Privacy Act; System of Records, 26953-26965 [2024-07980]
Download as PDF
Federal Register / Vol. 89, No. 74 / Tuesday, April 16, 2024 / Notices
non-public materials (including access
to documents filed under seal) appear in
39 CFR part 3011.
Pursuant to 39 U.S.C. 505, the
Commission appoints R. Tim Boone to
represent the interests of the general
public (Public Representative) in this
proceeding.
IV. Ordering Paragraphs
It is ordered:
1. The Commission establishes Docket
No. R2024–2 to consider the planned
price adjustments for Market Dominant
postal products and services, as well as
the related classification changes,
identified in the Postal Service’s April
9, 2024 Notice.
2. Comments on the planned price
adjustments and related classification
changes are due no later than May 9,
2024.
3. Pursuant to 39 U.S.C. 505, R. Tim
Boone is appointed to serve as an officer
of the Commission to represent the
interests of the general public (Public
Representative) in this proceeding.
4. The Commission directs the
Secretary of the Commission to arrange
for prompt publication of this notice in
the Federal Register.
By the Commission.
Erica A. Barker,
Secretary.
[FR Doc. 2024–07958 Filed 4–15–24; 8:45 am]
BILLING CODE 7710–FW–P
POSTAL REGULATORY COMMISSION
[Docket Nos. MC2024–227 and CP2024–233;
MC2026–228 and CP2024–234]
New Postal Products
Postal Regulatory Commission.
Notice.
AGENCY:
ACTION:
The Commission is noticing a
recent Postal Service filing for the
Commission’s consideration concerning
a negotiated service agreement. This
notice informs the public of the filing,
invites public comment, and takes other
administrative steps.
DATES: Comments are due: April 18,
2024.
ADDRESSES: Submit comments
electronically via the Commission’s
Filing Online system at https://
www.prc.gov. Those who cannot submit
comments electronically should contact
the person identified in the FOR FURTHER
INFORMATION CONTACT section by
telephone for advice on filing
alternatives.
FOR FURTHER INFORMATION CONTACT:
David A. Trissell, General Counsel, at
202–789–6820.
khammond on DSKJM1Z7X2PROD with NOTICES
SUMMARY:
VerDate Sep<11>2014
19:09 Apr 15, 2024
Jkt 262001
SUPPLEMENTARY INFORMATION:
Table of Contents
I. Introduction
II. Docketed Proceeding(s)
I. Introduction
The Commission gives notice that the
Postal Service filed request(s) for the
Commission to consider matters related
to negotiated service agreement(s). The
request(s) may propose the addition or
removal of a negotiated service
agreement from the Market Dominant or
the Competitive product list, or the
modification of an existing product
currently appearing on the Market
Dominant or the Competitive product
list.
Section II identifies the docket
number(s) associated with each Postal
Service request, the title of each Postal
Service request, the request’s acceptance
date, and the authority cited by the
Postal Service for each request. For each
request, the Commission appoints an
officer of the Commission to represent
the interests of the general public in the
proceeding, pursuant to 39 U.S.C. 505
(Public Representative). Section II also
establishes comment deadline(s)
pertaining to each request.
The public portions of the Postal
Service’s request(s) can be accessed via
the Commission’s website (https://
www.prc.gov). Non-public portions of
the Postal Service’s request(s), if any,
can be accessed through compliance
with the requirements of 39 CFR
3011.301.1
The Commission invites comments on
whether the Postal Service’s request(s)
in the captioned docket(s) are consistent
with the policies of title 39. For
request(s) that the Postal Service states
concern Market Dominant product(s),
applicable statutory and regulatory
requirements include 39 U.S.C. 3622, 39
U.S.C. 3642, 39 CFR part 3030, and 39
CFR part 3040, subpart B. For request(s)
that the Postal Service states concern
Competitive product(s), applicable
statutory and regulatory requirements
include 39 U.S.C. 3632, 39 U.S.C. 3633,
39 U.S.C. 3642, 39 CFR part 3035, and
39 CFR part 3040, subpart B. Comment
deadline(s) for each request appear in
section II.
II. Docketed Proceeding(s)
1. Docket No(s).: MC2024–227 and
CP2024–233; Filing Title: USPS Request
to Add Priority Mail & USPS Ground
Advantage Contract 215 to Competitive
Product List and Notice of Filing
1 See Docket No. RM2018–3, Order Adopting
Final Rules Relating to Non-Public Information,
June 27, 2018, Attachment A at 19–22 (Order No.
4679).
PO 00000
Frm 00098
Fmt 4703
Sfmt 4703
26953
Materials Under Seal; Filing Acceptance
Date: April 10, 2024; Filing Authority:
39 U.S.C. 3642, 39 CFR 3040.130
through 3040.135, and 39 CFR 3035.105;
Public Representative: Jennaca D.
Upperman; Comments Due: April 18,
2024.
2. Docket No(s).: MC2024–228 and
CP2024–234; Filing Title: USPS Request
to Add Priority Mail & USPS Ground
Advantage Contract 216 to Competitive
Product List and Notice of Filing
Materials Under Seal; Filing Acceptance
Date: April 10, 2024; Filing Authority:
39 U.S.C. 3642, 39 CFR 3040.130
through 3040.135, and 39 CFR 3035.105;
Public Representative: Almaroof Agoro;
Comments Due: April 18, 2024.
This Notice will be published in the
Federal Register.
Erica A. Barker,
Secretary.
[FR Doc. 2024–08030 Filed 4–15–24; 8:45 am]
BILLING CODE 7710–FW–P
POSTAL SERVICE
Privacy Act; System of Records
Postal Service®.
ACTION: Notice of modified systems of
records.
AGENCY:
The United States Postal
ServiceTM (USPSTM) is proposing to
revise two General Privacy Act Systems
of Records. These updates are being
made to support enhanced security and
analysis to anticipate user issues and
provide resolution.
DATES: These revisions will become
effective without further notice on May
16, 2024, unless, in response to
comments received on or before that
date result in a contrary determination.
ADDRESSES: Comments may be
submitted via email to the Privacy and
Records Management Office, United
States Postal Service Headquarters
(privacy@usps.gov). To facilitate public
inspection, arrangements to view copies
of any written comments received will
be made upon request.
FOR FURTHER INFORMATION CONTACT:
Janine Castorina, Chief Privacy and
Records Management Officer, Privacy
and Records Management Office, 202–
268–3069 or uspsprivacyfedregnotice@
usps.gov.
SUMMARY:
This
notice is in accordance with the Privacy
Act requirement that agencies publish
their systems of records in the Federal
Register when there is a revision,
change, or addition, or when the agency
establishes a new system of records. The
SUPPLEMENTARY INFORMATION:
E:\FR\FM\16APN1.SGM
16APN1
26954
Federal Register / Vol. 89, No. 74 / Tuesday, April 16, 2024 / Notices
Postal Service is proposing revisions to
three existing systems of records (SOR)
to support the implementation of
voluntary mentorship programs and
related applications.
SYSTEM NAME AND NUMBER:
550.100 Commercial Information
Technology Resources—Applications.
SECURITY CLASSIFICATION:
None.
I. Background
This notice is in accordance with the
Privacy Act requirement that agencies
publish their systems of records in the
Federal Register when there is a
revision, change, or addition, or when
the agency establishes a new system of
records. The Postal Service is proposing
to modify two SORs to support user
experience enhancement analytics:
USPS SOR 550.100 Commercial
Information Technology ResourcesApplications
USPS SOR 550.200 Commercial
Information Technology ResourcesAdministrative
II. Rationale for Changes to USPS
Privacy Act Systems of Records
User experience is integral to the
continued, seamless operation of any
technology solution. Identifying pain
points, areas of frustration, and common
technology failures are paramount to
positive user interaction. To that end,
USPS will deploy a new tool to
anticipate, identify, and provide
remediation support for problems that
may plague users in their technological
interactions. Accordingly, USPS will
modify USPS SOR 550.100 Commercial
Information Technology Resources—
Applications and USPS SOR 550.200
Commercial Information Technology
Resources—Administrative as follows:
USPS SOR 550.100 Commercial
Information Technology Resources—
Applications
—Four new purposes: 13, 14, 15, and 16
USPS SOR 550.200 Commercial
Information Technology Resources—
Administrative
—Two new categories of records: 119
and 120.
khammond on DSKJM1Z7X2PROD with NOTICES
III. Description of the Modified Systems
of Records
Pursuant to 5 U.S.C. 552a(e)(11),
interested persons are invited to submit
written data, views, or arguments on
this proposal. A report of the proposed
revisions to this SOR has been sent to
Congress and to the Office of
Management and Budget for their
evaluations. The Postal Service does not
expect that this modified system of
records will have any adverse effect on
individual privacy rights. Accordingly,
for the reasons stated above, the Postal
Service proposes revisions included in
this system of records presented in its
entirety as follows:
VerDate Sep<11>2014
19:09 Apr 15, 2024
Jkt 262001
SYSTEM LOCATION:
All USPS facilities and contractor
sites.
SYSTEM MANAGER(S):
For records of computer access
authorizations: Chief Information
Officer and Executive Vice President,
United States Postal Service, 475
L’Enfant Plaza SW, Washington, DC
20260.
AUTHORITY FOR MAINTENANCE OF THE SYSTEM:
39 U.S.C. 401, 403, and 404.
PURPOSE(S) OF THE SYSTEM:
1. To provide event registration
services to USPS customers, contractors,
and other third parties.
2. To allow task allocation and
tracking among team members.
3. To allow users to communicate by
telephone, instant-messaging, and email
through local machine and web-based
applications on desktop and mobile
operating systems.
4. To share your personal image via
your device camera during meetings and
web conferences, if you voluntarily
choose to turn the camera on, enabling
virtual face-to-face conversations.
5. To provide for the creation and
storage of media files, including video
recordings, audio recordings, desktop
recording, and web-based meeting
recordings.
6. To provide a collaborative platform
for viewing video and audio recordings.
7. To create limited use applications
using standard database formats.
8. To review distance driven by
approved individuals for accurate
logging and compensation.
9. To develop, maintain, and share
computer code.
10. To comply with Security
Executive Agent Directive (SEAD) 3
requirements for self-reporting of
unofficial foreign travel pertaining to
covered individuals who have access to
classified information or who hold a
sensitive position.
11. To administer and maintain a
secure board portal software that
provides leadership with instant access
to information they need before, during
and after meetings, making board and
committee interactions more efficient
and productive by promoting
collaboration and information sharing
among USPS Board of Governors (BOG)
and Executive Leadership Team (ELT).
PO 00000
Frm 00099
Fmt 4703
Sfmt 4703
12. To facilitate the software
component of USPS-sponsored
voluntary mentorship programs.
13. To monitor IT systems for
software, hardware and application
issues and aggregate results for
diagnosis.
14. To measure user experience and
utilization and provide proactive
remediation to experience interruptions.
15. To organize user technology
groupings by high-level to provide
preventative technology support.
16. Collecting user sentiment via
application interactions for the purpose
of measuring digital employee
experience and thereby improving
results.
CATEGORIES OF INDIVIDUALS COVERED BY THE
SYSTEM:
1. Individuals with authorized access
to USPS computers, information
resources, and facilities, including
employees, contractors, business
partners, suppliers, and third parties.
2. Individuals participating in webbased meetings, web-based video
conferencing, web-based
communication applications, and webbased collaboration applications.
3. USPS Board of Governors,
administrators, and USPS Executive
Leadership Team.
CATEGORIES OF RECORDS IN THE SYSTEM:
1. Third-party Information records:
Records relating to non-Postal, thirdparty individuals utilizing an
information system, application, or
piece of software, including: Third-Party
Name, Third Party Date Request, Third
Party Free Text, Guest User Information.
2. Collaboration application records:
Records relating to web-conferencing
and web-collaboration applications,
including; Collaborative Group Names,
Collaborative Group IDs, Action Name,
Number Of Actions Sent, Number Of
Action Responses, Employee Phone
Number, Collaborative Group Chat
History, Profile Information,
Collaborative Group Membership,
Contacts, Project Owner, Project Creator,
Event Start Time, Event Status, Event
Organizer, Event Presenter, Event
Producer, Event Production Type, Event
Recording Setting, Total Number Of
Event Media Viewings, Number Of
Active Users, Number Of Active Users
In Collaborative Groups, Number Of
Active Collaborative Group
Communication Channels, Number Of
Messages Sent, Number Of Calls
Participated In, Last Activity Date Of A
User, Number Of Guest Users In A
Collaborative Group, Event Name, Event
Description, Event Start Date, Event End
Date, Video Platform Group Name,
E:\FR\FM\16APN1.SGM
16APN1
khammond on DSKJM1Z7X2PROD with NOTICES
Federal Register / Vol. 89, No. 74 / Tuesday, April 16, 2024 / Notices
Video Platform Group Email Alias,
Video Platform Group Description,
Video Platform Group Classification,
Video Platform Group Access Level,
Video Platform Channel Name, Video
Platform Channel Description, Video
Platform Channel Access, Video
Platform Live Event Recording, Total
Number Of Video Conferences, Add
Room Member To Collaborative Group,
Attachment Downloaded From
Collaborative Group, Attachment
Uploaded From Collaborative Group,
Direct Message Started From
Collaborative Group, Invite Sent From
Collaborative Group, Message Edited
From Collaborative Group, Message
Posted In Collaborative Group, Remove
Room Member From Collaborative
Group, Room Created In Collaborative
Group, Add Service Account Permission
To Enterprise Collaborative Group,
Remove Service Account Permission To
Enterprise Collaborative Group, Added
User To Enterprise Collaborative Group,
Added User Role To Enterprise
Collaborative Group, Removed User
From Enterprise Collaborative Group,
Request To Join Enterprise Collaborative
Group, Approve Join Request From
Enterprise Collaborative Group, Reject
Join Request From Enterprise
Collaborative Group, Invite User To
Enterprise Collaborative Group, Accept
Invitation For Enterprise Collaborative
Group, Reject Invitation For Enterprise
Collaborative Group, Revoke Invitation
For Enterprise Collaborative Group, Join
Enterprise Collaborative Group, Ban
User Including With Moderation In
Enterprise Collaborative Group, Unban
User From Enterprise Collaborative
Group, Add All Users In Domain For
Enterprise Collaborative Group, Create
Group In Enterprise Collaborative
Group, Delete Group In Enterprise
Collaborative Group, Create Namespace
In Enterprise Collaborative Group,
Delete Namespace In Enterprise
Collaborative Group, Change Info
Setting In Enterprise Collaborative
Group, Add Info Setting In Enterprise
Collaborative Group, Remove Info
Setting In Enterprise Collaborative
Group, Add Member Role In Enterprise
Collaborative Group, Remove User Role
In Enterprise Collaborative Group,
Membership Expiration Added In
Enterprise Collaborative Group,
Membership Expiration Removed In
Enterprise Collaborative Group,
Membership Expiration Updated In
Enterprise Collaborative Group, ACL
Permission Changed In Collaborative
Group, Collaborative Group Invitation
Accepted, Join Request Approved, User
Joined Collaborative Group, User
Requested To Join Collaborative Group,
VerDate Sep<11>2014
19:09 Apr 15, 2024
Jkt 262001
Collaborative Group Basic Setting
Changed, Collaborative Group Created,
Collaborative Group Deleted,
Collaborative Group Identity Setting
Changed, Collaborative Group Info
Setting Added, Collaborative Group Info
Setting Changed, Collaborative Group
Info Setting Removed, Collaborative
Group New Member Restriction
Changed, Collaborative Group Post
Reply Settings Changed, Collaborative
Group Spam Moderation Settings
Changed, Collaborative Group Topic
Setting Changed, Collaborative Group
Message Moderated, User Posts Will
Always Be Posted, User Added To
Collaborative Group, User Banned From
Collaborative Group, User Invitation
Revoked From A Collaborative Group,
User Invited To Collaborative Group,
User Join Request Rejected From A
Collaborative Group, User Reinvited To
Collaborative Group, User Removed
From Collaborative Group, Call Event
Abuse Report Submitted, Call Event
Endpoint Left, Call Event Livestream
Watched, Individual Form Response,
Form Respondent Email Address,
Whiteboard Software Updated,
Whiteboard Reboot Requested,
Whiteboard Export Requested,
Attachment Deleted, Attachment
Uploaded, Note Content Edited, Note
Created, Note Deleted, Note Permissions
Edited.
3. Communication Application
Records: Enterprise Social Network User
Name, Enterprise Social Network User
State, Enterprise Social Network User
State Change Date, Enterprise Social
Network User Last Activity Date,
Number Of Messages Posted By An
Enterprise Social Network User In
Specified Time Period, Number Of
Messages Viewed By An Enterprise
Social Network User, Number Of Liked
Messages By An Enterprise Social
Network User, Products Assigned To A
Enterprise Social Network User, Home
Network Information, External Network
Information, External Network Name,
External Network Description, External
Network Image, Network Creation Date,
Network Usage Policy, External
Network User Name, External Network
User Email Address, External Group
Name, Number Of Users On A Network,
Network ID, Live Event Video Links,
Files Added Or Modified In Enterprise
Social Network, Message ID, Thread ID,
Message Privacy Status, Full Body Of
Message, Chat User Action, Chat Room
Member Added, Chat Attachment
Downloaded, Chat Attachment
Uploaded, Chat Room Blocked, Chat
User Blocked, Chat Direct Message
Started, Chat Invitation Accepted, Chat
Invitation Declined, Chat Invitation
PO 00000
Frm 00100
Fmt 4703
Sfmt 4703
26955
Sent, Chat Message Edited, Chat
Message Posted, Chat Room Member
Removed, Chat Room Created.
4. Multimedia records: Records
relating to media associated with or
originating from an information system,
including; Video Platform User ID,
Video Name, Videos Uploaded By User,
Videos Accessed By User, Channels
Created By User, User Group
Membership, Comments Left By User
On Videos, Screen Recordings, Video
Transcript, Deep Search Captions, Video
Metadata, Audio Metadata, Phone
Number, Time Phone Call Started, User
Name, Call Type, Phone Number Called
To, Phone Number Called From, Called
To Location, Called From Location,
Telephone Minutes Used, Telephone
Minutes Available, Charges For Use Of
Telephone Services, Currency Of
Charged Telephone Services, Call
Duration, Call ID, Conference ID, Phone
Number Type, Blocked Phone Numbers,
Blocking Action, Reason For Blocking
Action, Blocked Phone Number Display
Name, Date And Time Of Blocking, Call
Start Time, User Display Name, SIP
Address, Caller Number, Called To
Number, Call Type, Call Invite Time,
Call Failure Time, Call End Time, Call
Duration, Number Type, Media Bypass,
SBC FQDN, Data Center Media Path,
Data Center Signaling Path, Event Type,
Final SIP, Final Vendor Subcode, Final
SIP Phrase, Unique Customer Support
ID.
5. Limited Use Application records:
Records relating to applications with a
specific, limited use, including;
Application Authoring Application
Name, Application Authoring
Application Author, Voice Search Text
Strings, Miles Driven, Mileage Rates,
Country Currency, Destination,
Destination Classification, Car Make,
Car Model, Working Hours, Total
Number Of Monthly Drives, Total
Number Of Monthly Miles, Total
Number Of Personal Drives, Total
Number Of Personal Drives, Users
Allowed To Access Application,
Application Authoring Application
Security Settings, Total Number Of
Cloud-Based Searches Performed, Total
Number Of Cloud-Based Search Queries
From Web Browsers, Total Number Of
Cloud-Based Search Queries From
Android Operating Systems, Total
Number Of Cloud-Based Search Queries
From iOS Operating Systems, Data
Visualization Report Email Delivery
Added, Data Visualization Asset
Created, Data Visualization Data
Exported, Data Visualization Asset
Deleted, Data Visualization Report
Downloaded, Data Visualization Asset
Edited, Data Visualization Asset
Restored, Data Visualization Report
E:\FR\FM\16APN1.SGM
16APN1
khammond on DSKJM1Z7X2PROD with NOTICES
26956
Federal Register / Vol. 89, No. 74 / Tuesday, April 16, 2024 / Notices
Email Delivery Stopped, Data
Visualization Asset Trashed, Data
Visualization Report Email Delivery
Updated, Data Visualization Asset
Viewed, Data Visualization Link
Sharing Access Type Changed, Data
Visualization Link Sharing Visibility
Changed, Data Visualization User
Sharing Permissions Changed.
