Privacy assessment

DI-4001-341 PIA Alaska Beak Deformity.pdf

Alaska Beak Deformity Observations

Privacy assessment

OMB: 1028-0116

Document [pdf]
Download: pdf | pdf
DI-4001 (01/2015)
U.S. Department of the Interior

U.S. Department of the Interior
PRIVACY IMPACT ASSESSMENT

The Department of the Interior requires PIAs to be conducted and maintained on all IT systems whether already in
existence, in development or undergoing modification in order to adequately evaluate privacy risks, ensure the protection of
privacy information, and consider privacy implications throughout the information system development life cycle. This PIA
form may not be modified and must be completed electronically; hand-written submissions will not be accepted. See the DOI
PIA Guide for additional guidance on conducting a PIA or meeting the requirements of the E-Government Act of 2002. See
Section 6.0 of the DOI PIA Guide for specific guidance on answering the questions in this form.
NOTE: See Section 7.0 of the DOI PIA Guide for guidance on using the DOI Adapted PIA template to assess third-party
websites or applications.

Name of Project
Alaska Science Center Beak Deformity Observations
Bureau/Office
USGS Alaska Science Center
Point of Contact Email
cmhandel@usgs.gov

Bureau/Office Contact Title
Research Wildlife Biologist
First Name
Colleen

M.I.

Last Name
Handel

Phone
(907) 786-7181

Address Line 1
4210 University Dr.
Address Line 2
City
Anchorage

State/Territory
Alaska

Zip
99508

A. Is a PIA required?
Yes
Yes, information is collected from or maintained on
Members of the general public
B. What is the purpose of the system?
Collect observation reports from the public on birds with deformed beaks.

C. What is the legal authority?
16 U.S.C. 742(a)-742d, 742e-742j-2 Fish and Wildlife Act of 1956 authorizes the Secretary of the Interior to

Page 1 of 6

conduct investigations, prepare and disseminate information, and make periodic reports to the public regarding the
availability and abundance and the biological requirements of fish and wildlife resources; provides a comprehensive
national fish and wildlife policy and authorizes the Secretary of the Interior to take steps required for the development,
management, advancement, conservation, and protection of fisheries and wildlife resources through research, acquisition
of refuge lands, development of existing facilities, and other means.
D. Why is this PIA being completed or modified?
Existing Information System under Periodic Review
E. Is this information system registered in CSAM?
No
F. List all minor applications or subsystems that are hosted on this system and covered under this privacy impact
assessment.
Subsystem Name
Purpose
Contains PII
Describe
N/A
N/A
No

G. Does this information system or electronic collection require a published Privacy Act System of Records Notice (SORN)?
Yes
List Privacy Act SORN Identifier(s)
Interior, USGS-18: Computer Registration System
H. Does this information system or electronic collection require an OMB Control Number?
Yes
Describe
TBD - pursuing the process.
1028 - NEW

A. What PII will be collected? Indicate all that apply.
Name

Religious Preference

Social Security Number (SSN)

Citizenship

Security Clearance

Personal Cell Telephone Number

Gender

Spouse Information

Tribal or Other ID Number

Birth Date

Financial Information

Personal Email Address

Group Affiliation

Medical Information

Mother’s Maiden Name

Marital Status

Disability Information

Home Telephone Number

Biometrics

Credit Card Number

Child or Dependent Information

Other Names Used

Law Enforcement

Employment Information

Truncated SSN

Education Information

Military Status/Service

Legal Status

Emergency Contact

Mailing/Home Address

Place of Birth

Driver’s License

Other

Race/Ethnicity

Page 2 of 6

B. What is the source for the PII collected? Indicate all that apply.
Individual

Tribal agency

DOI records

State agency

Federal agency

Local agency

Third party source

Other

C. How will the information be collected? Indicate all that apply.
Paper Format

Face-to-Face Contact

Fax

Telephone Interview

Email

Web Site

Other

Information Shared Between Systems

D. What is the intended use of the PII collected?
To verify observation reports.

E. With whom will the PII be shared, both within DOI and outside DOI? Indicate all that apply.
Within the Bureau/Office
Describe the bureau or office and how the data will be used.
If scientists need to verify any observations, any of the optional PII data entered are used to contact the individual.
Other Bureaus/Offices
Other Federal Agencies
Tribal, State or Local Agencies
Contractor
Other Third Party Sources
F. Do individuals have the opportunity to decline to provide information or to consent to the specific uses of their PII?
Yes
Describe the method by which individuals can decline to provide information or how individuals consent to specific uses.
Although it's extremely helpful to scientists in verifying information, individuals are not required to enter their PII on the
web form.
G. What information is provided to an individual when asked to provide PII data? Indicate all that apply.
Privacy Act Statement

Privacy Notice

Other

None

Describe each applicable format.
In the USGS Footer, a link to Privacy, with more details are offered.

