U.S. DEPARTMENT OF
HOUSING AND URBAN DEVELOPMENT
PRIVACY THRESHOLD ANALYSIS (PTA)
Application for Community Compass TA and Capacity Building Program NOFA and Awardee Reporting
Community Planning & Development/Office of Technical Assistance and Management/Technical Assistance Division
Instruction & Template
November 6, 2019
PRIVACY THRESHOLD ANALYSIS (PTA)
The PTA is a compliance form developed by the Privacy Branch to identify the use of Personally Identifiable Information (PII) across the Department. The PTA is the first step in the PII verification process, which focuses on these areas of inquiry:
Purpose for the information,
Type of information,
Sensitivity of the information,
Use of the information,
And the risk to the information.
Please use the attached form to determine whether a Privacy and Civil Liberties Impact Assessment (PCLIA) is required under the E-Government Act of 2002 or a System of Record Notice (SORN) is required under the Privacy Act of 1974, as amended.
Please complete this form and send it to your program Privacy Liaison Officer (PLO). If you have no program Privacy Liaison Officer, please send the PTA to the HUD Privacy Branch:
John Bravacos, Senior Agency Official for Privacy
Privacy Branch
U.S. Department of Housing and Urban Development
privacy@hud.gov
Upon receipt from your program PLO, the HUD Privacy Branch will review this form. If a PCLIA or SORN is required, the HUD Privacy Branch will send you a copy of the PCLIA and SORN templates to complete and return.
PRIVACY THRESHOLD ANALYSIS (PTA)
Summary Information
Project or Program Name: |
Application for Community Compass TA and Capacity Building Program NOFA and Awardee Reporting |
||
Program: |
|
||
CSAM Name (if applicable): |
n/a |
CSAM Number (if applicable): |
n/a |
Type of Project or Program: |
|
Project or program status: |
|
Date first developed: |
n/a |
Pilot launch date: |
n/a |
Date of last PTA update: |
n/a |
Pilot end date: |
n/a |
ATO Status (if applicable) |
|
ATO expiration date (if applicable): |
n/a |
PROJECT OR PROGRAM MANAGER
Name: |
Stephanie Stone |
||
Office: |
CPD/OTAM/Technical Assistance Division |
Title: |
Director |
Phone: |
202-402-7418 |
Email: |
Stephanie.V.Stone@hud.gov |
INFORMATION SYSTEM SECURITY OFFICER (ISSO) (if applicable)
Name: |
Click here to enter text. |
||
Phone: |
Click here to enter text. |
Email: |
Click here to enter text. |
Specific PTA Questions
1. Reason for submitting the PTA: |
Application information is needed to determine competition winners (TA Awardees) best able to assist HUD recipients to achieve the goal of the Community Compass Technical Assistance Program. The goal of Community Compass is to empower communities by providing effective technical assistance and capacity building so that successful program implementation is sustained over the long term. Additional information is needed during the life of the award from the competition winners, i.e., the technical assistance providers, to fulfill the administrative requirements of the award.
|
If you are using these technologies and want coverage under the respective PIA for that technology, please stop here and contact the HUD Privacy Branch for further guidance.
|
Social Media Web portal2 (e.g., SharePoint) Contact Lists X Public website (e.g. A website operated by HUD, contractor, or other organization on behalf of the HUD None of these |
Please check all that apply. |
X This program collects no personally identifiable information3 Members of the public HUD employees/contractors (list programs): Contractors working on behalf of HUD Employees of other federal agencies Other (e.g. business entity) |
|
|
|
No specific information about or from individuals is collected, no PII is collected, only information pertaining to CPD program oversight and processes and procedures used. For the NOFA we request the names and organization names but no pii information. |
|
|
4(a) Does the project, program, or system retrieve information from the system about a U.S. Citizen or lawfully admitted permanent resident aliens by a personal identifier? |
X No. Please continue to next question. Yes. If yes, please list all personal identifiers used: |
|
4(b) Does the project, program, or system have an existing System of Records Notice (SORN) that has already been published in the Federal Register that covers the information collected? |
X No. Please continue to next question. Yes. If yes, provide the system name and number, and the Federal Register citation(s) for the most recent complete notice and any subsequent notices reflecting amendment to the system |
|
4(c)Has the project, program, or system undergone any significant changes since the SORN? |
X No. Please continue to next question. Yes. If yes, please describe. |
|
4(d) Does the project, program, or system use Social Security Numbers (SSN)? |
X No. Yes. |
|
4(e) If yes, please provide the specific legal authority and purpose for the collection of SSNs: |
NA |
|
4(f) If yes, please describe the uses of the SSNs within the project, program, or system: |
NA |
|
4(g) If this project, program, or system is an information technology/system, does it relate solely to infrastructure?