6. Development Records: Records
relating to applications used for the
creation, sharing, or modification of
software code, including: Data
Repository User ID, Data Repository
Password, Data Repository User
Address, Data Repository Payment
Information, Data Repository User First
Name, Data Repository User Last Name,
Data Repository Profile Picture, Data
Repository Profile Biography, Data
Repository Profile Location, Data
Repository User Company, Data
Repository User Preferences, Data
Repository User Preference Analytics,
Data Repository Transaction Date, Data
Repository Transaction Time, Data
Repository Transaction Amount
Charged, Data Repository web pages
Viewed, Data Repository Referring
website, Data Repository Date Of web
page Request, Data Repository Time Of
web page Request, Data Repository User
Commits, Data Repository User Commit
Comment Body Text, Data Repository
Pull Request Comment Body Text, Data
Repository Issue Comment Body Text,
Data Repository User Comment Body
Text, Data Repository User
Authentication, Language Of Device
Accessing Data Repository, Operating
System Of Device Accessing Data
Repository, Application Version Of
Device Accessing Data Repository,
Device Type Of Device Accessing Data
Repository, Device ID Of Device
Accessing Data Repository, Device
Model Of Device Accessing Data
Repository, Device Manufacturer Of
Device Accessing Data Repository,
Browser Version Of Device Accessing
Data Repository, Client Application
Information Of Device Accessing Data
Repository, Data Repository User Usage
Information, Data Repository
Transactional Information, Data
Repository API Notification Status, Data
Repository API Issue Status, Data
Repository API Pull Status, Data
Repository API Commit Status, Data
Repository API Review Status, Data
Repository API Label, Data Repository
API User Account Signin Status, Data
Repository API Schedule Status, Data
Repository API Schedule List.
7. Unofficial Foreign Travel
Monitoring: Records relating to covered
individuals for the administration of the
SEAD 3 program, including: Title, Name
Of Traveler, Information Type: Pre-
VerDate Sep<11>2014
19:09 Apr 15, 2024
Jkt 262001
Travel And Post-Travel, Start Date Of
Travel, End Date Of Travel, Carrier Of
Transportation, Countries You Are
Visiting, Passport Number, Passport
Expiration Date, Names And
Association Of Foreign National Travel
Companions, Planned Foreign Contacts,
Emergency Contact Name, Emergency
Contact Phone Number, Emergency
Contact Relationship, Post-Travel
Questions Relating To Activity, Events,
And Interactions.
8. Cloud-based storage records:
Records relating to activity within
cloud-based storage systems, including:
Number Of Files Made Publicly
Available, Number Of Files Made
Available With A Link, Number Of Files
Shared With Domain Users, Number Of
Files Shared With Domain Users
Through Link, Number Of Files Shared
With Users Outside Domain, Number Of
Files Shared With User Or Group In
Domain, Number Of Files Not Shared At
All, Number Of Spreadsheet Documents
Added, Number Of Text Documents
Added, Number Of Presentation
Documents, Number Of Form
Documents Added, Number Of Other
Files Added, Number Of Files Edited,
Number Of Files Viewed, Number Of
Files Added, Total Cloud Storage Space
Used, Last Time Storage Accessed By
User, Item Added To Folder, Item
Approval Cancelled, Comment Added
On Approval Of Item, Due Date Time
Change Requested, Item Approval
Requested, Reviewer Change Requested
For Item Approval, Item Approval
Reviewed, Document Copy Created,
Document Created, Document Deleted,
Document Downloaded, Document
Shared As Email Attachment, Document
Edited, Label Applied, Label Value
Changed, Label Removed, Item Locked,
Item Moved, Item Previewed, Item
Printed, Item Removed From Folder,
Item Renamed, Item Restored, Item
Trashed, Item Unlocked, Item
Uploaded, Item Viewed, Security
Update Applied To File, Security
Update Applied To All Files In Folder,
Publish Status Changed, Editor Settings
Changed, Link Sharing Access Type
Changed, Link Sharing Access Changed
From Parent Folder, Link Sharing
Visibility Changed, Link Sharing
Visibility Changed From Parent Folder,
Security Update Removed From File,
Membership Role Changed, Shared
Storage Settings Changed, Spreadsheet
Range Enabled, User Sharing
Permissions Changed, User Sharing
Permissions Changed From Parent
Folder, User Storage Updated, File
Viewed, File Renamed, File Created,
File Edited, File Previewed, File
Printed, File Updated, File Deleted, File
PO 00000
Frm 00101
Fmt 4703
Sfmt 4703
Uploaded, File Downloaded, File
Shared.
9. Email Application records: Records
relating to regular use of email
applications, including: Email Body
Text, Email Metadata, Total Number Of
Emails Sent, Total Number Of Emails
Received, Total Number Of Emails Sent
And Received, Last Time User Accessed
Email Client Through A Post Office
Protocol (POP) Mail Server, Last Time
User Accessed Email Client Through An
internet Message Access Protocol
(IMAP) Mail Server, Last Time User
Accessed Through Web-Based Server,
Total Email Client Storage Space Used,
Calendar Access Level(S) Changed,
Calendar Country Changed, Calendar
Created, Calendar Deleted, Calendar
Description Changed, Calendar Location
Changed, Calendar Time zone Changed,
Calendar Title Changed, Calendar
Notification Triggered, Calendar
Subscription Added, Calendar
Subscription Deleted, Calendar Event
Created, Calendar Event Deleted,
Calendar Event Guest Added, Calendar
Event Guest Auto-Response, Calendar
Event Guest Removed, Calendar Event
Guest Response Changed, Calendar
Event Modified, Calendar Event
Removed From Trash, Calendar Event
Restored, Calendar Event Start Time
Changed, Calendar Event Title
Modified, Successful Availability
Lookup Of A Calendar Between Email
Clients, Successful Availability Lookup
Of Email Client Resource, Successful
Email Client Resource List Lookup,
Unsuccessful Availability Lookup Of A
Calendar On Email Client, Unsuccessful
Availability Lookup Of Email Client
Resource, Unsuccessful Email Client
Resource List Lookup.
10. Web Browser Records: Records
relating to activity within a web
browser, including: Web Browser
Password Changed, Web Browser
Password Reused, Malware Detected in
Transferred Content for User, Sensitive
Data Detected In Transferred Content,
Unsafe website Visit Detected For User.
11. USPS Board of Governors name,
email, and collaborative meeting records
used to store meeting material such as
presentations, briefing documents/
memos, meeting minutes/notes, and
responses to various board inquiries,
presentation briefing documents, and
memos.
12. Mentorship Application
Information: Match Data Stored About A
User, Program Membership Status,
Program Eligibility, Program Enrollment
Date, Program Participation Preference,
Mentor/Mentee Capacity, Preferred
Mentors, Accepting New Matches
Status, Recommended Mentors,
Declined Recommendation Reason,
E:\FR\FM\16APN1.SGM
16APN1
Federal Register / Vol. 89, No. 74 / Tuesday, April 16, 2024 / Notices
Active Mentor/Mentee/Peer
Relationships, Relationship Start/End
Date, User Who Requested The
Relationship, Relationship Status,
Action Item/Checklist Item Progress,
Mentorship Agreements, Pairing Health,
Mentor/Mentee/Peer Relationship
Requests, Mentor/Mentee/Peer
Relationship Extension Requests,
Mentor/Mentee/Peer Request
Introduction Notes, Mentor/Mentee/
Peer Request Preferred Match Duration,
Past Mentor/Mentee/Peer Relationships,
Active Group Membership As A
Mentor/Mentee/Peer, Group Name,
Group Start/End Date, Group Status,
Past Group Membership As A Mentor/
Mentee/Peer.
13. Mentoring Session Data Stored For
A User: Status, Default Admin Agenda,
Custom User Agenda Start/End Date
Time, Mentee/Mentor Feedback, 1–4
Star Rating, Free Text Session Feedback,
Private Session Notes, Shared Session
Notes, User Booking Session, Session
Calendar Event And Videoconferencing
Details, Session Attendance, Session
Topics.
14. Program Survey Data Stored For A
User: Survey Status, Custom Admin
Supplied Question Responses, Program
Admin Data, Reporting Column
Preferences, Program Admin Support
Contact.
ROUTINE USES OF RECORDS MAINTAINED IN THE
SYSTEM, INCLUDING CATEGORIES OF USERS AND
THE PURPOSES OF SUCH USES:
khammond on DSKJM1Z7X2PROD with NOTICES
Standard routine uses 1. through 9.
apply. In addition:
(a) To appropriate agencies, entities,
and persons when (1) the Postal Service
suspects or has confirmed that there has
been a breach of the system of records;
(2) the Postal Service has determined
that as a result of the suspected or
confirmed breach there is a risk of harm
to individuals, the Postal Service
(including its information systems,
programs, and operations), the Federal
Government, or national security; and
(3) the disclosure made to such
agencies, entities, and persons is
reasonably necessary to assist in
connection with the Postal Service’s
efforts to respond to the suspected or
confirmed breach or to prevent,
minimize, or remedy such harm.
RECORD SOURCE CATEGORIES:
Employees; contractors; customers;
USPS Board of Governors.
POLICIES AND PRACTICES FOR STORAGE OF
RECORDS:
Automated database, computer
storage media, and paper.
VerDate Sep<11>2014
19:09 Apr 15, 2024
Jkt 262001
POLICIES AND PRACTICES FOR RETRIEVAL OF
RECORDS:
1. Records relating to third-parties are
retrievable by name and email address.
2. Records relating to collaboration
are retrievable by name, email address,
and user ID.
3. Records relating to communication
are retrievable by name, email address,
and user ID.
4. Records pertaining to multimedia
are retrievable by username and media
title.
5. Records relating to application
development are retrievable by user ID
and application name.
6. Records relating to limited use
applications are retrievable by name,
email address, and user ID.
7. Records relating to Unofficial
Foreign Travel Monitoring for covered
individuals are retrievable by name.
8. Records relating to Cloud-based
storage are retrievable by name, email
address, and user ID.
9. Records relating to Email
Applications are retrievable by name,
email address, and user ID.
10. Records relating to Web Browsers
are retrievable by name, email address,
and user ID.
11. USPS Board of Governors secure
board portal collaboration software data
is retrievable by date, meeting
information, committee name, and other
session collaboration details.
12. Records relating to mentorship
programs are retrievable by mentee
name
POLICIES AND PRACTICES FOR RETENTION AND
DISPOSAL OF RECORDS:
1. Records relating to third parties are
retained for twenty-four months.
2. Records relating to collaboration
are retained for twenty-four months.
3. Records relating to communication
are retained for twenty-four months.
4. Multimedia recordings are retained
for twenty-four months.
5. Records relating to application
development are retained for twentyfour months.
6. Records relating to limited use
applications are retained for twenty-four
months.
7. Records relating to Unofficial
Foreign Travel Monitoring for covered
individuals are retained for twenty-five
years.
8. Records relating to Cloud-based
storage are retained for twenty-four
months.
9. Records relating to Email
Applications are retained for twentyfour months.
10. Records relating to Web Browsers
are retained for twenty-four months.
11. USPS Board of Governors secure
board portal collaboration software data
PO 00000
Frm 00102
Fmt 4703
Sfmt 4703
26957
is retained up to twelve months from
the close of the corresponding event.
12. Records relating to mentorship
programs are retained for twenty-four
months.
ADMINISTRATIVE, TECHNICAL, AND PHYSICAL
SAFEGUARDS:
Paper records, computers, and
computer storage media are located in
controlled-access areas under
supervision of program personnel.
Computer access is limited to
authorized personnel with a current
security clearance, and physical access
is limited to authorized personnel who
must be identified with a badge.
Access to records is limited to
individuals whose official duties require
such access. Contractors and licensees
are subject to contract controls and
unannounced on-site audits and
inspections.
Computers are protected by
encryption, mechanical locks, card key
systems, or other physical access control
methods. The use of computer systems
is regulated with installed security
software, computer logon
identifications, and operating system
controls including access controls,
terminal and transaction logging, and
file management software.
RECORD ACCESS PROCEDURES:
Requests for access must be made in
accordance with the Notification
Procedure and USPS Privacy Act
regulations regarding access to records
and verification of identity under 39
CFR 266.5.
CONTESTING RECORD PROCEDURES:
See Notification Procedure and
Record Access Procedures above.
NOTIFICATION PROCEDURES:
Customers and employees wanting to
know if other information about them is
maintained in this system of records
must address inquiries in writing to the
Chief Information Officer and Executive
Vice President and include their name
and address.
EXEMPTIONS PROMULGATED FOR THE SYSTEM:
None.
HISTORY:
December 1, 2023; 88 FR 83981; May
11, 2021; 86 FR 25899; January 31, 2022;
87 FR 4957.
SYSTEM NAME AND NUMBER:
550.200 Commercial Information
Technology Resources—Administrative.
SECURITY CLASSIFICATION:
None.
E:\FR\FM\16APN1.SGM
16APN1
26958
Federal Register / Vol. 89, No. 74 / Tuesday, April 16, 2024 / Notices
SYSTEM LOCATION:
All USPS facilities and contractor
sites.
SYSTEM MANAGER(S):
For records of computer access
authorizations: Chief Information
Officer and Executive Vice President,
United States Postal Service, 475
L’Enfant Plaza SW, Washington, DC
20260.
AUTHORITY FOR MAINTENANCE OF THE SYSTEM:
39 U.S.C. 401, 403, and 404.
PURPOSE(S) OF THE SYSTEM:
1. To provide active and passive
monitoring and review of information
system applications and user activities.
2. To generate logs and reports of
information system application and user
activities.
3. To provide a means of auditing
commercial information system
activities across applications and users.
CATEGORIES OF INDIVIDUALS COVERED BY THE
SYSTEM:
1. Individuals with authorized access
to USPS computers, information
resources, and facilities, including
employees, contractors, business
partners, suppliers, and third parties.
2. Individuals participating in webbased meetings, web-based video
conferencing, web-based
communication applications, and webbased collaboration applications.
khammond on DSKJM1Z7X2PROD with NOTICES
CATEGORIES OF RECORDS IN THE SYSTEM:
1. General Audit Log activities:
DateTime, IP Address, User Activity,
User Item Accessed, Activity Detail,
Object ID, Record Type, Client IP
Address, CorrelationID, CreationTime,
EventData, EventSource, ItemType,
OrganizationID, UserAgent, USerKEy,
UserType, Version, Workload.
2. File and page activities: Accessed
file, Change retention label for a file,
Deleted file marked as a record,
Checked in file, Changed record status
to locked, Changed record status to
unlocked, Checked out file, Copied file,
Discarded file checkout, Deleted file,
Deleted file from recycle bin, Deleted
file from second-stage recycle bin,
Detected document sensitivity
mismatch, Detected malware in file,
Deleted file marked as a record,
Downloaded file, Modified file, Moved
file, Recycled all minor versions of file,
Recycled all versions of file, Recycled
version of file, Renamed file, Restored
file, Uploaded file, Viewed page, View
signaled by client, Performed search
query.
3. Folder activities: Copied folder,
Created folder, Deleted folder, Deleted
folder from recycle bin, Deleted folder
VerDate Sep<11>2014
19:09 Apr 15, 2024
Jkt 262001
from second-stage recycle bin, Modified
folder, Moved folder, Renamed folder,
Restored folder.
4. Cloud-based Enterprise Storage
activities: Created list, Created list
column, Created list content type,
Created list item, Created site column,
Created site content type, Deleted list,
Deleted list column, Deleted list content
type, Deleted list item, Deleted site
column, Deleted site content type,
Recycled list item, Restored list,
Restored list item, Updated list,
Updated list column, Updated list
content type, Updated list item,
Updated site column, Updated site
content type.
5. Sharing and access request
activities: Added permission level to
site collection, Accepted access request,
Accepted sharing invitation, Blocked
sharing invitation, Created access
request, Created a company shareable
link, Created an anonymous link,
Created secure link, Deleted secure link,
Created sharing invitation, Denied
access request, Removed a company
shareable link, Removed an anonymous
link, Shared filer, folder, or site,
Unshared file folder or site, Updated
access request, Updated an anonymous
link, Updated sharing invitation, Used a
company shareable link, Used an
anonymous link, Used secure link, User
added to secure link, User removed
from secure link, Withdrew sharing
invitation.
6. Synchronization activities: Allowed
computer to sync files, Blocked
computer from syncing files,
Downloaded files to computer,
Downloaded file changes to computer,
Uploaded files to document library,
Uploaded file changes to document
library.
7. Site permissions activities: Added
site collection admin, Added user of
group to Cloud-based Enterprise Storage
group, Broke permission level
inheritance, Broke sharing inheritance,
Created group, Deleted group, Modified
access request setting, Modified
‘‘Members Can Share’’ setting, Modified
permission level on site collection,
Modified site permissions, Removed site
collection admin, Removed permission
level from site collection, Removed user
or group from Cloud-based Enterprise
Storage group, Requested site admin
permissions, Restored sharing
inheritance, Updated group.
8. Site administration activities:
Added allowed data location, Added
exempt user agent, Added geo location
admin, Allowed user to create groups,
Cancelled site geo move, Changed a
sharing policy, Changed deice access
policy, Changed exempt user agents,
Changed network access policy,
PO 00000
Frm 00103
Fmt 4703
Sfmt 4703
Completed site geo move, Created Sent
To connection, Created site collection,
Deleted orphaned hub site, Deleted Sent
To connection, Deleted site, Enabled
document preview, Enabled legacy
workflow, Enabled Office on Demand,
Enabled result source for People
Searched, Enabled RSS feeds, Failed site
swap, Joined site to hub site, Registered
hub site, Removed allowed data
location, Removed geo location admin,
Renamed site, Scheduled site rename,
Scheduled site swap, Scheduled site geo
move, Set host site, Set storage quota for
geo location, Swapped site, Unjoined
site from hub site, Unregistered hub site.
9. Cloud-based Email Server mailbox
activities: Created mailbox item, Copied
messages to another folder, User signed
in to mailbox, Accessed mailbox items,
Sent message using Send On Behalf
permissions, Purged messages from
mailbox, Moved messages to Deleted
Items folder, Moved messages to another
folder, Sent message using Send As
permissions, Sent message, Updated
message, Deleted messages from Deleted
Items folder, New-Inbox Rule CreateInbox Rule from email web application,
Set-Inbox Rule Modify inbox rule from
email web application, Update inbox
rules from email web application,
Added delegate mailbox permissions,
Removed delegate mailbox permissions,
Added permissions to folder, Modified
permissions of folder, Removed
permissions from folder, Added or
removed user with delegate access to
calendar folder, Labeled message as a
record.
10. Retention policy and retention
level activities: Created retention label,
Created retention policy, Configured
settings for a retention policy, Deleted
retention label, Deleted retention policy,
Deleted settings from a retention policy,
Updated retention label, Updated
retention policy, Updated settings for a
retention policy, Enabled regulatory
record option for retention labels.
11. User administration activities:
Added user, Deleted user, Set license
properties, Reset user password,
Changed user password, Changed user
license, Updated user, Set property that
forces user to change password,
Organization Signup, Organization
Creation, User creation without
organization, Password reset requested,
Disable user, Login success, Login
success reauthenticate, Login failure,
Login failure reauthentication, Logout,
User permission change, Role
permission change, Environment
permissions change, Create role, Edit
role—add user, Edit role—remove user,
Edit role—change external group
mapping, Delete role.
