Privacy Act of 1974; System of Records, 77085-77088 [2022-27356]
Download as PDF
Federal Register / Vol. 87, No. 241 / Friday, December 16, 2022 / Notices
policies, and procedures, including all
applicable DoD automated systems
security and access policies. DoD
policies require the use of controls to
minimize the risk of compromise of
personally identifiable information (PII)
in paper and electronic form and to
enforce access by those with a need to
know and with appropriate clearances.
Additionally, DoD has established
security audit and accountability
policies and procedures which support
the safeguarding of PII and detection of
potential PII incidents. DoD routinely
employs safeguards such as the
following to information systems and
paper recordkeeping systems:
Multifactor log-in authentication
including Common Access Card (CAC)
authentication and password; physical
token as required; physical and
technological access controls governing
access to data; network encryption to
protect data transmitted over the
network; disk encryption securing disks
storing data; key management services
to safeguard encryption keys; masking
of sensitive data as practicable;
mandatory information assurance and
privacy training for individuals who
will have access; identification,
marking, and safeguarding of PII;
physical access safeguards including
multifactor identification physical
access controls, detection and electronic
alert systems for access to servers and
other network infrastructure; and
electronic intrusion detection systems
in DoD facilities.
Personal information maintained will
be the minimum necessary and only
used for the purposes stated in this
notice. Such information will be
retained for the minimum amount of
time, remain accessible only to
personnel with a valid operational need,
and only be used for the public health
emergency and no other purposes.
These records may be provided in
aggregate for accountability and mission
readiness purposes, as long as the
information may not be easily reidentified.
lotter on DSK11XQN23PROD with NOTICES1
Individuals seeking access to their
records should follow the procedures in
32 CFR part 310. Individuals should
address written inquiries to the DoD
component with oversight of the
records, as the component has Privacy
Act responsibilities concerning access,
amendment, and disclosure of the
records within this system of records.
The public may identify the contact
information for the appropriate DoD
office through the following website:
www.FOIA.gov. Signed written requests
should contain the name and number of
20:05 Dec 15, 2022
CONTESTING RECORD PROCEDURES:
Individuals seeking to amend or
correct the content of records about
them should follow the procedures in
32 CFR part 310.
NOTIFICATION PROCEDURES:
Individuals seeking to determine
whether information about themselves
is contained in this system of records
should follow the instructions for
Record Access Procedures above.
EXEMPTIONS PROMULGATED FOR THE SYSTEM:
The DoD has exempted records
maintained in this system from 5 U.S.C.
552a(c)(3); (d)(1), (2), (3), and (4); (e)(1);
(e)(4)(G), (H), and (I); and (f) pursuant to
5 U.S.C. 552a(k)(1). In addition, when
exempt records received from other
systems of records become part of this
system, the DoD also claims the same
exemptions for those records that are
claimed for the prior system(s) of
records of which they were a part, and
claims any additional exemptions set
forth here. An exemption rule for this
system has been promulgated in
accordance with requirements of 5
U.S.C. 553(b)(1), (2), and (3), (c) and (e),
and published in 32 CFR part 310.
HISTORY:
RECORD ACCESS PROCEDURES:
VerDate Sep<11>2014
this system of records notice along with
the full name, current address, and
email address of the individual. In
addition, the requester must provide
either a notarized statement or an
unsworn declaration made in
accordance with 28 U.S.C. 1746, in the
appropriate format:
If executed outside the United States:
‘‘I declare (or certify, verify, or state)
under penalty of perjury under the laws
of the United States of America that the
foregoing is true and correct. Executed
on (date). (Signature).’’
If executed within the United States,
its territories, possessions, or
commonwealths: ‘‘I declare (or certify,
verify, or state) under penalty of perjury
that the foregoing is true and correct.
Executed on (date). (Signature).’’
Jkt 259001
None.
[FR Doc. 2022–27150 Filed 12–15–22; 8:45 am]
BILLING CODE 5001–06–P
DEPARTMENT OF DEFENSE
Office of the Secretary
[Docket ID DoD–2022–OS–0139]
Privacy Act of 1974; System of
Records
AGENCY:
PO 00000
Department of Defense (DoD).
Frm 00029
Fmt 4703
Sfmt 4703
ACTION:
77085
Notice of a new system of
records.
In accordance with the
Privacy Act of 1974, the DoD is
establishing a new Department-wide
system of records titled, ‘‘Enterprise
Identity, Credential, and Access
Management (ICAM) Records, DoD–
0015.’’ This system of records will
support the management of individual
identity information, support the
provision of credentials to individuals
and entities to provide them access to
the DoD information services and data
they require, and support a standardized
DoD-wide process and protocol for
individual system and data access
across the enterprise to improve security
and cost savings.
DATES: This system of records is
effective upon publication; however,
comments on the Routine Uses will be
accepted on or before January 17, 2023.
The Routine Uses are effective at the
close of the comment period.
ADDRESSES: You may submit comments,
identified by docket number and title,
by either of the following methods:
* Federal Rulemaking Portal: https://
www.regulations.gov. Follow the
instructions for submitting comments.
* Mail: Department of Defense, Office
of the Assistant to the Secretary of
Defense for Privacy, Civil Liberties, and
Transparency, Regulatory Directorate,
4800 Mark Center Drive, Attn: Mailbox
24, Suite 08D09, Alexandria, VA 22350–
1700.
