practices occur:
i. Only trained Login.gov fraud
operations personnel have access to
records maintained specifically for
fraud prevention purposes. This
includes Device IDs and usage patterns
associated with personal identifiers and
risk scores as described in the
Categories of Records in the System.
PO 00000
Frm 00052
Fmt 4703
Sfmt 4703
70821
ii. Login.gov fraud operations
personnel retrieve personal information
(full name, date of birth, postal address
and Social Security Number) from thirdparty identity proofing services while
completing a manual review of a user’s
identity proofing transaction.
e. When GSA is conducting studies
into enhancements to the secure sign-in
service, data from voluntary
participants’ surveys and identityproofing transactions are retrieved by
GSA and third-party contractors to
conduct statistical analysis of the
performance of new technologies. Data
from Login.gov’s active service is not
retrieved during these studies.
POLICIES AND PRACTICES FOR RETENTION AND
DISPOSAL OF RECORDS:
Retention and disposal policies and
practices vary based on the type or
category of record in the system.
a. Records related to active user
authentication and validated user
identities will be retained and disposed
of in accordance with NARA’s General
Records Schedule (GRS) 3.2
(Transmittal 26), item 31 ‘‘System
access records’’ covering user profiles,
log-in files, password files, audit trail
files and extracts, system usage files,
and cost-back files used to assess
charges for system use. The guidance
instructs, ‘‘Destroy 6 years after
password is altered or user account is
terminated, but longer retention is
authorized if required for business use.’’
b. Records related to identity
verification attempts (photographs of
government IDs, personal information
entered by the user) may be retained by
Login.gov to aid in fraud investigation,
redress, or product improvement.
c. Records related to fraud prevention
operations, such as Device IDs and user
behaviors with associated identity
attributes and risk scores, are
maintained by a third party on behalf of
GSA for up to three years.
d. For studies commissioned by GSA,
third-party proofing services will
discard any information collected
within 24 hours of collection. GSA will
maintain the information for the
duration of the study after which it will
be preserved for 6 years as required by
the GSA’s retention schedule for
Customer Research and Reporting
Records.
ADMINISTRATIVE, TECHNICAL, AND PHYSICAL
SAFEGUARDS:
Records in the system are protected
from unauthorized access and misuse
through a combination of
administrative, technical, and physical
security measures. Administrative
measures include but are not limited to
E:\FR\FM\21NON1.SGM
21NON1
70822
Federal Register / Vol. 87, No. 223 / Monday, November 21, 2022 / Notices
policies that limit system access to
individuals within an agency with a
legitimate business need, and regular
review of security procedures and best
practices to enhance security. Technical
security measures within GSA include
restrictions on computer access to
authorized individuals, required use of
passphrases and regular review of
security procedures and best practices
to enhance security. Access to the
Login.gov database is maintained behind
an industry-standard firewall and
information in the database is
encrypted. As noted above, other than
email address, neither the system nor
the system operators can retrieve the
user’s personal account information
without the user supplying a password
or recovery code. Trained and cleared
Login.gov fraud operations personnel
are able to cross-reference personal
information used by third party or
federal agency identity proofing services
to validate a user’s identity attributes as
part of a manual review of identity
proofing transactions. Records related to
studies are kept separate from records
related to Login.gov’s active users.
RECORD ACCESS PROCEDURES:
Requests for access to records should
be directed to the system manager.
Individuals seeking access to their
records in this system of records may
submit a request by following the
instructions provided in 41 CFR part
105–64, subpart 105–64.2.
CONTESTING RECORD PROCEDURES:
During identity proofing, an
individual can use the Login.gov fraud
operations redress mechanism to contest
records used by third party identity
proofing services. After identity
proofing or participating in a study,
individuals wishing to contest the
content of records about themselves
contained in this system of records
should contact the system manager at
the address above. See 41 CFR part 105–
64, subpart 105–64.4 for full details on
what to include in a Privacy Act
amendment request.
lotter on DSK11XQN23PROD with NOTICES1
NOTIFICATION PROCEDURES:
Individuals seeking notification of
any records about themselves contained
in this system of records should contact
the system manager at the address
above. Follow the procedures on
accessing records in 41 CFR part 105–
64, subpart 105–64.2 to request such
notification.