E:\FR\FM\16APN1.SGM
16APN1
khammond on DSKJM1Z7X2PROD with NOTICES
Federal Register / Vol. 89, No. 74 / Tuesday, April 16, 2024 / Notices
12. Enterprise User Administration
group administration activities: Added
group, Updated group, Deleted group,
Added member to group, Removed
member from group.
13. Application administration
activities: Added service principal,
Removed a service principal from the
directory, Set delegation entry,
Removed credentials from a service
principal, Added delegation entry,
Added credentials to a service principal,
Removed delegation entry.
14. Role administration activities:
Added member to Role, Removed a user
from a directory role, Set company
contact information.
15. Directory administration
activities: Added a partner to the
directory, Removed a partner from the
directory, Added domain to company,
Removed domain from company,
Updated domain, Set domain
authentication, Verified domain,
Updated the federation settings for a
domain, Verified email verified domain,
Turned on Enterprise Information
Technology Account Administration
sync, Set password policy, Set company
information.
16. eDiscovery activities: Created
content search, Deleted content search,
Changed content search, Started content
search, Stopped content search, Started
export of content search, Started export
report, Previewed results of content
search, Purged results of content search,
Started analysis of content search,
Removed export of content search,
Removed preview results of content
search, Removed purse action
performed on content search, Removed
analysis of content search, Removed
search report, Content search preview
item listed, Content search preview item
viewed, Content search preview item
downloaded, Downloaded export of
content search, Created search
permissions filter, Deleted search
permissions filter, Changed search
permissions filter, Created hold in
eDiscovery case, Deleted hold in
eDiscovery case, Changed hold in
eDiscovery case, Created eDiscovery
case, Deleted hold in eDiscovery case,
Changed hold in eDiscovery case,
Created eDiscovery case, Deleted
eDiscovery data, Changed hold in
eDiscovery case, Added member to
eDiscovery case, Removed member from
eDiscovery case, Changed eDiscovery
case membership, Created eDiscovery
administrator, Deleted eDiscovery
administrator, Changed eDiscovery
administrator membership, Remediation
action created, Item deleted using
Remediation, Created workingset
search, Updated workingset search,
Deleted workingset search, Previewed
VerDate Sep<11>2014
19:09 Apr 15, 2024
Jkt 262001
workingset search, Document viewed,
Document annotated, Document
downloaded, Tag created, Tag edited,
Tag deleted, Tag files, Tag job, Created
review set, Added Cloud-based
productivity software data, Added nonoffice data, Added data to another
workingset, Added remediated data,
Run algo job, Run export job, Run burn
job, Run error remediation job, Run load
comparison job, Updated case settings.
17. eDiscovery system command
activities: Created content search,
Deleted content search, Changed
content search, Started content search,
Stopped content search, created content
search action, Deleted content search
action, Created search permissions
filter, Deleted search permissions filter,
Changed search permissions filter,
Created hold in eDiscovery case,
Deleted hold in eDiscovery case,
Changed hold in eDiscovery case,
Created search query for eDiscovery
case hold, Deleted search query for
eDiscovery case hold, Changed search
query for eDiscovery case hold, Created
eDiscovery case, Deleted eDiscovery
case, Changed eDiscovery case, Added
member to eDiscovery case, Removed
member from eDiscovery case, Changed
eDiscovery case membership, Created
eDiscovery administrator, Deleted
eDiscovery administrator, Changed
eDiscovery administrator membership.
18. Data Analysis application
activities: Viewed program dashboard,
Created program dashboard, Edited
program dashboard, Deleted program
dashboard, Shared program dashboard,
Printed program dashboard, Copied
program dashboard, Viewed program
tile, Exported program tile data, Viewed
program report, Deleted program report,
Printed program report page, Created
program report, Edited program report,
Copied program report, Exported
program artifact to another file format,
Export program activity events, Updated
program workspace access, Restored
program workspace, Updated program
workspace, Viewed program metadata,
Created program dataset, Deleted
program dataset, Created program
group, Deleted program group, Added
program group members, Retrieved
program groups, Retrieved program
dashboard, Retrieved data sources from
program dataset, Retrieved upstream
data flows from program dataflow,
Retrieved data sources from program
dataflow, Removed program group
members, Retrieved links between
datasets and dataflows, Created
organizational program content pack,
Created program app, Installed program
app, Updated program app, Updated
organization’s program settings, Started
program trial, Started program extended
PO 00000
Frm 00104
Fmt 4703
Sfmt 4703
26959
trial, Analyzed program dataset, Created
program gateway, Deleted program
gateway, Added data source to program
gateway, Removed data source from
program gateway, Changed program
gateway admins, Changed program
gateway data source users, Set
scheduled refresh on program dataset,
Unpublished program app, Deleted
organizational program content pack,
Renamed program dashboard, Edited
program dataset, Updated capacity
display name, Changed capacity state,
Updated capacity admin, Changed
capacity user assignment, Migrated
workspace to a capacity, Removed
workspace from a capacity, Retrieved
program workspaces, Shared program
report, Generated program Embed
Token, Discover program dataset data
sources, Updated program dataset data
sources, Requested program dataset
refresh, Binded program dataset to
gateway, Changed program dataset data
sources, Requested program dataset
refresh, Binded program dataset to
gateway, Changed program dataset
connections, Took over program dataset,
Updated program gateway data source
credentials, Imported file to program,
Updated program dataset parameters,
Generated program dataflow SAS token,
Created program dataflow, Updated
program dataflow, Deleted program
dataflow, Viewed program dataflow,
Exported program dataflow, Set
scheduled refresh on program dataflow,
Requested program dataflow refresh,
Received program dataflow secret from
Key Vault, Attached dataflow storage
account, Migrated dataflow storage
location, Updated dataflow storage
assignment permissions, Set dataflow
storage location for workspace, Took
ownership of program dataflow,
Canceled program dataflow refresh,
Created program email subscription,
Updated program email subscription,
Deleted program email subscription,
Created program folder, Deleted
program folder, Updated program
folder, Added program folder access,
Deleted program folder access, Updated
program folder access, Posted program
comment, Deleted program comment,
Analyzed program report, Viewed
program usage metrics, Edited program
dataset endorsement, Edited program
dataflow endorsement, Edited program
report endorsement, Edited program app
endorsement, Retrieved list of modified
workspaces in program tenant, Sent a
scan request in program tenant, Retrieve
scan result in program tenant, Inserted
snapshot for user in program tenant,
Updated snapshot for user in program
tenant, Deleted snapshot for user in
program tenant, Inserted snapshot for
E:\FR\FM\16APN1.SGM
16APN1
khammond on DSKJM1Z7X2PROD with NOTICES
26960
Federal Register / Vol. 89, No. 74 / Tuesday, April 16, 2024 / Notices
user in program tenant, Updated
snapshot for user in program tenant,
Deleted snapshot for user in program
tenant, Retrieved snapshots for user in
program tenant, Edited program
certification permission, Took over a
program data source, Updated capacity
custom settings, Created workspace for
program template app, Deleted
workspace for program template app,
Updated settings for program template
app, Updated testing permissions for
program template app, Created program
template app, Deleted program template
app, Promoted program template app,
Installed program template app,
Updated parameters for installed
program template app, Created install
ticker for installing program template
app, Updated an organizational custom
visual, Created an organizational custom
visual, Deleted an organizational custom
visual, Custom visual requested
Enterprise Information Technology
Account Administration access token,
Customer visual requested Cloud-based
productivity software access token,
Connected to program dataset from
external app, Created program dataset
from external app, Deleted program
dataset from external app, Edited
program dataset from external app,
Requested program dataset refresh from
external app, Requested SAS token for
program storage, Requested account key
for program storage, Assigned a
workspace to a deployment pipeline,
Removed a workspace from a
deployment pipeline, Deleted
deployment pipeline, Created
deployment pipeline, Deployed to a
pipeline stage, Updated deployment
pipeline configuration, Updated
deployment pipeline access, Added
external resource, Added link to
external resource, Deleted link to
external resource, Updated featured
tables, Applied sensitivity label to
program artifact, Changed sensitivity
label for program artifact, Deleted
sensitivity label from program artifact.
19. Productivity Analysis activities:
Updated privacy setting, Updated data
access setting, Uploaded organization
data, Created meeting exclusion,
Updated preferred meeting exclusion,
Execute query, Canceled query, Deleted
result, Downloaded report, Accessed
Odata link, Viewed query visualization,
Viewed explore, Created partition,
Updated partition, Deleted partition,
User logged in, User logged out.
20. Briefing email activities: Updated
user privacy settings, Updated
organization privacy settings.
21. Cloud-based Collaboration
Application activities: Created team,
Deleted team, Added channel, Deleted
channel, Changed organization setting,
VerDate Sep<11>2014
19:09 Apr 15, 2024
Jkt 262001
Changed team setting, Changed channel
setting, User signed in to Cloud-based
Collaboration Application, Added
members, Changed role of members,
Removed members, Added bot to team,
Removed bot from team, Added tab,
Removed tab, Updated tab, Added
connector, Removed connector,
Updated connector, Downloaded
analytics report, Upgraded Cloud-based
Collaboration Application device,
Blocked Cloud-based Collaboration
Application device, Unblocked Cloudbased Collaboration Application device,
Changed configuration of Cloud-based
Collaboration Application device,
Enrolled Cloud-based Collaboration
Application device, Installed app,
Upgraded app, Uninstalled app,
Published app, Updated app, Deleted
app, Deleted all organization apps,
Performed action on card, Added
scheduling group, Edited scheduling
group, Deleted scheduling group, Added
shift, Edited shift, Deleted shift, Added
time off, Edited time off, Deleted time
off, Added open shift, Edited open shift,
Deleted open shift, Shared schedule,
Clocked in using Time clock, Clocked
out using Time clock, Started break
using Time clock, Ended break using
Time clock, Added Time clock entry,
Edited Time clock entry, Deleted Time
clock entry, Added shift request,
Responded to shift request, Canceled
shift request, Changed schedule setting,
Added workforce integration, Accepted
off shift message.
22. Cloud-based Collaboration
Application approvals activities:
Created new approval request, Viewed
approval request details, Approved
approval request, Rejected approval
request, Canceled approval request,
Shared approval request, File attached
to approval request, Reassigned
approval request, Added e-signature to
approval request.
23. Enterprise Social Network
activities: Changed data retention
policy, Changed network configuration,
Changed network profile settings,
Changed private content mode, Changed
security configuration, Created file,
Created group, Deleted group, Deleted
message, Downloaded file, Exported
data, Shared file, Suspended network
user, Suspended user, Updated file
description, Updated file name, Viewed
file.
24. Enterprise Customer Relationship
Management activities: Accessed out-ofbox entity (deprecated), Accessed
custom entity (deprecated), Accessed
admin entity (deprecated), Performed
bulk actions (deprecated), All Enterprise
Customer Relationship Management
activities, Accessed Enterprise Customer
Relationship Management admin center
PO 00000
Frm 00105
Fmt 4703
Sfmt 4703
(deprecated), Accessed internal
management tool (deprecated), Signed
in or out (deprecated), Activated process
or plug-in (deprecated).
25. Information Systems
Infrastructure Automation activities:
Created flow, Edited flow, Deleted flow,
Edited flow permissions, Deleted flow
permissions, Started a Flow paid trial,
Renewed a Flow paid trial.
26. Application authoring program
activities: Created app, Edited app,
Deleted app, Launched app, Published
app, Marked app as Hero, Marked app
as Featured, Edited app permission,
Restored app version.
27. Enterprise Automation DLP
activities: Created DLP Policy, Updated
DLP Policy, Deleted DLP Policy.
28. Video platform activities: Created
video, Edited video, Deleted video,
Uploaded video, Downloaded video,
Edited video permission, Viewed video,
Shared video, Liked video, Unliked
video, Commented on video, Deleted
video comment, Uploaded video text
track, Deleted video text track,
Uploaded video thumbnail, Deleted
video thumbnail, Replaced video
permissions and channel links, Marked
video public, Marked video private,
Created Video platform group, Edited
Video platform group, Deleted Video
platform group, Edited Video platform
group memberships, Created Video
platform channel, Edited Video platform
channel, Deleted a Video platform
channel, Replaced Video platform
channel thumbnails, Edited Video
platform user settings, Edited tenant
settings, Edited global role members,
Deleted Video platform user, Deleted
Video platform user’s data report,
Edited Video platform user, Exported
Video platform user’s data report,
Downloaded Video platform user’s data
report, Video Platform Event Date,
Video Platform Event Name, Video
Platform Event Description, Video
Platform Meeting Code, Video Platform
Participant Identifiers.
29. Content explorer activities:
Accessed item.
30. Quarantine activities: Previewed
Quarantine message, Deleted
Quarantine message, Released
Quarantine message, Exported
Quarantine message, Viewed
Quarantine Message’s header.
31. Customer Key Service Encryption
activities: Fallback to Availability Key.
32. Form application activities:
Created form, Edited form, Moved form,
Deleted form, Viewed form, Previewed
form, Exported form, Allowed share
form for copy, Added form co-author,
Removed form co-author, Viewed
response page, Created response,
Updated response, Deleted all
E:\FR\FM\16APN1.SGM
16APN1
khammond on DSKJM1Z7X2PROD with NOTICES
Federal Register / Vol. 89, No. 74 / Tuesday, April 16, 2024 / Notices
responses, Deleted response, Viewed
responses, Viewed response, Created
summary link, Deleted summary link,
Updated from phishing status, Updated
user phishing status, Sent premium
form product invitation, Updated form
setting, Updated user setting, Listed
forms.
33. Sensitivity label activities:
Applied sensitivity label to site,
Removed sensitivity label from site,
Applied sensitivity label to file,
Changed sensitivity label applied to file,
Removed sensitivity label from file.
34. Local machine communications
platform system command activities: Set
tenant federation.
35. Search activities: Performed email
search, Performed Cloud-based
Enterprise Storage search.
36. Security analytics activities:
Attempted to compromise accounts.
37. Device activities: Printed file,
Deleted file, Renamed file, Created file,
Modified file, Read file, Captured
screen, Copied file to removable media,
Copied file to network share, Copied file
to clipboard, Uploaded file to cloud,
File accessed by an unallowed
application.
38. Information barrier activities:
Removed segment from site, Changed
segment of site, Applied segment to site.
39. On-premises DLP scanning
activities: Matched DLP rule, Enforced
DLP rule.
40. Individual Productivity Analytics
activities: Updated user settings,
Updated organization settings.
41. Exact Data Match (EDM) activities:
Created EDM schema, Modified EDM
schema, Removed EDM scheme,
Completed EDM data upload, Failed
EDM data upload.
42. Enterprise Information System
Information Protection activities:
Accessed file, Discovered file, Applied
sensitivity label, Updated sensitivity
label, Removed sensitivity label,
Removed file, Applied protection,
Changed protection, Removed
protection, Received AIP heartbeat.
43. Data Repository Team Discussion
Post Actions: Team Discussion Post
Updated, Team Discussion Post
Destroyed.
44. Data Repository Team Discussion
Post Reply Actions: Team Discussion
Post Reply Updated, Team Discussion
Post Reply Destroyed.
45. Data Repository Enterprise
Actions: Self-Hosted Runner Removed,
Self-Hosted Runner Registered, SelfHosted Runner Group Created, SelfHosted Runner Group Removed, SelfHosted Runner Removed From Group,
Self-Hosted Runner Added To Group,
Self-Hosted Runner Group Member List
Updated, Self-Hosted Runner Group
VerDate Sep<11>2014
19:09 Apr 15, 2024
Jkt 262001
Configuration Changed, Self-Hosted
Runner Updated.
46. Data Repository Hook Actions:
Hook Created, Hook Configuration
Changed, Hook Destroyed, Hook Events
Altered.
47. Data Repository Integration
Installation Request Actions: Integration
Installation Request Created, Integration
Installation Request Closed.
48. Data Repository Issue Action:
Issue Destroyed.
49. Data Repository Org Actions:
Secret Action Created, Member Creation
Disabled, Two Factor Authentication
Requirement Disabled, Member Creation
Enabled, Two Factor Authentication
Enabled, Member Invited, Self-Hosted
Runner Registered, Secret Action
Removed, Member Removed, Outside
Collaborator Removed, Self-Hosted
Runner Removed, Self-Hosted Runner
Group Created, Self-Hosted Runner
Group Removed, Self-Hosted Runner
Group Updated, Secret Action Updated,
Repository Default Branch Name
Updated, Default Repository Permission
Updated, Member Role Updated,
Member Repository Creation Permission
Updated.
50. Data Repository Organization
Label Actions: Default Label Created,
Default Label Updated, Default Label
Destroyed.
51. Data Repository Oauth
Application Actions: Oauth Application
Created, Oauth Application Destroyed,
Oauth Application Secret Restet, Oauth
Application Token Revoked, Oauth
Application Transferred.
52. Data Repository Profile Picture
Actions: Organization Profile Picture
Updated.
53. Data Repository Project Actions:
Project Board Created, Project Board
Linked, Project Board Renamed, Project
Board Updated, Project Board Deleted,
Project Board Unlinked, Project Board
Permissions Updated, Project Board
Team Permissions Updated, Project
Board User Permission Updated.
54. Data Repository Protected Branch
Actions: Branch Protection Enabled,
Branch Protection Destroyed, Branch
Protection Enforced For Administrators,
Branch Enforcement Of Required Code
Owner Enforced, Stale Pull Request
Dismissal Enforced, Branch Commit
Signing Updated, Pull Request Review
Updated, Required Status Check
Updated, Requirement For Branch To
Be Up To Date Before Merging Changed,
Branch Update Attempt Rejected,
Branch Protection Requirement
Overridden, Force Push Enabled, Force
Push Disabled, Branch Deletion
Enabled, Branch Deletion Disabled,
Linear Commit History Enabled, Linear
Commit History Disabled.
PO 00000
Frm 00106
Fmt 4703
Sfmt 4703
26961
55. Data Repository Repo Actions:
User Visibility Changed, Actions
Enabled For Repository, Collaboration
Member Added, Topic Added To
Repository, Repository Archived,
Anonymous Git Read Access Disabled,
Anonymous Git Read Access Enabled,
Anonymous Git Read Access Setting
Locked, Anonymous Git Read Access
Setting Unlocked, New Repository
Created, Secret Created For Repository,
Repository Deleted, Repository Enabled,
Secret Removed, User Removed, SelfHosted Runner Registered, Topic
Removed From Repository, Repository
Renamed, Self-Hosted Runner Updated,
Repository Transferred, Repository
Transfer Started, Repository
Unarchived, Secret Action Updated.
56. Data Repository Dependency
Graph Actions: Dependency Graph
Disabled, Dependency Graph Disabled
For New Repository, Dependency Graph
Enabled, Dependency Graph Enabled
For New Repository.
57. Data Repository Secret Scanning
Actions: Secret Scanning Disabled For
Individual Repository, Secret Scanning
Disabled For All Repositories, Secret
Scanning Disabled For New
Repositories, Secret Scanning Enabled
For Individual Repository, Secret
Scanning Enabled For All Repositories,
Secret Scanning Enabled For New
Repositories.
58. Data Repository Vulnerability
Alert Actions: Vulnerable Dependency
Alert Created, Vulnerable Dependency
Alert Dismissed, Vulnerable
Dependency Alert Resolved.
59. Data Repository Team Actions:
Member Added To Team, Repository
Added To Team, Team Parent Changed,
Team Privacy Level Changed, Team
Created, Member Demoted In Team,
Team Destroyed, Member Promoted In
Team, Member Removed From Team,
Repository Removed From Team.
60. Data Repository Team Discussion
Actions: Team Discussion Disabled,
Team Discussion Enabled.
61. Data Repository Workflow
Actions: Workflow Run Cancelled,
Workflow Run Completed, Workflow
Run Created, Workflow Run Deleted,
Workflow Run Rerun, Workflow Job
Prepared.