Instructions: All submissions received
must include the agency name and
docket number for this Federal Register
document. The general policy for
comments and other submissions from
members of the public is to make these
submissions available for public
viewing on the internet at https://
www.regulations.gov as they are
received without change, including any
personal identifiers or contact
information.
FOR FURTHER INFORMATION CONTACT: Ms.
Rahwa Keleta, Defense Privacy and Civil
Liberties Division, Directorate for
Privacy, Civil Liberties and Freedom of
Information, Office of the Assistant to
the Secretary of Defense for Privacy,
Civil Liberties, and Transparency,
Department of Defense, 4800 Mark
Center Drive, Mailbox #24, Suite 08D09,
Alexandria, VA 22350–1700;
OSD.DPCLTD@mail.mil; (703) 571–
0070.
SUPPLEMENTARY INFORMATION:
SUMMARY:
I. Background
DoD is establishing the Enterprise
Identity, Credentialing, and Access
E:\FR\FM\16DEN1.SGM
16DEN1
lotter on DSK11XQN23PROD with NOTICES1
77086
Federal Register / Vol. 87, No. 241 / Friday, December 16, 2022 / Notices
Management (ICAM) Records, DoD–
0015, as a DoD-wide Privacy Act system
of records. A DoD-wide system of
records notice (SORN) supports
multiple DoD paper or electronic
recordkeeping systems operated by
more than one DoD component that
maintain the same kind of information
about individuals for the same purpose.
Establishment of DoD-wide SORNs
helps DoD standardize the rules
governing the collection, maintenance,
use, and sharing of personal information
in key areas across the enterprise. DoDwide SORNs also reduce duplicative
and overlapping SORNs published by
separate DoD components. The creation
of DoD-wide SORNs is expected to make
locating relevant SORNs easier for DoD
personnel and the public, and create
efficiencies in the operation of the DoD
privacy program.
This system of records covers the
Department’s maintenance of records
about individual users of the DoD
network and information systems, to
create a secure and trusted environment
where users can access authorized
resources, including services,
information systems, and data, thereby
supporting mission accomplishment
while efficiently providing oversight of
DoD users on the network. There are
significant advantages in providing
ICAM services at the enterprise level,
including efficiencies in consolidating
network services; improved security;
cost savings; and enabling the creation
of digital identities for a single
individual for use across the enterprise.
The purposes of this system of records
include maintaining standardized user
access controls, which provides for
supporting users through self-service
functions, and ensuring only approved
users may access systems and data
across the DoD enterprise. ICAM more
efficiently reinforces the rules and
controls governing the collection,
maintenance, use, and sharing of
information. This SORN will reduce
duplicative efforts and overlap from
SORNs published by separate DoD
Components for solutions pursuing the
same functions.
DoD SORNs have been published in
the Federal Register and are available
from the address in FOR FURTHER
INFORMATION CONTACT or at the Defense
Privacy, Civil Liberties, and FOIA
Directorate website at https://
dpcld.defense.gov.
II. Privacy Act
Under the Privacy Act, a ‘‘system of
records’’ is a group of records under the
control of an agency from which
information is retrieved by the name of
an individual or by some identifying
VerDate Sep<11>2014
20:05 Dec 15, 2022
Jkt 259001
number, symbol, or other identifying
particulars assigned to the individual. In
the Privacy Act, an individual is defined
as a U.S. citizen or lawful permanent
resident.
In accordance with 5 U.S.C. 552a(r)
and Office of Management and Budget
(OMB) Circular No. A–108, DoD has
provided a report of this system of
records to the OMB and to Congress.
Dated: December 10, 2022.
Aaron T. Siegel,
Alternate OSD Federal Register Liaison
Officer, Department of Defense.
SYSTEM NAME AND NUMBER:
Enterprise Identity, Credential, and
Access Management (ICAM) Records,
DoD–0015.
SECURITY CLASSIFICATION:
Unclassified.
SYSTEM LOCATION:
Department of Defense (Department or
DoD), located at 1000 Defense Pentagon,
Washington, DC 20301–1000, and other
Department installations, offices, or
mission locations. Information may also
be stored within a government-certified
cloud, implemented and overseen by
the Department’s Chief Information
Officer (CIO), 6000 Defense Pentagon,
Washington, DC 20301–6000.
SYSTEM MANAGER(S):
Chief Information Officer, Department
of Defense, 6000 Defense Pentagon,
Washington, DC 20301–6000;
osd.pentagon.dod-cio.list.cio@mail.mil;
703–614–7323.
AUTHORITY FOR MAINTENANCE OF THE SYSTEM:
10 U.S.C. 2222, Defense Business
Systems: Business Process
Reengineering; Enterprise Architecture;
Management; 10 U.S.C. 2224, Defense
Information Assurance Program; 10
U.S.C. Chapter 8-Defense Agencies and
Department of Defense Field Activities;
31 U.S.C. 902, Authority and functions
of agency Chief Financial Officers;
Homeland Security Presidential
Directive (HSPD) 12, Policies for a
Common Identification Standard for
Federal Employees and Contractors,
August 27, 2004; OMB M–19–17,
Enabling Mission Delivery through
Improved Identity, Credential, and
Access Management; National Institute
of Standards and Technology (NIST)
Federal Information Processing
Standard (FIPS) 201–2, Personal
Identity Verification (PIV) of Federal
Employees and Contractors; DoD
Instruction 8320.02, Sharing Data,
Information, and Information
Technology (IT) Services in the
Department of Defense; DoD Instruction
PO 00000
Frm 00030
Fmt 4703
Sfmt 4703
8320.07, Implementing the Sharing of
Data, Information, and Information
Technology (IT) Services in the
Department of Defense; and DoD
Instruction 8520.03, Identity
Authentication for Information Systems.