EXEMPTIONS PROMULGATED FOR THE SYSTEM:
None.
VerDate Sep<11>2014
21:25 Nov 18, 2022
Jkt 259001
HISTORY:
82 FR 6552; 82 FR 37451
[FR Doc. 2022–25420 Filed 11–18–22; 8:45 am]
BILLING CODE 6820–34–P
DEPARTMENT OF DEFENSE
GENERAL SERVICES
ADMINISTRATION
NATIONAL AERONAUTICS AND
SPACE ADMINISTRATION
[OMB Control No. 9000–0024; Docket No.
2022–0053; Sequence No. 22]
Submission for OMB Review; Buy
American, Trade Agreements, and
Duty-Free Entry
Department of Defense (DOD),
General Services Administration (GSA),
and National Aeronautics and Space
Administration (NASA).
ACTION: Notice.
AGENCY:
Under the provisions of the
Paperwork Reduction Act, the
Regulatory Secretariat Division has
submitted to the Office of Management
and Budget (OMB) a request to review
and approve a revision of a previously
approved information collection
requirement regarding Buy American,
associated with implementation of
Federal Acquisition Regulation (FAR)
rule 2021–008, Amendments to the FAR
Buy American Act Requirements.
DATES: Submit comments on or before
December 21, 2022.
ADDRESSES: Written comments and
recommendations for this information
collection should be sent within 30 days
of publication of this notice to
www.reginfo.gov/public/do/PRAMain.
Find this particular information
collection by selecting ‘‘Currently under
Review—Open for Public Comments’’ or
by using the search function.
Additionally, submit a copy to GSA
through https://www.regulations.gov
and follow the instructions on the site.
This website provides the ability to type
short comments directly into the
comment field or attach a file for
lengthier comments.
Instructions: All items submitted
must cite OMB Control No. 9000–0024,
Buy American, Trade Agreements, and
Duty-Free Entry. Comments received
generally will be posted without change
to https://www.regulations.gov,
including any personal and/or business
confidential information provided. To
confirm receipt of your comment(s),
please check www.regulations.gov,
approximately two-to-three days after
submission to verify posting. If there are
difficulties submitting comments,
SUMMARY:
PO 00000
Frm 00053
Fmt 4703
Sfmt 4703
contact the GSA Regulatory Secretariat
Division at 202–501–4755 or
GSARegSec@gsa.gov.
FOR FURTHER INFORMATION CONTACT: Ms.
Mahruba Uddowla, Procurement
Analyst, at telephone 703–605–2868, or
mahruba.uddowla@gsa.gov.
SUPPLEMENTARY INFORMATION:
A. OMB Control Number, Title, and
Any Associated Form(s)
9000–0024, Buy American, Trade
Agreements, and Duty-Free Entry.
B. Needs and Uses
This clearance covers the information
that an offeror must submit in response
to the requirements of the provisions
and clauses in Federal Acquisition
Regulation (FAR) part 25 that relate to
the following:
* The Buy American statute (41
U.S.C. chapter 83) and Executive Orders
(E.O.s) 10582 and 14005.
* The Trade Agreements Act (19
U.S.C. 2501–2515), including the World
Trade Organization Government
Procurement Agreement and various
free trade agreements.
* The American Recovery and
Reinvestment Act of 2009 (Pub. L. 111–
5) (Recovery Act).
* Subchapters VIII and X of Chapter
98 of the Harmonized Tariff Schedule of
the United States (19 U.S.C. 1202).
a. 52.225–2, Buy American Certificate.
This provision requires the offeror to
identify in its proposal supplies that do
not meet the definition of domestic end
product and whether those supplies
exceed 55% domestic content. This
provision also requires offerors to
identify in its proposal domestic end
products that contain a critical
component.
b. 52.225–4, Buy American—Free
Trade Agreements—Israeli Trade Act
Certificate. This provision requires a
separate list of foreign products that are
eligible under a trade agreement, and a
list of all other foreign end products and
whether those supplies exceed 55%
domestic content. This provision also
requires offerors to identify in its
proposal domestic end products that
contain a critical component.
c. 52.225–6, Trade Agreements
Certificate. This provision requires the
offeror to certify that all end products
are either U.S.-made or designated
country end products, except as listed
in paragraph (b) of the provision.
