Privacy Act of 1974; System of Records, 19317-19320 [2023-06745]

Download as PDF Federal Register / Vol. 88, No. 62 / Friday, March 31, 2023 / Notices ddrumheller on DSK120RN23PROD with NOTICES1 for any disaster or emergency. The Division conducts research to better understand effective preparedness actions and ways to motivate the public to take those actions. ICPD develops and shares preparedness resources and coordinates comprehensive disaster preparedness initiatives that empower communities to prepare for, protect against, respond to, and recover from a disaster. This mission is achieved through close coordination with the FEMA Regions and working relationships with Federal, state, local, and Tribal agencies. This includes working with nongovernmental partners from all sectors both nationally and through neighborhood-based community groups. This collection will allow ICPD to gather the following information from the public via web form(s): • Feedback: General feedback on the effectiveness of national FEMA preparedness programs and initiatives and website user experience • Activity Details: Information regarding the type, size and location of preparedness activities hosted by members of the public and community organizers • POC Information: For registration within the site and follow-on communication, if needed • Future Engagement Requests: Allow for the public to enroll in the ICPD newsletter or other public communications • Publication Ordering: Submitting requests to the FEMA publication warehouse to have materials shipped directly to members of the public Collection of Information Title: Preparedness Activity Registration and Feedback. Type of Information Collection: Extension, without change, of a currently approved information collection. OMB Number: 1660–0134. FEMA Forms: FEMA Form FF–008– FY–23–101 (formerly 008–0–8), Preparedness Activity Web Collection; FEMA Form FF–008–FY–23–102 (formerly 519–0–11), Preparedness Activity Feedback Form. Abstract: To fulfill its mission for FEMA, the Individual and Community Preparedness Division (ICPD) collects information from individuals and organizations by the Preparedness Activity Registration Form and the Preparedness Activity Feedback Form located within a public website. This collection facilitates FEMA’s ability to assess its progress for multiple programs. As new programs or initiatives are created, ICPD will VerDate Sep<11>2014 17:54 Mar 30, 2023 Jkt 259001 leverage the pre- approved questions in the question bank provided for this collection. ICPD uses this information to inform the continuous improvement of the programs and the Division’s outreach. Further, the information allows the Division to analyze seasonal trends in preparedness across the variety of programs. Raw data is not shared outside of the database; only results of the data assessment is shared. The data is used for internal reports as well as public-facing talking points. Affected Public: Individuals and Households. Estimated Number of Respondents: 86,115. Estimated Number of Responses: 86,115. Estimated Total Annual Burden Hours: 7,174. Estimated Total Annual Respondent Cost: $217,229. Estimated Respondents’ Operation and Maintenance Costs: $0. Estimated Respondents’ Capital and Start-Up Costs: $0. Estimated Total Annual Cost to the Federal Government: $13,151. Comments Comments may be submitted as indicated in the ADDRESSES caption above. Comments are solicited to (a) evaluate whether the proposed data collection is necessary for the proper performance of the agency, including whether the information shall have practical utility; (b) evaluate the accuracy of the agency’s estimate of the burden of the proposed collection of information, including the validity of the methodology and assumptions used; (c) enhance the quality, utility, and clarity of the information to be collected; and (d) minimize the burden of the collection of information on those who are to respond, including through the use of appropriate automated, electronic, mechanical, or other technological collection techniques or other forms of information technology, e.g., permitting electronic submission of responses. Millicent Brown Wilson, Records Management Branch Chief, Office of the Chief Administrative Officer, Mission Support, Federal Emergency Management Agency, Department of Homeland Security. [FR Doc. 2023–06710 Filed 3–30–23; 8:45 am] BILLING CODE 9111–27–P PO 00000 19317 DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS–2022–0042] Privacy Act of 1974; System of Records Department of Homeland Security Federal Emergency Management Agency. ACTION: Notice of a modified system of records. AGENCY: In accordance with the Privacy Act of 1974, the Department of Homeland Security (DHS) proposes to update and reissue a current system of records titled, ‘‘Department of Homeland Security/Federal Emergency Management Agency (FEMA)–012 Suspicious Activity Reporting System of Records.’’ This system of records allows DHS/FEMA to collect, maintain, and retrieve records on individuals reported as being involved in suspicious activities, individuals who report suspicious activities, and individuals charged with the analysis and appropriate handling of suspicious activity reports. DHS/FEMA is updating this system of records to (1) revise contact and administrative information associated with this system of records, (2) add to the categories of records collected, (3) modify routine uses, and (4) other non-substantive changes. This updated system will be included in DHS’s inventory of record systems. DATES: Submit comments on or before May 1, 2023. This modified system will be effective upon publication. New or modified routine uses will be effective May 1, 2023. ADDRESSES: You may submit comments, identified by docket number DHS– 2022–0042 by one of the following methods: • Federal e-Rulemaking Portal: https:// www.regulations.gov. Follow the instructions for submitting comments. • Fax: 202–343–4010. • Mail: Mason Cutter, Chief Privacy Officer, Privacy Office, Department of Homeland Security, Washington, DC, 20528–0655. Instructions: All submissions received must include the agency name and docket number DHS–2022. All comments received will be posted without change to https:// www.regulations.gov, including any personal information provided. Docket: For access to the docket to read background documents or comments received, go to https:// www.regulations.gov. SUMMARY: For general questions please contact: Tammi FOR FURTHER INFORMATION CONTACT: Frm 00080 Fmt 4703 Sfmt 4703 E:\FR\FM\31MRN1.SGM 31MRN1 19318 Federal Register / Vol. 88, No. 62 / Friday, March 31, 2023 / Notices ddrumheller on DSK120RN23PROD with NOTICES1 Hines, (202) 646–3606, FEMA-Privacy@ fema.dhs.gov, Privacy Officer, Federal Emergency Management Agency, Department of Homeland Security, Washington, DC, 20478. For privacy questions please contact: Mason Cutter, (202) 343–1717, Privacy@hq.dhs.gov, Chief Privacy Officer, Privacy Office, Department of Homeland Security, Washington, DC, 20528–0655. SUPPLEMENTARY INFORMATION: I. Background In accordance with the Privacy Act of 1974, DHS/FEMA proposes to update and reissue a current DHS/FEMA system of records titled, ‘‘DHS/FEMA– 012 Suspicious Activity Reporting System of Records.’’ FEMA’s mission is to ‘‘support our citizens and first responders to ensure that as a nation we work together to build, sustain, and improve our capability to prepare for, protect against, respond to, recover from, and mitigate all hazards.’’ In support of this mission, and to ensure the safety of its citizens and first responders, FEMA collects, maintains, and retrieves records of individuals reported as being involved in suspicious activities and of individuals who report suspicious activities. FEMA’s Office of the Chief Security Officer (OCSO), Fraud Investigations and Inspections Division (FIID) manages this process. Investigators and Analysts are assigned to complete the analysis of suspicious activity reports; they are also responsible for the appropriate handling of such reports. FEMA Suspicious Activity Reports may be shared with federal, state, local, and tribal jurisdictions with responsibility for investigating suspicious activities within their jurisdictions. FEMA Suspicious Activity Reports that have a nexus to terrorism or hazards to homeland security, as determined by FEMA FIID Investigators or Analysts, and require immediate attention are reported to the police or law enforcement agency of jurisdiction via telephone and uploaded into the Federal Bureau of Investigation’s (FBI) eGuardian system by FEMA FIID Investigators or Analysts in coordination with the agency that reported the information. All investigators and analysts who submit reports to the eGuardian system are trained in the DHS Nationwide Suspicious Activity Reports Initiative, per DHS policy. FEMA is updating this System of Records Notice to reflect the following changes: (1) the contact information for general questions and administrative information has been updated, as well as the Authority for Maintenance of the VerDate Sep<11>2014 17:54 Mar 30, 2023 Jkt 259001 System section; (2) the categories of records have been updated to clarify the information collected in suspicious activity reports; and (3) Routine Use E has been modified and Routine Use F has been added to conform to Office of Management and Budget (OMB) Memorandum M–17–12 regarding breach notification and investigation. Furthermore, non-substantive changes to simplify the formatting and text of the previously published notice and the references to FEMA’s Office of Chief Security Officer (OCSO) have been updated to identify FEMA’s Fraud Investigations and Inspections Division as the specific office responsible for suspicious activity reporting. Consistent with DHS’s information sharing mission, information stored in the DHS/FEMA–012 Suspicious Activity Reporting System of Records may be shared with other DHS components that have a need to know the information to carry out their national security, law enforcement, immigration, intelligence, or other homeland security functions. In addition, information may be shared with appropriate federal, state, local, tribal, territorial, foreign, or international government agencies consistent with the routine uses set forth in this system of records notice. This modified system will be included in DHS’s inventory of record systems. II. Privacy Act The Privacy Act embodies fair information practice principles in a statutory framework governing the means by which federal government agencies collect, maintain, use, and disseminate individuals’ records. The Privacy Act applies to information that is maintained in a ‘‘system of records.’’ A ‘‘system of records’’ is a group of any records under the control of an agency from which information is retrieved by the name of an individual or by some identifying number, symbol, or other identifying particular assigned to the individual. The Privacy Act defines ‘‘individual’’ to encompass U.S. citizens and lawful permanent residents. Additionally, the Judicial Redress Act (JRA) provides covered persons with a statutory right to make requests for access and amendment to covered records, as defined by the JRA, and judicial review of denials of such requests. In addition, the JRA prohibits disclosures of covered records, except as otherwise permitted by the Privacy Act. Below is the description of the DHS/ FEMA–12 Suspicious Activity Reporting System of Records. PO 00000 Frm 00081 Fmt 4703 Sfmt 4703 In accordance with 5 U.S.C. 552a(r), DHS has provided a report of this system of records to the Office of Management and Budget, and to Congress. SYSTEM NAME AND NUMBER: Department of Homeland Security (DHS)/Federal Emergency Management Agency (FEMA)–012 Suspicious Activity Reporting System of Records. SECURITY CLASSIFICATION: For official use only (FOUO) and law enforcement sensitive (LES). This system does not contain classified information. SYSTEM LOCATION: Records are maintained on a FEMA Exchange Server that is accesscontrolled and under the management and control of the Federal Emergency Management Agency (FEMA) Office of Chief Information Officer at FEMA Headquarters, 500 C Street SW, Washington, DC 20472. SYSTEM MANAGERS: Office of the Chief Security Officer, Fraud Investigations and Inspections Division, 500 C Street SW, Washington, DC 20472. AUTHORITY FOR MAINTENANCE OF THE SYSTEM: 42 U.S.C. 5196(d); Executive Orders 12333 and 13388; 40 U.S.C. 1315(b)(2)(F); 6 U.S.C. 314 of the Homeland Security Act of 2002, as amended; the Intelligence Reform and Terrorism Prevention Act of 2004, as amended; and the National Security Act of 1947, as amended. PURPOSE(S) OF THE SYSTEM: The purpose of this system is to collect, investigate, analyze, and report suspicious activities to the police or law enforcement agency of jurisdiction and upload the Suspicious Activity Reports into the FEMA Exchange Server in coordination with the agency that reported the information. CATEGORIES OF INDIVIDUALS COVERED BY THE SYSTEM: Categories of individuals covered by the system include individuals reported as being involved in suspicious activities, individuals who report suspicious activities, and Fraud Investigations and Inspections Division Investigators and Analysts assigned to analyze and appropriately handle suspicious activity reports. CATEGORIES OF RECORDS IN THE SYSTEM: The following fields related to individuals may be maintained in this system: E:\FR\FM\31MRN1.SGM 31MRN1 Federal Register / Vol. 88, No. 62 / Friday, March 31, 2023 / Notices • Report of the suspicious activity (e.g., description of the suspicious activity and physical descriptors of individuals involved in suspicious activity); • Case/incident number; • Name (first, middle, and last); • Address (number, street, apartment, city, and state); • Age; • Sex; • Race for subject description; • Signature (investigator, analyst, or law enforcement officer (LEO)); • Jurisdiction over the suspected activity; • Injury code (a dropdown that lists the codes in question (0–None, 1– Refused, 2–First Aid, 3–Hospital, 4– Deceased) (if applicable)); • Telephone numbers (home, business, or cell); • Other contact information (e.g., email address); and • Property information (e.g., name, quantity, serial number, brand name, model, value, year, make, color, identifying characteristics, registration information). RECORD SOURCE CATEGORIES: Records are obtained from individuals reported as being involved in suspicious activities, individuals who report suspicious activities, Fraud Investigations and Inspections Division Investigators and Analysts, commercially available systems (LexisNexis) and other federal, state, and local law enforcement agencies. ddrumheller on DSK120RN23PROD with NOTICES1 ROUTINE USES OF RECORDS MAINTAINED IN THE SYSTEM, INCLUDING CATEGORIES OF USERS AND PURPOSES OF SUCH USES: In addition to those disclosures generally permitted under 5 U.S.C. 552a(b) of the Privacy Act, all or a portion of the records or information contained in this system may be disclosed outside DHS as a routine use pursuant to 5 U.S.C. 552a(b)(3) as follows: A. To the Department of Justice (DOJ), including Offices of the U.S. Attorneys, or to another federal agency conducting litigation or in proceedings before any court, adjudicative, or administrative body, when it is relevant and necessary to the litigation and one of the following is a party to the litigation or has an interest in such litigation: 1. DHS or any component thereof; 2. Any employee or former employee of DHS in their official capacity; 3. Any employee or former employee of DHS in their individual capacity when DOJ or DHS has agreed to represent the employee; or 4. The United States or any agency thereof. VerDate Sep<11>2014 17:54 Mar 30, 2023 Jkt 259001 B. To a congressional office from the record of an individual in response to an inquiry from that congressional office made at the request of the individual to whom the record pertains. C. To the National Archives and Records Administration (NARA) or General Services Administration pursuant to records management inspections being conducted under the authority of 44 U.S.C. 2904 and 2906. D. To an agency, organization, or individual for the purpose of performing audit or oversight operations as authorized by law, but only such information as is necessary and relevant to such audit or oversight function. E. To appropriate agencies, entities, and persons when (1) DHS suspects or has confirmed that there has been a breach of the system of records; (2) DHS has determined that as a result of the suspected or confirmed breach there is a risk of harm to individuals, DHS (including its information systems, programs, and operations), the Federal Government, or national security; and (3) the disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with DHS’s efforts to respond to the suspected or confirmed breach or to prevent, minimize, or remedy such harm. F. To another federal agency or federal entity, when DHS determines that information from this system of records is reasonably necessary to assist the recipient agency or entity in (1) responding to a suspected or confirmed breach or (2) preventing, minimizing, or remedying the risk of harm to individuals, the recipient agency or entity (including its information systems, programs, and operations), the federal government, or national security, resulting from a suspected or confirmed breach. G. To an appropriate federal, state, tribal, local, international, or foreign law enforcement agency or other appropriate authority charged with investigating or prosecuting a violation or enforcing or implementing a law, rule, regulation, or order, when a record, either on its face or in conjunction with other information, indicates a violation or potential violation of law, which includes criminal, civil, or regulatory violations and such disclosure is proper and consistent with the official duties of the person making the disclosure. H. To contractors and their agents, grantees, experts, consultants, and others performing or working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary to accomplish an agency function related to this system of PO 00000 Frm 00082 Fmt 4703 Sfmt 4703 19319 records. Individuals provided information under this routine use are subject to the same Privacy Act requirements and limitations on disclosure as are applicable to DHS officers and employees. I. To an appropriate federal, state, tribal, local, international counterterrorism agencies when DHS becomes aware of an indication of a threat or potential threat to security, and when such use is to assist in counterterrorism efforts. J. To an organization or individual in either the public or private sector, either foreign or domestic, when there is a reason to believe that the recipient is or could become the target of a particular terrorist activity or conspiracy, to the extent the information is relevant to the protection of life, property, or other vital interests of a data subject and disclosure is proper and consistent with the official duties of the person making the disclosure. K. To the news media and the public, with the approval of the Chief Privacy Officer in consultation with counsel, when there exists a legitimate public interest in the disclosure of the information, when disclosure is necessary to preserve confidence in the integrity of DHS, or is necessary to demonstrate the accountability of DHS’s officers, employees, or individuals covered by the system, except to the extent it is determined that release of the specific information in the context of a particular case would constitute an unwarranted invasion of personal privacy. POLICIES AND PRACTICES FOR STORAGE OF RECORDS: DHS/FEMA stores records in this system electronically on the accesscontrolled FEMA Exchange Server. POLICIES AND PRACTICES FOR RETRIEVAL OF RECORDS: DHS/FEMA retrieves records by case/ incident number, name, address, and/or date. POLICIES AND PRACTICES FOR RETENTION AND DISPOSAL OF RECORDS: Pursuant to National Archives and Records Administration Schedule Number N1–311–99–6, Items 1, 2, and 3, files containing information or allegations that are of an investigative nature but do not relate to a specific investigation are destroyed after five (5) years. Investigative case files that involve allegations made against senior agency officials, attract significant attention in the media, attract congressional attention, result in substantive changes in agency policies and procedures, or are cited in the E:\FR\FM\31MRN1.SGM 31MRN1 19320 Federal Register / Vol. 88, No. 62 / Friday, March 