Privacy
& Civil Liberties Impact Assessment (PCLIA)
Office
of Minority and Women Inclusion (OWMI) Supplier Registration
Application May
25, 2016 Reviewing
Official <<Privacy
Program Manager>> Bureau
Certifying Official <<
Privacy Program Specialist>> Version:
1.1 March
2016 Prepared
by: Privacy
Program Office (PPO)
PCLIA Record of Changes |
||||
Version No. |
Date Released |
Description of Change |
Pages Affected |
Changes Made By |
1.0 |
1/6/16 |
Updated Template |
all |
V.Curtis/L.Mitchell,R. Shelden |
1.1 |
3/5/16 |
Formatting and updates |
all |
V.Curtis/L.Mitchell,R. Shelden |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
It is the policy of the OCC to conduct a Privacy and Civil Liberties Impact Assessment (“PCLIA”) when personally identifiable information (“PII”) is maintained in a system or IT project. PCLIAs are required for all systems and projects that collect, maintain, or disseminate PII, regardless of the manner in which the information is retrieved.
This assessment is being completed pursuant to Section 208 of the E-Government Act of 2002 (“E-Gov Act”), 44 U.S.C. § 3501, and Office of the Management and Budget (“OMB”) Memorandum 03-22, “OMB Guidance for Implementing the Privacy Provisions of the E-Government Act of 2002,” which requires OCC to conduct a PCLIA before:
developing or procuring information technology (“IT”) systems or projects that collect, maintain or disseminate PII from or about members of the public, or
initiating a new collection of information that: a) will be collected, maintained, or disseminated using IT; and b) includes any PII permitting the physical or online contacting of a specific individual, if identical questions have been posed to, or identical reporting requirements imposed on, 10 or more persons. Agencies, instrumentalities, or employees of the federal government are not included.
This PCLIA provides the following information regarding the system or project:
an overview of its purpose and functions;
a description of the information collected;
a description of the how information is maintained, used, and shared;
an assessment of whether the system or project is in compliance with federal requirements that support information privacy; and
an overview of the redress/complaint procedures available to individuals who may be affected by the use or sharing of information by the system or project.
[Explain here whether a PCLIA is being conducted for this system/project for the first time or whether this PCLIA supersedes or supplements a preexisting PCLIA.]
Agency – means any entity that falls within the definition of the term “executive agency”' as defined in 31 U.S.C. § 102.
Certifying Official – The Bureau official who certify that all requirements have been completed so a PCLIA can be reviewed and approved by the Reviewing Official.
Collect (including “collection”) – means the retrieval, receipt, gathering, or acquisition of any PII and its storage or presence in a OCC system. This term should be given its broadest possible meaning.
Contractors and service providers – are private companies that provide goods or services under a contract with the OCC. This includes, but is not limited to, information providers, information processors, and other organizations providing information system development, information technology services, and other outsourced applications.
Data mining – means a program involving pattern-based queries, searches, or other analyses of 1 or more electronic databases, where – (a) a department or agency of the federal government, or a non-federal entity acting on behalf of the federal government, is conducting the queries, searches, or other analyses to discover or locate a predictive pattern or anomaly indicative of terrorist or criminal activity on the part of any individual or individuals; (b) the queries, searches, or other analyses are not subject-based and do not use personal identifiers of a specific individual, or inputs associated with a specific individual or group of individuals, to retrieve information from the database or databases; and (c) the purpose of the queries, searches, or other analyses is not solely – (i) the detection of fraud, waste, or abuse in a government agency or program; or (ii) the security of a government computer system.
Disclosure – When it is clear from its usage that the term “disclosure” refers to records provided to the public in response to a request under the Freedom of Information Act (5 U.S.C. § 552, “FOIA”) or the Privacy Act (5 U.S.C. § 552a), its application should be limited in that manner. Otherwise, the term should be interpreted as synonymous with the terms “sharing” and “dissemination” as defined in this manual.
Dissemination – as used in this manual, is synonymous with the terms “sharing” and “disclosure” (unless it is clear from the context that the use of the term “disclosure” refers to a FOIA/Privacy Act disclosure).
E-Government – means the use of digital technologies to transform government operations to improve effectiveness, efficiency, and service delivery.
Federal information system – means a discrete set of information resources organized for the collection, processing, maintenance, transmission, and dissemination of information owned or under the control of a federal agency, whether automated or manual.
Final Rule – After the NPRM comment period closes, the agency reviews and analyzes the comments received (if any). The agency has the option to proceed with the rulemaking as proposed, issue a new or modified proposal, or withdraw the proposal before reaching its final decision. The agency can also revise the supporting analyses contained in the NPRM (e.g., to address a concern raised by a member of the public in response to the NPRM).
Government information – means information created, collected, used, maintained, processed, disseminated, or disposed of by or for the federal government.
Individual – means a citizen of the United States or an alien lawfully admitted for permanent residence. If a question does not specifically inquire about or an issue does not clearly involve a Privacy Act system of records, the term should be given its common, everyday meaning. In certain contexts, the term individual may also include citizens of other countries who are covered by the terms of an international or other agreement that involves information stored in the system or used by the project.
Information – means any representation of knowledge such as facts, data, or opinions in any medium or form, regardless of its physical form or characteristics. This term should be given the broadest possible meaning. This term includes, but is not limit to, information contained in a Privacy Act system of records.