Offerors are not allowed to provide
other than a U.S.-made or designated
country end product, unless the
requirement is waived.
d. 52.225–8, Duty-Free Entry. This
clause requires contractors to notify the
E:\FR\FM\21NON1.SGM
21NON1
Agencies
[Federal Register Volume 87, Number 223 (Monday, November 21, 2022)]
[Notices]
[Pages 70819-70822]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2022-25420]
-----------------------------------------------------------------------
GENERAL SERVICES ADMINISTRATION
[Notice-ID-2022-02; Docket No. 2022-0002; Sequence No. 29]
Privacy Act of 1974; Notice of a Modified System of Records
AGENCY: Office of the Chief Privacy Officer, General Services
Administration (GSA).
ACTION: Notice of a modified system of records.
-----------------------------------------------------------------------
SUMMARY: GSA proposes to modify a system of records subject to the
Privacy Act of 1974, as amended. Login.gov is a secure sign-in service
with the capability to authenticate and identity proof users before the
user is granted access to participating government websites or
applications. GSA is modifying the categories of records in the system,
the policies and practices for retrieval and routine uses of records,
and removing outdated references to National Institute of Standards and
Technology (NIST) technical standards. This modification is intended to
revise and replace all notices previously describing this system of
records.
DATES: Submit comments on or before: December 21, 2022.
ADDRESSES: Submit comments identified by ``Notice-ID-2022-02, Notice of
Modified System of Records'' via. Submit comments via https://www.regulations.gov, the Federal eRulemaking portal, by searching for
Notice-ID-2022-02, Notice of Modified System of Records. Select the
link ``Comment Now'' that corresponds with ``Notice-ID-2022-02, Notice
of Modified System of Records.'' Follow the instructions provided on
the screen. Please include your name, company name (if any), and
``Notice-ID-2022-02, Notice of Modified System of Records'' on your
attached document.
FOR FURTHER INFORMATION CONTACT: Richard Speidel, Chief Privacy
Officer, GSA, by email at [email protected] or by phone at 202-
969-5830.
SUPPLEMENTARY INFORMATION: GSA proposes to alter language in this
system of records to remove an outdated NIST technical standard, and
instead use plain language to describe the system's authentication and
identity proofing process.
In 2019, the Office of Management and Budget (OMB) published
Memorandum 2019-17 (M-19-17), which withdrew Memorandum 2004-04 (M-04-
04) and specified the most recent version of NIST SP 800-63 as
authoritative for defining levels associated with the rigor of various
digital identity related functions. OMB directed agencies to transition
from the prior use of Levels of Assurance (LOAs) from M-04-04 in favor
of Authentication Assurance Levels (AALs), Identity Assurance Levels
(IALs), and Federation Assurance Levels (FALs).
To prevent future potential misalignment between Federal guidance
and this system of record notice (SORN), this revision removes
references to NIST standards and instead uses plain language
descriptions of Login.gov's authentication and identity proofing
process. This revision also adds categories of records and two new
routine uses related to research studies and fraud prevention
operations, and details the records management practices for those new
records.
Specifically:
references to Level of Assurance (LOA) are removed because
that is an outdated NIST technical standard and Login.gov instead uses
plain language descriptions of its authentication and identity proofing
process;
use of records to increase coverage and access to
authentication and identity proofing services to the public, including
studies evaluating impacts to equitable access by identity
verification.
use of records to support fraud prevention operations to
preserve
[[Page 70820]]
integrity of the authentication and identity proofing system.
Richard Speidel,
Chief Privacy Officer, Office of the Deputy Chief Information Officer,
General Services Administration.
SYSTEM NAME AND NUMBER:
GSA/TTS-1 (Login.gov)
SECURITY CLASSIFICATION:
Unclassified.
SYSTEM LOCATION:
General Services Administration owns Login.gov, which is housed in
secure data centers in the continental United States. Contact the
System Manager listed below for additional information.
