Privacy Act of 1974; New System of Records, 14487-14490 [2024-03908]
Download as PDF
Federal Register / Vol. 89, No. 39 / Tuesday, February 27, 2024 / Notices
petition. The order itself explains the
bases for the EPA’s decision.
Sections 307(b) and 505(b)(2) of the
CAA provide that a petitioner may
request judicial review of those portions
of an order that deny issues in a
petition. Any petition for review shall
be filed in the United States Court of
Appeals for the appropriate circuit no
later than April 29, 2024.
Cristina Ferna´ndez,
Air & Radiation Division Director, Region III.
[FR Doc. 2024–04027 Filed 2–26–24; 8:45 am]
BILLING CODE 6560–50–P
ENVIRONMENTAL PROTECTION
AGENCY
[EPA–HQ–OPP–2024–0088; FRL–11751–01–
OCSPP]
Pesticide Program Dialogue
Committee; Notice of Public Meetings
Environmental Protection
Agency (EPA).
ACTION: Notice.
AGENCY:
Pursuant to the Federal
Advisory Committee Act, the
Environmental Protection Agency’s
(EPA’s) Office of Pesticide Programs is
announcing the dates for the 2024
meetings of the Pesticide Program
Dialogue Committee (PPDC) on June 5
and 6, and November 13 and 14, 2024,
respectively. These meetings are open to
the public and will be held in person.
Limited opportunities for virtual
participation will be offered.
DATES: The Spring meeting will be held
on Wednesday, June 5 and Thursday,
June 6, 2024, from approximately 9 a.m.
to 5 p.m. each day. Requests to
participate in the Spring meeting must
be received on or before May 31, 2024.
The Fall meeting will be held on
Wednesday, November 13 and
Thursday, November 14, 2024, from
approximately 9 a.m. to 5 p.m. each day.
Requests to participate in the Fall
meeting must be received on or before
November 8, 2024.
To request accommodation of a
disability, please contact the technical
person listed under FOR FURTHER
INFORMATON CONTACT, preferably at least
10 days prior to the meeting, to give
EPA as much time as possible to process
your request.
ADDRESSES: The meetings will be held at
the U.S. Environmental Protection
Agency at 1201 Constitution Avenue
NW, Washington, DC 20004.
Links to register for each of the
meetings will be available at https://
www.epa.gov/pesticide-advisorycommittees-and-regulatory-partners/
lotter on DSK11XQN23PROD with NOTICES1
SUMMARY:
VerDate Sep<11>2014
16:53 Feb 26, 2024
Jkt 262001
pesticide-program-dialogue-committeeppdc.
FOR FURTHER INFORMATION CONTACT:
Jeffrey Chang, telephone number: (202)
566–2213, email address: chang.jeffrey@
epa.gov.
SUPPLEMENTARY INFORMATION:
I. General Information
A. Does this action apply to me?
You may be potentially affected by
this action if you work in in agricultural
settings or if you are concerned about
implementation of the Federal
Insecticide, Fungicide, and Rodenticide
Act (FIFRA) (7 U.S.C. 136 et seq.); the
Federal Food, Drug, and Cosmetic Act
(FFDCA) (21 U.S.C. 301 et seq.); the
Pesticide Registration Improvement Act
(PRIA) (which amends FIFRA section
33); and the Endangered Species Act
(ESA) (16 U.S.C. 1531 et seq.).
Potentially affected entities may include
but are not limited to: Agricultural
workers and farmers; pesticide industry
and trade associations; environmental,
consumer, and farm worker groups;
pesticide users and growers; animal
rights groups; pest consultants; state,
local, and tribal governments; academia;
public health organizations; and the
public. If you have questions regarding
the applicability of this action to a
particular entity, consult the person
listed under FOR FURTHER INFORMATION
CONTACT.
B. How can I get copies of this document
and other related information?
The docket for this action, identified
by docket identification (ID) number
EPA–HQ–OPP–2024–0088, is available
online at https://www.regulations.gov.
The docket will also be available inperson at the Office of Pesticide
Programs Regulatory Public Docket
(OPP Docket) in the EPA/DC, West
William Jefferson Clinton Bldg., Rm.
3334, 1301 Constitution Ave. NW,
Washington, DC 20460–0001. The
Public Reading Room is open from 8:30
a.m. to 4:30 p.m., Monday through
Friday, excluding legal holidays. The
telephone number for the Public
Reading Room is (202) 566–1744.
For further information on EPA/DC
services, docket contact information and
the current status of the EPA/DC and
Reading Room, please visit https://
www.epa.gov/dockets.
The agenda and meeting materials
will be available seven calendar days in
advance of each meeting at https://
www.epa.gov/pesticide-advisorycommittees-and-regulatory-partners/
pesticide-program-dialogue-committeeppdc.
PO 00000
Frm 00058
Fmt 4703
Sfmt 4703
14487
II. Background
The PPDC is a federal advisory
committee chartered under the Federal
Advisory Committee Act (FACA), Public
Law 92–463. EPA established the PPDC
in September 1995 to provide policy
advice, information and
recommendations to the EPA
Administrator through the Director of
the Office of Pesticide Programs, Office
of Chemical Safety and Pollution
Prevention. The PPDC provides a public
forum to discuss a wide variety of
pesticide regulatory developments and
reform initiatives, evolving public
policy and program implementation
issues associated with evaluating and
risks from the use of pesticides.