62. Data Repository Account Actions:
Billing Plan Change, Plan Change,
Pending Plan Change, Pending
Subscription Change.
63. Data Repository Advisory Credit
Actions: Accept Credit, Create Credit,
Decline Credit, Destroy Credit.
64. Data Repository Billing Actions:
Change Billing Type, Change Email.
65. Data Repository Bot Alerts
Actions: Disable Bot, Enable Bot.
E:\FR\FM\16APN1.SGM
16APN1
khammond on DSKJM1Z7X2PROD with NOTICES
26962
Federal Register / Vol. 89, No. 74 / Tuesday, April 16, 2024 / Notices
66. Data Repository Bot Alerts for
New Repository Actions: Disable Alerts,
Enable Alerts.
67. Data Repository Bot Security
Alerts for Update Actions: Disable
Security Update Alerts, Enable Security
Update Alerts.
68. Data Repository Bot Security
Alerts for New Repository Actions:
Disable New Repository Security Alerts,
Enable New Repository Security Alerts.
69. Data Repository Environment
Actions: Create Actions Secret, Delete,
Remove Actions Secret, Update Actions
Secret.
70. Data Repository Git Actions:
Clone, Fetch, Push.
71. Data Repository Marketplace
Agreement Signature Actions: Create.
72. Data Repository Marketplace
Listing Actions: Approve, Create, Delist,
Redraft, Reject.
73. Data Repository Members Can
Create Pages Actions: Enable, Disable.
74. Data Repository Organization
Credential Authorization Actions:
Security Assertion Markup Language
Single-Sign On Authorized, Security
Assertion Markup Language Single-Sign
On Deauthorized, Authorized
Credentials Revoked.
75. Data Repository Package Actions:
Package Version Published, Package
Version Deleted, Package Deleted,
Package Version Restored, Package
Restored.
76. Data Repository Payment Method
Actions: Payment Method Cleared,
Payment Method Created, Payment
Method Updated.
77. Data Repository Advisory Actions:
Security Advisory Closed, Common
Vulnerabilities And Exposures Advisory
Requested, Data Repository Security
Advisory Made Public, Data Repository
Security Advisory Withdrawn, Security
Advisory Opened, Security Advisory
Published, Security Advisory Reopened,
Security Advisory Updated.
78. Data Repository Content Analysis:
Data Use Settings Enabled, Data Use
Settings Disabled.
79. Data Repository Sponsors Actions:
Repo Funding Link Button Toggle, Repo
Funding Links File Action, Sponsor
Sponsorship Cancelled, Sponsor
Sponsorship Created, Sponsor
Sponsorship Preference Changed,
Sponsor Sponsorship Tier Changed,
Sponsored Developer Approved,
Sponsored Developer Created,
Sponsored Developer Profile Updated,
Sponsored Developer Request
Submitted For Approval, Sponsored
Developer Tier Description Updated,
Sponsored Developer Newsletter Sent,
Sponsored Developer Invited From
Waitlist, Sponsored Developer Joined
From Waitlist.
VerDate Sep<11>2014
19:09 Apr 15, 2024
Jkt 262001
80. Administrator audit log events:
Admin privileges grant, Group events,
Marketplace login audit change, Auto
provisioning automatically disabled.
81. Group enterprise audit log events:
Add service account permission,
Remove service account permission,
Add user, Add user role, Remove user,
Request to join, Approve join request,
Reject join request, Invite user, Accept
invitation, Reject invitation, Revoke
invitation, Join, Ban user including with
moderation, Unban user, Add all users
in domain, Create group, Delete group,
Create namespace, Delete namespace,
Change info setting, Add info setting,
Remove info setting, Add member role,
Remove user role, Membership
expiration added, Membership
expiration removed, Membership
expiration updated.
82. Software vendor employee
interaction events: Event date, Software
product name, Software vendor
employee email, Software vendor
employee home office location,
Software vendor employee access
justification, Justification tickets, Log
ID, Software product resource accessed
name.
83. Login events: Two-step
verification enabled, Two-step
verification disabled, Account password
change, Account recovery email change,
Account recovery phone change,
Account recovery secret question
change, Account recovery secret answer
change, Advanced Protection enroll,
Advanced Protection unenroll, Failed
login, Government-backed attack
attempt, Leaked password detected,
Login challenged, Login verification,
Logout, Out of domain email forwarding
enabled, Successful login, Suspicious
Login, Suspicious login blocked,
Suspicious login from less secure app
blocked, Suspicious programmatic login
locked, User suspended, User
suspended through spam relay, User
suspended through spam, User
suspended through suspicious activity.
84. OAuth Token audit log events:
OAuth event description, OAuth event
name, OAuth user, OAuth application
name, OAuth client ID, OAuth scope,
OAuth event data, OAuth logged
activity IP address.
85. Rules audit log events: Rule event
name, Rule event description, Rule
triggering user, Rule name, Rule type,
Rule resource name, Resource ID,
Resource title, Resource type, Resource
owner, Recipients, Data source, Actor IP
address, Rule severity, Scan type,
Matched trigger, Matched detectors,
Triggered actions, Suppressed actions,
Date, Device ID, Device type.
86. SAML audit log events: SAML
event description, SAML Event name,
PO 00000
Frm 00107
Fmt 4703
Sfmt 4703
SAML triggering user, SAML
application name, SAML user
organization name, Initiated by, Failure
type, Response status, Second level
status, SAML logged activity IP address,
SAML event date.
87. Calendar application audit log
events: Activity name, Activity
description, Calendar user, Calendar ID,
Event title, Event ID, User agent,
Recipient email, Message ID, Remote
Exchange Web Server URL, Error code,
Requested window start, Requested
window end, Date, Calendar logged
activity IP address.
88. Context-Aware Access audit log
events: Event name, Context-Aware
access user, Context-Aware access
logged activity IP address, Device ID,
Access level applied, Context-Aware
access event date.
89. Web browser audit log events:
Web browser event name, Web browser
event date, Web browser event reason,
Device name, Device user, Web browser
profile user name, URL generating
event, Operating System of Web
Browser, Web browser triggered rule
reason, Web browser event result, Web
browser content name, Web browser
content size, Web browser content hash,
Web browser content type, Web browser
trigger type, Web browser trigger user,
Web browser user agent, Web browser
client type.
90. Data Visualization audit log
events: Asset name, Event description,
User, Event name, Date, Asset type,
Owner, Asset ID, IP address, Connector
type, visibility, Prior visibility.
91. Devices audit log events: Device
ID, Event description, Date, Event name,
User, Device type, Application hash,
Serial number, Device model, OS
version, Policy name, Policy status
code, Windows OS edition, Account
registration change, Device action event,
Device application change, Device
compliance status, Device compromise,
Device OS update, Device ownership,
Device settings change, Device status
changed on Apple portal, Device sync,
Failed screen unlock attempts, Sign out
user, Suspicious activity, Work profile
support.
92. Cloud-based web storage
application audit log events: Cloudbased web storage application event
name, Cloud-based web storage
application event description, Cloudbased web storage application item type,
Cloud-based web storage application
item ID, Cloud-based web storage
application item visibility, Cloud-based
web storage application item prior
visibility, Cloud-based web storage
application user, Cloud-based web
storage application visitor Boolean
value, Cloud-based web storage
E:\FR\FM\16APN1.SGM
16APN1
khammond on DSKJM1Z7X2PROD with NOTICES
Federal Register / Vol. 89, No. 74 / Tuesday, April 16, 2024 / Notices
application file owner, Cloud-based web
storage application event date, Cloudbased web storage application event IP
address.
93. Groups audit log events: Groups
event name, Groups event description,
Groups event user, Groups event date.
94. Chat audit log events: Chat event
name, Chat event description, Chat
event user, Chat event date.
95. Whiteboard application audit log
events: Whiteboard application ID
Whiteboard application event
description, Whiteboard application
event name, Whiteboard application
event user, Whiteboard application
event date.
96. Note application audit log events:
Note application event name, Note
application event description, Note
application event user, Note application
event note owner, Note application
event date, Note application note URI,
Note application attachment URI.
97. Password vault audit log events:
Password vault actor, Password vault
event timestamp, Password vault event
name, Password vault application
username, Password vault application
installation name, Password vault
application credential name.
98. Takeout audit log events: Takeout
event description, Takeout products
requested, Takeout Job ID, Takeout
event date, Takeout event IP address.
99. User accounts audit log events:
User account event description, User
account event date, User account event
IP address, two-step verification disable,
two-step verification enroll, Account
password change, Account recovery
email change, Account recovery phone
change, Account recovery secret
question change, Account recovery
secret answer change.
100. Voice audit log events: Voice
event name, Voice event description,
Voice event date, Voice event user,
Voice receiving phone number, Voice
placing phone number, Voice call
duration, Voice group message status,
Voice call cost, Auto Attendant couldn’t
route to voicemail recipient, Auto
attendant deleted, Auto attendant failed
to transfer to a user, Auto attendant
published, Auto attendant received a
voicemail, Auto attendant voicemail
failed to deliver, Auto attendant
voicemail failed to forward.
101. User setting changes: 2-Step
Verification Scratch Codes Of User
Deleted, New 2-Step Verification
Scratch Codes Generated For User, 3Legged Oauth Device Tokens Revoked,
3-Legged Oauth Token Revoked, Add
Recovery Email For User, Add Recovery
Phone For User, Admin Privileges
Granted For User, Admin Privileges
Revoked For User, Application Specific
VerDate Sep<11>2014
19:09 Apr 15, 2024
Jkt 262001
Password Revoked For User, Automatic
Contact Sharing Changed For User, Bulk
Upload Notification, User Invite
Cancelled, Custom Attribute Changed,
External Id Changed, Gender Changed,
Ims Changed, IP Whitelisted, Keywords
Changed, User Location Changed, User
Organization Changed, User Phone
Numbers Changed, User Recovery Email
Changed, User Recovery Phone
Changed, User Relation Changed, User
Address Changed, User Email Monitor
Created, Data Transfer Requested For
User, Delegated Admin Privileges
Granted, Account Information Dump
Deleted, Email Monitor Deleted,
Mailbox Dump Deleted, Profile Photo
Deleted, First Name Changed, Gmail
Account Reset, Last Name Changed,
Mail Routing Destination Created, Mail
Routing Destination Deleted, Nickname
Created, Nickname Deleted, Password
Changed, Password Change Required
On Next Login, Recovery Email
Removed, Recovery Phone Removed,
Account Information Requested,
Mailbox Dump Requested, User Invite
Resent, Cookies Reset For User And
Forced Relogin, Security Key Registered
For User, Security Key Revoked, User
Invite Sent, Temporary Password
Viewed, 2-Step Verification Turned Off,
User Session Unblocked, Profile Photo
Updated, User Advanced Protection
Unenroll, User Archived, User Birthdate
Changed, User Created, User Deleted,
User Downgraded From Social Media
Application, User Enrolled In 2-Step
Verification, User List Downloaded,
User Org Unit Changed, User Put In 2Step Verification Grace Period, User
Renamed, User Strong Auth Unenrolled,
User Suspended, User Unarchived, User
Undeleted, User Unsuspended, User
Upgraded To Social Media Application.
102. Application Authoring
application audit log elements: App
synced, App edited, App added, App
deleted, App invocation added, App
invocation edited, App invocation
deleted, App invocation action
performed, App read call made, App bot
invocation.
103. Organizational Administrative
Data Elements: Set Terms and
Conditions, Modify Terms and
Conditions, Set org custom theme, Edit
org custom theme, Add custom policy,
Delete custom policy, Create User IdP
Profile, Create environment, Delete
environment, Rename environment,
Edit domain name, Create business
group, Edit business group name, Edit
business group entitlement, Delete
business group.
104. API audit log elements: Create
API, Delete API, Import API, Update
label of API, Update consumer endpoint
of API, Update endpoint URI of API,
PO 00000
Frm 00108
Fmt 4703
Sfmt 4703
26963
Calendar API kind, Application API
client version, Create API version,
Delete API version, Import API, Edit
name of API version, Edit description of
API version, Edit API URL of API
version, Add tag to API, Remove tag
from API, Deprecate API, Set T&Cs,
Create RAML, Modify RAML, Create
endpoint, Update existing endpoint,
Deploy proxy, Update deployed proxy,
Redeploy proxy, Create SLA tier,
Modify SLA tier, Deprecate SLA tier,
Delete SLA tier, Apply policy, Edit
policy, Remove policy, Create project,
Delete project, Delete files, Rename
project, Clean branch, Create branch,
Delete branch, Save branch, Delete file,
Move file, Import project, Publish to
Exchange, Publish to API Platform, Add
dependencies, Remove dependencies,
Change dependencies, Reload
dependencies, Merge Branch, Share
project, Sync with Data Repository,
Unsync with Data Repository, Modify
organization settings, Rename branch,
Modify project settings.
105. API Metadata: Create an API
instance, Delete an API instance, Update
an API instance.
106. Application Data: Create
application, Delete application, Reset
client secret, Request access, Request
tier change, Request tier change
approval, Approve application, Revoke
application, Restore application, Create
Mocking Service link, Delete Mocking
Service link, Create/modify/delete
Object store, Upload file, Delete file,
Update file.
107. Private Portals audit log events:
Create portal, Modify portal association,
Delete portal, Add portal page, Make
portal page visible, Delete portal page,
Edit portal page, Hide portal page, Set
portal theme, Modify portal theme,
Modify portal security, Create a page,
Update a page, Delete a page, Publish a
portal.
108. Public Portals audit log events:
Update a domain, Delete a domain,
Create a page, Delete a page, Update a
page, Create a portal, Publish a portal,
Delete a portal, Update a portal.
109. Identity Management audit log
events: Create identity provider
configuration, Edit identity provider
configuration, Delete identity provider
configuration, Warning, Create identity
management key, Set primary identity
management key, Delete identity
management key.
110. Connected App audit log events:
Create Connected Application, Edit
Connected Application, Delete
Connected Application, Update Scope
Assignments, Application Authorization
Approved, Application Authorization
Denied, Token Retrieval Success, Token
E:\FR\FM\16APN1.SGM
16APN1
khammond on DSKJM1Z7X2PROD with NOTICES
26964
Federal Register / Vol. 89, No. 74 / Tuesday, April 16, 2024 / Notices
Retrieval Failed, Revoke Access/Refresh
Tokens.
111. Team audit log events: Create
Team, Update Team, Move Team, Add
Members, Remove Members, Add
Permissions, Remove Permissions, Edit
External Group Mappings, Delete Team.
112. Asset Management audit log
events: Create an asset, Update an asset,
Delete an asset, Share an asset, Publish
an asset to public portal, Remove an
asset from public portal, Update an asset
icon, Delete an asset icon, Create a
managed tag (category), Delete a
managed tag (category), Delete an
organization, Update tags, Create a tag
configuration, Update a tag
configuration, Delete a tag
configuration.
113. Asset Review audit log events:
Create a Comment, Delete a comment,
Update a comment, Create a review,
Delete a review, Update a review.
114. Runtime Manager audit log
events: Create application, Start
application, Restart application, Stop
application, Delete application, Change
application zip file, Promote application
from sandbox, Change application
runtime, Change application worker
size, Change application worker
number, Enable/disable persistent
queues, Enable/disable persistent queue
encryption, Modify application
properties, Enable/disable insight,
Modify log levels, Create/modify/delete
alerts, Enable/disable alerts, Create/
modify/delete application data, Create/
modify schedules, Create/modify/delete
tenants, Enable/disable schedules, Clear
queues, Enable/Disable static IP,
Allocate/release static IP, LoadBalancer
Create/modify/delete, Create/modify/
delete alerts V2, Create/modify/delete
VPC, Create/modify/delete VPN.
115. Server audit log events: Add
server, Delete server, Rename server,
Create server group, Delete server group,
Rename server group, Add server to
server group, Remove server from server
group, Create cluster, Delete Cluster,
Rename cluster, Add server to cluster,
Remove server from cluster, Deploy
application, Delete application, Start
application, Stop application, Redeploy
application with existing file, Redeploy
application with new file.
116. Private Spaces audit log events:
Create/Modify/Delete private space,
Create/Modify/Delete connection,
Create/Modify/Delete VPN, Create/
Modify/Delete transit gateway, Create/
Modify/Delete TLSContext, Create/
Modify/Delete routes.
117. Anypoint MQ audit log events:
Create/modify/delete/purge queue,
Create/modify/delete exchange, Create/
delete exchange binding, Create/delete/
regenerate client.
VerDate Sep<11>2014
19:09 Apr 15, 2024
Jkt 262001
118. Mentorship program application
data: Notification Logs, Notification
Type, Notification Template, Status,
Time sent, Email Events, General
Application Data, Support Tickets,
Product Usage Analytics, Product
update in app notification delivery
status, Application error logs,
Application request logs.
119. User Experience Device Audit
events: Administrator Account Status,
All Antispywares, All Antiviruses, All
Firewalls, Allow Non-Provisionable
Devices, Antispyware Name,
Antispyware Real Time Protection,
Antispyware Up To Date, Antivirus
Name, Antivirus Real Time Protection,
Antivirus Up To Date, Audit Account
Logon Events, Audit Account
Management, Audit Directory Service
Access, Audit Logon Events, Audit
Object Access, Audit Policy Change,
Audit Privilege Use, Audit Process
Tracking, Audit System Events, Average
Boot Duration, Average Fast Startup
Duration, Average Logon Duration, Bios
Serial Number, Boot Disk Health Status,
Boot Disk Type, Chassis Serial Number,
Controller Ca License Universal Unique
Identifier, Controller Ca Status,
Controller Crash Guard Count,
Controller Crash Guard Limit, Controller
Crash Guard Protection Interval,
Controller Crash Guard React Interval,
Controller Custom Shells, Controller
Data Channel Protocol, Controller DNS
Res Preference, Controller Engage
Service Status, Controller Freezes
Monitoring, Controller Installs Scan
Interval, Controller Is Visible, Controller
Log Level, Controller Max Segment Size,
Controller Ra Execution Policy,
Controller SMB Print Mon Status,
Controller String Tag, Controller Web
Mon Status, Collector Distinguished
Name, Collector Installation Log,
Collector Package Target Version,
Collector Print Monitoring Status,
Collector Status, Collector Tag, Collector
Update Status, Collector Version, CPU
Frequency, CPU Model, Database Usage,
Device Encryption Required, Device
Manufacturer, Device Model, Device
Password Required, Device Product Id,
Device Product Version, Device Serial
Number, Device Type, Device Universal
Unique Identifier, Device Universal
Unique Identifier, Directory Service
Site, Disks Manufacturers, Disks Smart
Index, Distinguished Name, EAS Access
State, EAS Access State Reason, EAS
Device Access Rule, EAS Device
Identity, EAS Exemption, EAS Policy
Application Status, EAS Policy Name,
EAS Policy Update, Email Attachment
Enabled, Enforce Password History,
Entity, Extended Logon Duration
Baseline, Firewall Name, Firewall Real
PO 00000
Frm 00109
Fmt 4703
Sfmt 4703
Time Protection, First Seen, Graphical
Card Ram, Graphical Cards, Group
Name, Guest Account Status, Hard
Disks, ID, internet Security Settings, Ip
Addresses, Is Collector Distinguished
Name Truncated, Is Directory Service
Site Truncated, Last Boot Duration, Last
Extended Logon Duration, Last Ip
Address, Last Known Connection
Status, Last Local Ip Address, Last
Logged On User, Last Logon Duration,
Last Logon Time, Last Seen, Last Seen
On TCP, Last System Boot, Last Update,
Last Update Status, Last Updater
Request, Last Windows Update, Local
Administrators, Local Power Users,
Logical CPU Number, Logical Drives,
Mac Addresses, Maximum Password
Age, Membership Type, Minimum
Password Age, Minimum Password
Length, Monitor Models, Monitor
Resolutions, Monitors, Monitors Serial
Numbers, Device Name, Number Of
Antispyware, Number Of Antiviruses,
Number Of Cores, Number Of CPUs,
Number Of Days Since First Seen,
Number Of Days Since Last Boot,
Number Of Days Since Last EAS Policy
Update, Number Of Days Since Last
Logon, Number Of Days Since Last
Seen, Number Of Days Since Last Seen
On TCP, Number Of Days Since Last
Windows Update, Number Of Firewalls,
Number Of Graphical Cards, Number Of
Monitors, OS Architecture, OS Build,
OS Version And Architecture, Password
Complexity Requirements, Platform,
Privileges Of Last Logged On Users, Sd
Card Encryption Required, Sid, Storage
Policy, System Drive Capacity, System
Drive Free Space, System Drive Usage,
Total Active Days, Total Drive Capacity,
Total Drive Free Space, Total Drive
Usage, Total Nonsystem Drive Capacity,
Total Nonsystem Drive Free Space,
Total Nonsystem Drive Usage, Total
Ram, Updater Error, Updater Version,
Upgrade Group, User Account Control
Status, Windows License Key, Windows
Updates Status, WMI Status.