For example, is the system a Local Area Network (LAN) or Wide Area Network (WAN)? |
X No. Please continue to next question. Yes. If a log kept of communication traffic, please answer this question. |
|
4(h) If header or payload data4 is stored in the communication traffic log, please detail the data elements stored. |
||
NA
|
|
X No. Yes. If yes, please list: Click here to enter text. |
|
X No. Yes. If yes, please list: Click here to enter text. |
6(a) Is this external sharing pursuant to new or existing information sharing access agreement (MOU, MOA, etc.)?
|
An MOU is occasionally used; info is reviewed by the program and field office staff in conjunction with the TA Provider and grantee. |
7. Does the project, program, or system provide role-based training for personnel who have access in addition to annual privacy training required of all HUD personnel?
|
X No. Yes. If yes, please list: |
|
X No. What steps will be taken to develop and maintain the accounting: PII is NOT used. Yes. In what format is the accounting maintained: |
|
Unknown. X No. No PII is collected or maintained. Yes. Please indicate the determinations for each of the following: Confidentiality: Low Moderate High
Integrity: Low Moderate High
Availability: Low Moderate High |
PRIVACY THRESHOLD ANALYSIS REVIEW
(To be Completed by PROGRAM PLO)
Program Privacy Liaison Reviewer: |
Click here to enter text. |
|
Date submitted to Program Privacy Office: |
Click here to enter a date. |
|
Date submitted to HUD Privacy Branch: |
Click here to enter a date. |
|
Program Privacy Liaison Officer Recommendation: Please include recommendation below, including what new privacy compliance documentation is needed. |
||
Click here to enter text.
|
(To be Completed by the HUD Privacy Branch)
HUD Privacy Branch Reviewer: |
Click here to enter text. |
Date approved by HUD Privacy Branch: |
Click here to enter a date. |
PTA Expiration Date: |
Click here to enter a date. |
DESIGNATION
Privacy Sensitive System: |
If “no” PTA adjudication is complete. |
|
|
Category of System: |
If “other” is selected, please describe: Click here to enter text. |
|
|
Determination: PTA sufficient at this time. Privacy compliance documentation determination in progress. New information sharing arrangement is required. HUD Policy for Computer-Readable Extracts Containing Sensitive PII applies. Privacy Act Statement required. Privacy and Civil Liberties Impact Assessment (PCLIA) required. System of Records Notice (SORN) required. Paperwork Reduction Act (PRA) Clearance may be required. Contact your program PRA Officer. A Records Schedule may be required. Contact your program Records Officer. |
|
||
PIA: |
If covered by existing PCLIA, please list: Click here to enter text. |
|
|
SORN: |
If covered by existing SORN, please list: Click here to enter text. |
|
|
HUD Privacy Branch Comments: This PTA will suffice at this time, however; if there are any changes, an update will be required. Please describe rationale for privacy compliance determination above. |
|||
Click here to enter text.
|
DOCUMENT ENDORSMENT
DATE REVIEWED: |
PRIVACY REVIEWING OFFICIALS NAME: |
By signing below, you attest that the content captured in this document is accurate and complete and meet the requirements of applicable federal regulations and HUD internal policies.
|
|
11/7/19 |
|
|
|
SYSTEM OWNER Stephanie Stone, Director |
|
Date |
CPD/OTAM/Technical Assistance Division |
|
|
|
|
|
|
|
|
|
|
|
John Bravacos Senior Agency Official for Privacy Privacy Branch
|
|
Date |
OFFICE OF ADMINISTRATION |
|
|
|
|
|
2 Informational and collaboration-based portals in operation at HUD and its programs that collect, use, maintain, and share limited personally identifiable information (PII) about individuals who are “members” of the portal or “potential members” who seek to gain access to the portal.
3 HUD defines personal information as “Personally Identifiable Information” or PII, which is any information that permits the identity of an individual to be directly or indirectly inferred, including any information that is linked or linkable to that individual, regardless of whether the individual is a U.S. citizen, lawful permanent resident, visitor to the U.S., or employee or contractor to the Department. “Sensitive PII” is PII, which if lost, compromised, or disclosed without authorization, could result in substantial harm, embarrassment, inconvenience, or unfairness to an individual. For the purposes of this PTA, SPII and PII are treated the same.
4 Header: Information that is placed before the actual data. The header normally contains a small number of bytes of control information, which is used to communicate important facts about the data that the message contains and how it is to be interpreted and used. It serves as the communication and control link between protocol elements on different devices.
Payload data: The actual data to be transmitted, often called the payload of the message (metaphorically borrowing a term from the space industry!) Most messages contain some data of one form or another, but some actually contain none: they are used only for control and communication purposes. For example, these may be used to set up or terminate a logical connection before data is sent.
5 FIPS 199 is the Federal Information Processing Standard Publication 199, Standards for Security Categorization of Federal Information and Information Systems and is used to establish security categories of information systems.
United States Department of Housing and Urban Development
File Type | application/vnd.openxmlformats-officedocument.wordprocessingml.document |
Author | Groomes, Brittani J |
File Modified | 0000-00-00 |
File Created | 2021-08-25 |