III. How can I request to participate in
this meeting?
Please visit https://www.epa.gov/
pesticide-advisory-committees-andregulatory-partners/pesticide-programdialogue-committee-ppdc to find a link
to register to attend the meeting in
person. The agenda and meeting
materials will be available seven
calendar days in advance of each
meeting.
Requests to make brief oral comments
to the PPDC during the meeting should
be submitted to the individual listed
under FOR FURTHER INFORMATION
CONTACT on or before noon on the date
set in the DATES section.
Authority: 5 U.S.C. Appendix 2 et seq.
and 7 U.S.C. 136 et seq.
Dated: February 21, 2024.
Edward Messina,
Director, Office of Pesticide Programs.
[FR Doc. 2024–03966 Filed 2–26–24; 8:45 am]
BILLING CODE 6560–50–P
EXPORT-IMPORT BANK
Privacy Act of 1974; New System of
Records
Export Import Bank of the
United States.
ACTION: Notice of a new system of
records.
AGENCY:
Pursuant to the Privacy Act of
1974, the Export Import Bank of the
United States (‘‘EXIM’’, ‘‘EXIM Bank’’,
or ‘‘The Bank’’) is proposing a new
system of records notice (‘‘SORN’’)—
EXIM Emergency Notification System.
This new SORN will include the
authorities for maintenance of the
system, the purposes of the system, and
the categories of entities and individuals
covered by the system. The new system
of records described in this notice,
EXIM Emergency Notification System
SUMMARY:
E:\FR\FM\27FEN1.SGM
27FEN1
lotter on DSK11XQN23PROD with NOTICES1
14488
Federal Register / Vol. 89, No. 39 / Tuesday, February 27, 2024 / Notices
using OnSolve Platform for Critical
Event Management (PCEM), will collect
information for current employees and
contractors of the Bank for emergency
notification, information technology
alerting, and disaster recovery to
support effective communication and
management of critical alerts, and to
keep EXIM employees and contractors
safe, informed, assured, and productive
during an event/incident or crisis.
DATES: The system of records described
herein will become effective February
27, 2024. The deadline to submit
comments on this system of records, as
well as the date on which the below
routine uses will become effective, will
be 30 days after Federal Register
publication.
ADDRESSES: You may submit written
comments to EXIM Bank by any of the
following methods:
• Federal eRulemaking Portal:
https://www.regulations.gov. Follow the
website instructions for submitting
comments.
• Email: sorn.comments@exim.gov.
Refer to SORN in the subject line.
• Mail or Hand Delivery: Address
letters to the Freedom of Information
Act Office and the Office of Information
Management and Technology, Export
Import Bank of the United States, 811
Vermont Ave. NW, Washington, DC
20571.
Commenters are strongly encouraged
to submit public comments
electronically. EXIM Bank expects to
have limited personnel available to
process public comments that are
submitted on paper through mail. Until
further notice, any comments submitted
on paper will be considered to the
extent practicable. All submissions must
include the agency’s name (Export
Import Bank of the United States, or
EXIM Bank) and reference this notice.
Comments received will be posted
without change to EXIM Bank’s website.
Do not submit comments that include
any Personally Identifiable Information
(PII) or confidential business
information. Copies of comments may
also be obtained by writing to the
Freedom of Information Act Office and
the Office of Information Management
and Technology, Export Import Bank of
the United States, 811 Vermont Ave.
NW, Washington, DC 20571.
FOR FURTHER INFORMATION CONTACT: The
Office of the General Counsel,
Administrative Law Group at
OGCAdminLaw@exim.gov or 202–329–
2052, or by going to EXIM Bank Privacy
Act System of Records Notice. You may
also contact Selma Hamilton, Director,
Security Services at Selma.Hamilton@
exim.gov or 202–565–3313.
VerDate Sep<11>2014
16:53 Feb 26, 2024
Jkt 262001
The new
system of records described in this
notice, EXIM Emergency Notification
System, will store certain information
about employees and contractors of the
Bank for emergency notification,
information technology alerting, and
disaster recovery to support effective
communication and management of
critical alerts, and to keep EXIM
employees and contractors safe,
informed, assured, and productive
during an event/incident or crisis.
The report of a new system of records
has been submitted to the Committee on
Oversight and Government Reform of
the House of Representatives, the
Committee on Homeland Security and
Governmental Affairs of the Senate, and
the Office of Management and Budget,
pursuant to OMB Circular A–108,
‘‘Federal Agency Responsibilities for
Review, Reporting, and Publication
under the Privacy Act’’ (Dec. 2016), and
the Privacy Act, 5 U.S.C. 552a(r).
SUPPLEMENTARY INFORMATION:
SYSTEM NAME AND NUMBER:
System Name: EXIM Emergency
Notification System.
System Number: N/A.
SECURITY CLASSIFICATION:
Unclassified.
SYSTEM LOCATION:
This electronic system will be used
via a web interface and mobile
application by the Export Import Bank
of the United States, 811 Vermont
Avenue NW, Washington, DC 20571.
The physical location and technical
operation of the system is at the
FedRAMP Authorized Amazon Web
Services (AWS) US East/West cloud
services facility at 410 Terry Ave N,
Seattle, WA 98109–5210.