Information technology (IT) – means any equipment or interconnected system or subsystem of equipment, used in the automatic acquisition, storage, analysis, evaluation, manipulation, management, movement, control, display, switching, interchange, transmission, or reception of data or information by the executive agency, if the equipment is used by the executive agency directly or is used by a contractor under a contract with the executive agency that requires the use: (i) of that equipment; or (ii) of that equipment to a significant extent in the performance of a service or the furnishing of a product. It includes computers, ancillary equipment (including imaging peripherals, input, output, and storage devices necessary for security and surveillance), peripheral equipment designed to be controlled by the central processing unit of a computer, software, firmware and similar procedures, services (including support services), and related resources; but does not include any equipment acquired by a federal contractor incidental to a federal contract. Clinger-Cohen Act of 1996, 40 U.S.C. § 11101(6).
Major Information system – embraces “large” and “sensitive” information systems and means “a system or project that requires special management attention because of its importance to an agency mission; its high development, operating, or maintenance costs; or its significant role in the administration of agency programs, finances, property, or other resources.” OMB Circular A-130, § 6.u. This definition includes all systems that contain PII and are rated as “MODERATE or HIGH impact” under Federal Information Processing Standard 199.
National Security systems – a telecommunications or information system operated by the federal government, the function, operation or use of which involves: (1) intelligence activities, (2) cryptologic activities related to national security, (3) command and control of military forces, (4) equipment that is an integral part of a weapon or weapons systems, or (5) systems critical to the direct fulfillment of military or intelligence missions, but does not include systems used for routine administrative and business applications, such as payroll, finance, logistics, and personnel management. Clinger-Cohen Act of 1996, 40 U.S.C. § 11103.
Notice of Proposed Rule Making (NPRM) – the Privacy Act (Section (J) and (k)) allow agencies to use the rulemaking process to exempt particular systems of records from some of the requirements in the Act. This process is often referred to as “notice-and-comment rulemaking.” The agency publishes an NPRM to notify the public that the agency is proposing a rule and provides an opportunity for the public to comment on the proposal before the agency can issue a final rule.
Personally Identifiable Information (PII) –any information that can be used to distinguish or trace an individual’s identity, either alone or when combined with other personal or identifying information that is linked or linkable to a specific individual.
Privacy and Civil Liberties Impact Assessment (PCLIA) – a PCLIA is:
a process conducted to: (a) identify privacy and civil liberties risks in systems, programs, and other activities that maintain PII; (b) ensure that information systems, programs, and other activities comply with legal, regulatory, and policy requirements; (c) analyze the privacy and civil liberties risks identified; (d) identify remedies, protections, and alternative or additional privacy controls necessary to mitigate those risks; and (e) provide notice to the public of privacy and civil liberties protection practices.
a document that catalogues the outcome of that privacy and civil liberties risk assessment process.
Protected Information – as the term is used in this PCLIA, has the same definition given to that term in TD 25-10, Section 4.
Privacy Act Record – any item, collection, or grouping of information about an individual that is maintained by an agency, including, but not limited to, the individual’s education, financial transactions, medical history, and criminal or employment history and that contains the individual’s name, or the identifying number, symbol, or other identifying particular assigned to the individual, such as a finger or voice print or a photograph. 5 U.S.C. § 552a (a)(4).
Reviewing Official – The OCC Privacy Program Manager approves all PCLIAs as part of her/his duties..
Routine Use – with respect to the disclosure of a record outside of OCC (i.e., external sharing), the sharing of such record for a purpose which is compatible with the purpose for which it was collected 5 U.S.C. § 552a(a)(7).
Sharing – any OCC initiated distribution of information to government employees or agency contractors or grantees, including intra- or inter-agency transfers or exchanges of OCC information, regardless of whether it is covered by the Privacy Act. It does not include responses to requests for agency records under FOIA or the Privacy Act. It is synonymous with the term “dissemination” as used in this assessment. It is also synonymous with the term “disclosure” as used in this assessment unless it is clear from the context in which the term is used that it refers to disclosure to the public in response to a request for agency records under FOIA or the Privacy Act.
System – as the term used in this manual, includes both federal information systems and information technology.
System of Records – a group of any records under the control of OCC from which information is retrieved by the name of the individual or by some identifying number, symbol, or other identifying particular assigned to the individual. 5 U.S.C. § 552a (a)(5).
System of Records Notice – Each agency that maintains a system of records shall publish in the Federal Register upon establishment or revision a notice of the existence and character of the system of records, which notice shall include: (A) the name and location of the system; (B) the categories of individuals on whom records are maintained in the system; (C) the categories of records maintained in the system; (D) each routine use of the records contained in the system, including the categories of users and the purpose of such use; (E) the policies and practices of the agency regarding storage, retrievability, access controls, retention, and disposal of the records; (F) the title and business address of the agency official who is responsible for the system of records; (G) the agency procedures whereby an individual can be notified at her/his request if the system of records contains a record pertaining to him; (H) the agency procedures whereby an individual can be notified at her/his request how she/he can gain access to any record pertaining to him contained in the system of records, and how she/he can contest its content; and (I) the categories of sources of records in the system. 5 U.S.C. § 552a (e)(4).
System Owner – Official responsible for the overall procurement, development, integration, modification, or operation and maintenance of a system
The purpose of the OMWI Supplier Registration Application is to collect information from potential OCC customer companies. PII is used to contact the company representative for purposes of providing OCC contract work. It supports the mission of the Department by satisfying a Dodd/Frank requirement.