PURPOSE(S) OF THE SYSTEM:
This system of records supports the
Department’s maintenance of records
about individual users of the DoD
network and information systems, to
create a secure and trusted environment
where users can access authorized
resources, including services,
information systems, and data. ICAM
more efficiently reinforces the rules and
controls governing the collection,
maintenance, use, and sharing of
information and supports the
standardization of user access controls,
self-service functions, and ensuring that
only approved users access systems and
data across the DoD enterprise. The
system creates a single user record,
consolidating all pertinent data
associated with the individual under
one account. The principal purpose of
the ICAM system is to capture and
maintain a record of names, digital
signatures, approved access, and other
identifiers from authoritative sources to
provide and maintain a record of access
management to DoD systems and
resources, to include Financial
Management and Reporting Records and
Information Systems Security records.
This information is used to provide the
following ICAM services:
A. Enables and manages the digital
flow of identity, credential, and accessmanagement data for DoD-affiliated
individuals.
B. Provides authentication to DoD
networks and resources through
common standards, shared services, and
federation.
C. Facilitates managed access to
protected resources, such as federally
managed facilities, information systems,
and data.
D. Scopes access that is necessary and
relevant to authorize the actions each
user is allowed to perform on a given
system; provides audit capability to
ensure proper access is granted.
E. Supports aligning existing account
or entitlement information from DoD
authoritative source systems to
consuming applications.
F. Provides fast, reliable, secure, and
auditable capabilities across the DoD
enterprise in a manner enhancing user
experience and supports the critical
missions.
G. Provides consistent auditing
capabilities such as monitoring and
logging to support identity analytics for
E:\FR\FM\16DEN1.SGM
16DEN1
Federal Register / Vol. 87, No. 241 / Friday, December 16, 2022 / Notices
detecting insider threats and external
attacks.
H. Enables the determination of
requirements for identification,
credentialing, authentication, and
authorization lifecycle management for
future planning and fiscal management.
CATEGORIES OF INDIVIDUALS COVERED BY THE
SYSTEM:
Individuals who have been issued
credentials for access to DoD data,
systems, or facilities which may include
uniformed services personnel, including
National Guard and Reserve
components; former members and
retirees of the uniformed services;
dependent family members of
uniformed services members; civilian
employees, contractors, and any other
DoD-‘‘affiliated’’ individuals requiring
or requesting access to DoD or DoDcontrolled information systems and/or
DoD- or DoD contractor-operated,
controlled, or secured facilities.
CATEGORIES OF RECORDS IN THE SYSTEM:
A. Personal information, such as
name, DoD Identification (ID) Number,
or other DoD-assigned student or
educational ID number, date and place
of birth, gender, citizenship, mother’s
middle/maiden name, driver’s license,
passport information, photograph, email
address(es), personal and duty phone
numbers, emergency contact
information, race and ethnic origin.
B. Employment-related information,
such as employment status, duty
position, service component, branch,
personnel classification, security
clearance, grade/rank/series, military
status, military occupational specialty,
official orders, unit of assignment,
occupation, access rights provisioned in
DoD systems and applications, DD Form
577, ‘‘Appointment/Termination
Record—Authorized Signature,’’
financial position appointed to, and
other organizational affiliation
information.
C. Course and training data, such as
examination and course completion
status.
lotter on DSK11XQN23PROD with NOTICES1
RECORD SOURCE CATEGORIES:
A. Individuals.
B. All DoD databases flowing into or
accessed through the following
integrated data systems, environments,
applications, and tools, including:
Defense Finance and Accounting
Services financial business feeder
systems, Procurement Integrated
Enterprise Environment, Defense
Manpower Data Center including the
Defense Eligibility Enrollment System
(DEERS), Defense Readiness Reporting
System (DRRS) enterprise (including
VerDate Sep<11>2014
20:05 Dec 15, 2022
Jkt 259001
DRRS-Strategic and DRRS-Army
Database), Defense Medical Logistics—
Enterprise Solution, Digital Training
Management System, Defense
Occupational and Environmental Health
Readiness System, Global Force
Management Data Initiative, Medical
Operational Data System, Force Risk
Reduction, Medical Readiness Reporting
System, Medical Health System Data
Repository, National Guard Bureau
Human/Personnel, Resource, and
Manpower Systems, National Guard
Bureau System, and commensurate data
from DoD Component systems
performing ICAM services.
ROUTINE USES OF RECORDS MAINTAINED IN THE
SYSTEM, INCLUDING CATEGORIES OF USERS AND
PURPOSES OF SUCH USES:
In addition to those disclosures
generally permitted under 5 U.S.C.
552a(b) of the Privacy Act of 1974, as
amended, all or a portion of the records
or information contained herein may
specifically be disclosed outside the
DoD as a Routine Use pursuant to 5
U.S.C. 552a(b)(3) as follows:
A. To contractors, grantees, experts,
consultants, students, and others
performing or working on a contract,
service, grant, cooperative agreement, or
other assignment for the Federal
government when necessary to
accomplish an agency function related
to this system of records.