31, 2023 / Notices Office of the Inspector General’s (OIG) periodic reports to Congress are cut off when the case is closed, retired to the Federal Records Center (FRC) five (5) years after cutoff, and then transferred to the National Archives and Records Administration twenty (20) years after cutoff. All other investigative case files are placed in inactive files when a case is closed, cut off at the end of fiscal year, and destroyed ten (10) years after cutoff, except those that are unusually significant for documenting major violations of criminal law or ethical standards by agency officials or others. ADMINISTRATIVE, TECHNICAL, AND PHYSICAL SAFEGUARDS: DHS/FEMA safeguards records in this system in accordance with applicable rules and policies, including all applicable DHS systems security and access policies. DHS/FEMA imposes strict controls to minimize the risk of compromising the information that is being stored. Access to the computer system containing the records in this system is limited to those who have a need to know the information for the performance of their official duties and who have appropriate clearances or permissions. ddrumheller on DSK120RN23PROD with NOTICES1 RECORD ACCESS PROCEDURES: The Secretary of Homeland Security has exempted this system from the notification, access, and amendment procedures of the Privacy Act because it is a law enforcement system. However, DHS/FEMA will consider individual requests to determine whether information may be released. Thus, individuals seeking access to and notification of any record contained in this system of records, or seeking to contest its content, may submit a request in writing to the Chief Privacy Officer and FEMA’s Freedom of Information Act (FOIA) Officer whose contact information can be found at https://www.dhs.gov/foia under ‘‘Contact Information.’’ If an individual believes more than one component maintains Privacy Act records concerning them, the individual may submit the request to the Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, Washington, DC 20528–0655, or electronically at https://www.dhs.gov/ dhs-foia-privacy-act-requestsubmission-form. Even if neither the Privacy Act nor the Judicial Redress Act provide a right of access, certain records about you may be available under the Freedom of Information Act. When an individual is seeking records about themself from this system of records or any other Departmental VerDate Sep<11>2014 17:54 Mar 30, 2023 Jkt 259001 system of records, the individual’s request must conform with the Privacy Act regulations set forth in 6 CFR part 5. The individual must first verify their identity, meaning that the individual must provide their full name, current address, and date and place of birth. The individual must sign the request, and the individual’s signature must either be notarized or submitted under 28 U.S.C. 1746, a law that permits statements to be made under penalty of perjury as a substitute for notarization. An individual may obtain more information about this process at https:// www.dhs.gov/foia. In addition, the individual should: • Explain why they believe the Department would have information being requested; • Identify which component(s) of the Department they believe may have the information; • Specify when the individual believes the records would have been created; and • Provide any other information that will help the DHS staff determine which DHS component agency may have responsive records. If the request is seeking records pertaining to another living individual, the request must include an authorization from the individual whose record is being requested, authorizing the release to the requester. Without the above information, the component(s) may not be able to conduct an effective search, and the individual’s request may be denied due to lack of specificity or lack of compliance with applicable regulations. CONTESTING RECORD PROCEDURES: For records covered by the Privacy Act or covered Judicial Redress Act (JRA) records, individuals may make a request for amendment or correction of a Department record about the individual by writing directly to the Department component that maintains the record, unless the record is not subject to amendment or correction. The request should identify each particular record in question, state the amendment or correction desired, and state why the individual believes that the record is not accurate, relevant, timely, or complete. The individual may submit any documentation that would be helpful. If the individual believes that the same record is in more than one system of records, the request should state that and be addressed to each component that maintains a system of records containing the record. When an individual is making a request for amendment or correction of Departmental records about themself PO 00000 Frm 00083 Fmt 4703 Sfmt 4703 from this system of records or any other Departmental system of records, the individual’s request must conform with the Privacy Act regulations set forth in 6 CFR part 5. NOTIFICATION PROCUEDURES: See ‘‘Record Access Procedures’’ above. EXEMPTIONS PROMULGATED FOR THE SYSTEM: The Secretary of Homeland Security, pursuant to 5 U.S.C. 552a(k)(2), has exempted this system from the following provisions of the Privacy Act, subject to the limitation set forth in 5 U.S.C. 552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f). HISTORY: * 79 FR 40124 (July 11, 2014). * * * * Mason C. Clutter, Acting Chief Privacy Officer, Department of Homeland Security. [FR Doc. 2023–06745 Filed 3–30–23; 8:45 am] BILLING CODE 9111–19–P DEPARTMENT OF THE INTERIOR Fish and Wildlife Service [Docket No. FWS–R8–NWRS–2023–N003; FXRS12610800000–223–FF08RSDC00] Final Environmental Impact Statement/ Environmental Impact Report for Tijuana Estuary Tidal Restoration Program II Phase I Fish and Wildlife Service, Interior. ACTION: Notice of availability; final environmental impact statement/ environmental impact report. AGENCY: We, the U.S. Fish and Wildlife Service (Service), announce the availability of a final environmental impact statement/environmental impact report (FEIS/EIR) for the Tijuana Estuary Tidal Restoration Program II Phase I project. The FEIS/EIR was prepared jointly by the Service and the California Department of Parks and Recreation to satisfy the requirements of the National Environmental Policy Act (NEPA) and California Environmental Quality Act, respectively. The U.S. Army Corps of Engineers is participating in the NEPA process as a cooperating agency. The FEIS/EIR evaluates the environmental consequences of restoring 82 to 87 acres of native coastal wetlands and uplands within the Tijuana River National Estuarine Research Reserve on portions of both the Tijuana Slough National Wildlife Refuge and Border Field State Park, in San Diego County, California. SUMMARY: E:\FR\FM\31MRN1.SGM 31MRN1