SYSTEM MANAGER(S):
Selma Hamilton, Director, Security
Services, EXIM Bank, 811 Vermont
Avenue NW, Washington, DC 20571,
Selma.Hamilton@exim.gov, 202–565–
3313.
AUTHORITY FOR MAINTENANCE OF THE SYSTEM:
Export-Import Bank Act of 1945, as
amended (12 U.S.C. 635 et seq.).1 5
U.S.C. 301.
PURPOSE(S) OF THE SYSTEM:
The purpose of this system of records
is to facilitate and enable EXIM to
communicate with its employees and
contractors (‘‘Contacts’’) in a quick and
efficient manner in critical events. EXIM
utilizes EXIM Emergency Notification
1 More specifically, sections 635(a)(1) and
635a(j)(1)(C) of the Export-Import Bank Act of 1945,
as amended.
PO 00000
Frm 00059
Fmt 4703
Sfmt 4703
System to ensure employee safety and
business continuity, as well as swift
disaster recovery during critical events.
EXIM uses contact information of its
employees and contractors (typically
name, telephone number, email
addresses and/or physical address,
which is stored within OnSolve
Platform for Critical Event Management
(PCEM)) and use the system to
communicate alerts using multiple
modalities (including SMS, email, and
voice collectively referred to herein as
‘‘alerts’’) to the Contacts at scale.
CATEGORIES OF INDIVIDUALS COVERED BY THE
SYSTEM:
The EXIM Emergency Notification
System will contain information on
EXIM current employees and
contractors.
CATEGORIES OF RECORDS IN THE SYSTEM:
The EXIM Emergency Notification
System will contain Personally
Identifiable Information (PII) of EXIM
current employees and contractors
typically including, but not limited to
name, telephone number, email
addresses and/or physical address/
location, and travel data such as dates
and locations of travel captured through
manual entry or an API (Application
Programming Interface) from EXIM
Travel Reservation Management system
(Concur). This information will be
necessary to enable EXIM to identify
and communicate with EXIM staff and
other persons having connections with
EXIM (‘‘Contacts’’ or ‘‘Recipients’’) in a
quick and efficient manner to ensure
employee safety and business
continuity, as well as swift recovery
during critical events.
RECORD SOURCE CATEGORIES:
The information in the system is
obtained using one of three methods: (1)
Active Directory (AD) user data will be
used as the initial source of information
for the database to create users, (2)
additional user information will be
entered by the user via the user account
‘‘opt-in’’ portal, and (3) data captured
through manual entry or an API
(Application Programming Interface)
from EXIM Travel Reservation
Management system (Concur). User
accounts are created individually within
the OnSolve portal or uploaded via
SFTP from an Active Directory export
using System Center Orchestrator
(SCOrch).
ROUTINE USES OF RECORDS MAINTAINED IN THE
SYSTEM, INCLUDING CATEGORIES OF USERS AND
PURPOSES OF SUCH USES:
In addition to those disclosures that
are generally permitted under 5 U.S.C.
552a(b) of the Privacy Act, all or a
E:\FR\FM\27FEN1.SGM
27FEN1
lotter on DSK11XQN23PROD with NOTICES1
Federal Register / Vol. 89, No. 39 / Tuesday, February 27, 2024 / Notices
portion of the records or information
contained in this system may be
disclosed to authorized entities, as is
determined to be relevant and
necessary, outside EXIM as a routine
use pursuant to 5 U.S.C. 552a(b)(3) as
follows:
1. Appropriate agencies, entities, and
persons when (a) the Bank suspects or
has confirmed that there has been a
breach of the system of records; (b) the
Bank has determined that as a result of
the suspected or confirmed breach there
is a risk of harm to individuals, the
Bank (including its information systems,
programs, and operations), the Federal
Government, or national security; and
(c) the disclosure made to such
agencies, entities, and persons is
reasonably necessary to assist in
connection with the Bank’s efforts to
respond to the suspected or confirmed
breach or to prevent, minimize, or
remedy such harm.
2. Another Federal agency or Federal
entity, when the Bank determines that
information from this system of records
is reasonably necessary to assist the
recipient agency or entity in (a)
responding to a suspected or confirmed
breach or (b) preventing, minimizing, or
remedying the risk of harm to
individuals, the recipient agency or
entity (including its information
systems, programs, and operations), the
Federal Government, or national
security, resulting from a suspected or
confirmed breach.
3. Congressional offices in response to
an inquiry made at the request of the
individual to whom the record pertains.
4. Contractors or other authorized
individuals performing work on a
contract, service, cooperative agreement,
job, or other activity on behalf of the
Bank or Federal Government and who
have a need to access the information in
the performance of their duties or
activities.
5. The U.S. Department of Justice
(DOJ) for its use in providing legal
advice to the Bank or in representing the
Bank in a proceeding before a court,
adjudicative body, or other
administrative body, where the use of
such information by the DOJ is deemed
by the Bank to be relevant and necessary
to the advice or proceeding, and in the
case of a proceeding, such proceeding
names as a party in interest: (a) The
Bank; (b) Any employee of the Bank in
his or her official capacity; (c) Any
employee of the Bank in his or her
individual capacity where DOJ has
agreed to represent the employee; or (d)
The United States, where the Bank
determines that litigation is likely to
affect the Bank or any of its
components.