B. To the appropriate Federal, State,
local, territorial, tribal, foreign, or
international law enforcement authority
or other appropriate entity where a
record, either alone or in conjunction
with other information, indicates a
violation or potential violation of law,
whether criminal, civil, or regulatory in
nature.
C. To any component of the
Department of Justice for the purpose of
representing the DoD, or its
components, officers, employees, or
members in pending or potential
litigation to which the record is
pertinent.
D. In an appropriate proceeding
before a court, grand jury, or
administrative or adjudicative body or
official, when the DoD or other Agency
representing the DoD determines that
the records are relevant and necessary to
the proceeding; or in an appropriate
proceeding before an administrative or
adjudicative body when the adjudicator
determines the records to be relevant to
the proceeding.
E. To the National Archives and
Records Administration for the purpose
of records management inspections
conducted under the authority of 44
U.S.C. 2904 and 2906.
PO 00000
Frm 00031
Fmt 4703
Sfmt 4703
77087
F. To a Member of Congress or staff
acting upon the Member’s behalf when
the Member or staff requests the
information on behalf of, and at the
request of, the individual who is the
subject of the record.
G. To appropriate agencies, entities,
and persons when (1) the DoD suspects
or confirms a breach of the system of
records; (2) the DoD determines as a
result of the suspected or confirmed
breach there is a risk of harm to
individuals, the DoD (including its
information systems, programs, and
operations), the Federal Government, or
national security; and (3) the disclosure
made to such agencies, entities, and
persons is reasonably necessary to assist
in connection with the DoD’s efforts to
respond to the suspected or confirmed
breach or to prevent, minimize, or
remedy such harm.
H. To another Federal agency or
Federal entity, when the DoD
determines that information from this
system of records is reasonably
necessary to assist the recipient agency
or entity in (1) responding to a
suspected or confirmed breach or (2)
preventing, minimizing, or remedying
the risk of harm to individuals, the
recipient agency or entity (including its
information systems, programs and
operations), the Federal Government, or
national security, resulting from a
suspected or confirmed breach.
I. To another Federal, State or local
agency for the purpose of comparing to
the agency’s system of records or to nonFederal records, in coordination with an
Office of Inspector General in
conducting an audit, investigation,
inspection, evaluation, or some other
review as authorized by the Inspector
General Act of 1987, as amended.
J. To such recipients and under such
circumstances and procedures as are
mandated by Federal statute or treaty.
POLICIES AND PRACTICES FOR STORAGE OF
RECORDS:
Records may be stored electronically
or on paper in secure facilities in a
locked drawer behind a locked door.
Electronic records may be stored locally
on digital media; in agency-owned
cloud environments; or in vendor Cloud
Service Offerings certified under the
Federal Risk and Authorization
Management Program (FedRAMP).
POLICIES AND PRACTICES FOR RETRIEVAL OF
RECORDS:
Records may be retrieved by
individual name, DoD ID Number, or
email address.
E:\FR\FM\16DEN1.SGM
16DEN1
77088
Federal Register / Vol. 87, No. 241 / Friday, December 16, 2022 / Notices
POLICIES AND PRACTICES FOR RETENTION AND
DISPOSAL OF RECORDS:
A. Financial Records: The DD Form
577 records are retained for six (6) years
after the final invoice or IntraGovernment Payment and Collection or
other similar documentation and then
destroyed (DAA–GRS2013–0003–0001).
B. General System Records: Records
are created as part of the user
identification and authorization process
to gain access to systems. Records are
used to monitor inappropriate systems
access by users. These records are
temporary and will be destroyed in
accordance with NARA guidance, when
business use ceases (DAA–GRS–2013–
0006–0003).
lotter on DSK11XQN23PROD with NOTICES1
ADMINISTRATIVE, TECHNICAL, AND PHYSICAL
SAFEGUARDS:
DoD safeguards records in this system
of records according to applicable rules,
policies, and procedures, including all
applicable DoD automated systems
security and access policies. DoD
policies require the use of controls to
minimize the risk of compromise of
personally identifiable information (PII)
in paper and electronic form and to
enforce access by those with a need to
know and with appropriate clearances.
Additionally, DoD has established
security audit and accountability
policies and procedures which support
the safeguarding of PII and detection of
potential PII incidents. DoD routinely
employs safeguards such as the
following to information systems and
paper recordkeeping systems:
Multifactor log-in authentication
including Common Access Card (CAC)
authentication and password; physical
token as required; physical and
technological access controls governing
access to data; network encryption to
protect data transmitted over the
network; disk encryption securing disks
storing data; key management services
to safeguard encryption keys; masking
of sensitive data as practicable;
mandatory information assurance and
privacy training for individuals who
will have access; identification,
marking, and safeguarding of PII;
physical access safeguards including
multifactor identification physical
access controls, detection and electronic
alert systems for access to servers and
other network infrastructure; and
electronic intrusion detection systems
in DoD facilities.
Individuals seeking access to their
records should follow the procedures in
32 CFR part 310. Individuals should
address written inquiries to the DoD
component with oversight of the
20:05 Dec 15, 2022
CONTESTING RECORD PROCEDURES:
Individuals seeking to amend or
correct the content of records about
them should follow the procedures in
32 CFR part 310.
NOTIFICATION PROCEDURES:
Individuals seeking to determine
whether information about themselves
is contained in this system of records
should follow the instructions for
Record Access Procedures above.