Agencies

[Federal Register Volume 88, Number 62 (Friday, March 31, 2023)]
[Notices]
[Pages 19317-19320]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2023-06745]


-----------------------------------------------------------------------

DEPARTMENT OF HOMELAND SECURITY

[Docket No. DHS-2022-0042]


Privacy Act of 1974; System of Records

AGENCY: Department of Homeland Security Federal Emergency Management 
Agency.

ACTION: Notice of a modified system of records.

-----------------------------------------------------------------------

SUMMARY: In accordance with the Privacy Act of 1974, the Department of 
Homeland Security (DHS) proposes to update and reissue a current system 
of records titled, ``Department of Homeland Security/Federal Emergency 
Management Agency (FEMA)-012 Suspicious Activity Reporting System of 
Records.'' This system of records allows DHS/FEMA to collect, maintain, 
and retrieve records on individuals reported as being involved in 
suspicious activities, individuals who report suspicious activities, 
and individuals charged with the analysis and appropriate handling of 
suspicious activity reports. DHS/FEMA is updating this system of 
records to (1) revise contact and administrative information associated 
with this system of records, (2) add to the categories of records 
collected, (3) modify routine uses, and (4) other non-substantive 
changes. This updated system will be included in DHS's inventory of 
record systems.

DATES: Submit comments on or before May 1, 2023. This modified system 
will be effective upon publication. New or modified routine uses will 
be effective May 1, 2023.

ADDRESSES: You may submit comments, identified by docket number DHS-
2022-0042 by one of the following methods:
     Federal e-Rulemaking Portal: https://www.regulations.gov. 
Follow the instructions for submitting comments.
     Fax: 202-343-4010.
     Mail: Mason Cutter, Chief Privacy Officer, Privacy Office, 
Department of Homeland Security, Washington, DC, 20528-0655.
    Instructions: All submissions received must include the agency name 
and docket number DHS-2022. All comments received will be posted 
without change to https://www.regulations.gov, including any personal 
information provided.
    Docket: For access to the docket to read background documents or 
comments received, go to https://www.regulations.gov.

FOR FURTHER INFORMATION CONTACT: For general questions please contact: 
Tammi

[[Page 19318]]

Hines, (202) 646-3606, [email protected], Privacy Officer, 
Federal Emergency Management Agency, Department of Homeland Security, 
Washington, DC, 20478. For privacy questions please contact: Mason 
Cutter, (202) 343-1717, [email protected], Chief Privacy Officer, 
Privacy Office, Department of Homeland Security, Washington, DC, 20528-
0655.