SYSTEM MANAGER(S):
Daniel Lopez-Braus, Director, Login.gov, TTS, Office of Solutions,
General Services Administration, 1800 F Street NW, Washington, DC
20405. https://www.Login.gov.
AUTHORITY FOR MAINTENANCE OF THE SYSTEM:
E-Government Act of 2002 (Pub. L. 107-347, 44 U.S.C. 3501 note), 6
U.S.C. 1523 (b)(1)(A)-(E), and 40 U.S.C. 501.
PURPOSES(S) OF THE SYSTEM:
The purposes of the system are:
to provide a secure sign-in service with the capability to
authenticate and identity proof users before the user is granted access
to participating government websites or applications;
to prevent fraud and to protect the integrity of the
Login.gov system; and
to conduct studies into enhancements to the secure sign-in
service, including demographic studies of the equitable performance of
new technologies.
CATEGORIES OF INDIVIDUALS COVERED BY THE SYSTEM:
Individuals covered by this system of records include members of
the public seeking electronic access to a website or application from a
federal, state, or local agency that has integrated with Login.gov
(``partner agency'') and participants in studies commissioned by GSA to
evaluate equitable performance of new identity verification and fraud
prevention technologies.
CATEGORIES OF RECORDS IN THE SYSTEM:
The system contains information provided by individuals who create
and use Login.gov accounts. There are two types of accounts in the
Login.gov system: records related to the process of authenticating a
Login.gov user's account, and records related to the process in which
an individual's identity is verified.
For accounts for which Login.gov is authenticating the user, the
system collects and maintains:
email address,
password,
and phone number (optionally).
For accounts that require a verified identity, the system collects
and maintains:
photographs of their government-issued ID, to include all
personal information and images on the ID. Photographs are stored in an
encrypted format, and are only accessed to investigate suspected or
confirmed fraud;
Social Security Number (SSN); and
phone number or postal address.
Each third-party identity proofing service will send information
back to Login.gov about its attempt to identity proof the user,
including:
Transaction ID;
pass/fail indicator;
date/time of transaction; and
status codes associated with the transaction data.
Each partner agency whose services the user accesses via Login.gov
may add its own unique identifier to that user's account information.
To protect the public and the integrity of the system, Login.gov
needs to detect and prevent fraud while providing redress to users who
were unable to complete identity verification. To that end, Login.gov
will also obtain a collection of information about the device (a
``Device ID'') including, for example browser type and internet
protocol (IP) address) and usage patterns (e.g., keyboard, mouse, or
touchscreen behavior) used to access their Login.gov account. The
Device ID and usage patterns are assessed by a third-party fraud
prevention service along with the other information collected by
Login.gov. The third-party fraud prevention services provide Login.gov
risk scores for all of the information assessed, and also provide other
identifying attributes that have been associated with that same Device
ID in the past. Those identifying attributes include, but are not
limited to, names, addresses, phone numbers, and SSNs that have been
associated with the Device ID.
Separate from Login.gov's active sign-on service, GSA may also
conduct studies in which it temporarily collects information from
voluntary participants to evaluate the equitable performance of new
technologies and guide service improvements. In addition to the
categories of records previously described, collection of information
for studies could include, but is not limited to:
demographic information such as race, ethnicity, gender,
income, age, and education; and
biometric information to verify that the applicant matches
the identity documents (e.g., a photograph or video of the user).
RECORD SOURCE CATEGORIES:
The sources for information in the system include individual
Login.gov users, participants in GSA-commissioned studies, third-party
identity-proofing services, partner agencies, and third-party fraud
prevention services. Individual users and research participants provide
information needed to authenticate themselves, verify their identity,
or voluntarily respond to research surveys. Each third-party identity
proofing service provides transaction details about their attempt to
identity proof a user. Partner agencies may provide their own unique
identifier to that user's account information. Third party fraud
prevention services provide risk scores and identity attributes
associated with a user's Device ID.
ROUTINE USES OF RECORDS MAINTAINED IN THE SYSTEM, INCLUDING CATEGORIES
OF USERS AND PURPOSES OF SUCH USES:
In addition to those disclosures generally permitted under 5 U.S.C.