EXEMPTIONS PROMULGATED FOR THE SYSTEM:
None.
HISTORY:
None.
[FR Doc. 2022–27356 Filed 12–15–22; 8:45 am]
BILLING CODE 5001–06–P
DEPARTMENT OF DEFENSE
Office of the Secretary
[Docket ID: DoD–2022–OS–0137]
Privacy Act of 1974; System of
Records
Jkt 259001
Department of Defense (DoD).
Notice of a modified system of
AGENCY:
ACTION:
RECORD ACCESS PROCEDURES:
VerDate Sep<11>2014
records, as the component has Privacy
Act responsibilities concerning access,
amendment, and disclosure of the
records within this system of records.
The public may identify the contact
information for the appropriate DoD
office through the following website:
www.FOIA.gov. Signed written requests
should contain the name and number of
this system of records notice along with
the full name, current address,
telephone number and email address of
the individual along with the name and
number of this system of records notice.
In addition, the requester must provide
either a notarized statement or an
unsworn declaration made in
accordance with 28 U.S.C. 1746, in the
following format:
If executed outside the United States:
‘‘I declare (or certify, verify, or state)
under penalty of perjury under the laws
of the United States of America that the
foregoing is true and correct. Executed
on (date). (Signature).’’
If executed within the United States,
its territories, possessions, or
commonwealths: ‘‘I declare (or certify,
verify, or state) under penalty of perjury
that the foregoing is true and correct.
Executed on (date). (Signature).’’
records.
In accordance with the
Privacy Act of 1974, the DoD is
modifying, renumbering, and renaming
a Department-wide system of records
SUMMARY:
PO 00000
Frm 00032
Fmt 4703
Sfmt 4703
titled DoD DPR–39, ‘‘DoD Personnel
Accountability and Assessment
System.’’ This system of records is being
modified to support additional
information systems being established
within the DoD using the same
categories of data for the same purposes.
The system number is changing from
DPR–39 to DoD–0012, to reflect its
status as a DoD-wide system of records,
and the name is changing from ‘‘DoD
Personnel Accountability and
Assessment System’’ to ‘‘Defense
Accountability and Assessment
Records.’’ The DoD is also modifying
numerous sections of the notice,
including the system location, system
managers, authority for maintenance of
the system, purpose of the system,
individuals covered by the system,
record source categories, routine uses,
and notification procedures. This
system of records covers DoD’s
maintenance of records about
accountability for and status of DoDaffiliated individuals, including Military
Service members, civilian employees,
dependents and family members,
contractors, and other DoD-affiliated
personnel (including individuals in
other uniformed services performing
DoD-related assignments) in a natural or
man-made disaster, public health
emergency, similar crisis, or when
directed by the Secretary of Defense.
This system may also apply to DoD’s
maintenance of records about DoDaffiliated individuals that are necessary
to respond to anomalous health
incidents (AHIs), such as AHIs
contemplated by two sections of the
National Defense Authorization Act of
Fiscal Year 2022, when such records are
not covered by another system, such as
EDHA 07, Military Health Information
System (June 15, 2020). Additionally,
DoD is issuing a direct final rule, which
is exempting this system of records from
certain provisions of the Privacy Act,
elsewhere in today’s issue of the
Federal Register.
DATES: This system of records is
effective upon publication; however,
comments on the Routine Uses will be
accepted on or before January 17, 2023.
The Routine Uses are effective at the
close of the comment period.
ADDRESSES: You may submit comments,
identified by docket number and title,
by any of the following methods:
* Federal Rulemaking Portal: https://
www.regulations.gov. Follow the
instructions for submitting comments.
* Mail: Department of Defense, Office
of the Assistant to the Secretary of
Defense for Privacy, Civil Liberties, and
Transparency, Regulatory Directorate,
4800 Mark Center Drive, Attn: Mailbox
E:\FR\FM\16DEN1.SGM
16DEN1
Agencies
[Federal Register Volume 87, Number 241 (Friday, December 16, 2022)]
[Notices]
[Pages 77085-77088]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2022-27356]
-----------------------------------------------------------------------
DEPARTMENT OF DEFENSE
Office of the Secretary
[Docket ID DoD-2022-OS-0139]
Privacy Act of 1974; System of Records
AGENCY: Department of Defense (DoD).
ACTION: Notice of a new system of records.
-----------------------------------------------------------------------
SUMMARY: In accordance with the Privacy Act of 1974, the DoD is
establishing a new Department-wide system of records titled,
``Enterprise Identity, Credential, and Access Management (ICAM)
Records, DoD-0015.'' This system of records will support the management
of individual identity information, support the provision of
credentials to individuals and entities to provide them access to the
DoD information services and data they require, and support a
standardized DoD-wide process and protocol for individual system and
data access across the enterprise to improve security and cost savings.
DATES: This system of records is effective upon publication; however,
comments on the Routine Uses will be accepted on or before January 17,
2023. The Routine Uses are effective at the close of the comment
period.
ADDRESSES: You may submit comments, identified by docket number and
title, by either of the following methods:
* Federal Rulemaking Portal: https://www.regulations.gov. Follow
the instructions for submitting comments.