H. How will data be retrieved? List the identifiers that will be used to retrieve information (e.g., name, case number, etc.).
Internally, thru the database's ObservationID.

I. Will reports be produced on individuals?
No

A. How will data collected from sources other than DOI records be verified for accuracy?
The website has on-screen email and telephone validation tools.

Page 3 of 6

B. How will data be checked for completeness?
It can be verified by the scientists.

C. What procedures are taken to ensure the data is current? Identify the process or name the document (e.g., data models).
This will be updated by the individual, only if they are wanting to update their information.

D. What are the retention periods for data in the system? Identify the associated records retention schedule for the records
in this system.
Retention periods will vary somewhat by asset but will be done in accordance with DOI, USGS, and federal requirements
and guidelines as outlined in USGS GRDS 432-1-S1, Chapter 400, Item #418-01b and any other applicable laws, rules or
regulations.
E. What are the procedures for disposition of the data at the end of the retention period? Where are the procedures
documented?
Permanent records are determined by NARA as having sufficient historical or other value to warrant continued
preservation by the Federal Government beyond the time they are needed for the agency’s administrative, scientific,
legal, or fiscal purposes.
F. Briefly describe privacy risks and how information handling practices at each stage of the “information lifecycle” (i.e.,
collection, use, retention, processing, disclosure and destruction) affect individual privacy.
The system and the website are secured thru the use of STIGs and A&A process. All of the developers and SA's have
yearly security training to ensure the data will be kept secure. This system is in the DMZ and is protected by firewalls.
The web server is configured by USGS STIGs and is scanned monthly, as part of our A&A process.

A. Is the use of the data both relevant and necessary to the purpose for which the system is being designed?
Yes
Explanation
To verify individual observation reports.

B. Does this system or electronic collection derive new data or create previously unavailable data about an individual
through data aggregation?
No
C. Will the new data be placed in the individual’s record?
No
D. Can the system make determinations about individuals that would not be possible without the new data?
No
E. How will the new data be verified for relevance and accuracy?
N/A

F. Are the data or the processes being consolidated?
No, data or processes are not being consolidated
G. Who will have access to data in the system or electronic collection? Indicate all that apply.
Page 4 of 6

Users

Developers

Contractors

Other

System Administrator

Describe
System researchers

H. How is user access to data determined? Will users have access to all data or will access be restricted?
Internal users via Access control list and managed by what role they play in the system; external users can only report
into the database.
I. Are contractors involved with the design and/or development of the system, or will they be involved with the maintenance
of the system?
No
J. Is the system using technologies in ways that the DOI has not previously employed (e.g., monitoring software,
SmartCards or Caller ID)?
No
K. Will this system provide the capability to identify, locate and monitor individuals?
Yes
Explanation
System is capturing the name, address, and telephone users for verification by researchers and additional questions.

L. What kinds of information are collected as a function of the monitoring of individuals?
Google Analytics is on all our web pages. However, there is not anything specific to the system to monitor an individual’s
interaction with a system.
M. What controls will be used to prevent unauthorized monitoring?
Website and backend databases are secured via use of USGS STIGs, virus protection; as well as servers are scanned
once a month; ESN intrusion detection.
N. How will the PII be secured?

Page 5 of 6

(1) Physical Controls. Indicate all that apply.
Security Guards
Secured Facility

Identification Badges

Combination Locks
Locked Offices

Key Cards

Closed Circuit Television

Safes

Locked File Cabinets

Cipher Locks

Other

(2) Technical Controls. Indicate all that apply.
Password
Intrusion Detection System (IDS)
Firewall

Virtual Private Network (VPN)

Encryption

Public Key Infrastructure (PKI) Certificates

User Identification

Personal Identity Verification (PIV) Card

Biometrics
Other
(3) Administrative Controls. Indicate all that apply.
Periodic Security Audits
Regular Monitoring of Users’ Security Practices
Backups Secured Off-site

Methods to Ensure Only Authorized Personnel Have Access to PII

Rules of Behavior

Encryption of Backups Containing Sensitive Data

Role-Based Training

Mandatory Security, Privacy and Records Management Training

Other
O. Who will be responsible for protecting the privacy rights of the public and employees? This includes officials responsible
for addressing Privacy Act complaints and requests for redress or amendment of records.
System Owner: Marla Hood and add'l ASC IT staff
Asset Owner: Colleen Handel
Privacy Act Officer: Bill Reilly
P. Who is responsible for assuring proper use of the data and for reporting the loss, compromise, unauthorized disclosure, or
unauthorized access of privacy protected information?
System Owner: Marla Hood; Asset Owner: Colleen Handel; Information System Security Officer: Larry Roberts
The Asset owner is directly responsible for assuring proper use of the data in conjunction with the information owner and
system administrator, who assists with the technical implementation of the controls.

Page 6 of 6


File Typeapplication/pdf
File Modified2015-11-12
File Created2015-06-12

© 2024 OMB.report | Privacy Policy