VerDate Sep<11>2014
16:53 Feb 26, 2024
Jkt 262001
6. A court, magistrate, or
administrative tribunal during an
administrative proceeding or judicial
proceeding, including disclosures to
opposing counsel or witnesses
(including expert witnesses) during
discovery or other pre-hearing
exchanges of information, litigation, or
settlement negotiations, where relevant
and necessary to a proceeding, or in
connection with criminal law
proceedings.
7. Appropriate Federal, State, local,
foreign, Tribal, or self-regulatory
organizations or agencies responsible for
investigating, prosecuting, enforcing,
implementing, issuing, or carrying out a
statute, rule, regulation, order, policy, or
license if the record indicates a
violation or a potential violation of civil
or criminal law, rule, regulation, order,
policy, or license.
POLICIES AND PRACTICES FOR STORAGE OF
RECORDS:
The records are stored digitally in
encrypted format in the OnSolve PCEM
Amazon Web Services (AWS) FedRAMP
authorized cloud environment. OnSolve
PCEM encrypts EXIM’s sensitive
information (such as current employee
or contractor first name, last name, and
email address) at rest and stores it in the
databases leveraging native AWS
encryption including Database (DB)
clusters, snapshots, underlying structure
for DB clusters. Automated database
backups are in place along with read
replica. Native AWS encryption on
storage level with an encrypted Elastic
Block Storage (EBS) volume using
Advanced Encryption Standard (AES)–256). For live data (not in a backup file)
Elastic File System (EFS) is used. EXIM
Emergency Notification System
complies with EXIM policy which
stipulates that sensitive data (such as
routine reports) generated from EXIM
Emergency Notification System must be
stored on EXIM’s storage system that is
managed and protected by EXIM’s
Infrastructure General Support System
administrative, technical, and physical
controls.
POLICIES AND PRACTICES FOR RETRIEVAL OF
RECORDS:
Records may be retrieved by the
system administrator using Contact’s
(EXIM employee and contractor) first
name, last name, work email address, as
well as non-key attributes such as
location (e.g., Headquarters or Regional
Offices), to identify lists of potentially
impacted contacts with a nexus to a
critical event. Information may
additionally be retrieved by other
personal identifiers by user account
maintenance programs within the
PO 00000
Frm 00060
Fmt 4703
Sfmt 4703
14489
application. The administrator runs
routine reports and reviews analytics
that include user unique identifiers
such as name and phone number, etc.
Reports can be filtered using a personal
identifier (i.e., reports can be generated
to indicate who responded to a
notification message).
POLICIES AND PRACTICES FOR RETENTION AND
DISPOSAL OF RECORDS:
Records are archived/disposed of
during the routine data sync for
individuals who are no longer
employees or contractors of EXIM.
Otherwise, records are maintained and
destroyed in accordance with the
National Archives and Record
Administration’s (‘‘NARA’’) Basic Laws
and Authorities (44 U.S.C. 3301, et seq.)
or an EXIM Bank records disposition
schedule approved by NARA.
ADMINISTRATIVE, TECHNICAL, AND PHYSICAL
SAFEGUARDS:
Information will be stored in
electronic format within the OnSolve
PCEM Cloud Service Provider (CSP)
Amazon Web Service (AWS). EXIM
Emergency Notification System has
configurable, layered user accounts and
permissions features to ensure users
have only the amount of access
necessary to perform their duties.
Access to EXIM Emergency Notification
System is restricted to EXIM current
employees and contractors for
emergency notification, information
technology alerting, and disaster
recovery to support effective
communication. OnSolve PCEM users
use HTTPS through CloudFlare DNS to
access the application using an internet
Browser. EXIM AD Data daily sync is
performed using SFTP one direction
initiated from EXIM only.
OnSolve PCEM personnel access the
AWS US East/West OnSolve Platform
CEM environment via VPN to meet FIPS
140–2 Cryptographic Module Validation
Program requirements at https://
csrc.nist.gov/projects/cryptographicmodule-validation-program. Multifactor authentication is implemented on
personal mobile devices (only) for CSP
administrators to authenticate. VPN
Authentication occurs at the VPN
located in the public subnet in the
authorization boundary. After
establishing the VPN connection, the
administrator establishes an SSH
connection to remote desktop into a
Jump Host, within the Jump Host
subnet. Personnel must supply their
username and password provided by a
dedicated Active Directory, specifically
used for this AWS environment (i.e., not
the corporate Active Directory). If
someone were to leave the organization
E:\FR\FM\27FEN1.SGM
27FEN1
14490
Federal Register / Vol. 89, No. 39 / Tuesday, February 27, 2024 / Notices
or no longer require access, that
individual’s jump host can be deleted.
Jump Hosts authenticate against Vault
(within a management services subnet
in the OnSolve AWS cloud
environment) to establish access. Vault
checks Active Directory to validate the
login information that has been
provided by the user and returns an
SSH-signed certificate token/key that
expires after 12 hours. Vault also stores
‘‘secrets’’ to the environment. For
example, all the database passwords for
database users are stored in Vault. The
Jump Host is allowed access into all
other subnets for administrative
purposes just as if the 12-hours token
has not expired.