* Mail: Department of Defense, Office of the Assistant to the
Secretary of Defense for Privacy, Civil Liberties, and Transparency,
Regulatory Directorate, 4800 Mark Center Drive, Attn: Mailbox 24, Suite
08D09, Alexandria, VA 22350-1700.
Instructions: All submissions received must include the agency name
and docket number for this Federal Register document. The general
policy for comments and other submissions from members of the public is
to make these submissions available for public viewing on the internet
at https://www.regulations.gov as they are received without change,
including any personal identifiers or contact information.
FOR FURTHER INFORMATION CONTACT: Ms. Rahwa Keleta, Defense Privacy and
Civil Liberties Division, Directorate for Privacy, Civil Liberties and
Freedom of Information, Office of the Assistant to the Secretary of
Defense for Privacy, Civil Liberties, and Transparency, Department of
Defense, 4800 Mark Center Drive, Mailbox #24, Suite 08D09, Alexandria,
VA 22350-1700; [email protected]; (703) 571-0070.
SUPPLEMENTARY INFORMATION:
I. Background
DoD is establishing the Enterprise Identity, Credentialing, and
Access
[[Page 77086]]
Management (ICAM) Records, DoD-0015, as a DoD-wide Privacy Act system
of records. A DoD-wide system of records notice (SORN) supports
multiple DoD paper or electronic recordkeeping systems operated by more
than one DoD component that maintain the same kind of information about
individuals for the same purpose. Establishment of DoD-wide SORNs helps
DoD standardize the rules governing the collection, maintenance, use,
and sharing of personal information in key areas across the enterprise.
DoD-wide SORNs also reduce duplicative and overlapping SORNs published
by separate DoD components. The creation of DoD-wide SORNs is expected
to make locating relevant SORNs easier for DoD personnel and the
public, and create efficiencies in the operation of the DoD privacy
program.
This system of records covers the Department's maintenance of
records about individual users of the DoD network and information
systems, to create a secure and trusted environment where users can
access authorized resources, including services, information systems,
and data, thereby supporting mission accomplishment while efficiently
providing oversight of DoD users on the network. There are significant
advantages in providing ICAM services at the enterprise level,
including efficiencies in consolidating network services; improved
security; cost savings; and enabling the creation of digital identities
for a single individual for use across the enterprise. The purposes of
this system of records include maintaining standardized user access
controls, which provides for supporting users through self-service
functions, and ensuring only approved users may access systems and data
across the DoD enterprise. ICAM more efficiently reinforces the rules
and controls governing the collection, maintenance, use, and sharing of
information. This SORN will reduce duplicative efforts and overlap from
SORNs published by separate DoD Components for solutions pursuing the
same functions.
DoD SORNs have been published in the Federal Register and are
available from the address in FOR FURTHER INFORMATION CONTACT or at the
Defense Privacy, Civil Liberties, and FOIA Directorate website at
https://dpcld.defense.gov.
II. Privacy Act
Under the Privacy Act, a ``system of records'' is a group of
records under the control of an agency from which information is
retrieved by the name of an individual or by some identifying number,
symbol, or other identifying particulars assigned to the individual. In
the Privacy Act, an individual is defined as a U.S. citizen or lawful
permanent resident.
In accordance with 5 U.S.C. 552a(r) and Office of Management and
Budget (OMB) Circular No. A-108, DoD has provided a report of this
system of records to the OMB and to Congress.
Dated: December 10, 2022.
Aaron T. Siegel,
Alternate OSD Federal Register Liaison Officer, Department of Defense.
SYSTEM NAME AND NUMBER:
Enterprise Identity, Credential, and Access Management (ICAM)
Records, DoD-0015.
SECURITY CLASSIFICATION:
Unclassified.
SYSTEM LOCATION:
Department of Defense (Department or DoD), located at 1000 Defense
Pentagon, Washington, DC 20301-1000, and other Department
installations, offices, or mission locations. Information may also be
stored within a government-certified cloud, implemented and overseen by
the Department's Chief Information Officer (CIO), 6000 Defense
Pentagon, Washington, DC 20301-6000.
SYSTEM MANAGER(S):
Chief Information Officer, Department of Defense, 6000 Defense
Pentagon, Washington, DC 20301-6000; [email protected]; 703-614-7323.
AUTHORITY FOR MAINTENANCE OF THE SYSTEM:
10 U.S.C. 2222, Defense Business Systems: Business Process
Reengineering; Enterprise Architecture; Management; 10 U.S.C. 2224,
Defense Information Assurance Program; 10 U.S.C. Chapter 8-Defense
Agencies and Department of Defense Field Activities; 31 U.S.C. 902,
Authority and functions of agency Chief Financial Officers; Homeland
Security Presidential Directive (HSPD) 12, Policies for a Common
Identification Standard for Federal Employees and Contractors, August
27, 2004; OMB M-19-17, Enabling Mission Delivery through Improved
Identity, Credential, and Access Management; National Institute of
Standards and Technology (NIST) Federal Information Processing Standard
(FIPS) 201-2, Personal Identity Verification (PIV) of Federal Employees
and Contractors; DoD Instruction 8320.02, Sharing Data, Information,
and Information Technology (IT) Services in the Department of Defense;
DoD Instruction 8320.07, Implementing the Sharing of Data, Information,
and Information Technology (IT) Services in the Department of Defense;
and DoD Instruction 8520.03, Identity Authentication for Information
Systems.