120. User Experience Audit Records:
Country, Database Usage, Department,
Distinguished Name, First Seen, Full
Name, Unique User Identifier, Job Title,
Last Seen, Locality, Location, User
Logon Name, Number Of Days Since
Last Seen, Org Unit, Seen On Mac OS,
Seen On Mobile, Seen On Windows,
User Security Identifier, Total Active
Days, Type, Duration, Real Duration,
Activity Type.
ROUTINE USES OF RECORDS MAINTAINED IN THE
SYSTEM, INCLUDING CATEGORIES OF USERS AND
THE PURPOSES OF SUCH USES:
Standard routine uses 1. through 9.
apply. In addition:
a. To appropriate agencies, entities,
and persons when (1) the Postal Service
E:\FR\FM\16APN1.SGM
16APN1
Federal Register / Vol. 89, No. 74 / Tuesday, April 16, 2024 / Notices
suspects or has confirmed that there has
been a breach of the system of records;
(2) the Postal Service has determined
that as a result of the suspected or
confirmed breach there is a risk of harm
to individuals, the Postal Service
(including its information systems,
programs, and operations), the Federal
Government, or national security; and
(3) the disclosure made to such
agencies, entities, and persons is
reasonably necessary to assist in
connection with the Postal Service’s
efforts to respond to the suspected or
confirmed breach or to prevent,
minimize, or remedy such harm.
RECORD SOURCE CATEGORIES:
decision are reprinted below in
accordance with section 3632(b)(2).
CONTESTING RECORD PROCEDURES:
Sarah Sullivan,
Attorney, Ethics and Legal Compliance.
See Notification Procedure and
Record Access Procedures above.
NOTIFICATION PROCEDURES:
Customers wanting to know if other
information about them is maintained in
this system of records must address
inquiries in writing to the Chief
Information Officer and Executive Vice
President and include their name and
address.
None.
POLICIES AND PRACTICES FOR STORAGE OF
RECORDS:
HISTORY:
Automated database, computer
storage media, and paper.
December 1, 2023; 88 FR 83981; May
10th, 2021; 86 FR 24902.
POLICIES AND PRACTICES FOR RETRIEVAL OF
RECORDS:
Sarah Sullivan,
Attorney, Ethics & Legal Compliance.
Records relating to system
administration are retrievable by user
ID.
[FR Doc. 2024–07980 Filed 4–15–24; 8:45 am]
BILLING CODE 7710–12–P
POLICIES AND PRACTICES FOR RETENTION AND
DISPOSAL OF RECORDS:
Records relating to system
administration are retained for twentyfour months.
ADMINISTRATIVE, TECHNICAL, AND PHYSICAL
SAFEGUARDS:
khammond on DSKJM1Z7X2PROD with NOTICES
and verification of identity under 39
CFR 266.5.
EXEMPTIONS PROMULGATED FOR THE SYSTEM:
Employees; contractors; customers.
POSTAL SERVICE
Change in Classes of General
Applicability for Competitive Products
AGENCY:
Paper records, computers, and
computer storage media are located in
controlled-access areas under
supervision of program personnel.
Computer access is limited to
authorized personnel with a current
security clearance, and physical access
is limited to authorized personnel who
must be identified with a badge.
Access to records is limited to
individuals whose official duties require
such access. Contractors and licensees
are subject to contract controls and
unannounced on-site audits and
inspections.
Computers are protected by
encryption, mechanical locks, card key
systems, or other physical access control
methods. The use of computer systems
is regulated with installed security
software, computer logon
identifications, and operating system
controls including access controls,
terminal and transaction logging, and
file management software.
RECORD ACCESS PROCEDURES:
Postal ServiceTM.
Notice of a change in classes of
general applicability for competitive
products.
ACTION:
This notice sets forth changes
in classes of general applicability for
competitive products.
SUMMARY:
DATES:
Applicable date: July 14, 2024.
FOR FURTHER INFORMATION CONTACT:
Christopher C. Meyerson, 202–268–
7820.
On
February 8, 2024, pursuant to their
authority under 39 U.S.C. 3632 and
3642, the Governors of the Postal
Service established classification
changes for rate categories for vendorassisted electronic money transfer,
which are within the International
Money Transfer Service—Outbound
product found at Mail Classification
Schedule section 2620.3. The
Governors’ Decision and the record of
proceedings in connection with such
SUPPLEMENTARY INFORMATION:
Requests for access must be made in
accordance with the Notification
Procedure above and USPS Privacy Act
regulations regarding access to records
VerDate Sep<11>2014
19:09 Apr 15, 2024
Jkt 262001
26965
PO 00000
Frm 00110
Fmt 4703
Sfmt 4703
Decision of the Governors of the United
States Postal Service on Mail
Classification Schedule Changes
Concerning International Money
Transfer Service—Outbound and
International Money Transfer Service—
Inbound (Governors’ Decision No. 24–2)
February 8, 2024
Statement of Explanation and
Justification
Pursuant to our authority under
section 404(b) and Chapter 36 of title 39,
United States Code, the Governors
establish classification changes to the
International Money Transfer Service
(IMTS)—Outbound product and the
IMTS—Inbound product, to occur in
three phases.
As for the first phase, the IMTS—
Outbound product includes an
Electronic Money Transfer service that
enables customers to make payments or
transfer funds to individuals or firms in
foreign destinations. Electronic money
transfers are available through the Sure
Money (DineroSeguro) service, which is
based on an agreement with a financial
services company. During the last few
years there have been significant
declines in the number of electronic
money transfers purchased from the
Postal Service, and despite substantial
historical price increases, the Sure
Money (DineroSeguro) service has not
covered its costs. Thus, the Postal
Service intends to terminate the Sure
Money (DineroSeguro) service by
removing the prices and price categories
in Mail Classification Schedule section
2620 that concerns IMTS—Outbound.
As for the second and third phases,
IMTS—Outbound enables customers to
make payments or transfer funds to
individuals or firms in foreign
destinations. This product includes
hardcopy international postal money
orders, which may be offered in
cooperation with foreign postal
operators. IMTS—Inbound provides a
service to foreign postal operators for
cashing of hard copy international
postal money orders sent to recipients
in the United States. During the last few
years there have been significant
declines in the number of international
postal money orders sold and cashed by
the Postal Service, and despite
substantial historical price increases,
the international postal money order
service has not covered its costs.
Currently, both the outbound and
inbound international postal money
E:\FR\FM\16APN1.SGM
16APN1
Agencies
[Federal Register Volume 89, Number 74 (Tuesday, April 16, 2024)]
[Notices]
[Pages 26953-26965]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2024-07980]
=======================================================================
-----------------------------------------------------------------------
POSTAL SERVICE
Privacy Act; System of Records
AGENCY: Postal Service[supreg].
ACTION: Notice of modified systems of records.
-----------------------------------------------------------------------
SUMMARY: The United States Postal Service\TM\ (USPS\TM\) is proposing
to revise two General Privacy Act Systems of Records. These updates are
being made to support enhanced security and analysis to anticipate user
issues and provide resolution.
DATES: These revisions will become effective without further notice on
May 16, 2024, unless, in response to comments received on or before
that date result in a contrary determination.
ADDRESSES: Comments may be submitted via email to the Privacy and
Records Management Office, United States Postal Service Headquarters
([email protected]). To facilitate public inspection, arrangements to
view copies of any written comments received will be made upon request.
FOR FURTHER INFORMATION CONTACT: Janine Castorina, Chief Privacy and
Records Management Officer, Privacy and Records Management Office, 202-
268-3069 or [email protected].
SUPPLEMENTARY INFORMATION: This notice is in accordance with the
Privacy Act requirement that agencies publish their systems of records
in the Federal Register when there is a revision, change, or addition,
or when the agency establishes a new system of records. The
[[Page 26954]]
Postal Service is proposing revisions to three existing systems of
records (SOR) to support the implementation of voluntary mentorship
programs and related applications.
I. Background
This notice is in accordance with the Privacy Act requirement that
agencies publish their systems of records in the Federal Register when
there is a revision, change, or addition, or when the agency
establishes a new system of records. The Postal Service is proposing to
modify two SORs to support user experience enhancement analytics:
USPS SOR 550.100 Commercial Information Technology Resources-
Applications
USPS SOR 550.200 Commercial Information Technology Resources-
Administrative
II. Rationale for Changes to USPS Privacy Act Systems of Records
User experience is integral to the continued, seamless operation of
any technology solution. Identifying pain points, areas of frustration,
and common technology failures are paramount to positive user
interaction. To that end, USPS will deploy a new tool to anticipate,
identify, and provide remediation support for problems that may plague
users in their technological interactions. Accordingly, USPS will
modify USPS SOR 550.100 Commercial Information Technology Resources--
Applications and USPS SOR 550.200 Commercial Information Technology
Resources--Administrative as follows:
USPS SOR 550.100 Commercial Information Technology Resources--
Applications
--Four new purposes: 13, 14, 15, and 16
USPS SOR 550.200 Commercial Information Technology Resources--
Administrative
--Two new categories of records: 119 and 120.
III. Description of the Modified Systems of Records
Pursuant to 5 U.S.C. 552a(e)(11), interested persons are invited to
submit written data, views, or arguments on this proposal. A report of
the proposed revisions to this SOR has been sent to Congress and to the
Office of Management and Budget for their evaluations. The Postal
Service does not expect that this modified system of records will have
any adverse effect on individual privacy rights. Accordingly, for the
reasons stated above, the Postal Service proposes revisions included in
this system of records presented in its entirety as follows:
SYSTEM NAME AND NUMBER:
550.100 Commercial Information Technology Resources--Applications.
SECURITY CLASSIFICATION:
None.
SYSTEM LOCATION:
All USPS facilities and contractor sites.
SYSTEM MANAGER(S):
For records of computer access authorizations: Chief Information
Officer and Executive Vice President, United States Postal Service, 475
L'Enfant Plaza SW, Washington, DC 20260.
AUTHORITY FOR MAINTENANCE OF THE SYSTEM:
39 U.S.C. 401, 403, and 404.
PURPOSE(S) OF THE SYSTEM:
1. To provide event registration services to USPS customers,
contractors, and other third parties.
2. To allow task allocation and tracking among team members.
3. To allow users to communicate by telephone, instant-messaging,
and email through local machine and web-based applications on desktop
and mobile operating systems.
4. To share your personal image via your device camera during
meetings and web conferences, if you voluntarily choose to turn the
camera on, enabling virtual face-to-face conversations.
5. To provide for the creation and storage of media files,
including video recordings, audio recordings, desktop recording, and
web-based meeting recordings.
6. To provide a collaborative platform for viewing video and audio
recordings.
7. To create limited use applications using standard database
formats.
8. To review distance driven by approved individuals for accurate
logging and compensation.
9. To develop, maintain, and share computer code.
10. To comply with Security Executive Agent Directive (SEAD) 3
requirements for self-reporting of unofficial foreign travel pertaining
to covered individuals who have access to classified information or who
hold a sensitive position.
11. To administer and maintain a secure board portal software that
provides leadership with instant access to information they need
before, during and after meetings, making board and committee
interactions more efficient and productive by promoting collaboration
and information sharing among USPS Board of Governors (BOG) and
Executive Leadership Team (ELT).
12. To facilitate the software component of USPS-sponsored
voluntary mentorship programs.
13. To monitor IT systems for software, hardware and application
issues and aggregate results for diagnosis.
14. To measure user experience and utilization and provide
proactive remediation to experience interruptions.
15. To organize user technology groupings by high-level to provide
preventative technology support.
16. Collecting user sentiment via application interactions for the
purpose of measuring digital employee experience and thereby improving
results.
CATEGORIES OF INDIVIDUALS COVERED BY THE SYSTEM:
1. Individuals with authorized access to USPS computers,
information resources, and facilities, including employees,
contractors, business partners, suppliers, and third parties.
2. Individuals participating in web-based meetings, web-based video
conferencing, web-based communication applications, and web-based
collaboration applications.
3. USPS Board of Governors, administrators, and USPS Executive
Leadership Team.
CATEGORIES OF RECORDS IN THE SYSTEM:
1. Third-party Information records: Records relating to non-Postal,
third-party individuals utilizing an information system, application,
or piece of software, including: Third-Party Name, Third Party Date
Request, Third Party Free Text, Guest User Information.
2. Collaboration application records: Records relating to web-
conferencing and web-collaboration applications, including;
Collaborative Group Names, Collaborative Group IDs, Action Name, Number
Of Actions Sent, Number Of Action Responses, Employee Phone Number,
Collaborative Group Chat History, Profile Information, Collaborative
Group Membership, Contacts, Project Owner, Project Creator, Event Start
Time, Event Status, Event Organizer, Event Presenter, Event Producer,
Event Production Type, Event Recording Setting, Total Number Of Event
Media Viewings, Number Of Active Users, Number Of Active Users In
Collaborative Groups, Number Of Active Collaborative Group
Communication Channels, Number Of Messages Sent, Number Of Calls
Participated In, Last Activity Date Of A User, Number Of Guest Users In
A Collaborative Group, Event Name, Event Description, Event Start Date,
Event End Date, Video Platform Group Name,
[[Page 26955]]
Video Platform Group Email Alias, Video Platform Group Description,
Video Platform Group Classification, Video Platform Group Access Level,
Video Platform Channel Name, Video Platform Channel Description, Video
Platform Channel Access, Video Platform Live Event Recording, Total
Number Of Video Conferences, Add Room Member To Collaborative Group,
Attachment Downloaded From Collaborative Group, Attachment Uploaded
From Collaborative Group, Direct Message Started From Collaborative
Group, Invite Sent From Collaborative Group, Message Edited From
Collaborative Group, Message Posted In Collaborative Group, Remove Room
Member From Collaborative Group, Room Created In Collaborative Group,
Add Service Account Permission To Enterprise Collaborative Group,
Remove Service Account Permission To Enterprise Collaborative Group,
Added User To Enterprise Collaborative Group, Added User Role To
Enterprise Collaborative Group, Removed User From Enterprise
Collaborative Group, Request To Join Enterprise Collaborative Group,
Approve Join Request From Enterprise Collaborative Group, Reject Join
Request From Enterprise Collaborative Group, Invite User To Enterprise
Collaborative Group, Accept Invitation For Enterprise Collaborative
Group, Reject Invitation For Enterprise Collaborative Group, Revoke
Invitation For Enterprise Collaborative Group, Join Enterprise
Collaborative Group, Ban User Including With Moderation In Enterprise
Collaborative Group, Unban User From Enterprise Collaborative Group,
Add All Users In Domain For Enterprise Collaborative Group, Create
Group In Enterprise Collaborative Group, Delete Group In Enterprise
Collaborative Group, Create Namespace In Enterprise Collaborative
Group, Delete Namespace In Enterprise Collaborative Group, Change Info
Setting In Enterprise Collaborative Group, Add Info Setting In
Enterprise Collaborative Group, Remove Info Setting In Enterprise
Collaborative Group, Add Member Role In Enterprise Collaborative Group,
Remove User Role In Enterprise Collaborative Group, Membership
Expiration Added In Enterprise Collaborative Group, Membership
Expiration Removed In Enterprise Collaborative Group, Membership
Expiration Updated In Enterprise Collaborative Group, ACL Permission
Changed In Collaborative Group, Collaborative Group Invitation
Accepted, Join Request Approved, User Joined Collaborative Group, User
Requested To Join Collaborative Group, Collaborative Group Basic
Setting Changed, Collaborative Group Created, Collaborative Group
Deleted, Collaborative Group Identity Setting Changed, Collaborative
Group Info Setting Added, Collaborative Group Info Setting Changed,
Collaborative Group Info Setting Removed, Collaborative Group New
Member Restriction Changed, Collaborative Group Post Reply Settings
Changed, Collaborative Group Spam Moderation Settings Changed,
Collaborative Group Topic Setting Changed, Collaborative Group Message
Moderated, User Posts Will Always Be Posted, User Added To
Collaborative Group, User Banned From Collaborative Group, User
Invitation Revoked From A Collaborative Group, User Invited To
Collaborative Group, User Join Request Rejected From A Collaborative
Group, User Reinvited To Collaborative Group, User Removed From
Collaborative Group, Call Event Abuse Report Submitted, Call Event
Endpoint Left, Call Event Livestream Watched, Individual Form Response,
Form Respondent Email Address, Whiteboard Software Updated, Whiteboard
Reboot Requested, Whiteboard Export Requested, Attachment Deleted,
Attachment Uploaded, Note Content Edited, Note Created, Note Deleted,
Note Permissions Edited.
3. Communication Application Records: Enterprise Social Network
User Name, Enterprise Social Network User State, Enterprise Social
Network User State Change Date, Enterprise Social Network User Last
Activity Date, Number Of Messages Posted By An Enterprise Social
Network User In Specified Time Period, Number Of Messages Viewed By An
Enterprise Social Network User, Number Of Liked Messages By An
Enterprise Social Network User, Products Assigned To A Enterprise
Social Network User, Home Network Information, External Network
Information, External Network Name, External Network Description,
External Network Image, Network Creation Date, Network Usage Policy,
External Network User Name, External Network User Email Address,
External Group Name, Number Of Users On A Network, Network ID, Live
Event Video Links, Files Added Or Modified In Enterprise Social
Network, Message ID, Thread ID, Message Privacy Status, Full Body Of
Message, Chat User Action, Chat Room Member Added, Chat Attachment
Downloaded, Chat Attachment Uploaded, Chat Room Blocked, Chat User
Blocked, Chat Direct Message Started, Chat Invitation Accepted, Chat
Invitation Declined, Chat Invitation Sent, Chat Message Edited, Chat
Message Posted, Chat Room Member Removed, Chat Room Created.
4. Multimedia records: Records relating to media associated with or
originating from an information system, including; Video Platform User
ID, Video Name, Videos Uploaded By User, Videos Accessed By User,
Channels Created By User, User Group Membership, Comments Left By User
On Videos, Screen Recordings, Video Transcript, Deep Search Captions,
Video Metadata, Audio Metadata, Phone Number, Time Phone Call Started,
User Name, Call Type, Phone Number Called To, Phone Number Called From,
Called To Location, Called From Location, Telephone Minutes Used,
Telephone Minutes Available, Charges For Use Of Telephone Services,
Currency Of Charged Telephone Services, Call Duration, Call ID,
Conference ID, Phone Number Type, Blocked Phone Numbers, Blocking
Action, Reason For Blocking Action, Blocked Phone Number Display Name,
Date And Time Of Blocking, Call Start Time, User Display Name, SIP
Address, Caller Number, Called To Number, Call Type, Call Invite Time,
Call Failure Time, Call End Time, Call Duration, Number Type, Media
Bypass, SBC FQDN, Data Center Media Path, Data Center Signaling Path,
Event Type, Final SIP, Final Vendor Subcode, Final SIP Phrase, Unique
Customer Support ID.