SUPPLEMENTARY INFORMATION:

I. Background

    In accordance with the Privacy Act of 1974, DHS/FEMA proposes to 
update and reissue a current DHS/FEMA system of records titled, ``DHS/
FEMA-012 Suspicious Activity Reporting System of Records.'' FEMA's 
mission is to ``support our citizens and first responders to ensure 
that as a nation we work together to build, sustain, and improve our 
capability to prepare for, protect against, respond to, recover from, 
and mitigate all hazards.'' In support of this mission, and to ensure 
the safety of its citizens and first responders, FEMA collects, 
maintains, and retrieves records of individuals reported as being 
involved in suspicious activities and of individuals who report 
suspicious activities. FEMA's Office of the Chief Security Officer 
(OCSO), Fraud Investigations and Inspections Division (FIID) manages 
this process. Investigators and Analysts are assigned to complete the 
analysis of suspicious activity reports; they are also responsible for 
the appropriate handling of such reports.
    FEMA Suspicious Activity Reports may be shared with federal, state, 
local, and tribal jurisdictions with responsibility for investigating 
suspicious activities within their jurisdictions. FEMA Suspicious 
Activity Reports that have a nexus to terrorism or hazards to homeland 
security, as determined by FEMA FIID Investigators or Analysts, and 
require immediate attention are reported to the police or law 
enforcement agency of jurisdiction via telephone and uploaded into the 
Federal Bureau of Investigation's (FBI) eGuardian system by FEMA FIID 
Investigators or Analysts in coordination with the agency that reported 
the information. All investigators and analysts who submit reports to 
the eGuardian system are trained in the DHS Nationwide Suspicious 
Activity Reports Initiative, per DHS policy.
    FEMA is updating this System of Records Notice to reflect the 
following changes: (1) the contact information for general questions 
and administrative information has been updated, as well as the 
Authority for Maintenance of the System section; (2) the categories of 
records have been updated to clarify the information collected in 
suspicious activity reports; and (3) Routine Use E has been modified 
and Routine Use F has been added to conform to Office of Management and 
Budget (OMB) Memorandum M-17-12 regarding breach notification and 
investigation.
    Furthermore, non-substantive changes to simplify the formatting and 
text of the previously published notice and the references to FEMA's 
Office of Chief Security Officer (OCSO) have been updated to identify 
FEMA's Fraud Investigations and Inspections Division as the specific 
office responsible for suspicious activity reporting.
    Consistent with DHS's information sharing mission, information 
stored in the DHS/FEMA-012 Suspicious Activity Reporting System of 
Records may be shared with other DHS components that have a need to 
know the information to carry out their national security, law 
enforcement, immigration, intelligence, or other homeland security 
functions. In addition, information may be shared with appropriate 
federal, state, local, tribal, territorial, foreign, or international 
government agencies consistent with the routine uses set forth in this 
system of records notice.
    This modified system will be included in DHS's inventory of record 
systems.

II. Privacy Act

    The Privacy Act embodies fair information practice principles in a 
statutory framework governing the means by which federal government 
agencies collect, maintain, use, and disseminate individuals' records. 
The Privacy Act applies to information that is maintained in a ``system 
of records.'' A ``system of records'' is a group of any records under 
the control of an agency from which information is retrieved by the 
name of an individual or by some identifying number, symbol, or other 
identifying particular assigned to the individual. The Privacy Act 
defines ``individual'' to encompass U.S. citizens and lawful permanent 
residents. Additionally, the Judicial Redress Act (JRA) provides 
covered persons with a statutory right to make requests for access and 
amendment to covered records, as defined by the JRA, and judicial 
review of denials of such requests. In addition, the JRA prohibits 
disclosures of covered records, except as otherwise permitted by the 
Privacy Act.
    Below is the description of the DHS/FEMA-12 Suspicious Activity 
Reporting System of Records.
    In accordance with 5 U.S.C. 552a(r), DHS has provided a report of 
this system of records to the Office of Management and Budget, and to 
Congress.

SYSTEM NAME AND NUMBER:
    Department of Homeland Security (DHS)/Federal Emergency Management 
Agency (FEMA)-012 Suspicious Activity Reporting System of Records.

SECURITY CLASSIFICATION:
    For official use only (FOUO) and law enforcement sensitive (LES). 
This system does not contain classified information.

SYSTEM LOCATION:
    Records are maintained on a FEMA Exchange Server that is access-
controlled and under the management and control of the Federal 
Emergency Management Agency (FEMA) Office of Chief Information Officer 
at FEMA Headquarters, 500 C Street SW, Washington, DC 20472.

SYSTEM MANAGERS:
    Office of the Chief Security Officer, Fraud Investigations and 
Inspections Division, 500 C Street SW, Washington, DC 20472.

AUTHORITY FOR MAINTENANCE OF THE SYSTEM:
    42 U.S.C. 5196(d); Executive Orders 12333 and 13388; 40 U.S.C. 
1315(b)(2)(F); 6 U.S.C. 314 of the Homeland Security Act of 2002, as 
amended; the Intelligence Reform and Terrorism Prevention Act of 2004, 
as amended; and the National Security Act of 1947, as amended.

PURPOSE(S) OF THE SYSTEM:
    The purpose of this system is to collect, investigate, analyze, and 
report suspicious activities to the police or law enforcement agency of 
jurisdiction and upload the Suspicious Activity Reports into the FEMA 
Exchange Server in coordination with the agency that reported the 
information.

CATEGORIES OF INDIVIDUALS COVERED BY THE SYSTEM:
    Categories of individuals covered by the system include individuals 
reported as being involved in suspicious activities, individuals who 
report suspicious activities, and Fraud Investigations and Inspections 
Division Investigators and Analysts assigned to analyze and 
appropriately handle suspicious activity reports.