Estimated Number of Individuals Whose Personally Identifiable Information is Maintained in the System or by the Project |
||||||
|
The authorities for operating this system or performing this project are: Dodd/Frank act.
|
Authority |
Description |
The Privacy Act requires “each agency that maintains a system of records [to] maintain in its records only such information about an individual as is relevant and necessary to accomplish a purpose of the agency required to be fulfilled by statute or by executive order of the President.” 5 U.S.C. § 552a (e)(1). It allows federal agencies to exempt records from certain requirements (including the relevant and necessary requirement) under certain conditions5 U.S.C. §552a (k). The proposed exemption must be described in a Notice of Proposed Rulemaking (“NPRM”). In the context of the Privacy Act, the purpose of the NPRM is to give the public notice of a Privacy Act exemption claimed for a system of records and solicit public opinion on the proposed exemption. After addressing any public concerns raised in response to the NPRM, the agency must issue a Final Rule. It is possible for some, but not all, of the records maintained in the system or by the project to be exempted from the Privacy Act through the NPRM/Final Rule process.
Section 4.1(a) Please check all of the following that are true:
Section 4.1(b) ☐ Yes ☐ No ☒ N/A With respect to PII maintained in the system or by the project that is subject to the Privacy Act’s relevant and necessary requirement, was an assessment conducted prior to collection (e.g., during Paperwork Reduction Act analysis) to determine which PII types (see Section 4.2 below) were relevant and necessary to meet the system’s or project’s mission requirements?
Section 4.1(c) ☐ Yes ☐ No ☒ N/A With respect to PII currently maintained in the system or by the project that is subject to the Privacy Act’s relevant and necessary requirement, is the PII limited to only that which is relevant and necessary to meet the system’s or project’s mission requirements?
Section 4.1(d) ☐ Yes ☒ No With respect to PII maintained in the system or by the project that is subject to the Privacy Act’s relevant and necessary requirement, is there a process to continuously reevaluate and ensure that the PII remains relevant and necessary?
|
|
To perform their various missions, federal agencies must necessarily collect various types of information. The checked boxes below represent the types of information maintained in the system or by the project. Information identified below is used by the system or project to fulfill the purpose stated in Section 3.3 – Authority to Collect.
Biographical/General Information |
||
☒ Name |
☐ Gender |
☐ Group/Organization Membership |
☐ Date of Birth |
☐ Race |
☐ Military Service Information |
☐ Home Physical/Postal Mailing Address |
☐ Ethnicity |
☐ Personal Home Phone or Fax Number |
☐ Zip Code |
☐ Personal Cell Number |
☐ Alias (including nickname) |
☐ Business Physical/Postal Mailing Address |
☐ Business Cell Number |
☒ Business Phone or Fax Number |
☐ Personal e-mail address |
☐ Nationality |
☐ Mother’s Maiden Name |
☒ Business e-mail address |
☐ Country of Birth |
☐ Spouse Information |
☐ Personal Financial Information (including loan information) |
☐ City or County of Birth |
☐ Children Information |
☐ Business Financial Information (including loan information) |
☐ Immigration Status |
☐ Information about other relatives. |
☐ Marital Status |
☐ Citizenship |
☐ Professional/personal references or other information about an individual’s friends, associates or acquaintances. |
☐ Religion/Religious Preference |
☐ Device settings or preferences (e.g., security level, sharing options, ringtones). |
☐ Global Positioning System (GPS)/Location Data |
☐ Sexual Orientation |
☐ User names, avatars etc. |
☐ Secure Digital (SD) Card or Other Data stored on a card or other technology |
☐ Cell tower records (e.g., logs. user location, time etc.) |
☐ Network communications data |
☐ Cubical or office number |
☐ Contact lists and directories (known to contain personal information) |
☐ Contact lists and directories (unknown whether it contains personal information) |
☐ Contact lists and directories (known to contain only business information) |
☐ Education Information |
☐ Resume or curriculum vitae |
☐ Other (please describe): |
☐ ☐ Other (please describe): |
☐ Other (please describe): ______________________ |
☐ Other (please describe): ______________________ |
Identifying Numbers |
|
☐ Full Social Security number |
☐ Health Plan Beneficiary Number |
☐ Truncated/Partial Social Security number (e.g., last 4 digits) |
☐ Alien Registration Number |
☐ Personal Taxpayer Identification Number |
☐ Business Taxpayer Identification Number (If known: ☐ sole proprietor; ☐ non-sole proprietor) |
☐ Personal Credit Card Number |
☐ Business Credit Card Number (If known: ☐ sole proprietor; ☐ non-sole proprietor) |
☐ Personal Vehicle Identification Number |
☐ Business Vehicle Identification Number (If known: ☐ sole proprietor; ☐ non-sole proprietor) |
☐ Personal License Plate Number |
☐ Business License Plate Number (If known: ☐ sole proprietor; ☐ non-sole proprietor) |
☐ File/Case ID Number (individual) |
☐ File/Case ID Number (business) (If known: ☐ sole proprietor; ☐ non-sole proprietor) |
☐ Personal Professional License Number |
☐ Business Professional License Number (If known: ☐ sole proprietor; ☐ non-sole proprietor) |
☐ Employee Identification Number |
☐ Patient ID Number |
☐ Business Bank Account Number |
☐ Personal Bank Account Number |
☐ Commercially obtained internet navigation/purchasing habits of individuals |
☐ Government obtained internet navigation/purchasing habits of individuals |
☐ Passport Number and Passport information (including full name, passport number, DOB, POB, sex, nationality, issuing country photograph and signature) (use “Other” if some but not all elements are collected) |
☐ Driver’s License Number |
☐ Personal device identifiers or serial numbers |
☐ Other Identifying Numbers (please describe):____________________________ |
☐ Other Identifying Numbers (please describe):____________________________ |
☐ Other Identifying Numbers (please describe):____________________________ |
Medical/Emergency Information Regarding Individuals |
||
☐ Medical/Health Information |
☐ Worker’s Compensation Act Information |
☐ Patient ID Number |
☐ Mental Health Information |
☐ Disability Information |