5. Limited Use Application records: Records relating to
applications with a specific, limited use, including; Application
Authoring Application Name, Application Authoring Application Author,
Voice Search Text Strings, Miles Driven, Mileage Rates, Country
Currency, Destination, Destination Classification, Car Make, Car Model,
Working Hours, Total Number Of Monthly Drives, Total Number Of Monthly
Miles, Total Number Of Personal Drives, Total Number Of Personal
Drives, Users Allowed To Access Application, Application Authoring
Application Security Settings, Total Number Of Cloud-Based Searches
Performed, Total Number Of Cloud-Based Search Queries From Web
Browsers, Total Number Of Cloud-Based Search Queries From Android
Operating Systems, Total Number Of Cloud-Based Search Queries From iOS
Operating Systems, Data Visualization Report Email Delivery Added, Data
Visualization Asset Created, Data Visualization Data Exported, Data
Visualization Asset Deleted, Data Visualization Report Downloaded, Data
Visualization Asset Edited, Data Visualization Asset Restored, Data
Visualization Report
[[Page 26956]]
Email Delivery Stopped, Data Visualization Asset Trashed, Data
Visualization Report Email Delivery Updated, Data Visualization Asset
Viewed, Data Visualization Link Sharing Access Type Changed, Data
Visualization Link Sharing Visibility Changed, Data Visualization User
Sharing Permissions Changed.
6. Development Records: Records relating to applications used for
the creation, sharing, or modification of software code, including:
Data Repository User ID, Data Repository Password, Data Repository User
Address, Data Repository Payment Information, Data Repository User
First Name, Data Repository User Last Name, Data Repository Profile
Picture, Data Repository Profile Biography, Data Repository Profile
Location, Data Repository User Company, Data Repository User
Preferences, Data Repository User Preference Analytics, Data Repository
Transaction Date, Data Repository Transaction Time, Data Repository
Transaction Amount Charged, Data Repository web pages Viewed, Data
Repository Referring website, Data Repository Date Of web page Request,
Data Repository Time Of web page Request, Data Repository User Commits,
Data Repository User Commit Comment Body Text, Data Repository Pull
Request Comment Body Text, Data Repository Issue Comment Body Text,
Data Repository User Comment Body Text, Data Repository User
Authentication, Language Of Device Accessing Data Repository, Operating
System Of Device Accessing Data Repository, Application Version Of
Device Accessing Data Repository, Device Type Of Device Accessing Data
Repository, Device ID Of Device Accessing Data Repository, Device Model
Of Device Accessing Data Repository, Device Manufacturer Of Device
Accessing Data Repository, Browser Version Of Device Accessing Data
Repository, Client Application Information Of Device Accessing Data
Repository, Data Repository User Usage Information, Data Repository
Transactional Information, Data Repository API Notification Status,
Data Repository API Issue Status, Data Repository API Pull Status, Data
Repository API Commit Status, Data Repository API Review Status, Data
Repository API Label, Data Repository API User Account Signin Status,
Data Repository API Schedule Status, Data Repository API Schedule List.
7. Unofficial Foreign Travel Monitoring: Records relating to
covered individuals for the administration of the SEAD 3 program,
including: Title, Name Of Traveler, Information Type: Pre-Travel And
Post-Travel, Start Date Of Travel, End Date Of Travel, Carrier Of
Transportation, Countries You Are Visiting, Passport Number, Passport
Expiration Date, Names And Association Of Foreign National Travel
Companions, Planned Foreign Contacts, Emergency Contact Name, Emergency
Contact Phone Number, Emergency Contact Relationship, Post-Travel
Questions Relating To Activity, Events, And Interactions.
8. Cloud-based storage records: Records relating to activity within
cloud-based storage systems, including: Number Of Files Made Publicly
Available, Number Of Files Made Available With A Link, Number Of Files
Shared With Domain Users, Number Of Files Shared With Domain Users
Through Link, Number Of Files Shared With Users Outside Domain, Number
Of Files Shared With User Or Group In Domain, Number Of Files Not
Shared At All, Number Of Spreadsheet Documents Added, Number Of Text
Documents Added, Number Of Presentation Documents, Number Of Form
Documents Added, Number Of Other Files Added, Number Of Files Edited,
Number Of Files Viewed, Number Of Files Added, Total Cloud Storage
Space Used, Last Time Storage Accessed By User, Item Added To Folder,
Item Approval Cancelled, Comment Added On Approval Of Item, Due Date
Time Change Requested, Item Approval Requested, Reviewer Change
Requested For Item Approval, Item Approval Reviewed, Document Copy
Created, Document Created, Document Deleted, Document Downloaded,
Document Shared As Email Attachment, Document Edited, Label Applied,
Label Value Changed, Label Removed, Item Locked, Item Moved, Item
Previewed, Item Printed, Item Removed From Folder, Item Renamed, Item
Restored, Item Trashed, Item Unlocked, Item Uploaded, Item Viewed,
Security Update Applied To File, Security Update Applied To All Files
In Folder, Publish Status Changed, Editor Settings Changed, Link
Sharing Access Type Changed, Link Sharing Access Changed From Parent
Folder, Link Sharing Visibility Changed, Link Sharing Visibility
Changed From Parent Folder, Security Update Removed From File,
Membership Role Changed, Shared Storage Settings Changed, Spreadsheet
Range Enabled, User Sharing Permissions Changed, User Sharing
Permissions Changed From Parent Folder, User Storage Updated, File
Viewed, File Renamed, File Created, File Edited, File Previewed, File
Printed, File Updated, File Deleted, File Uploaded, File Downloaded,
File Shared.
9. Email Application records: Records relating to regular use of
email applications, including: Email Body Text, Email Metadata, Total
Number Of Emails Sent, Total Number Of Emails Received, Total Number Of
Emails Sent And Received, Last Time User Accessed Email Client Through
A Post Office Protocol (POP) Mail Server, Last Time User Accessed Email
Client Through An internet Message Access Protocol (IMAP) Mail Server,
Last Time User Accessed Through Web-Based Server, Total Email Client
Storage Space Used, Calendar Access Level(S) Changed, Calendar Country
Changed, Calendar Created, Calendar Deleted, Calendar Description
Changed, Calendar Location Changed, Calendar Time zone Changed,
Calendar Title Changed, Calendar Notification Triggered, Calendar
Subscription Added, Calendar Subscription Deleted, Calendar Event
Created, Calendar Event Deleted, Calendar Event Guest Added, Calendar
Event Guest Auto-Response, Calendar Event Guest Removed, Calendar Event
Guest Response Changed, Calendar Event Modified, Calendar Event Removed
From Trash, Calendar Event Restored, Calendar Event Start Time Changed,
Calendar Event Title Modified, Successful Availability Lookup Of A
Calendar Between Email Clients, Successful Availability Lookup Of Email
Client Resource, Successful Email Client Resource List Lookup,
Unsuccessful Availability Lookup Of A Calendar On Email Client,
Unsuccessful Availability Lookup Of Email Client Resource, Unsuccessful
Email Client Resource List Lookup.
10. Web Browser Records: Records relating to activity within a web
browser, including: Web Browser Password Changed, Web Browser Password
Reused, Malware Detected in Transferred Content for User, Sensitive
Data Detected In Transferred Content, Unsafe website Visit Detected For
User.
11. USPS Board of Governors name, email, and collaborative meeting
records used to store meeting material such as presentations, briefing
documents/memos, meeting minutes/notes, and responses to various board
inquiries, presentation briefing documents, and memos.
12. Mentorship Application Information: Match Data Stored About A
User, Program Membership Status, Program Eligibility, Program
Enrollment Date, Program Participation Preference, Mentor/Mentee
Capacity, Preferred Mentors, Accepting New Matches Status, Recommended
Mentors, Declined Recommendation Reason,
[[Page 26957]]
Active Mentor/Mentee/Peer Relationships, Relationship Start/End Date,
User Who Requested The Relationship, Relationship Status, Action Item/
Checklist Item Progress, Mentorship Agreements, Pairing Health, Mentor/
Mentee/Peer Relationship Requests, Mentor/Mentee/Peer Relationship
Extension Requests, Mentor/Mentee/Peer Request Introduction Notes,
Mentor/Mentee/Peer Request Preferred Match Duration, Past Mentor/
Mentee/Peer Relationships, Active Group Membership As A Mentor/Mentee/
Peer, Group Name, Group Start/End Date, Group Status, Past Group
Membership As A Mentor/Mentee/Peer.
13. Mentoring Session Data Stored For A User: Status, Default Admin
Agenda, Custom User Agenda Start/End Date Time, Mentee/Mentor Feedback,
1-4 Star Rating, Free Text Session Feedback, Private Session Notes,
Shared Session Notes, User Booking Session, Session Calendar Event And
Videoconferencing Details, Session Attendance, Session Topics.
14. Program Survey Data Stored For A User: Survey Status, Custom
Admin Supplied Question Responses, Program Admin Data, Reporting Column
Preferences, Program Admin Support Contact.
ROUTINE USES OF RECORDS MAINTAINED IN THE SYSTEM, INCLUDING CATEGORIES
OF USERS AND THE PURPOSES OF SUCH USES:
Standard routine uses 1. through 9. apply. In addition:
(a) To appropriate agencies, entities, and persons when (1) the
Postal Service suspects or has confirmed that there has been a breach
of the system of records; (2) the Postal Service has determined that as
a result of the suspected or confirmed breach there is a risk of harm
to individuals, the Postal Service (including its information systems,
programs, and operations), the Federal Government, or national
security; and (3) the disclosure made to such agencies, entities, and
persons is reasonably necessary to assist in connection with the Postal
Service's efforts to respond to the suspected or confirmed breach or to
prevent, minimize, or remedy such harm.
RECORD SOURCE CATEGORIES:
Employees; contractors; customers; USPS Board of Governors.
POLICIES AND PRACTICES FOR STORAGE OF RECORDS:
Automated database, computer storage media, and paper.
POLICIES AND PRACTICES FOR RETRIEVAL OF RECORDS:
1. Records relating to third-parties are retrievable by name and
email address.
2. Records relating to collaboration are retrievable by name, email
address, and user ID.
3. Records relating to communication are retrievable by name, email
address, and user ID.
4. Records pertaining to multimedia are retrievable by username and
media title.
5. Records relating to application development are retrievable by
user ID and application name.
6. Records relating to limited use applications are retrievable by
name, email address, and user ID.
7. Records relating to Unofficial Foreign Travel Monitoring for
covered individuals are retrievable by name.
8. Records relating to Cloud-based storage are retrievable by name,
email address, and user ID.
9. Records relating to Email Applications are retrievable by name,
email address, and user ID.
10. Records relating to Web Browsers are retrievable by name, email
address, and user ID.
11. USPS Board of Governors secure board portal collaboration
software data is retrievable by date, meeting information, committee
name, and other session collaboration details.
12. Records relating to mentorship programs are retrievable by
mentee name
POLICIES AND PRACTICES FOR RETENTION AND DISPOSAL OF RECORDS:
1. Records relating to third parties are retained for twenty-four
months.
2. Records relating to collaboration are retained for twenty-four
months.
3. Records relating to communication are retained for twenty-four
months.
4. Multimedia recordings are retained for twenty-four months.
5. Records relating to application development are retained for
twenty-four months.
6. Records relating to limited use applications are retained for
twenty-four months.
7. Records relating to Unofficial Foreign Travel Monitoring for
covered individuals are retained for twenty-five years.
8. Records relating to Cloud-based storage are retained for twenty-
four months.
9. Records relating to Email Applications are retained for twenty-
four months.
10. Records relating to Web Browsers are retained for twenty-four
months.
11. USPS Board of Governors secure board portal collaboration
software data is retained up to twelve months from the close of the
corresponding event.
12. Records relating to mentorship programs are retained for
twenty-four months.
ADMINISTRATIVE, TECHNICAL, AND PHYSICAL SAFEGUARDS:
Paper records, computers, and computer storage media are located in
controlled-access areas under supervision of program personnel.
Computer access is limited to authorized personnel with a current
security clearance, and physical access is limited to authorized
personnel who must be identified with a badge.
Access to records is limited to individuals whose official duties
require such access. Contractors and licensees are subject to contract
controls and unannounced on-site audits and inspections.
Computers are protected by encryption, mechanical locks, card key
systems, or other physical access control methods. The use of computer
systems is regulated with installed security software, computer logon
identifications, and operating system controls including access
controls, terminal and transaction logging, and file management
software.
RECORD ACCESS PROCEDURES:
Requests for access must be made in accordance with the
Notification Procedure and USPS Privacy Act regulations regarding
access to records and verification of identity under 39 CFR 266.5.
CONTESTING RECORD PROCEDURES:
See Notification Procedure and Record Access Procedures above.
NOTIFICATION PROCEDURES:
Customers and employees wanting to know if other information about
them is maintained in this system of records must address inquiries in
writing to the Chief Information Officer and Executive Vice President
and include their name and address.
EXEMPTIONS PROMULGATED FOR THE SYSTEM:
None.
HISTORY:
December 1, 2023; 88 FR 83981; May 11, 2021; 86 FR 25899; January
31, 2022; 87 FR 4957.
SYSTEM NAME AND NUMBER:
550.200 Commercial Information Technology Resources--
Administrative.
SECURITY CLASSIFICATION:
None.
[[Page 26958]]
SYSTEM LOCATION:
All USPS facilities and contractor sites.
SYSTEM MANAGER(S):
For records of computer access authorizations: Chief Information
Officer and Executive Vice President, United States Postal Service, 475
L'Enfant Plaza SW, Washington, DC 20260.
AUTHORITY FOR MAINTENANCE OF THE SYSTEM:
39 U.S.C. 401, 403, and 404.
PURPOSE(S) OF THE SYSTEM:
1. To provide active and passive monitoring and review of
information system applications and user activities.
2. To generate logs and reports of information system application
and user activities.
3. To provide a means of auditing commercial information system
activities across applications and users.
CATEGORIES OF INDIVIDUALS COVERED BY THE SYSTEM:
1. Individuals with authorized access to USPS computers,
information resources, and facilities, including employees,
contractors, business partners, suppliers, and third parties.
2. Individuals participating in web-based meetings, web-based video
conferencing, web-based communication applications, and web-based
collaboration applications.
CATEGORIES OF RECORDS IN THE SYSTEM:
1. General Audit Log activities: DateTime, IP Address, User
Activity, User Item Accessed, Activity Detail, Object ID, Record Type,
Client IP Address, CorrelationID, CreationTime, EventData, EventSource,
ItemType, OrganizationID, UserAgent, USerKEy, UserType, Version,
Workload.
2. File and page activities: Accessed file, Change retention label
for a file, Deleted file marked as a record, Checked in file, Changed
record status to locked, Changed record status to unlocked, Checked out
file, Copied file, Discarded file checkout, Deleted file, Deleted file
from recycle bin, Deleted file from second-stage recycle bin, Detected
document sensitivity mismatch, Detected malware in file, Deleted file
marked as a record, Downloaded file, Modified file, Moved file,
Recycled all minor versions of file, Recycled all versions of file,
Recycled version of file, Renamed file, Restored file, Uploaded file,
Viewed page, View signaled by client, Performed search query.
3. Folder activities: Copied folder, Created folder, Deleted
folder, Deleted folder from recycle bin, Deleted folder from second-
stage recycle bin, Modified folder, Moved folder, Renamed folder,
Restored folder.
4. Cloud-based Enterprise Storage activities: Created list, Created
list column, Created list content type, Created list item, Created site
column, Created site content type, Deleted list, Deleted list column,
Deleted list content type, Deleted list item, Deleted site column,
Deleted site content type, Recycled list item, Restored list, Restored
list item, Updated list, Updated list column, Updated list content
type, Updated list item, Updated site column, Updated site content
type.
5. Sharing and access request activities: Added permission level to
site collection, Accepted access request, Accepted sharing invitation,
Blocked sharing invitation, Created access request, Created a company
shareable link, Created an anonymous link, Created secure link, Deleted
secure link, Created sharing invitation, Denied access request, Removed
a company shareable link, Removed an anonymous link, Shared filer,
folder, or site, Unshared file folder or site, Updated access request,
Updated an anonymous link, Updated sharing invitation, Used a company
shareable link, Used an anonymous link, Used secure link, User added to
secure link, User removed from secure link, Withdrew sharing
invitation.
6. Synchronization activities: Allowed computer to sync files,
Blocked computer from syncing files, Downloaded files to computer,
Downloaded file changes to computer, Uploaded files to document
library, Uploaded file changes to document library.
7. Site permissions activities: Added site collection admin, Added
user of group to Cloud-based Enterprise Storage group, Broke permission
level inheritance, Broke sharing inheritance, Created group, Deleted
group, Modified access request setting, Modified ``Members Can Share''
setting, Modified permission level on site collection, Modified site
permissions, Removed site collection admin, Removed permission level
from site collection, Removed user or group from Cloud-based Enterprise
Storage group, Requested site admin permissions, Restored sharing
inheritance, Updated group.
8. Site administration activities: Added allowed data location,
Added exempt user agent, Added geo location admin, Allowed user to
create groups, Cancelled site geo move, Changed a sharing policy,
Changed deice access policy, Changed exempt user agents, Changed
network access policy, Completed site geo move, Created Sent To
connection, Created site collection, Deleted orphaned hub site, Deleted
Sent To connection, Deleted site, Enabled document preview, Enabled
legacy workflow, Enabled Office on Demand, Enabled result source for
People Searched, Enabled RSS feeds, Failed site swap, Joined site to
hub site, Registered hub site, Removed allowed data location, Removed
geo location admin, Renamed site, Scheduled site rename, Scheduled site
swap, Scheduled site geo move, Set host site, Set storage quota for geo
location, Swapped site, Unjoined site from hub site, Unregistered hub
site.
9. Cloud-based Email Server mailbox activities: Created mailbox
item, Copied messages to another folder, User signed in to mailbox,
Accessed mailbox items, Sent message using Send On Behalf permissions,
Purged messages from mailbox, Moved messages to Deleted Items folder,
Moved messages to another folder, Sent message using Send As
permissions, Sent message, Updated message, Deleted messages from
Deleted Items folder, New-Inbox Rule Create-Inbox Rule from email web
application, Set-Inbox Rule Modify inbox rule from email web
application, Update inbox rules from email web application, Added
delegate mailbox permissions, Removed delegate mailbox permissions,
Added permissions to folder, Modified permissions of folder, Removed
permissions from folder, Added or removed user with delegate access to
calendar folder, Labeled message as a record.
10. Retention policy and retention level activities: Created
retention label, Created retention policy, Configured settings for a
retention policy, Deleted retention label, Deleted retention policy,
Deleted settings from a retention policy, Updated retention label,
Updated retention policy, Updated settings for a retention policy,
Enabled regulatory record option for retention labels.
11. User administration activities: Added user, Deleted user, Set
license properties, Reset user password, Changed user password, Changed
user license, Updated user, Set property that forces user to change
password, Organization Signup, Organization Creation, User creation
without organization, Password reset requested, Disable user, Login
success, Login success reauthenticate, Login failure, Login failure
reauthentication, Logout, User permission change, Role permission
change, Environment permissions change, Create role, Edit role--add
user, Edit role--remove user, Edit role--change external group mapping,
Delete role.
[[Page 26959]]
12. Enterprise User Administration group administration activities:
Added group, Updated group, Deleted group, Added member to group,
Removed member from group.
13. Application administration activities: Added service principal,
Removed a service principal from the directory, Set delegation entry,
Removed credentials from a service principal, Added delegation entry,
Added credentials to a service principal, Removed delegation entry.
14. Role administration activities: Added member to Role, Removed a
user from a directory role, Set company contact information.
15. Directory administration activities: Added a partner to the
directory, Removed a partner from the directory, Added domain to
company, Removed domain from company, Updated domain, Set domain
authentication, Verified domain, Updated the federation settings for a
domain, Verified email verified domain, Turned on Enterprise
Information Technology Account Administration sync, Set password
policy, Set company information.