CATEGORIES OF RECORDS IN THE SYSTEM:
    The following fields related to individuals may be maintained in 
this system:

[[Page 19319]]

     Report of the suspicious activity (e.g., description of 
the suspicious activity and physical descriptors of individuals 
involved in suspicious activity);
     Case/incident number;
     Name (first, middle, and last);
     Address (number, street, apartment, city, and state);
     Age;
     Sex;
     Race for subject description;
     Signature (investigator, analyst, or law enforcement 
officer (LEO));
     Jurisdiction over the suspected activity;
     Injury code (a dropdown that lists the codes in question 
(0-None, 1-Refused, 2-First Aid, 3-Hospital, 4-Deceased) (if 
applicable));
     Telephone numbers (home, business, or cell);
     Other contact information (e.g., email address); and
     Property information (e.g., name, quantity, serial number, 
brand name, model, value, year, make, color, identifying 
characteristics, registration information).

RECORD SOURCE CATEGORIES:
    Records are obtained from individuals reported as being involved in 
suspicious activities, individuals who report suspicious activities, 
Fraud Investigations and Inspections Division Investigators and 
Analysts, commercially available systems (LexisNexis) and other 
federal, state, and local law enforcement agencies.

ROUTINE USES OF RECORDS MAINTAINED IN THE SYSTEM, INCLUDING CATEGORIES 
OF USERS AND PURPOSES OF SUCH USES:
    In addition to those disclosures generally permitted under 5 U.S.C. 
552a(b) of the Privacy Act, all or a portion of the records or 
information contained in this system may be disclosed outside DHS as a 
routine use pursuant to 5 U.S.C. 552a(b)(3) as follows:
    A. To the Department of Justice (DOJ), including Offices of the 
U.S. Attorneys, or to another federal agency conducting litigation or 
in proceedings before any court, adjudicative, or administrative body, 
when it is relevant and necessary to the litigation and one of the 
following is a party to the litigation or has an interest in such 
litigation:
    1. DHS or any component thereof;
    2. Any employee or former employee of DHS in their official 
capacity;
    3. Any employee or former employee of DHS in their individual 
capacity when DOJ or DHS has agreed to represent the employee; or
    4. The United States or any agency thereof.
    B. To a congressional office from the record of an individual in 
response to an inquiry from that congressional office made at the 
request of the individual to whom the record pertains.
    C. To the National Archives and Records Administration (NARA) or 
General Services Administration pursuant to records management 
inspections being conducted under the authority of 44 U.S.C. 2904 and 
2906.
    D. To an agency, organization, or individual for the purpose of 
performing audit or oversight operations as authorized by law, but only 
such information as is necessary and relevant to such audit or 
oversight function.
    E. To appropriate agencies, entities, and persons when (1) DHS 
suspects or has confirmed that there has been a breach of the system of 
records; (2) DHS has determined that as a result of the suspected or 
confirmed breach there is a risk of harm to individuals, DHS (including 
its information systems, programs, and operations), the Federal 
Government, or national security; and (3) the disclosure made to such 
agencies, entities, and persons is reasonably necessary to assist in 
connection with DHS's efforts to respond to the suspected or confirmed 
breach or to prevent, minimize, or remedy such harm.
    F. To another federal agency or federal entity, when DHS determines 
that information from this system of records is reasonably necessary to 
assist the recipient agency or entity in (1) responding to a suspected 
or confirmed breach or (2) preventing, minimizing, or remedying the 
risk of harm to individuals, the recipient agency or entity (including 
its information systems, programs, and operations), the federal 
government, or national security, resulting from a suspected or 
confirmed breach.
    G. To an appropriate federal, state, tribal, local, international, 
or foreign law enforcement agency or other appropriate authority 
charged with investigating or prosecuting a violation or enforcing or 
implementing a law, rule, regulation, or order, when a record, either 
on its face or in conjunction with other information, indicates a 
violation or potential violation of law, which includes criminal, 
civil, or regulatory violations and such disclosure is proper and 
consistent with the official duties of the person making the 
disclosure.
    H. To contractors and their agents, grantees, experts, consultants, 
and others performing or working on a contract, service, grant, 
cooperative agreement, or other assignment for DHS, when necessary to 
accomplish an agency function related to this system of records. 
Individuals provided information under this routine use are subject to 
the same Privacy Act requirements and limitations on disclosure as are 
applicable to DHS officers and employees.
    I. To an appropriate federal, state, tribal, local, international 
counterterrorism agencies when DHS becomes aware of an indication of a 
threat or potential threat to security, and when such use is to assist 
in counterterrorism efforts.
    J. To an organization or individual in either the public or private 
sector, either foreign or domestic, when there is a reason to believe 
that the recipient is or could become the target of a particular 
terrorist activity or conspiracy, to the extent the information is 
relevant to the protection of life, property, or other vital interests 
of a data subject and disclosure is proper and consistent with the 
official duties of the person making the disclosure.
    K. To the news media and the public, with the approval of the Chief 
Privacy Officer in consultation with counsel, when there exists a 
legitimate public interest in the disclosure of the information, when 
disclosure is necessary to preserve confidence in the integrity of DHS, 
or is necessary to demonstrate the accountability of DHS's officers, 
employees, or individuals covered by the system, except to the extent 
it is determined that release of the specific information in the 
context of a particular case would constitute an unwarranted invasion 
of personal privacy.

POLICIES AND PRACTICES FOR STORAGE OF RECORDS:
    DHS/FEMA stores records in this system electronically on the 
access-controlled FEMA Exchange Server.

POLICIES AND PRACTICES FOR RETRIEVAL OF RECORDS:
    DHS/FEMA retrieves records by case/incident number, name, address, 
and/or date.