☐ Emergency Contact Information (e.g., a third party to contact in case of emergency) |
☐ Other (please describe): ____________________________________________________ |
Biometrics/Distinguishing Features/Characteristics of Individuals |
||
☐ Physical description/ characteristics (e.g., hair, eye color, weight, height, sex, gender etc.) |
☐ Signatures |
☐ Vascular scans |
☐ Fingerprints |
☒ Photos |
☐ Retina/Iris Scans |
☐ Palm prints |
☐ Video |
☐ Dental Profile |
☐ Voice audio recording |
☐ Scars, marks, tattoos |
☐ DNA Sample or Profile |
☐ Other (please describe): ______________________ |
☐ Other (please describe): _______________________ |
☐ Other (please describe): _______________________ |
Specific Information/File Types |
||
☐ Taxpayer Information/Tax Return Information |
☐ Law Enforcement Information |
☐ Security Clearance/Background Check Information |
☐ Civil/Criminal History Information/Police Records (government source) |
☐ Credit History Information (government source) |
☐ Bank Secrecy Act Information |
☐ Civil/Criminal History Information/Police Records (commercial source) |
☐ Credit History Information (commercial source) |
☐ National Security/Classified Information |
☐ Protected Information (as defined in Treasury Directive 25-10) |
☐ Case files |
☐ Personnel Files |
☐ Information provided under a confidentiality agreement |
☐ Information subject to the terms of an international or other agreement |
☐ Other (please describe): ______________________ |
Audit Log and Security Monitoring Information |
||
☐ User ID assigned to or generated by a user of Treasury IT |
☐ Date and time an individual accesses a facility, system, or other IT |
☐ Files accessed by a user of Treasury IT (e.g., web navigation habits) |
☐ Passwords generated by or assigned to a user of Treasury IT |
☐ Internet or other queries run by a user of Treasury IT |
☐ Contents of files accessed by a user of Treasury IT |
☐ Biometric information used to access Treasury facilities or IT |
☐ Video of individuals derived from security cameras |
☐ Public Key Information (PKI). |
☐ Information revealing an individual’s presence in a particular location as derived from security token/key fob, employee identification card scanners or other IT or devices |
☐ Still photos of individuals derived from security cameras. |
☐ Internet Protocol (IP) Address |
☐ Other (please describe): |
☐ Other (please describe): |
☐ Other (please describe): _____________________ |
Other |
|
☐ Other (please describe: ______________ |
☐ Other (please describe: _______________ |
☐ Other (please describe: ______________ |
☐ Other (please describe: _______________ |
Individual |
<<Source name>> |
<<Source name>> |
||||||||||||
|
|
|
||||||||||||
Manner in which information is acquired from source by the Treasury project/system: (select all that apply): |
Manner in which information is acquired from source by the Treasury project/system: (select all that apply): |
Manner in which information is acquired from source by the Treasury project/system: (select all that apply): |
||||||||||||
☒ From a paper or electronic form provided to individuals, the public or members of a particular group
|
☐ From a paper or electronic form provided to individuals, the public or members of a particular group
|
☐ From a paper or electronic form provided to individuals, the public or members of a particular group
|
||||||||||||
Please identify the form name (or description) and/or number (e.g., OMB Control Number): _________________ |
Please identify the form name (or description) and/or number (e.g., OMB Control Number): _________________ |
Please identify the form name (or description) and/or number (e.g., OMB Control Number): _________________ |
||||||||||||
☐ Received in paper format other than a form. |
☐ Received in paper format other than a form. |
☐ Received in paper format other than a form. |
||||||||||||
☐ Delivered to the project on disk or other portable device and uploaded to the system. |
☐ Delivered to the project on disk or other portable device and uploaded to the system. |
☐ Delivered to the project on disk or other portable device and uploaded to the system. |
||||||||||||
☐ Accessed and downloaded or otherwise acquired via the internet |
☐ Accessed and downloaded or otherwise acquired via the internet |
☐ Accessed and downloaded or otherwise acquired via the internet |
||||||||||||
☐ Scanned documents uploaded to the system. |
☐ Scanned documents uploaded to the system. |
☐ Scanned documents uploaded to the system. |
||||||||||||
☐ Bulk transfer |
☐ Bulk transfer |
☐ Bulk transfer |
||||||||||||
☐ Extracted from particular technology (e.g., radio frequency identification data (RFID) devices, video or photographic cameras, biometric collection devices). |
☐ Extracted from particular technology (e.g., radio frequency identification data (RFID) devices, video or photographic cameras, biometric collection devices). |
☐ Extracted from particular technology (e.g., radio frequency identification data (RFID) devices, video or photographic cameras, biometric collection devices). |
||||||||||||
☐ Fax |
☐ Fax |
☐ Fax |
||||||||||||
☐ Extracted from notes of a phone interview or face to face contact |
☐ Extracted from notes of a phone interview or face to face contact |
☐ Extracted from notes of a phone interview or face to face contact |
||||||||||||
☐ Other: Please describe: _________________ |
☐ Other: Please describe: _________________ |
☐ Other: Please describe: _________________ |
||||||||||||
☐ Other: Please describe: _________________ |
☐ Other: Please describe: _________________ |
☐ Other: Please describe: _________________ |
Notice of Authority, Principal Uses, Routine Uses, and Effect of not Providing Information |
When Federal agencies use a form to obtain information from an individual that will be maintained in a system of records, they must inform the individual of the following: “(A) the authority (whether granted by statute, or by executive order of the President) which authorizes the solicitation of the information and whether disclosure of such information is mandatory or voluntary; (B) the principal purpose or purposes for which the information is intended to be used; (C) the routine uses which may be made of the information as published pursuant to paragraph (4)(D) of this subsection; and (D) the effects on her/him, if any, of not providing all or any part of the requested information.” 5 U.S.C § 522a(e)(3).