OnSolve PCEM, which is hosted in
AWS as a Software-as-a-Service
application, inherits all the
administrative, technical, and physical
controls offered by AWS and the EXIM
Infrastructure General Support System.
OnSolve PCEM CSP is compliant with
the Federal Risk and Authorization
Management Program (FedRAMP). The
PII information EXIM Emergency
Notification System is encrypted and
stored in AWS, and the Hypertext
Transfer Protocol Secure (HTTPS)
protocol and Security Assertion Markup
Language (SAML) authentication is used
to access EXIM Emergency Notification
System.
RECORD ACCESS PROCEDURES:
Requests to access records under the
Privacy Act must be submitted in
writing and must be signed by the
requestor. Requests should be addressed
to the Freedom of Information Act
Office and the Office of Information
Management and Technology, Export
Import Bank of the United States, 811
Vermont Ave. NW, Washington, DC
20571. The request must comply with
the requirements of 12 CFR 404.14.
lotter on DSK11XQN23PROD with NOTICES1
CONTESTING RECORD PROCEDURES:
Individuals seeking to contest and/or
amend records under the Privacy Act
must submit a request in writing. The
request must be signed by the requestor
and should be addressed to the Freedom
of Information Act Office and the Office
of Information Management and
Technology, Export Import Bank of the
United States, 811 Vermont Ave. NW,
Washington, DC 20571. The request
must comply with the requirements of
12 CFR 404.14.
NOTIFICATION PROCEDURES:
Individuals wishing to determine
whether this system of records contains
information about them may do so by
submitting a written request to the
Freedom of Information Act Office and
VerDate Sep<11>2014
16:53 Feb 26, 2024
Jkt 262001
the Office of Information Management
and Technology, Export Import Bank of
the United States, 811 Vermont Ave.
NW, Washington, DC 20571. The
written request must include the
following:
• Name
• Type of information requested
• Address to which the information should
be sent, and
• Signature
EXEMPTIONS PROMULGATED FOR THE SYSTEM:
None.
any penalty for failing to comply with
a collection of information subject to the
PRA that does not display a valid Office
of Management and Budget (OMB)
control number.
Written PRA comments should
be submitted on or before April 29,
2024. If you anticipate that you will be
submitting comments, but find it
difficult to do so within the period of
time allowed by this notice, you should
advise the contact listed below as soon
as possible.
DATES:
Direct all PRA comments to
Nicole Ongele, FCC, via email PRA@
fcc.gov and to nicole.ongele@fcc.gov.
ADDRESSES:
HISTORY:
None.
Lin Zhou,
IT Specialist.
For
additional information about the
information collection, contact Nicole
Ongele, (202) 418–2991.
FOR FURTHER INFORMATION CONTACT:
[FR Doc. 2024–03908 Filed 2–26–24; 8:45 am]
BILLING CODE 6690–01–P
SUPPLEMENTARY INFORMATION:
FEDERAL COMMUNICATIONS
COMMISSION
[OMB 3060–1033; FR ID 204674]
Information Collection Being Reviewed
by the Federal Communications
Commission Under Delegated
Authority
Federal Communications
Commission.
ACTION: Notice and request for
comments.
AGENCY:
As part of its continuing effort
to reduce paperwork burdens, and as
required by the Paperwork Reduction
Act (PRA) of 1995, the Federal
Communications Commission (FCC or
the Commission) invites the general
public and other Federal agencies to
take this opportunity to comment on the
following information collection.
Comments are requested concerning:
whether the proposed collection of
information is necessary for the proper
performance of the functions of the
Commission, including whether the
information shall have practical utility;
the accuracy of the Commission’s
burden estimate; ways to enhance the
quality, utility, and clarity of the
information collected; ways to minimize
the burden of the collection of
information on the respondents,
including the use of automated
collection techniques or other forms of
information technology; and ways to
further reduce the information
collection burden on small business
concerns with fewer than 25 employees.
The FCC may not conduct or sponsor a
collection of information unless it
displays a currently valid control
number. No person shall be subject to
SUMMARY:
PO 00000
Frm 00061
Fmt 4703
Sfmt 4703
OMB Control Number: 3060–1033.
Title: Multi-Channel Video Program
Distributor EEO Program Annual
Report, FCC Form 396–C.
Form Number: FCC–396–C.
Type of Review: Extension of a
currently approved collection.
Respondents: Business or other forprofit entities, Not-for-profit
institutions.
Number of Respondents and
Responses: 603 respondents; 763
responses.
Estimated time per Response: 10
minutes–2.5 hours.
Frequency of Response:
Recordkeeping requirement; Once every
five year reporting requirement; Annual
reporting requirement.
Obligation to Respond: Required to
obtain benefits. The statutory authority
for this collection of information is
contained in Section 154(i) and 303 and
634 of the Communications Act of 1934,
as amended.
Total Annual Burden: 970 hours.
Total Annual Cost: No Cost.
Needs and Uses: The FCC Form 396–
C is a collection device used to assess
compliance with the Equal Employment
Opportunity (EEO) program
requirements of Multi-Channel Video
Programming Distributors (MPVDs). It is
publicly filed to allow interested parties
to monitor a MPVD’s compliance with
the Commission’s EEO requirements. As
part of the in-depth MVPD investigation
conducted once every five years via the
Form 396–C Supplemental Investigation
Sheet, MVPDs are required to submit
their annual EEO public file report for
the preceding year, which details
various facts concerning their
employment outreach efforts.