POLICIES AND PRACTICES FOR RETENTION AND DISPOSAL OF RECORDS:
    Pursuant to National Archives and Records Administration Schedule 
Number N1-311-99-6, Items 1, 2, and 3, files containing information or 
allegations that are of an investigative nature but do not relate to a 
specific investigation are destroyed after five (5) years. 
Investigative case files that involve allegations made against senior 
agency officials, attract significant attention in the media, attract 
congressional attention, result in substantive changes in agency 
policies and procedures, or are cited in the

[[Page 19320]]

Office of the Inspector General's (OIG) periodic reports to Congress 
are cut off when the case is closed, retired to the Federal Records 
Center (FRC) five (5) years after cutoff, and then transferred to the 
National Archives and Records Administration twenty (20) years after 
cutoff. All other investigative case files are placed in inactive files 
when a case is closed, cut off at the end of fiscal year, and destroyed 
ten (10) years after cutoff, except those that are unusually 
significant for documenting major violations of criminal law or ethical 
standards by agency officials or others.

ADMINISTRATIVE, TECHNICAL, AND PHYSICAL SAFEGUARDS:
    DHS/FEMA safeguards records in this system in accordance with 
applicable rules and policies, including all applicable DHS systems 
security and access policies. DHS/FEMA imposes strict controls to 
minimize the risk of compromising the information that is being stored. 
Access to the computer system containing the records in this system is 
limited to those who have a need to know the information for the 
performance of their official duties and who have appropriate 
clearances or permissions.

RECORD ACCESS PROCEDURES:
    The Secretary of Homeland Security has exempted this system from 
the notification, access, and amendment procedures of the Privacy Act 
because it is a law enforcement system. However, DHS/FEMA will consider 
individual requests to determine whether information may be released. 
Thus, individuals seeking access to and notification of any record 
contained in this system of records, or seeking to contest its content, 
may submit a request in writing to the Chief Privacy Officer and FEMA's 
Freedom of Information Act (FOIA) Officer whose contact information can 
be found at https://www.dhs.gov/foia under ``Contact Information.'' If 
an individual believes more than one component maintains Privacy Act 
records concerning them, the individual may submit the request to the 
Chief Privacy Officer and Chief Freedom of Information Act Officer, 
Department of Homeland Security, Washington, DC 20528-0655, or 
electronically at https://www.dhs.gov/dhs-foia-privacy-act-request-submission-form. Even if neither the Privacy Act nor the Judicial 
Redress Act provide a right of access, certain records about you may be 
available under the Freedom of Information Act.
    When an individual is seeking records about themself from this 
system of records or any other Departmental system of records, the 
individual's request must conform with the Privacy Act regulations set 
forth in 6 CFR part 5. The individual must first verify their identity, 
meaning that the individual must provide their full name, current 
address, and date and place of birth. The individual must sign the 
request, and the individual's signature must either be notarized or 
submitted under 28 U.S.C. 1746, a law that permits statements to be 
made under penalty of perjury as a substitute for notarization. An 
individual may obtain more information about this process at https://www.dhs.gov/foia. In addition, the individual should:
     Explain why they believe the Department would have 
information being requested;
     Identify which component(s) of the Department they believe 
may have the information;
     Specify when the individual believes the records would 
have been created; and
     Provide any other information that will help the DHS staff 
determine which DHS component agency may have responsive records.
    If the request is seeking records pertaining to another living 
individual, the request must include an authorization from the 
individual whose record is being requested, authorizing the release to 
the requester.
    Without the above information, the component(s) may not be able to 
conduct an effective search, and the individual's request may be denied 
due to lack of specificity or lack of compliance with applicable 
regulations.

CONTESTING RECORD PROCEDURES:
    For records covered by the Privacy Act or covered Judicial Redress 
Act (JRA) records, individuals may make a request for amendment or 
correction of a Department record about the individual by writing 
directly to the Department component that maintains the record, unless 
the record is not subject to amendment or correction. The request 
should identify each particular record in question, state the amendment 
or correction desired, and state why the individual believes that the 
record is not accurate, relevant, timely, or complete. The individual 
may submit any documentation that would be helpful. If the individual 
believes that the same record is in more than one system of records, 
the request should state that and be addressed to each component that 
maintains a system of records containing the record. When an individual 
is making a request for amendment or correction of Departmental records 
about themself from this system of records or any other Departmental 
system of records, the individual's request must conform with the 
Privacy Act regulations set forth in 6 CFR part 5.

NOTIFICATION PROCUEDURES:
    See ``Record Access Procedures'' above.

EXEMPTIONS PROMULGATED FOR THE SYSTEM:
    The Secretary of Homeland Security, pursuant to 5 U.S.C. 
552a(k)(2), has exempted this system from the following provisions of 
the Privacy Act, subject to the limitation set forth in 5 U.S.C. 
552a(c)(3); (d); (e)(1), (e)(4)(G), (e)(4)(H), (e)(4)(I); and (f).

HISTORY:
    79 FR 40124 (July 11, 2014).
* * * * *

Mason C. Clutter,
Acting Chief Privacy Officer, Department of Homeland Security.
[FR Doc. 2023-06745 Filed 3-30-23; 8:45 am]
BILLING CODE 9111-19-P


This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.