Section 4.4(a) ☒ Yes ☐ No Does OCC collect any of the PII maintained in the system or by the project directly from an individual?
Section 4.4(b) ☒ Yes ☐ No ☐ N/A Was the information collected from the individual using a form (paper or electronic)?
Section 4.4(c) ☒ Yes ☐ No ☐ N/A If the answer to Section 4.4(b) was “yes,” was the individual notified (on the form in which the PII was collected or on a separate form that can be retained by the individual) about the following at the point where the information was collected (e.g., in a form; on a website).
☒ The authority (whether granted by statute, or by Executive order of the President) which authorizes the solicitation of the information. ☒ Whether disclosure of such information is mandatory or voluntary. ☒ The principal purpose or purposes for which the information is intended to be used. ☐ The individuals or organizations outside of Treasury with whom the information may be/ will be shared. ☒ The effects on the individual, if any, if they decide not to provide all or any part of the requested information.
|
|
Use of Social Security Numbers |
Social Security numbers (“SSN”) are commonly used by identity thieves to commit fraudulent acts against individuals. The SSN is one data element that has the ability to harm the individual and requires more protection when used. Therefore, and in an effort to reduce risk to individuals and federal agencies, OMB Memorandum M-07-16, Safeguarding Against and Responding to the Breach of Personally Identifiable Information, (May 22, 2007) required agencies to reduce the use of SSNs in agency systems and programs and to identify instances in which the collection is superfluous. In addition, OMB mandated agencies to explore alternatives to agency use of SSNs as personal identifiers for Federal employees and members of the public.
In addition, the Privacy Act provides that: “It shall be unlawful for any Federal, State or local government agency to deny to any individual any right, benefit, or privilege provided by law because of such individual’s refusal to disclose his social security account number.” Pub. L. No. 93–579, § 7. This provision does not apply to: (1) any disclosure which is required by federal statute; or (2) any disclosure of an SSN to any federal, state, or local agency maintaining a system of records in existence and operating before January 1, 1975, if such disclosure was required under statute or regulation adopted prior to such date to verify the identity of an individual. Id. at § 7(a)(2)(A)-(B).
Section 4.4(d) ☐ Yes ☒ No ☒ N/A Does the system or project maintain SSNs?
Section 4.4(e) ☐ Yes ☐ No☒ N/A Is it possible to use an alternative to the SSN as a personal identifier in the system or project?
If no, please explain in the space below why an alternative was not possible (e.g., cite the statute requiring use of the SSN).
Section 4.4(f) ☐ Yes ☐ No ☒ N/A Will individuals be denied any right, benefit, or privilege provided by law because they refused to disclose their SSN? If yes, please check the applicable box::
☐ SSN disclosure is required by Federal statute or Executive Order. ; or☐ the SSN is disclosed to any Federal, state, or local agency maintaining a system of records in existence and operating before January 1, 1975, and disclosure was required under statute or regulation adopted prior to such date to verify the identity of an individual.
Section 4.4 (g) ☐ Yes ☐ No ☒ N/A When the SSN is collected, are individuals given notice whether disclosure is mandatory or voluntary, the legal authority such number is solicited, and what uses will be made of it?
|
|
First Amendment Activities |
The Privacy Act provides that Federal agencies “maintain no record describing how any individual exercises rights guaranteed by the First Amendment unless expressly authorized by statute or by the individual about whom the record is maintained or unless pertinent to and within the scope of an authorized law enforcement activity.” 5 U.S.C. § 552a(e)(7).
Section 4.4(h) ☐ Yes ☒ No Does the system or project maintain any information describing how an individual exercises their rights guaranteed by the First Amendment?
If the system or project maintains information describing how an individual exercises their rights guaranteed by the First Amendment, do any of the following exceptions apply (the information may be maintained if any of the exceptions apply)?
☒ N/A, the system or project does not maintain any information describing how any individual exercises their rights guaranteed by the First Amendment.
Exceptions:
☐ The individual about whom the information was collected or maintained expressly authorizes its collection/maintenance. ☐ The information maintained is pertinent to and within the scope of an authorized law enforcement activity. ☐ There is a statute that expressly authorizes its collection.
|
|
The following sections require a clear description of the system’s or project’s use of information.