E:\FR\FM\27FEN1.SGM
27FEN1
Agencies
[Federal Register Volume 89, Number 39 (Tuesday, February 27, 2024)]
[Notices]
[Pages 14487-14490]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2024-03908]
=======================================================================
-----------------------------------------------------------------------
EXPORT-IMPORT BANK
Privacy Act of 1974; New System of Records
AGENCY: Export Import Bank of the United States.
ACTION: Notice of a new system of records.
-----------------------------------------------------------------------
SUMMARY: Pursuant to the Privacy Act of 1974, the Export Import Bank of
the United States (``EXIM'', ``EXIM Bank'', or ``The Bank'') is
proposing a new system of records notice (``SORN'')--EXIM Emergency
Notification System. This new SORN will include the authorities for
maintenance of the system, the purposes of the system, and the
categories of entities and individuals covered by the system. The new
system of records described in this notice, EXIM Emergency Notification
System
[[Page 14488]]
using OnSolve Platform for Critical Event Management (PCEM), will
collect information for current employees and contractors of the Bank
for emergency notification, information technology alerting, and
disaster recovery to support effective communication and management of
critical alerts, and to keep EXIM employees and contractors safe,
informed, assured, and productive during an event/incident or crisis.
DATES: The system of records described herein will become effective
February 27, 2024. The deadline to submit comments on this system of
records, as well as the date on which the below routine uses will
become effective, will be 30 days after Federal Register publication.
ADDRESSES: You may submit written comments to EXIM Bank by any of the
following methods:
Federal eRulemaking Portal: https://www.regulations.gov.
Follow the website instructions for submitting comments.
Email: [email protected]. Refer to SORN in the
subject line.
Mail or Hand Delivery: Address letters to the Freedom of
Information Act Office and the Office of Information Management and
Technology, Export Import Bank of the United States, 811 Vermont Ave.
NW, Washington, DC 20571.
Commenters are strongly encouraged to submit public comments
electronically. EXIM Bank expects to have limited personnel available
to process public comments that are submitted on paper through mail.
Until further notice, any comments submitted on paper will be
considered to the extent practicable. All submissions must include the
agency's name (Export Import Bank of the United States, or EXIM Bank)
and reference this notice. Comments received will be posted without
change to EXIM Bank's website. Do not submit comments that include any
Personally Identifiable Information (PII) or confidential business
information. Copies of comments may also be obtained by writing to the
Freedom of Information Act Office and the Office of Information
Management and Technology, Export Import Bank of the United States, 811
Vermont Ave. NW, Washington, DC 20571.
FOR FURTHER INFORMATION CONTACT: The Office of the General Counsel,
Administrative Law Group at [email protected] or 202-329-2052, or by
going to EXIM Bank Privacy Act System of Records Notice. You may also
contact Selma Hamilton, Director, Security Services at
[email protected] or 202-565-3313.
SUPPLEMENTARY INFORMATION: The new system of records described in this
notice, EXIM Emergency Notification System, will store certain
information about employees and contractors of the Bank for emergency
notification, information technology alerting, and disaster recovery to
support effective communication and management of critical alerts, and
to keep EXIM employees and contractors safe, informed, assured, and
productive during an event/incident or crisis.
The report of a new system of records has been submitted to the
Committee on Oversight and Government Reform of the House of
Representatives, the Committee on Homeland Security and Governmental
Affairs of the Senate, and the Office of Management and Budget,
pursuant to OMB Circular A-108, ``Federal Agency Responsibilities for
Review, Reporting, and Publication under the Privacy Act'' (Dec. 2016),
and the Privacy Act, 5 U.S.C. 552a(r).
SYSTEM NAME AND NUMBER:
System Name: EXIM Emergency Notification System.
System Number: N/A.
SECURITY CLASSIFICATION:
Unclassified.
SYSTEM LOCATION:
This electronic system will be used via a web interface and mobile
application by the Export Import Bank of the United States, 811 Vermont
Avenue NW, Washington, DC 20571. The physical location and technical
operation of the system is at the FedRAMP Authorized Amazon Web
Services (AWS) US East/West cloud services facility at 410 Terry Ave N,
Seattle, WA 98109-5210.
SYSTEM MANAGER(S):
Selma Hamilton, Director, Security Services, EXIM Bank, 811 Vermont
Avenue NW, Washington, DC 20571, [email protected], 202-565-3313.
AUTHORITY FOR MAINTENANCE OF THE SYSTEM:
Export-Import Bank Act of 1945, as amended (12 U.S.C. 635 et
seq.).\1\ 5 U.S.C. 301.
---------------------------------------------------------------------------
\1\ More specifically, sections 635(a)(1) and 635a(j)(1)(C) of
the Export-Import Bank Act of 1945, as amended.
---------------------------------------------------------------------------
PURPOSE(S) OF THE SYSTEM:
The purpose of this system of records is to facilitate and enable
EXIM to communicate with its employees and contractors (``Contacts'')
in a quick and efficient manner in critical events. EXIM utilizes EXIM
Emergency Notification System to ensure employee safety and business
continuity, as well as swift disaster recovery during critical events.