PURPOSE(S) OF THE SYSTEM:
This system of records supports the Department's maintenance of
records about individual users of the DoD network and information
systems, to create a secure and trusted environment where users can
access authorized resources, including services, information systems,
and data. ICAM more efficiently reinforces the rules and controls
governing the collection, maintenance, use, and sharing of information
and supports the standardization of user access controls, self-service
functions, and ensuring that only approved users access systems and
data across the DoD enterprise. The system creates a single user
record, consolidating all pertinent data associated with the individual
under one account. The principal purpose of the ICAM system is to
capture and maintain a record of names, digital signatures, approved
access, and other identifiers from authoritative sources to provide and
maintain a record of access management to DoD systems and resources, to
include Financial Management and Reporting Records and Information
Systems Security records. This information is used to provide the
following ICAM services:
A. Enables and manages the digital flow of identity, credential,
and access-management data for DoD-affiliated individuals.
B. Provides authentication to DoD networks and resources through
common standards, shared services, and federation.
C. Facilitates managed access to protected resources, such as
federally managed facilities, information systems, and data.
D. Scopes access that is necessary and relevant to authorize the
actions each user is allowed to perform on a given system; provides
audit capability to ensure proper access is granted.
E. Supports aligning existing account or entitlement information
from DoD authoritative source systems to consuming applications.
F. Provides fast, reliable, secure, and auditable capabilities
across the DoD enterprise in a manner enhancing user experience and
supports the critical missions.
G. Provides consistent auditing capabilities such as monitoring and
logging to support identity analytics for
[[Page 77087]]
detecting insider threats and external attacks.
H. Enables the determination of requirements for identification,
credentialing, authentication, and authorization lifecycle management
for future planning and fiscal management.
CATEGORIES OF INDIVIDUALS COVERED BY THE SYSTEM:
Individuals who have been issued credentials for access to DoD
data, systems, or facilities which may include uniformed services
personnel, including National Guard and Reserve components; former
members and retirees of the uniformed services; dependent family
members of uniformed services members; civilian employees, contractors,
and any other DoD-``affiliated'' individuals requiring or requesting
access to DoD or DoD-controlled information systems and/or DoD- or DoD
contractor-operated, controlled, or secured facilities.
CATEGORIES OF RECORDS IN THE SYSTEM:
A. Personal information, such as name, DoD Identification (ID)
Number, or other DoD-assigned student or educational ID number, date
and place of birth, gender, citizenship, mother's middle/maiden name,
driver's license, passport information, photograph, email address(es),
personal and duty phone numbers, emergency contact information, race
and ethnic origin.
B. Employment-related information, such as employment status, duty
position, service component, branch, personnel classification, security
clearance, grade/rank/series, military status, military occupational
specialty, official orders, unit of assignment, occupation, access
rights provisioned in DoD systems and applications, DD Form 577,
``Appointment/Termination Record--Authorized Signature,'' financial
position appointed to, and other organizational affiliation
information.
C. Course and training data, such as examination and course
completion status.
RECORD SOURCE CATEGORIES:
A. Individuals.
B. All DoD databases flowing into or accessed through the following
integrated data systems, environments, applications, and tools,
including:
Defense Finance and Accounting Services financial business feeder
systems, Procurement Integrated Enterprise Environment, Defense
Manpower Data Center including the Defense Eligibility Enrollment
System (DEERS), Defense Readiness Reporting System (DRRS) enterprise
(including DRRS-Strategic and DRRS-Army Database), Defense Medical
Logistics--Enterprise Solution, Digital Training Management System,
Defense Occupational and Environmental Health Readiness System, Global
Force Management Data Initiative, Medical Operational Data System,
Force Risk Reduction, Medical Readiness Reporting System, Medical
Health System Data Repository, National Guard Bureau Human/Personnel,
Resource, and Manpower Systems, National Guard Bureau System, and
commensurate data from DoD Component systems performing ICAM services.
ROUTINE USES OF RECORDS MAINTAINED IN THE SYSTEM, INCLUDING CATEGORIES
OF USERS AND PURPOSES OF SUCH USES:
In addition to those disclosures generally permitted under 5 U.S.C.
552a(b) of the Privacy Act of 1974, as amended, all or a portion of the
records or information contained herein may specifically be disclosed
outside the DoD as a Routine Use pursuant to 5 U.S.C. 552a(b)(3) as
follows:
A. To contractors, grantees, experts, consultants, students, and
others performing or working on a contract, service, grant, cooperative
agreement, or other assignment for the Federal government when
necessary to accomplish an agency function related to this system of
records.
B. To the appropriate Federal, State, local, territorial, tribal,
foreign, or international law enforcement authority or other
appropriate entity where a record, either alone or in conjunction with
other information, indicates a violation or potential violation of law,
whether criminal, civil, or regulatory in nature.
C. To any component of the Department of Justice for the purpose of
representing the DoD, or its components, officers, employees, or
members in pending or potential litigation to which the record is
pertinent.
D. In an appropriate proceeding before a court, grand jury, or
administrative or adjudicative body or official, when the DoD or other
Agency representing the DoD determines that the records are relevant
and necessary to the proceeding; or in an appropriate proceeding before
an administrative or adjudicative body when the adjudicator determines
the records to be relevant to the proceeding.