Please describe all of the uses of the information types and groupings collected and maintained by the system or project (see Section 4.2), including a discussion of why the information is used for this purpose and how it relates to the mission of the bureau or office that owns the system.
|
Collecting Information Directly from the Individual When Using it to Make Adverse Determinations About Them |
The Privacy Act requires that Federal agencies “collect information to the greatest extent practicable directly from the subject individual when the information may result in adverse determinations about an individual’s rights, benefits, and privileges under Federal programs.” 5 U.S.C. § 552a(e)(2).
Section 5.1(a) ☐ Yes ☒ No Is it possible that the information maintained in the system or by the project may be used by OCC to make an adverse determination about an individual’s rights, benefits, and privileges under federal programs (e.g., decisions about whether the individual will receive a financial benefit, get a clearance or access to a Treasury facility, obtain employment with Treasury)?
Section 5.1(b) ☐ Yes ☒ No Is it possible that OCC will share information maintained in the system or by the project with a third party external to OCC that will use the information to make an adverse determination about an individual’s rights, benefits, and privileges under federal programs?
Section 5.1(c) ☐ Yes ☐ No ☒ N/A If information could potentially be used to make an adverse determination about an individual’s rights, benefits, and privileges under federal programs, does the system or project collect information (to the greatest extent practicable) directly from the individual?
|
|
Data Mining |
As required by Section 804 of the Implementing the 9/11 Commission Recommendations Act of 2007 (“9-11 Commission Act”), OCC reports annually to Congress on its data mining activities.
|
Section 5.1(d) ☐ Yes ☒ No Is information maintained in the system or by the project used to conduct “data-mining” activities as that term is defined in the Implementing the 9-11 Commission Act?
|
|
Exemption from Accuracy, Relevance, Timeliness, and Completeness Requirements |
The Privacy Act requires that Federal agencies “maintain all records which are used by the agency in making any determination about any individual with such accuracy, relevance, timeliness, and completeness as is reasonably necessary to assure fairness to the individual in the determination.” 5 U.S.C § 552a(e)(5). If a particular system of records meets certain requirements (including the NPRM process defined in Section 2 above), an agency may exempt the system of records (or a portion of the records) from this requirement.
Section 5.2(a) ☐ Yes ☒ No Is all or any portion of the information maintained in the system or by the project: (a) part of a system of records and (b) exempt from the accuracy, relevance, timeliness, and completeness requirements in sections (e)(5) of the Privacy Act?
|
|
|
|
Computer Matching |
The Computer Matching and Privacy Protection Act of 1988 amended the Privacy Act imposing additional requirements when Privacy Act systems of records are used in computer matching programs.
Pursuant to the Privacy Act, as amended, there are two distinct types of matching programs. The first type of matching program involves the computerized comparison of two or more automated federal personnel or payroll systems of records or a system of federal personnel or payroll records with non-federal records. This type of matching program may be conducted for any purpose. The second type of matching program involves the computerized comparison of two or more automated systems of records or a system of records with non-federal records. The purpose of this type of matching program must be for the purpose of eligibility determinations or compliance requirements for applicants, recipients, beneficiaries, participants, or providers of services for payments or in-kind assistance under federal benefit programs, or recouping payments or delinquent debts under such federal benefit programs. See 5 U.S.C. § 522a(a)(8).
Matching programs must be conducted pursuant to a matching agreement between the source and recipient agencies. The matching agreement describes the purpose and procedures of the matching and establishes protections for matching records.
Section 5.2(b) ☐ Yes ☒ No Is any of the information maintained in the system or by the project (a) part of a system of records and (b) used as part of a matching program?
Section 5.2(c) ☐ Yes ☐ No ☒ N/A Is there a matching agreement in place that contains the information required by Section (o) of the Privacy Act?
Section 5.2(d) ☐ Yes ☐ No ☒ N/A Are assessments made regarding the accuracy of the records that will be used in the matching program?
Section 5.2(e) ☐ Yes ☐ No ☒ N/A Does the bureau or office that owns the system or project independently verify the information, provide the individual notice and an opportunity to contest the findings, or obtain Data Integrity Board approval in accordance with Section (p) of the Privacy Act before taking adverse action against the individual?
|
|
|
Ensuring Fairness in Making Adverse Determinations About Individuals |
Federal agencies are required to “maintain all records which are used by the agency in making any determination about any individual with such accuracy, relevance, timeliness, and completeness as is reasonably necessary to assure fairness to the individual in the determination.” 5 U.S.C. § 552a(e)(5). This requirement also applies when merging records from two or more sources where the merged records are used by the agency to make any determination about any individual.