552a(b) of the Privacy Act, all or a portion of the records or
information contained in this system may be disclosed to authorized
entities, as is determined to be relevant and necessary, outside GSA as
a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows:
a. To the Department of Justice or other Federal agency conducting
litigation or in proceedings before any court, adjudicative or
administrative body, when: (a) GSA or any component thereof, or (b) any
employee of GSA in his/her official capacity, or (c) any employee of
GSA in his/her individual capacity where DOJ or GSA has agreed to
represent the employee, or (d) the United States or any agency thereof,
is a party to the litigation or has an interest in such litigation, and
GSA determines that the records are both relevant and necessary to the
litigation.
b. To third parties providing remote or in-person authentication
and identity proofing services, inclusive of other federal agencies
providing such services, as necessary to authenticate and/or identity
proof an individual for access to a participating government website or
application;
c. To an appropriate Federal, State, tribal, local, international,
or foreign law enforcement agency or other appropriate
[[Page 70821]]
authority charged with investigating or prosecuting a violation or
enforcing or implementing a law, rule, regulation, or order, where a
record, either on its face or in conjunction with other information,
indicates a violation or potential violation of law, which includes
criminal, civil, or regulatory violations and such disclosure is proper
and consistent with the official duties of the person making the
disclosure.
d. To a Member of Congress or his or her staff in response to a
request made on behalf of and at the request of the individual who is
the subject of the record.
e. To the Office of Management and Budget (OMB), Office of
Inspector General (OIG), and the Government Accountability Office (GAO)
in accordance with their responsibilities for evaluation or oversight
of Federal programs.
f. To an expert, consultant, or contractor of GSA in the
performance of a federal duty to which the information is relevant.
g. To the National Archives and Records Administration (NARA) for
records management purposes.
h. To appropriate agencies, entities, and persons when (1) GSA
suspects or has confirmed that there has been a breach of the system of
records; (2) GSA has determined that as a result of the suspected or
confirmed breach there is a risk of harm to individuals, GSA (including
its information systems, programs and operations), the Federal
Government, or national security; and (3) the disclosure made to such
agencies, entities, and persons is reasonably necessary to assist in
connection with GSA's efforts to respond to the suspected or confirmed
breach or to prevent, minimize, or remedy such harm.
i. To another Federal agency or Federal entity, when GSA determines
that information from this system of records is reasonably necessary to
assist the recipient agency or entity in (1) responding to a suspected
or confirmed breach or (2) preventing, minimizing, or remedying the
risk of harm to individuals, the recipient agency or entity (including
its information systems, programs, and operations), the Federal
Government, or national security, resulting from a suspected or
confirmed breach.
j. To the Government Publishing Office (GPO), when Login.gov needs
to mail a user an address confirmation form or if a user requests
mailed notifications of account changes or of proofing attempts.
k. To other federal agencies and third-party fraud prevention
services as necessary to detect and investigate suspected fraud,
including providing redress to users.
l. To third-party identity proofing services and fraud prevention
services when participating in studies commissioned by the GSA to
evaluate the equitable performance of new technologies and guide
service improvements.
POLICIES AND PRACTICES FOR STORAGE OF RECORDS:
All records are stored electronically in databases. User account
information is encrypted in transit and at rest.
POLICIES AND PRACTICES FOR RETRIEVAL OF RECORDS:
Records retrieval practices vary based on the type or category of
record in the system.
a. When a user logs in, Login.gov retrieves their email and phone
number (if provided) to send the user a one-time passcode.
b. When a user accesses a participating government website or
application that requires the user's identity attributes, the following
retrieval practice occurs:
i. The user successfully logs into their account (enabling
decryption and retrieval of certain records);
ii. Login.gov decrypts and retrieves the user's verified personal
information (full name, date of birth, postal address, and Social
Security Number); and
iii. Login.gov requests that the user provide consent to share the
personal information requested by the participating government site.
c. When a user with verified identity is recovering access to their
account, the following retrieval practice occurs:
i. The user successfully authenticates their account when
requesting to reset their Login.gov password;
ii. The user provides their personal recovery code (enabling
decryption and retrieval of the records) and selects a new password;
iii. Login.gov retrieves the user's verified personal information
(full name, date of birth, postal address, and Social Security Number);
iv. These attributes are then encrypted with the user's new
password.
