Office of the Secretary September 23, 2016 – Federal Register Recent Federal Regulation Documents

Privacy Act of 1974; System of Records
Document Number: 2016-22903
Type: Notice
Date: 2016-09-23
Agency: Department of Defense, Office of the Secretary
Pursuant to the Privacy Act of 1974, 5 U.S.C. 552a, and Office of Management and Budget (OMB) Circular No. A-130, notice is hereby given that the Office of the Secretary of Defense (OSD) proposes to alter a system of records, DUSDI 01-DoD, ``Department of Defense (DoD) Insider Threat Management and Analysis Center (DITMAC) and DoD Component Insider Threat Records System,'' last published at 81 FR 31614, May 19, 2016. This system of records exists to: Analyze, monitor, and audit insider threat information for insider threat detection and mitigation within the DoD on threats that persons who have or had been granted eligibility for access to classified information or eligibility to hold sensitive positions may pose to DoD and U.S. Government installations, facilities, personnel, missions, or resources. The system of records will support the DITMAC and DoD Component insider threat programs, enable the identification of systemic insider threat issues and challenges, and provide a basis for the development and recommendation of solutions to deter, detect, and/or mitigate potential insider threats. It will assist in identifying best practices among other Federal Government insider threat programs, through the use of existing DoD resources and functions and by leveraging existing authorities, policies, programs, systems, and architectures. This alteration reflects a change to the categories of individuals by removing the phrase: And who have exhibited actual, probable, or possible indications of insider threat behaviors or activities. Public Law 112-81, 10 U.S.C. 2224 note, Insider Threat Detection, requires the Department to detect and prevent insider threats in order to protect sensitive information and information systems. This authority requires the Department to employ anomaly detection techniques, which logically require ingestion of non-anomalous information in order to identify anomalous information. Accordingly, the individuals subject to the DoD Insider Threat program are those individuals who had or have been granted eligibility or access to classified information.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.