|
||
|
||
|
||
Merging Information About Individuals |
||
|
Policies and Standard Operating Procedures or Technical Solutions Designed to Ensure Information Accuracy, Completeness, and Timeliness |
|
Accuracy, Completeness, and Timeliness of Information Received from the Source |
||
|
Disseminating Notice of Corrections of or Amendments to PII |
||
|
Internal Information Sharing |
||
|
|
Memorandum of Understanding/Other Agreements Limiting Treasury’s Internal Use/Disclosure of PII |
|
||
|
Internal Information Sharing Chart |
||||
|
||||
Internal Recipient’s Name (e.g., bureau or office) |
|
|
|
|
Purpose of the Sharing |
|
|
|
|
PII Shared |
|
|
|
|
Applicable Statutory or Regulatory or Restrictions on Information Shared |
|
|
|
|
Applicable Restrictions Imposed by Agreement on Information Shared (e.g., by OCC agreement with the party that provided the information to OCC) |
|
|
|
|
Name and Description of MOU or Other Agreement Restricting Treasury’s Internal Use, Maintenance, Handling, or Sharing of PII Received |
|
|
|
|
Method of PII Transfer (e.g., paper/oral disclosures/magnetic disk/portable device/email/fax/other (please describe if other) |
|
|
|
|
Used throughout OCC. |
|
External Information Sharing |
||
|
Accounting of Disclosures |
||
|
Statutory or Regulatory Restrictions on Disclosure |
||
|
Memorandum of Understanding Related to External Sharing |
||
|
Memorandum of Understanding Limiting Treasury’s Use or Disclosure of PII |
|
|
|
<< Space for Narrative Explanation of the Answer to Section 5.4(i): Privacy and/or civil liberties risks presented and mitigation efforts>> |
Memorandum of Understanding Limiting External Party’s Use or Disclosure of PII |
||
|
External Information Sharing Chart |
||||||||||||||||||||||||||||||||||||
|
Obtaining Consent Prior to New Disclosures Not Included in the SORN or Authorized by the Privacy Act |
||
|
Responses to the questions below address the practical, policy, and legal consequences of failing to comply with one or more of the following federal information management requirements (to the extent required) and how those risks were or are being mitigated: (1) the Privacy Act System of Records Notice Requirement; (2) the Paperwork Reduction Act; (3) the Federal Records Act; (4) the E-Gov Act security requirements; and (5) Section 508 of the Rehabilitation Act of 1973.
For collections of PII that meet certain requirements, the Privacy Act requires that the agency publish a SORN in the Federal Register.
System of Records |
||
|
The PRA requires OMB approval before a Federal agency may collect standardized data from 10 or more respondents within a 12 month period. OMB requires agencies to conduct a PIA (a Treasury PCLIA) when initiating, consistent with the PRA, a new electronic collection of PII for 10 or more persons (excluding agencies, instrumentalities, or employees of the federal government).
Paperwork Reduction Act Compliance |
Section 6.2(a) ☒ Yes ☒ No Does the system or project maintain information obtained from individuals and organizations who are not federal personnel or an agency of the federal government?
Section 6.2(b) ☐ Yes ☐ No ☒ N/A Does the project or system involve a new collection of information in identifiable form for 10 or more persons from outside the federal government?
Section 6.2(c) ☐ Yes ☒ No ☐ N/A Did the project or system complete an Information Collection Request (“ICR”) and receive OMB approval?
|
|
Records retention schedules determine the maximum amount of time necessary to retain information in order to meet the needs of the project or system. Information is generally either disposed of or sent to the NARA for permanent retention upon expiration of this period.
NARA Records Retention Requirements |
||
|
The completion of Federal Information Security Management Act (“FISMA”) Security Assessment & Authorization (SA&A) process is required before a federal information system may receive Authority to Operate (“ATO”). Different security requirements apply to National Security Systems.
Federal Information System Subject to FISMA Security Assessment and Authorization |
||
|
||
Access Controls and Security Requirements |
||
|
||
Security Risks in Manner of Collection |
||
|
||
Security Controls When Sharing Internally or Externally |
||
|
Monitoring of Individuals |
||
|
Audit Trails |
||
|
When Federal agencies develop, procure, maintain, or use Electronic and Information Technology (“EIT”), Section 508 of the Rehabilitation Act of 1973 (as amended in 1998) requires that individuals with disabilities (including federal employees) must have access and use (including privacy policies and directives as well as redress opportunities) that is comparable to that which is available to individuals who do not have disabilities.
Applicability of and Compliance With the Rehabilitation Act |
||
|
Access Under the Freedom of Information Act and Privacy Act |
||
|
Privacy Act Access Exemption |
||
|
Additional Redress Mechanisms |
||
|
Contractors and Service Providers - include, but are not limited to, information providers, information processors, and other organizations providing information system development, information technology services, and other outsourced applications.
Data Mining - a program involving pattern-based queries, searches, or other analyses of one or more electronic databases, where-- (A) a department or agency of the federal government, or a non-federal entity acting on behalf of the federal government, is conducting the queries, searches, or other analyses to discover or locate a predictive pattern or anomaly indicative of terrorist or criminal activity on the part of any individual or individuals; (B) the queries, searches, or other analyses are not subject-based and do not use personal identifiers of a specific individual, or inputs associated with a specific individual or group of individuals, to retrieve information from the database or databases; and (C) the purpose of the queries, searches, or other analyses is not solely-- (i) the detection of fraud, waste, or abuse in a government agency or program; or (ii) the security of a government computer system.
Final Rule – After the NPRM comment period closes, the agency reviews and analyzes the comments received (if any). The agency has the option-to proceed with the rulemaking as proposed, issue a new or modified proposal or withdraw the proposal before reaching its final decision. The agency can also revise the supporting analyses contained in the NPRM (e.g., to address a concern raised by a member of the public in response to the NPRM).
Information System Life Cycle - the phases, through which an information system passes, typically characterized as initiation, development, operation, and termination.