d. When Login.gov is performing fraud investigation and redress,
the following retrieval practices occur:
i. Only trained Login.gov fraud operations personnel have access to
records maintained specifically for fraud prevention purposes. This
includes Device IDs and usage patterns associated with personal
identifiers and risk scores as described in the Categories of Records
in the System.
ii. Login.gov fraud operations personnel retrieve personal
information (full name, date of birth, postal address and Social
Security Number) from third-party identity proofing services while
completing a manual review of a user's identity proofing transaction.
e. When GSA is conducting studies into enhancements to the secure
sign-in service, data from voluntary participants' surveys and
identity-proofing transactions are retrieved by GSA and third-party
contractors to conduct statistical analysis of the performance of new
technologies. Data from Login.gov's active service is not retrieved
during these studies.
POLICIES AND PRACTICES FOR RETENTION AND DISPOSAL OF RECORDS:
Retention and disposal policies and practices vary based on the
type or category of record in the system.
a. Records related to active user authentication and validated user
identities will be retained and disposed of in accordance with NARA's
General Records Schedule (GRS) 3.2 (Transmittal 26), item 31 ``System
access records'' covering user profiles, log-in files, password files,
audit trail files and extracts, system usage files, and cost-back files
used to assess charges for system use. The guidance instructs,
``Destroy 6 years after password is altered or user account is
terminated, but longer retention is authorized if required for business
use.''
b. Records related to identity verification attempts (photographs
of government IDs, personal information entered by the user) may be
retained by Login.gov to aid in fraud investigation, redress, or
product improvement.
c. Records related to fraud prevention operations, such as Device
IDs and user behaviors with associated identity attributes and risk
scores, are maintained by a third party on behalf of GSA for up to
three years.
d. For studies commissioned by GSA, third-party proofing services
will discard any information collected within 24 hours of collection.
GSA will maintain the information for the duration of the study after
which it will be preserved for 6 years as required by the GSA's
retention schedule for Customer Research and Reporting Records.
ADMINISTRATIVE, TECHNICAL, AND PHYSICAL SAFEGUARDS:
Records in the system are protected from unauthorized access and
misuse through a combination of administrative, technical, and physical
security measures. Administrative measures include but are not limited
to
[[Page 70822]]
policies that limit system access to individuals within an agency with
a legitimate business need, and regular review of security procedures
and best practices to enhance security. Technical security measures
within GSA include restrictions on computer access to authorized
individuals, required use of passphrases and regular review of security
procedures and best practices to enhance security. Access to the
Login.gov database is maintained behind an industry-standard firewall
and information in the database is encrypted. As noted above, other
than email address, neither the system nor the system operators can
retrieve the user's personal account information without the user
supplying a password or recovery code. Trained and cleared Login.gov
fraud operations personnel are able to cross-reference personal
information used by third party or federal agency identity proofing
services to validate a user's identity attributes as part of a manual
review of identity proofing transactions. Records related to studies
are kept separate from records related to Login.gov's active users.
RECORD ACCESS PROCEDURES:
Requests for access to records should be directed to the system
manager. Individuals seeking access to their records in this system of
records may submit a request by following the instructions provided in
41 CFR part 105-64, subpart 105-64.2.
CONTESTING RECORD PROCEDURES:
During identity proofing, an individual can use the Login.gov fraud
operations redress mechanism to contest records used by third party
identity proofing services. After identity proofing or participating in
a study, individuals wishing to contest the content of records about
themselves contained in this system of records should contact the
system manager at the address above. See 41 CFR part 105-64, subpart
105-64.4 for full details on what to include in a Privacy Act amendment
request.
NOTIFICATION PROCEDURES:
Individuals seeking notification of any records about themselves
contained in this system of records should contact the system manager
at the address above. Follow the procedures on accessing records in 41
CFR part 105-64, subpart 105-64.2 to request such notification.
EXEMPTIONS PROMULGATED FOR THE SYSTEM:
None.
HISTORY:
82 FR 6552; 82 FR 37451
[FR Doc. 2022-25420 Filed 11-18-22; 8:45 am]
BILLING CODE 6820-34-P