16. eDiscovery activities: Created content search, Deleted content
search, Changed content search, Started content search, Stopped content
search, Started export of content search, Started export report,
Previewed results of content search, Purged results of content search,
Started analysis of content search, Removed export of content search,
Removed preview results of content search, Removed purse action
performed on content search, Removed analysis of content search,
Removed search report, Content search preview item listed, Content
search preview item viewed, Content search preview item downloaded,
Downloaded export of content search, Created search permissions filter,
Deleted search permissions filter, Changed search permissions filter,
Created hold in eDiscovery case, Deleted hold in eDiscovery case,
Changed hold in eDiscovery case, Created eDiscovery case, Deleted hold
in eDiscovery case, Changed hold in eDiscovery case, Created eDiscovery
case, Deleted eDiscovery data, Changed hold in eDiscovery case, Added
member to eDiscovery case, Removed member from eDiscovery case, Changed
eDiscovery case membership, Created eDiscovery administrator, Deleted
eDiscovery administrator, Changed eDiscovery administrator membership,
Remediation action created, Item deleted using Remediation, Created
workingset search, Updated workingset search, Deleted workingset
search, Previewed workingset search, Document viewed, Document
annotated, Document downloaded, Tag created, Tag edited, Tag deleted,
Tag files, Tag job, Created review set, Added Cloud-based productivity
software data, Added non-office data, Added data to another workingset,
Added remediated data, Run algo job, Run export job, Run burn job, Run
error remediation job, Run load comparison job, Updated case settings.
17. eDiscovery system command activities: Created content search,
Deleted content search, Changed content search, Started content search,
Stopped content search, created content search action, Deleted content
search action, Created search permissions filter, Deleted search
permissions filter, Changed search permissions filter, Created hold in
eDiscovery case, Deleted hold in eDiscovery case, Changed hold in
eDiscovery case, Created search query for eDiscovery case hold, Deleted
search query for eDiscovery case hold, Changed search query for
eDiscovery case hold, Created eDiscovery case, Deleted eDiscovery case,
Changed eDiscovery case, Added member to eDiscovery case, Removed
member from eDiscovery case, Changed eDiscovery case membership,
Created eDiscovery administrator, Deleted eDiscovery administrator,
Changed eDiscovery administrator membership.
18. Data Analysis application activities: Viewed program dashboard,
Created program dashboard, Edited program dashboard, Deleted program
dashboard, Shared program dashboard, Printed program dashboard, Copied
program dashboard, Viewed program tile, Exported program tile data,
Viewed program report, Deleted program report, Printed program report
page, Created program report, Edited program report, Copied program
report, Exported program artifact to another file format, Export
program activity events, Updated program workspace access, Restored
program workspace, Updated program workspace, Viewed program metadata,
Created program dataset, Deleted program dataset, Created program
group, Deleted program group, Added program group members, Retrieved
program groups, Retrieved program dashboard, Retrieved data sources
from program dataset, Retrieved upstream data flows from program
dataflow, Retrieved data sources from program dataflow, Removed program
group members, Retrieved links between datasets and dataflows, Created
organizational program content pack, Created program app, Installed
program app, Updated program app, Updated organization's program
settings, Started program trial, Started program extended trial,
Analyzed program dataset, Created program gateway, Deleted program
gateway, Added data source to program gateway, Removed data source from
program gateway, Changed program gateway admins, Changed program
gateway data source users, Set scheduled refresh on program dataset,
Unpublished program app, Deleted organizational program content pack,
Renamed program dashboard, Edited program dataset, Updated capacity
display name, Changed capacity state, Updated capacity admin, Changed
capacity user assignment, Migrated workspace to a capacity, Removed
workspace from a capacity, Retrieved program workspaces, Shared program
report, Generated program Embed Token, Discover program dataset data
sources, Updated program dataset data sources, Requested program
dataset refresh, Binded program dataset to gateway, Changed program
dataset data sources, Requested program dataset refresh, Binded program
dataset to gateway, Changed program dataset connections, Took over
program dataset, Updated program gateway data source credentials,
Imported file to program, Updated program dataset parameters, Generated
program dataflow SAS token, Created program dataflow, Updated program
dataflow, Deleted program dataflow, Viewed program dataflow, Exported
program dataflow, Set scheduled refresh on program dataflow, Requested
program dataflow refresh, Received program dataflow secret from Key
Vault, Attached dataflow storage account, Migrated dataflow storage
location, Updated dataflow storage assignment permissions, Set dataflow
storage location for workspace, Took ownership of program dataflow,
Canceled program dataflow refresh, Created program email subscription,
Updated program email subscription, Deleted program email subscription,
Created program folder, Deleted program folder, Updated program folder,
Added program folder access, Deleted program folder access, Updated
program folder access, Posted program comment, Deleted program comment,
Analyzed program report, Viewed program usage metrics, Edited program
dataset endorsement, Edited program dataflow endorsement, Edited
program report endorsement, Edited program app endorsement, Retrieved
list of modified workspaces in program tenant, Sent a scan request in
program tenant, Retrieve scan result in program tenant, Inserted
snapshot for user in program tenant, Updated snapshot for user in
program tenant, Deleted snapshot for user in program tenant, Inserted
snapshot for
[[Page 26960]]
user in program tenant, Updated snapshot for user in program tenant,
Deleted snapshot for user in program tenant, Retrieved snapshots for
user in program tenant, Edited program certification permission, Took
over a program data source, Updated capacity custom settings, Created
workspace for program template app, Deleted workspace for program
template app, Updated settings for program template app, Updated
testing permissions for program template app, Created program template
app, Deleted program template app, Promoted program template app,
Installed program template app, Updated parameters for installed
program template app, Created install ticker for installing program
template app, Updated an organizational custom visual, Created an
organizational custom visual, Deleted an organizational custom visual,
Custom visual requested Enterprise Information Technology Account
Administration access token, Customer visual requested Cloud-based
productivity software access token, Connected to program dataset from
external app, Created program dataset from external app, Deleted
program dataset from external app, Edited program dataset from external
app, Requested program dataset refresh from external app, Requested SAS
token for program storage, Requested account key for program storage,
Assigned a workspace to a deployment pipeline, Removed a workspace from
a deployment pipeline, Deleted deployment pipeline, Created deployment
pipeline, Deployed to a pipeline stage, Updated deployment pipeline
configuration, Updated deployment pipeline access, Added external
resource, Added link to external resource, Deleted link to external
resource, Updated featured tables, Applied sensitivity label to program
artifact, Changed sensitivity label for program artifact, Deleted
sensitivity label from program artifact.
19. Productivity Analysis activities: Updated privacy setting,
Updated data access setting, Uploaded organization data, Created
meeting exclusion, Updated preferred meeting exclusion, Execute query,
Canceled query, Deleted result, Downloaded report, Accessed Odata link,
Viewed query visualization, Viewed explore, Created partition, Updated
partition, Deleted partition, User logged in, User logged out.
20. Briefing email activities: Updated user privacy settings,
Updated organization privacy settings.
21. Cloud-based Collaboration Application activities: Created team,
Deleted team, Added channel, Deleted channel, Changed organization
setting, Changed team setting, Changed channel setting, User signed in
to Cloud-based Collaboration Application, Added members, Changed role
of members, Removed members, Added bot to team, Removed bot from team,
Added tab, Removed tab, Updated tab, Added connector, Removed
connector, Updated connector, Downloaded analytics report, Upgraded
Cloud-based Collaboration Application device, Blocked Cloud-based
Collaboration Application device, Unblocked Cloud-based Collaboration
Application device, Changed configuration of Cloud-based Collaboration
Application device, Enrolled Cloud-based Collaboration Application
device, Installed app, Upgraded app, Uninstalled app, Published app,
Updated app, Deleted app, Deleted all organization apps, Performed
action on card, Added scheduling group, Edited scheduling group,
Deleted scheduling group, Added shift, Edited shift, Deleted shift,
Added time off, Edited time off, Deleted time off, Added open shift,
Edited open shift, Deleted open shift, Shared schedule, Clocked in
using Time clock, Clocked out using Time clock, Started break using
Time clock, Ended break using Time clock, Added Time clock entry,
Edited Time clock entry, Deleted Time clock entry, Added shift request,
Responded to shift request, Canceled shift request, Changed schedule
setting, Added workforce integration, Accepted off shift message.
22. Cloud-based Collaboration Application approvals activities:
Created new approval request, Viewed approval request details, Approved
approval request, Rejected approval request, Canceled approval request,
Shared approval request, File attached to approval request, Reassigned
approval request, Added e-signature to approval request.
23. Enterprise Social Network activities: Changed data retention
policy, Changed network configuration, Changed network profile
settings, Changed private content mode, Changed security configuration,
Created file, Created group, Deleted group, Deleted message, Downloaded
file, Exported data, Shared file, Suspended network user, Suspended
user, Updated file description, Updated file name, Viewed file.
24. Enterprise Customer Relationship Management activities:
Accessed out-of-box entity (deprecated), Accessed custom entity
(deprecated), Accessed admin entity (deprecated), Performed bulk
actions (deprecated), All Enterprise Customer Relationship Management
activities, Accessed Enterprise Customer Relationship Management admin
center (deprecated), Accessed internal management tool (deprecated),
Signed in or out (deprecated), Activated process or plug-in
(deprecated).
25. Information Systems Infrastructure Automation activities:
Created flow, Edited flow, Deleted flow, Edited flow permissions,
Deleted flow permissions, Started a Flow paid trial, Renewed a Flow
paid trial.
26. Application authoring program activities: Created app, Edited
app, Deleted app, Launched app, Published app, Marked app as Hero,
Marked app as Featured, Edited app permission, Restored app version.
27. Enterprise Automation DLP activities: Created DLP Policy,
Updated DLP Policy, Deleted DLP Policy.
28. Video platform activities: Created video, Edited video, Deleted
video, Uploaded video, Downloaded video, Edited video permission,
Viewed video, Shared video, Liked video, Unliked video, Commented on
video, Deleted video comment, Uploaded video text track, Deleted video
text track, Uploaded video thumbnail, Deleted video thumbnail, Replaced
video permissions and channel links, Marked video public, Marked video
private, Created Video platform group, Edited Video platform group,
Deleted Video platform group, Edited Video platform group memberships,
Created Video platform channel, Edited Video platform channel, Deleted
a Video platform channel, Replaced Video platform channel thumbnails,
Edited Video platform user settings, Edited tenant settings, Edited
global role members, Deleted Video platform user, Deleted Video
platform user's data report, Edited Video platform user, Exported Video
platform user's data report, Downloaded Video platform user's data
report, Video Platform Event Date, Video Platform Event Name, Video
Platform Event Description, Video Platform Meeting Code, Video Platform
Participant Identifiers.
29. Content explorer activities: Accessed item.
30. Quarantine activities: Previewed Quarantine message, Deleted
Quarantine message, Released Quarantine message, Exported Quarantine
message, Viewed Quarantine Message's header.
31. Customer Key Service Encryption activities: Fallback to
Availability Key.
32. Form application activities: Created form, Edited form, Moved
form, Deleted form, Viewed form, Previewed form, Exported form, Allowed
share form for copy, Added form co-author, Removed form co-author,
Viewed response page, Created response, Updated response, Deleted all
[[Page 26961]]
responses, Deleted response, Viewed responses, Viewed response, Created
summary link, Deleted summary link, Updated from phishing status,
Updated user phishing status, Sent premium form product invitation,
Updated form setting, Updated user setting, Listed forms.
33. Sensitivity label activities: Applied sensitivity label to
site, Removed sensitivity label from site, Applied sensitivity label to
file, Changed sensitivity label applied to file, Removed sensitivity
label from file.
34. Local machine communications platform system command
activities: Set tenant federation.
35. Search activities: Performed email search, Performed Cloud-
based Enterprise Storage search.
36. Security analytics activities: Attempted to compromise
accounts.
37. Device activities: Printed file, Deleted file, Renamed file,
Created file, Modified file, Read file, Captured screen, Copied file to
removable media, Copied file to network share, Copied file to
clipboard, Uploaded file to cloud, File accessed by an unallowed
application.
38. Information barrier activities: Removed segment from site,
Changed segment of site, Applied segment to site.
39. On-premises DLP scanning activities: Matched DLP rule, Enforced
DLP rule.
40. Individual Productivity Analytics activities: Updated user
settings, Updated organization settings.
41. Exact Data Match (EDM) activities: Created EDM schema, Modified
EDM schema, Removed EDM scheme, Completed EDM data upload, Failed EDM
data upload.
42. Enterprise Information System Information Protection
activities: Accessed file, Discovered file, Applied sensitivity label,
Updated sensitivity label, Removed sensitivity label, Removed file,
Applied protection, Changed protection, Removed protection, Received
AIP heartbeat.
43. Data Repository Team Discussion Post Actions: Team Discussion
Post Updated, Team Discussion Post Destroyed.
44. Data Repository Team Discussion Post Reply Actions: Team
Discussion Post Reply Updated, Team Discussion Post Reply Destroyed.
45. Data Repository Enterprise Actions: Self-Hosted Runner Removed,
Self-Hosted Runner Registered, Self-Hosted Runner Group Created, Self-
Hosted Runner Group Removed, Self-Hosted Runner Removed From Group,
Self-Hosted Runner Added To Group, Self-Hosted Runner Group Member List
Updated, Self-Hosted Runner Group Configuration Changed, Self-Hosted
Runner Updated.
46. Data Repository Hook Actions: Hook Created, Hook Configuration
Changed, Hook Destroyed, Hook Events Altered.
47. Data Repository Integration Installation Request Actions:
Integration Installation Request Created, Integration Installation
Request Closed.
48. Data Repository Issue Action: Issue Destroyed.
49. Data Repository Org Actions: Secret Action Created, Member
Creation Disabled, Two Factor Authentication Requirement Disabled,
Member Creation Enabled, Two Factor Authentication Enabled, Member
Invited, Self-Hosted Runner Registered, Secret Action Removed, Member
Removed, Outside Collaborator Removed, Self-Hosted Runner Removed,
Self-Hosted Runner Group Created, Self-Hosted Runner Group Removed,
Self-Hosted Runner Group Updated, Secret Action Updated, Repository
Default Branch Name Updated, Default Repository Permission Updated,
Member Role Updated, Member Repository Creation Permission Updated.
50. Data Repository Organization Label Actions: Default Label
Created, Default Label Updated, Default Label Destroyed.
51. Data Repository Oauth Application Actions: Oauth Application
Created, Oauth Application Destroyed, Oauth Application Secret Restet,
Oauth Application Token Revoked, Oauth Application Transferred.
52. Data Repository Profile Picture Actions: Organization Profile
Picture Updated.
53. Data Repository Project Actions: Project Board Created, Project
Board Linked, Project Board Renamed, Project Board Updated, Project
Board Deleted, Project Board Unlinked, Project Board Permissions
Updated, Project Board Team Permissions Updated, Project Board User
Permission Updated.
54. Data Repository Protected Branch Actions: Branch Protection
Enabled, Branch Protection Destroyed, Branch Protection Enforced For
Administrators, Branch Enforcement Of Required Code Owner Enforced,
Stale Pull Request Dismissal Enforced, Branch Commit Signing Updated,
Pull Request Review Updated, Required Status Check Updated, Requirement
For Branch To Be Up To Date Before Merging Changed, Branch Update
Attempt Rejected, Branch Protection Requirement Overridden, Force Push
Enabled, Force Push Disabled, Branch Deletion Enabled, Branch Deletion
Disabled, Linear Commit History Enabled, Linear Commit History
Disabled.
55. Data Repository Repo Actions: User Visibility Changed, Actions
Enabled For Repository, Collaboration Member Added, Topic Added To
Repository, Repository Archived, Anonymous Git Read Access Disabled,
Anonymous Git Read Access Enabled, Anonymous Git Read Access Setting
Locked, Anonymous Git Read Access Setting Unlocked, New Repository
Created, Secret Created For Repository, Repository Deleted, Repository
Enabled, Secret Removed, User Removed, Self-Hosted Runner Registered,
Topic Removed From Repository, Repository Renamed, Self-Hosted Runner
Updated, Repository Transferred, Repository Transfer Started,
Repository Unarchived, Secret Action Updated.
56. Data Repository Dependency Graph Actions: Dependency Graph
Disabled, Dependency Graph Disabled For New Repository, Dependency
Graph Enabled, Dependency Graph Enabled For New Repository.
57. Data Repository Secret Scanning Actions: Secret Scanning
Disabled For Individual Repository, Secret Scanning Disabled For All
Repositories, Secret Scanning Disabled For New Repositories, Secret
Scanning Enabled For Individual Repository, Secret Scanning Enabled For
All Repositories, Secret Scanning Enabled For New Repositories.
58. Data Repository Vulnerability Alert Actions: Vulnerable
Dependency Alert Created, Vulnerable Dependency Alert Dismissed,
Vulnerable Dependency Alert Resolved.
59. Data Repository Team Actions: Member Added To Team, Repository
Added To Team, Team Parent Changed, Team Privacy Level Changed, Team
Created, Member Demoted In Team, Team Destroyed, Member Promoted In
Team, Member Removed From Team, Repository Removed From Team.
60. Data Repository Team Discussion Actions: Team Discussion
Disabled, Team Discussion Enabled.
61. Data Repository Workflow Actions: Workflow Run Cancelled,
Workflow Run Completed, Workflow Run Created, Workflow Run Deleted,
Workflow Run Rerun, Workflow Job Prepared.
62. Data Repository Account Actions: Billing Plan Change, Plan
Change, Pending Plan Change, Pending Subscription Change.
63. Data Repository Advisory Credit Actions: Accept Credit, Create
Credit, Decline Credit, Destroy Credit.
64. Data Repository Billing Actions: Change Billing Type, Change
Email.
65. Data Repository Bot Alerts Actions: Disable Bot, Enable Bot.
[[Page 26962]]
66. Data Repository Bot Alerts for New Repository Actions: Disable
Alerts, Enable Alerts.
67. Data Repository Bot Security Alerts for Update Actions: Disable
Security Update Alerts, Enable Security Update Alerts.
68. Data Repository Bot Security Alerts for New Repository Actions:
Disable New Repository Security Alerts, Enable New Repository Security
Alerts.
69. Data Repository Environment Actions: Create Actions Secret,
Delete, Remove Actions Secret, Update Actions Secret.
70. Data Repository Git Actions: Clone, Fetch, Push.
71. Data Repository Marketplace Agreement Signature Actions:
Create.
72. Data Repository Marketplace Listing Actions: Approve, Create,
Delist, Redraft, Reject.
73. Data Repository Members Can Create Pages Actions: Enable,
Disable.
74. Data Repository Organization Credential Authorization Actions:
Security Assertion Markup Language Single-Sign On Authorized, Security
Assertion Markup Language Single-Sign On Deauthorized, Authorized
Credentials Revoked.
75. Data Repository Package Actions: Package Version Published,
Package Version Deleted, Package Deleted, Package Version Restored,
Package Restored.
76. Data Repository Payment Method Actions: Payment Method Cleared,
Payment Method Created, Payment Method Updated.
77. Data Repository Advisory Actions: Security Advisory Closed,
Common Vulnerabilities And Exposures Advisory Requested, Data
Repository Security Advisory Made Public, Data Repository Security
Advisory Withdrawn, Security Advisory Opened, Security Advisory
Published, Security Advisory Reopened, Security Advisory Updated.
78. Data Repository Content Analysis: Data Use Settings Enabled,
Data Use Settings Disabled.
79. Data Repository Sponsors Actions: Repo Funding Link Button
Toggle, Repo Funding Links File Action, Sponsor Sponsorship Cancelled,
Sponsor Sponsorship Created, Sponsor Sponsorship Preference Changed,
Sponsor Sponsorship Tier Changed, Sponsored Developer Approved,
Sponsored Developer Created, Sponsored Developer Profile Updated,
Sponsored Developer Request Submitted For Approval, Sponsored Developer
Tier Description Updated, Sponsored Developer Newsletter Sent,
Sponsored Developer Invited From Waitlist, Sponsored Developer Joined
From Waitlist.