EXIM uses contact information of its employees and contractors
(typically name, telephone number, email addresses and/or physical
address, which is stored within OnSolve Platform for Critical Event
Management (PCEM)) and use the system to communicate alerts using
multiple modalities (including SMS, email, and voice collectively
referred to herein as ``alerts'') to the Contacts at scale.
CATEGORIES OF INDIVIDUALS COVERED BY THE SYSTEM:
The EXIM Emergency Notification System will contain information on
EXIM current employees and contractors.
CATEGORIES OF RECORDS IN THE SYSTEM:
The EXIM Emergency Notification System will contain Personally
Identifiable Information (PII) of EXIM current employees and
contractors typically including, but not limited to name, telephone
number, email addresses and/or physical address/location, and travel
data such as dates and locations of travel captured through manual
entry or an API (Application Programming Interface) from EXIM Travel
Reservation Management system (Concur). This information will be
necessary to enable EXIM to identify and communicate with EXIM staff
and other persons having connections with EXIM (``Contacts'' or
``Recipients'') in a quick and efficient manner to ensure employee
safety and business continuity, as well as swift recovery during
critical events.
RECORD SOURCE CATEGORIES:
The information in the system is obtained using one of three
methods: (1) Active Directory (AD) user data will be used as the
initial source of information for the database to create users, (2)
additional user information will be entered by the user via the user
account ``opt-in'' portal, and (3) data captured through manual entry
or an API (Application Programming Interface) from EXIM Travel
Reservation Management system (Concur). User accounts are created
individually within the OnSolve portal or uploaded via SFTP from an
Active Directory export using System Center Orchestrator (SCOrch).
ROUTINE USES OF RECORDS MAINTAINED IN THE SYSTEM, INCLUDING CATEGORIES
OF USERS AND PURPOSES OF SUCH USES:
In addition to those disclosures that are generally permitted under
5 U.S.C. 552a(b) of the Privacy Act, all or a
[[Page 14489]]
portion of the records or information contained in this system may be
disclosed to authorized entities, as is determined to be relevant and
necessary, outside EXIM as a routine use pursuant to 5 U.S.C.
552a(b)(3) as follows:
1. Appropriate agencies, entities, and persons when (a) the Bank
suspects or has confirmed that there has been a breach of the system of
records; (b) the Bank has determined that as a result of the suspected
or confirmed breach there is a risk of harm to individuals, the Bank
(including its information systems, programs, and operations), the
Federal Government, or national security; and (c) the disclosure made
to such agencies, entities, and persons is reasonably necessary to
assist in connection with the Bank's efforts to respond to the
suspected or confirmed breach or to prevent, minimize, or remedy such
harm.
2. Another Federal agency or Federal entity, when the Bank
determines that information from this system of records is reasonably
necessary to assist the recipient agency or entity in (a) responding to
a suspected or confirmed breach or (b) preventing, minimizing, or
remedying the risk of harm to individuals, the recipient agency or
entity (including its information systems, programs, and operations),
the Federal Government, or national security, resulting from a
suspected or confirmed breach.
3. Congressional offices in response to an inquiry made at the
request of the individual to whom the record pertains.
4. Contractors or other authorized individuals performing work on a
contract, service, cooperative agreement, job, or other activity on
behalf of the Bank or Federal Government and who have a need to access
the information in the performance of their duties or activities.
5. The U.S. Department of Justice (DOJ) for its use in providing
legal advice to the Bank or in representing the Bank in a proceeding
before a court, adjudicative body, or other administrative body, where
the use of such information by the DOJ is deemed by the Bank to be
relevant and necessary to the advice or proceeding, and in the case of
a proceeding, such proceeding names as a party in interest: (a) The
Bank; (b) Any employee of the Bank in his or her official capacity; (c)
Any employee of the Bank in his or her individual capacity where DOJ
has agreed to represent the employee; or (d) The United States, where
the Bank determines that litigation is likely to affect the Bank or any
of its components.
6. A court, magistrate, or administrative tribunal during an
administrative proceeding or judicial proceeding, including disclosures
to opposing counsel or witnesses (including expert witnesses) during
discovery or other pre-hearing exchanges of information, litigation, or
settlement negotiations, where relevant and necessary to a proceeding,
or in connection with criminal law proceedings.
7. Appropriate Federal, State, local, foreign, Tribal, or self-
regulatory organizations or agencies responsible for investigating,
prosecuting, enforcing, implementing, issuing, or carrying out a
statute, rule, regulation, order, policy, or license if the record
indicates a violation or a potential violation of civil or criminal
law, rule, regulation, order, policy, or license.
POLICIES AND PRACTICES FOR STORAGE OF RECORDS:
The records are stored digitally in encrypted format in the OnSolve
PCEM Amazon Web Services (AWS) FedRAMP authorized cloud environment.
OnSolve PCEM encrypts EXIM's sensitive information (such as current
employee or contractor first name, last name, and email address) at
rest and stores it in the databases leveraging native AWS encryption
including Database (DB) clusters, snapshots, underlying structure for
DB clusters. Automated database backups are in place along with read
replica. Native AWS encryption on storage level with an encrypted
Elastic Block Storage (EBS) volume using Advanced Encryption Standard
(AES)--256). For live data (not in a backup file) Elastic File System
(EFS) is used. EXIM Emergency Notification System complies with EXIM
policy which stipulates that sensitive data (such as routine reports)
generated from EXIM Emergency Notification System must be stored on
EXIM's storage system that is managed and protected by EXIM's
Infrastructure General Support System administrative, technical, and
physical controls.