Information System - a discrete set of information resources organized for the collection, processing, maintenance, use, sharing, dissemination, or disposition of information. Derived from 44 U.S.C § 3502(8).
Information Technology (“IT”) – any equipment or interconnected system or subsystem of equipment, used in the automatic acquisition, storage, analysis, evaluation, manipulation, management, movement, control, display, switching, interchange, transmission, or reception of data or information by the executive agency, if the equipment is used by the executive agency directly or is used by a contractor under a contract with the executive agency that requires the use: (i) of that equipment; or (ii) of that equipment to a significant extent in the performance of a service or the furnishing of a product. It includes computers, ancillary equipment (including imaging peripherals, input, output, and storage devices necessary for security and surveillance), peripheral equipment designed to be controlled by the central processing unit of a computer, software, firmware and similar procedures, services (including support services), and related resources; but does not include any equipment acquired by a federal contractor incidental to a federal contract. Derived from Clinger-Cohen Act of 1996, 40 U.S.C. § 11101(6).
Major Information System – embraces “large” and “sensitive” information systems and means “a system or project that requires special management attention because of its importance to an agency mission; its high development, operating, or maintenance costs; or its significant role in the administration of agency programs, finances, property, or other resources.” OMB Circular A-130, Section 6.u. This definition includes all systems that contain PII and were rated by the Treasury as “MODERATE” or “HIGH” impact under Federal Information Processing Standard 199.
Notice of Proposed Rule Making (“NPRM”) – the Privacy Act (Section (J) and (k)) allow agencies to use the rulemaking process to exempt particular systems of records from some of the requirements in the Act. This process is often, referred to as “notice-and-comment rulemaking.” The agency publishes an NPRM to notify the public that the agency is proposing a rule and provides an opportunity for the public to comment on the proposal before the agency can issue a final rule.
Personally Identifiable Information (“PII”) – Any information that can be used to distinguish or trace an individual’s identity, either alone or when combined with other personal or identifying information that is linked or linkable to a specific individual. The definition of this term also incorporates by reference the definition of PII in M-06-191 and the definition of the term “Information in Identifiable Form” as defined in 44 U.S.C. § 208(d)2 Pub. L. No. 107-347, 116 Stat. 2899, and as further defined in M-03-22.
Privacy Act Record - Any item, collection, or grouping of information about an individual that is maintained by an agency, including, but not limited to, his education, financial transactions, medical history, and criminal or employment history and that contains his name, or the identifying number, symbol, or other identifying particular assigned to the individual, such as a finger or voice print or a photograph;
Record Series - A series is the basic unit for organizing and controlling files. It is a group of files or documents kept together (either physically or intellectually) because they relate to a particular subject or function, result from the same activity, document a specific type of transaction, take a particular physical form, or have some other relationship arising out of their creation, receipt, maintenance, or use. Record series may span across entire enterprises. For example, the General Records Schedule contains records series which span the entire federal government.
Derived from, 36 CFR 1220.14.
Reviewing Official – A position created by M-03-22, the Review Official is responsible for reviewing and approving PIAs. Pursuant to OMB’s guidance, the reviewing Official is “the agency CIO or other agency head designee, who is other than the official procuring the system or the official who conducts the PIA.” At Treasury, the DASPTR serves as the agency Reviewing Official and is responsible for reviewing and approving PCLIAs.
Routine Use – with respect to the disclosure of a record outside of the Department (i.e., external sharing), the use of such record for a purpose which is compatible with the purpose for which it was collected.
System of Records – A group of any records under the control of any agency from which information is retrieved by the name of the individual or by some identifying number, symbol, or other identifying particular assigned to the individual.
System of Records Notice – Each agency that maintains a system of records shall publish in the Federal Register upon establishment or revision a notice of the existence and character of the system of records, which notice shall include: (A) the name and location of the system; (B) the categories of individuals on whom records are maintained in the system; (C) the categories of records maintained in the system; (D) each routine use of the records contained in the system, including the categories of users and the purpose of such use; (E) the policies and practices of the agency regarding storage, retrievability, access controls, retention, and disposal of the records; (F) the title and business address of the agency official who is responsible for the system of records; (G) the agency procedures whereby an individual can be notified at his request if the system of records contains a record pertaining to him; (H) the agency procedures whereby an individual can be notified at his request how he can gain access to any record pertaining to him contained in the system of records, and how he can contest its content; and (I) the categories of sources of records in the system.
System Owner - the official in the program office who is responsible for the use of the system and who implements the legal information resources management requirements, such as the guidance contained in M-03-22. If issues arise regarding identification of the system owner, the project or program manager are the system owner for purposes of this manual.
Treasury. The United States Department of the Treasury, including but not limited to its components and bureaus.
1 M-06-19 defines PII as “any information about an individual maintained by an agency, including, but not limited to, education, financial transactions, medical history, and criminal or employment history and information which can be used to distinguish or trace an individual’s identity, such as their name, social security number, date and place of birth, mother’s maiden name, biometric records, etc., including any other personal information which is linked or linkable to an individual.”
2 44 U.S.C. § 208(d) defines “Information in Identifiable Form” as “any representation of information that permits the identity of an individual to whom the information applies to be reasonably inferred by either direct or indirect means.”
File Type | application/vnd.openxmlformats-officedocument.wordprocessingml.document |
Author | OPTR (C3) |
File Modified | 0000-00-00 |
File Created | 2021-01-16 |