80. Administrator audit log events: Admin privileges grant, Group
events, Marketplace login audit change, Auto provisioning automatically
disabled.
81. Group enterprise audit log events: Add service account
permission, Remove service account permission, Add user, Add user role,
Remove user, Request to join, Approve join request, Reject join
request, Invite user, Accept invitation, Reject invitation, Revoke
invitation, Join, Ban user including with moderation, Unban user, Add
all users in domain, Create group, Delete group, Create namespace,
Delete namespace, Change info setting, Add info setting, Remove info
setting, Add member role, Remove user role, Membership expiration
added, Membership expiration removed, Membership expiration updated.
82. Software vendor employee interaction events: Event date,
Software product name, Software vendor employee email, Software vendor
employee home office location, Software vendor employee access
justification, Justification tickets, Log ID, Software product resource
accessed name.
83. Login events: Two-step verification enabled, Two-step
verification disabled, Account password change, Account recovery email
change, Account recovery phone change, Account recovery secret question
change, Account recovery secret answer change, Advanced Protection
enroll, Advanced Protection unenroll, Failed login, Government-backed
attack attempt, Leaked password detected, Login challenged, Login
verification, Logout, Out of domain email forwarding enabled,
Successful login, Suspicious Login, Suspicious login blocked,
Suspicious login from less secure app blocked, Suspicious programmatic
login locked, User suspended, User suspended through spam relay, User
suspended through spam, User suspended through suspicious activity.
84. OAuth Token audit log events: OAuth event description, OAuth
event name, OAuth user, OAuth application name, OAuth client ID, OAuth
scope, OAuth event data, OAuth logged activity IP address.
85. Rules audit log events: Rule event name, Rule event
description, Rule triggering user, Rule name, Rule type, Rule resource
name, Resource ID, Resource title, Resource type, Resource owner,
Recipients, Data source, Actor IP address, Rule severity, Scan type,
Matched trigger, Matched detectors, Triggered actions, Suppressed
actions, Date, Device ID, Device type.
86. SAML audit log events: SAML event description, SAML Event name,
SAML triggering user, SAML application name, SAML user organization
name, Initiated by, Failure type, Response status, Second level status,
SAML logged activity IP address, SAML event date.
87. Calendar application audit log events: Activity name, Activity
description, Calendar user, Calendar ID, Event title, Event ID, User
agent, Recipient email, Message ID, Remote Exchange Web Server URL,
Error code, Requested window start, Requested window end, Date,
Calendar logged activity IP address.
88. Context-Aware Access audit log events: Event name, Context-
Aware access user, Context-Aware access logged activity IP address,
Device ID, Access level applied, Context-Aware access event date.
89. Web browser audit log events: Web browser event name, Web
browser event date, Web browser event reason, Device name, Device user,
Web browser profile user name, URL generating event, Operating System
of Web Browser, Web browser triggered rule reason, Web browser event
result, Web browser content name, Web browser content size, Web browser
content hash, Web browser content type, Web browser trigger type, Web
browser trigger user, Web browser user agent, Web browser client type.
90. Data Visualization audit log events: Asset name, Event
description, User, Event name, Date, Asset type, Owner, Asset ID, IP
address, Connector type, visibility, Prior visibility.
91. Devices audit log events: Device ID, Event description, Date,
Event name, User, Device type, Application hash, Serial number, Device
model, OS version, Policy name, Policy status code, Windows OS edition,
Account registration change, Device action event, Device application
change, Device compliance status, Device compromise, Device OS update,
Device ownership, Device settings change, Device status changed on
Apple portal, Device sync, Failed screen unlock attempts, Sign out
user, Suspicious activity, Work profile support.
92. Cloud-based web storage application audit log events: Cloud-
based web storage application event name, Cloud-based web storage
application event description, Cloud-based web storage application item
type, Cloud-based web storage application item ID, Cloud-based web
storage application item visibility, Cloud-based web storage
application item prior visibility, Cloud-based web storage application
user, Cloud-based web storage application visitor Boolean value, Cloud-
based web storage
[[Page 26963]]
application file owner, Cloud-based web storage application event date,
Cloud-based web storage application event IP address.
93. Groups audit log events: Groups event name, Groups event
description, Groups event user, Groups event date.
94. Chat audit log events: Chat event name, Chat event description,
Chat event user, Chat event date.
95. Whiteboard application audit log events: Whiteboard application
ID Whiteboard application event description, Whiteboard application
event name, Whiteboard application event user, Whiteboard application
event date.
96. Note application audit log events: Note application event name,
Note application event description, Note application event user, Note
application event note owner, Note application event date, Note
application note URI, Note application attachment URI.
97. Password vault audit log events: Password vault actor, Password
vault event timestamp, Password vault event name, Password vault
application username, Password vault application installation name,
Password vault application credential name.
98. Takeout audit log events: Takeout event description, Takeout
products requested, Takeout Job ID, Takeout event date, Takeout event
IP address.
99. User accounts audit log events: User account event description,
User account event date, User account event IP address, two-step
verification disable, two-step verification enroll, Account password
change, Account recovery email change, Account recovery phone change,
Account recovery secret question change, Account recovery secret answer
change.
100. Voice audit log events: Voice event name, Voice event
description, Voice event date, Voice event user, Voice receiving phone
number, Voice placing phone number, Voice call duration, Voice group
message status, Voice call cost, Auto Attendant couldn't route to
voicemail recipient, Auto attendant deleted, Auto attendant failed to
transfer to a user, Auto attendant published, Auto attendant received a
voicemail, Auto attendant voicemail failed to deliver, Auto attendant
voicemail failed to forward.
101. User setting changes: 2-Step Verification Scratch Codes Of
User Deleted, New 2-Step Verification Scratch Codes Generated For User,
3-Legged Oauth Device Tokens Revoked, 3-Legged Oauth Token Revoked, Add
Recovery Email For User, Add Recovery Phone For User, Admin Privileges
Granted For User, Admin Privileges Revoked For User, Application
Specific Password Revoked For User, Automatic Contact Sharing Changed
For User, Bulk Upload Notification, User Invite Cancelled, Custom
Attribute Changed, External Id Changed, Gender Changed, Ims Changed, IP
Whitelisted, Keywords Changed, User Location Changed, User Organization
Changed, User Phone Numbers Changed, User Recovery Email Changed, User
Recovery Phone Changed, User Relation Changed, User Address Changed,
User Email Monitor Created, Data Transfer Requested For User, Delegated
Admin Privileges Granted, Account Information Dump Deleted, Email
Monitor Deleted, Mailbox Dump Deleted, Profile Photo Deleted, First
Name Changed, Gmail Account Reset, Last Name Changed, Mail Routing
Destination Created, Mail Routing Destination Deleted, Nickname
Created, Nickname Deleted, Password Changed, Password Change Required
On Next Login, Recovery Email Removed, Recovery Phone Removed, Account
Information Requested, Mailbox Dump Requested, User Invite Resent,
Cookies Reset For User And Forced Relogin, Security Key Registered For
User, Security Key Revoked, User Invite Sent, Temporary Password
Viewed, 2-Step Verification Turned Off, User Session Unblocked, Profile
Photo Updated, User Advanced Protection Unenroll, User Archived, User
Birthdate Changed, User Created, User Deleted, User Downgraded From
Social Media Application, User Enrolled In 2-Step Verification, User
List Downloaded, User Org Unit Changed, User Put In 2-Step Verification
Grace Period, User Renamed, User Strong Auth Unenrolled, User
Suspended, User Unarchived, User Undeleted, User Unsuspended, User
Upgraded To Social Media Application.
102. Application Authoring application audit log elements: App
synced, App edited, App added, App deleted, App invocation added, App
invocation edited, App invocation deleted, App invocation action
performed, App read call made, App bot invocation.
103. Organizational Administrative Data Elements: Set Terms and
Conditions, Modify Terms and Conditions, Set org custom theme, Edit org
custom theme, Add custom policy, Delete custom policy, Create User IdP
Profile, Create environment, Delete environment, Rename environment,
Edit domain name, Create business group, Edit business group name, Edit
business group entitlement, Delete business group.
104. API audit log elements: Create API, Delete API, Import API,
Update label of API, Update consumer endpoint of API, Update endpoint
URI of API, Calendar API kind, Application API client version, Create
API version, Delete API version, Import API, Edit name of API version,
Edit description of API version, Edit API URL of API version, Add tag
to API, Remove tag from API, Deprecate API, Set T&Cs, Create RAML,
Modify RAML, Create endpoint, Update existing endpoint, Deploy proxy,
Update deployed proxy, Redeploy proxy, Create SLA tier, Modify SLA
tier, Deprecate SLA tier, Delete SLA tier, Apply policy, Edit policy,
Remove policy, Create project, Delete project, Delete files, Rename
project, Clean branch, Create branch, Delete branch, Save branch,
Delete file, Move file, Import project, Publish to Exchange, Publish to
API Platform, Add dependencies, Remove dependencies, Change
dependencies, Reload dependencies, Merge Branch, Share project, Sync
with Data Repository, Unsync with Data Repository, Modify organization
settings, Rename branch, Modify project settings.
105. API Metadata: Create an API instance, Delete an API instance,
Update an API instance.
106. Application Data: Create application, Delete application,
Reset client secret, Request access, Request tier change, Request tier
change approval, Approve application, Revoke application, Restore
application, Create Mocking Service link, Delete Mocking Service link,
Create/modify/delete Object store, Upload file, Delete file, Update
file.
107. Private Portals audit log events: Create portal, Modify portal
association, Delete portal, Add portal page, Make portal page visible,
Delete portal page, Edit portal page, Hide portal page, Set portal
theme, Modify portal theme, Modify portal security, Create a page,
Update a page, Delete a page, Publish a portal.
108. Public Portals audit log events: Update a domain, Delete a
domain, Create a page, Delete a page, Update a page, Create a portal,
Publish a portal, Delete a portal, Update a portal.
109. Identity Management audit log events: Create identity provider
configuration, Edit identity provider configuration, Delete identity
provider configuration, Warning, Create identity management key, Set
primary identity management key, Delete identity management key.
110. Connected App audit log events: Create Connected Application,
Edit Connected Application, Delete Connected Application, Update Scope
Assignments, Application Authorization Approved, Application
Authorization Denied, Token Retrieval Success, Token
[[Page 26964]]
Retrieval Failed, Revoke Access/Refresh Tokens.
111. Team audit log events: Create Team, Update Team, Move Team,
Add Members, Remove Members, Add Permissions, Remove Permissions, Edit
External Group Mappings, Delete Team.
112. Asset Management audit log events: Create an asset, Update an
asset, Delete an asset, Share an asset, Publish an asset to public
portal, Remove an asset from public portal, Update an asset icon,
Delete an asset icon, Create a managed tag (category), Delete a managed
tag (category), Delete an organization, Update tags, Create a tag
configuration, Update a tag configuration, Delete a tag configuration.
113. Asset Review audit log events: Create a Comment, Delete a
comment, Update a comment, Create a review, Delete a review, Update a
review.
114. Runtime Manager audit log events: Create application, Start
application, Restart application, Stop application, Delete application,
Change application zip file, Promote application from sandbox, Change
application runtime, Change application worker size, Change application
worker number, Enable/disable persistent queues, Enable/disable
persistent queue encryption, Modify application properties, Enable/
disable insight, Modify log levels, Create/modify/delete alerts,
Enable/disable alerts, Create/modify/delete application data, Create/
modify schedules, Create/modify/delete tenants, Enable/disable
schedules, Clear queues, Enable/Disable static IP, Allocate/release
static IP, LoadBalancer Create/modify/delete, Create/modify/delete
alerts V2, Create/modify/delete VPC, Create/modify/delete VPN.
115. Server audit log events: Add server, Delete server, Rename
server, Create server group, Delete server group, Rename server group,
Add server to server group, Remove server from server group, Create
cluster, Delete Cluster, Rename cluster, Add server to cluster, Remove
server from cluster, Deploy application, Delete application, Start
application, Stop application, Redeploy application with existing file,
Redeploy application with new file.
116. Private Spaces audit log events: Create/Modify/Delete private
space, Create/Modify/Delete connection, Create/Modify/Delete VPN,
Create/Modify/Delete transit gateway, Create/Modify/Delete TLSContext,
Create/Modify/Delete routes.
117. Anypoint MQ audit log events: Create/modify/delete/purge
queue, Create/modify/delete exchange, Create/delete exchange binding,
Create/delete/regenerate client.
118. Mentorship program application data: Notification Logs,
Notification Type, Notification Template, Status, Time sent, Email
Events, General Application Data, Support Tickets, Product Usage
Analytics, Product update in app notification delivery status,
Application error logs, Application request logs.
119. User Experience Device Audit events: Administrator Account
Status, All Antispywares, All Antiviruses, All Firewalls, Allow Non-
Provisionable Devices, Antispyware Name, Antispyware Real Time
Protection, Antispyware Up To Date, Antivirus Name, Antivirus Real Time
Protection, Antivirus Up To Date, Audit Account Logon Events, Audit
Account Management, Audit Directory Service Access, Audit Logon Events,
Audit Object Access, Audit Policy Change, Audit Privilege Use, Audit
Process Tracking, Audit System Events, Average Boot Duration, Average
Fast Startup Duration, Average Logon Duration, Bios Serial Number, Boot
Disk Health Status, Boot Disk Type, Chassis Serial Number, Controller
Ca License Universal Unique Identifier, Controller Ca Status,
Controller Crash Guard Count, Controller Crash Guard Limit, Controller
Crash Guard Protection Interval, Controller Crash Guard React Interval,
Controller Custom Shells, Controller Data Channel Protocol, Controller
DNS Res Preference, Controller Engage Service Status, Controller
Freezes Monitoring, Controller Installs Scan Interval, Controller Is
Visible, Controller Log Level, Controller Max Segment Size, Controller
Ra Execution Policy, Controller SMB Print Mon Status, Controller String
Tag, Controller Web Mon Status, Collector Distinguished Name, Collector
Installation Log, Collector Package Target Version, Collector Print
Monitoring Status, Collector Status, Collector Tag, Collector Update
Status, Collector Version, CPU Frequency, CPU Model, Database Usage,
Device Encryption Required, Device Manufacturer, Device Model, Device
Password Required, Device Product Id, Device Product Version, Device
Serial Number, Device Type, Device Universal Unique Identifier, Device
Universal Unique Identifier, Directory Service Site, Disks
Manufacturers, Disks Smart Index, Distinguished Name, EAS Access State,
EAS Access State Reason, EAS Device Access Rule, EAS Device Identity,
EAS Exemption, EAS Policy Application Status, EAS Policy Name, EAS
Policy Update, Email Attachment Enabled, Enforce Password History,
Entity, Extended Logon Duration Baseline, Firewall Name, Firewall Real
Time Protection, First Seen, Graphical Card Ram, Graphical Cards, Group
Name, Guest Account Status, Hard Disks, ID, internet Security Settings,
Ip Addresses, Is Collector Distinguished Name Truncated, Is Directory
Service Site Truncated, Last Boot Duration, Last Extended Logon
Duration, Last Ip Address, Last Known Connection Status, Last Local Ip
Address, Last Logged On User, Last Logon Duration, Last Logon Time,
Last Seen, Last Seen On TCP, Last System Boot, Last Update, Last Update
Status, Last Updater Request, Last Windows Update, Local
Administrators, Local Power Users, Logical CPU Number, Logical Drives,
Mac Addresses, Maximum Password Age, Membership Type, Minimum Password
Age, Minimum Password Length, Monitor Models, Monitor Resolutions,
Monitors, Monitors Serial Numbers, Device Name, Number Of Antispyware,
Number Of Antiviruses, Number Of Cores, Number Of CPUs, Number Of Days
Since First Seen, Number Of Days Since Last Boot, Number Of Days Since
Last EAS Policy Update, Number Of Days Since Last Logon, Number Of Days
Since Last Seen, Number Of Days Since Last Seen On TCP, Number Of Days
Since Last Windows Update, Number Of Firewalls, Number Of Graphical
Cards, Number Of Monitors, OS Architecture, OS Build, OS Version And
Architecture, Password Complexity Requirements, Platform, Privileges Of
Last Logged On Users, Sd Card Encryption Required, Sid, Storage Policy,
System Drive Capacity, System Drive Free Space, System Drive Usage,
Total Active Days, Total Drive Capacity, Total Drive Free Space, Total
Drive Usage, Total Nonsystem Drive Capacity, Total Nonsystem Drive Free
Space, Total Nonsystem Drive Usage, Total Ram, Updater Error, Updater
Version, Upgrade Group, User Account Control Status, Windows License
Key, Windows Updates Status, WMI Status.
120. User Experience Audit Records: Country, Database Usage,
Department, Distinguished Name, First Seen, Full Name, Unique User
Identifier, Job Title, Last Seen, Locality, Location, User Logon Name,
Number Of Days Since Last Seen, Org Unit, Seen On Mac OS, Seen On
Mobile, Seen On Windows, User Security Identifier, Total Active Days,
Type, Duration, Real Duration, Activity Type.
ROUTINE USES OF RECORDS MAINTAINED IN THE SYSTEM, INCLUDING CATEGORIES
OF USERS AND THE PURPOSES OF SUCH USES:
Standard routine uses 1. through 9. apply. In addition:
a. To appropriate agencies, entities, and persons when (1) the
Postal Service
[[Page 26965]]
suspects or has confirmed that there has been a breach of the system of
records; (2) the Postal Service has determined that as a result of the
suspected or confirmed breach there is a risk of harm to individuals,
the Postal Service (including its information systems, programs, and
operations), the Federal Government, or national security; and (3) the
disclosure made to such agencies, entities, and persons is reasonably
necessary to assist in connection with the Postal Service's efforts to
respond to the suspected or confirmed breach or to prevent, minimize,
or remedy such harm.
RECORD SOURCE CATEGORIES:
Employees; contractors; customers.
POLICIES AND PRACTICES FOR STORAGE OF RECORDS:
Automated database, computer storage media, and paper.
POLICIES AND PRACTICES FOR RETRIEVAL OF RECORDS:
Records relating to system administration are retrievable by user
ID.
POLICIES AND PRACTICES FOR RETENTION AND DISPOSAL OF RECORDS:
Records relating to system administration are retained for twenty-
four months.
ADMINISTRATIVE, TECHNICAL, AND PHYSICAL SAFEGUARDS:
Paper records, computers, and computer storage media are located in
controlled-access areas under supervision of program personnel.
Computer access is limited to authorized personnel with a current
security clearance, and physical access is limited to authorized
personnel who must be identified with a badge.
Access to records is limited to individuals whose official duties
require such access. Contractors and licensees are subject to contract
controls and unannounced on-site audits and inspections.
Computers are protected by encryption, mechanical locks, card key
systems, or other physical access control methods. The use of computer
systems is regulated with installed security software, computer logon
identifications, and operating system controls including access
controls, terminal and transaction logging, and file management
software.
RECORD ACCESS PROCEDURES:
Requests for access must be made in accordance with the
Notification Procedure above and USPS Privacy Act regulations regarding
access to records and verification of identity under 39 CFR 266.5.
CONTESTING RECORD PROCEDURES:
See Notification Procedure and Record Access Procedures above.
NOTIFICATION PROCEDURES:
Customers wanting to know if other information about them is
maintained in this system of records must address inquiries in writing
to the Chief Information Officer and Executive Vice President and
include their name and address.
EXEMPTIONS PROMULGATED FOR THE SYSTEM:
None.
HISTORY:
December 1, 2023; 88 FR 83981; May 10th, 2021; 86 FR 24902.
Sarah Sullivan,
Attorney, Ethics & Legal Compliance.
[FR Doc. 2024-07980 Filed 4-15-24; 8:45 am]
BILLING CODE 7710-12-P