E. To the National Archives and Records Administration for the
purpose of records management inspections conducted under the authority
of 44 U.S.C. 2904 and 2906.
F. To a Member of Congress or staff acting upon the Member's behalf
when the Member or staff requests the information on behalf of, and at
the request of, the individual who is the subject of the record.
G. To appropriate agencies, entities, and persons when (1) the DoD
suspects or confirms a breach of the system of records; (2) the DoD
determines as a result of the suspected or confirmed breach there is a
risk of harm to individuals, the DoD (including its information
systems, programs, and operations), the Federal Government, or national
security; and (3) the disclosure made to such agencies, entities, and
persons is reasonably necessary to assist in connection with the DoD's
efforts to respond to the suspected or confirmed breach or to prevent,
minimize, or remedy such harm.
H. To another Federal agency or Federal entity, when the DoD
determines that information from this system of records is reasonably
necessary to assist the recipient agency or entity in (1) responding to
a suspected or confirmed breach or (2) preventing, minimizing, or
remedying the risk of harm to individuals, the recipient agency or
entity (including its information systems, programs and operations),
the Federal Government, or national security, resulting from a
suspected or confirmed breach.
I. To another Federal, State or local agency for the purpose of
comparing to the agency's system of records or to non-Federal records,
in coordination with an Office of Inspector General in conducting an
audit, investigation, inspection, evaluation, or some other review as
authorized by the Inspector General Act of 1987, as amended.
J. To such recipients and under such circumstances and procedures
as are mandated by Federal statute or treaty.
POLICIES AND PRACTICES FOR STORAGE OF RECORDS:
Records may be stored electronically or on paper in secure
facilities in a locked drawer behind a locked door. Electronic records
may be stored locally on digital media; in agency-owned cloud
environments; or in vendor Cloud Service Offerings certified under the
Federal Risk and Authorization Management Program (FedRAMP).
POLICIES AND PRACTICES FOR RETRIEVAL OF RECORDS:
Records may be retrieved by individual name, DoD ID Number, or
email address.
[[Page 77088]]
POLICIES AND PRACTICES FOR RETENTION AND DISPOSAL OF RECORDS:
A. Financial Records: The DD Form 577 records are retained for six
(6) years after the final invoice or Intra-Government Payment and
Collection or other similar documentation and then destroyed (DAA-
GRS2013-0003-0001).
B. General System Records: Records are created as part of the user
identification and authorization process to gain access to systems.
Records are used to monitor inappropriate systems access by users.
These records are temporary and will be destroyed in accordance with
NARA guidance, when business use ceases (DAA-GRS-2013-0006-0003).
ADMINISTRATIVE, TECHNICAL, AND PHYSICAL SAFEGUARDS:
DoD safeguards records in this system of records according to
applicable rules, policies, and procedures, including all applicable
DoD automated systems security and access policies. DoD policies
require the use of controls to minimize the risk of compromise of
personally identifiable information (PII) in paper and electronic form
and to enforce access by those with a need to know and with appropriate
clearances. Additionally, DoD has established security audit and
accountability policies and procedures which support the safeguarding
of PII and detection of potential PII incidents. DoD routinely employs
safeguards such as the following to information systems and paper
recordkeeping systems: Multifactor log-in authentication including
Common Access Card (CAC) authentication and password; physical token as
required; physical and technological access controls governing access
to data; network encryption to protect data transmitted over the
network; disk encryption securing disks storing data; key management
services to safeguard encryption keys; masking of sensitive data as
practicable; mandatory information assurance and privacy training for
individuals who will have access; identification, marking, and
safeguarding of PII; physical access safeguards including multifactor
identification physical access controls, detection and electronic alert
systems for access to servers and other network infrastructure; and
electronic intrusion detection systems in DoD facilities.
RECORD ACCESS PROCEDURES:
Individuals seeking access to their records should follow the
procedures in 32 CFR part 310. Individuals should address written
inquiries to the DoD component with oversight of the records, as the
component has Privacy Act responsibilities concerning access,
amendment, and disclosure of the records within this system of records.
The public may identify the contact information for the appropriate DoD
office through the following website: www.FOIA.gov. Signed written
requests should contain the name and number of this system of records
notice along with the full name, current address, telephone number and
email address of the individual along with the name and number of this
system of records notice. In addition, the requester must provide
either a notarized statement or an unsworn declaration made in
accordance with 28 U.S.C. 1746, in the following format:
If executed outside the United States: ``I declare (or certify,
verify, or state) under penalty of perjury under the laws of the United
States of America that the foregoing is true and correct. Executed on
(date). (Signature).''
If executed within the United States, its territories, possessions,
or commonwealths: ``I declare (or certify, verify, or state) under
penalty of perjury that the foregoing is true and correct. Executed on
(date). (Signature).''
CONTESTING RECORD PROCEDURES:
Individuals seeking to amend or correct the content of records
about them should follow the procedures in 32 CFR part 310.
NOTIFICATION PROCEDURES:
Individuals seeking to determine whether information about
themselves is contained in this system of records should follow the
instructions for Record Access Procedures above.
EXEMPTIONS PROMULGATED FOR THE SYSTEM:
None.
HISTORY:
None.
[FR Doc. 2022-27356 Filed 12-15-22; 8:45 am]
BILLING CODE 5001-06-P