POLICIES AND PRACTICES FOR RETRIEVAL OF RECORDS:
Records may be retrieved by the system administrator using
Contact's (EXIM employee and contractor) first name, last name, work
email address, as well as non-key attributes such as location (e.g.,
Headquarters or Regional Offices), to identify lists of potentially
impacted contacts with a nexus to a critical event. Information may
additionally be retrieved by other personal identifiers by user account
maintenance programs within the application. The administrator runs
routine reports and reviews analytics that include user unique
identifiers such as name and phone number, etc. Reports can be filtered
using a personal identifier (i.e., reports can be generated to indicate
who responded to a notification message).
POLICIES AND PRACTICES FOR RETENTION AND DISPOSAL OF RECORDS:
Records are archived/disposed of during the routine data sync for
individuals who are no longer employees or contractors of EXIM.
Otherwise, records are maintained and destroyed in accordance with the
National Archives and Record Administration's (``NARA'') Basic Laws and
Authorities (44 U.S.C. 3301, et seq.) or an EXIM Bank records
disposition schedule approved by NARA.
ADMINISTRATIVE, TECHNICAL, AND PHYSICAL SAFEGUARDS:
Information will be stored in electronic format within the OnSolve
PCEM Cloud Service Provider (CSP) Amazon Web Service (AWS). EXIM
Emergency Notification System has configurable, layered user accounts
and permissions features to ensure users have only the amount of access
necessary to perform their duties. Access to EXIM Emergency
Notification System is restricted to EXIM current employees and
contractors for emergency notification, information technology
alerting, and disaster recovery to support effective communication.
OnSolve PCEM users use HTTPS through CloudFlare DNS to access the
application using an internet Browser. EXIM AD Data daily sync is
performed using SFTP one direction initiated from EXIM only.
OnSolve PCEM personnel access the AWS US East/West OnSolve Platform
CEM environment via VPN to meet FIPS 140-2 Cryptographic Module
Validation Program requirements at https://csrc.nist.gov/projects/cryptographic-module-validation-program. Multi-factor authentication is
implemented on personal mobile devices (only) for CSP administrators to
authenticate. VPN Authentication occurs at the VPN located in the
public subnet in the authorization boundary. After establishing the VPN
connection, the administrator establishes an SSH connection to remote
desktop into a Jump Host, within the Jump Host subnet. Personnel must
supply their username and password provided by a dedicated Active
Directory, specifically used for this AWS environment (i.e., not the
corporate Active Directory). If someone were to leave the organization
[[Page 14490]]
or no longer require access, that individual's jump host can be
deleted. Jump Hosts authenticate against Vault (within a management
services subnet in the OnSolve AWS cloud environment) to establish
access. Vault checks Active Directory to validate the login information
that has been provided by the user and returns an SSH-signed
certificate token/key that expires after 12 hours. Vault also stores
``secrets'' to the environment. For example, all the database passwords
for database users are stored in Vault. The Jump Host is allowed access
into all other subnets for administrative purposes just as if the 12-
hours token has not expired.
OnSolve PCEM, which is hosted in AWS as a Software-as-a-Service
application, inherits all the administrative, technical, and physical
controls offered by AWS and the EXIM Infrastructure General Support
System.
OnSolve PCEM CSP is compliant with the Federal Risk and
Authorization Management Program (FedRAMP). The PII information EXIM
Emergency Notification System is encrypted and stored in AWS, and the
Hypertext Transfer Protocol Secure (HTTPS) protocol and Security
Assertion Markup Language (SAML) authentication is used to access EXIM
Emergency Notification System.
RECORD ACCESS PROCEDURES:
Requests to access records under the Privacy Act must be submitted
in writing and must be signed by the requestor. Requests should be
addressed to the Freedom of Information Act Office and the Office of
Information Management and Technology, Export Import Bank of the United
States, 811 Vermont Ave. NW, Washington, DC 20571. The request must
comply with the requirements of 12 CFR 404.14.
CONTESTING RECORD PROCEDURES:
Individuals seeking to contest and/or amend records under the
Privacy Act must submit a request in writing. The request must be
signed by the requestor and should be addressed to the Freedom of
Information Act Office and the Office of Information Management and
Technology, Export Import Bank of the United States, 811 Vermont Ave.
NW, Washington, DC 20571. The request must comply with the requirements
of 12 CFR 404.14.
NOTIFICATION PROCEDURES:
Individuals wishing to determine whether this system of records
contains information about them may do so by submitting a written
request to the Freedom of Information Act Office and the Office of
Information Management and Technology, Export Import Bank of the United
States, 811 Vermont Ave. NW, Washington, DC 20571. The written request
must include the following:
Name
Type of information requested
Address to which the information should be sent, and
Signature
EXEMPTIONS PROMULGATED FOR THE SYSTEM:
None.
HISTORY:
None.
Lin Zhou,
IT Specialist.
[FR Doc. 2024-03908 Filed 2-26-24; 8:45 am]
BILLING CODE 6690-01-P