DBIDS/IACS PRIVACY IMPACT ASSESSMENT (PIA) 2. Name of IT System: Defense Biometric Identification System (DBIDS)
|
|
|
- Myron Hancock
- 10 years ago
- Views:
Transcription
1 DBIDS/IACS PRIVACY IMPACT ASSESSMENT (PIA) (Use N/A where appropriate) 1. DoD Component: Defense Manpower Data Center (DMDC) 2. Name of IT System: Defense Biometric Identification System (DBIDS) 3. Budget System Identification Number: System Identification Number(s) (IT Registry/Defense IT Portfolio Repository): IT Investment (OMB Circular A-11) Unique Identifier (if applicable): Privacy Act System of Records Notice Identifier: S Defense Biometric Identification System (DBIDS) (November 18, 2004, 69 FR 67552) (Soon to be republished as DMDC 10) 7. OMB Information Collection Number and Expiration Date: NA 8. Authority: 5 U.S.C. 301 Departmental regulations; 10 U.S.C. 113, Secretary of Defense, Note at Pub.L ; 10 U.S.C. 136, Under Secretary of Defense for Personnel and Readiness; 18 U.S.C. 1029, Access device fraud; 18 U.S.C. 1030, Computer fraud; 23 U.S.C. 401 et seq. National Highway Safety Act of 1966; 40 U.S.C. Chapter 25, Information technology management; 50 U.S.C. Chapter 23, Internal Security; Pub.L , Government Information Security Act; Pub.L , Computer Security Act of 1987; Pub. L , Computer Fraud and Abuse Act; E.O (SSN); E.O , Classified National Security Information as amended by E.O., and 13,292; and E.O , Security Requirements for Government Employees. 9. Brief Summary: The Defense Biometric Identification System (DBIDS) is a Department of Defense (DoD) system developed by DMDC as a force protection program to manage personnel, property and installation access. DBIDS is called the Installation Control Access System (IACS) in Europe. It is a networked client/server database system designed to easily verify the access authorization of personnel entering military installations by the use of barcode technology and fingerprint biometric identification. The DBIDS software application is used to enter personnel data into a database, capture biometric information, and retrieve that data and biometric information for verification and validation at a later time. The program supports the adding, retrieving, updating, and displaying of information for individuals, who require military installation access. DBIDS enhances the military law enforcement mission by helping to provide a safe and secure community and by allowing real-time access to data. The program alerts registration personnel and installation gate guards to barred individuals across jurisdictional boundaries, and eliminates duplication of data.
2 This program utilizes a personal computer (PC) based client/server database system to register personnel and vehicles. It produces installation passes for personnel who are entitled to recurring and unescorted access to military installations and do not possess a DoD ID Card. The system incorporates existing Real-time Automated Personnel Identification System (RAPIDS) ID card technology for cross platform compatibility. Data elements are compatible with the Defense Enrollment/Eligibility Reporting System (DEERS) database so data can be shared and updated across both systems through barcode technology. 10. Identifiable Information to be Collected, its Nature and Source: name, grade, Social Security Number, status, date and place of birth, weight, height, eye color, hair color, gender, passport number, country of citizenship, geographic and electronic home and work addresses and telephone numbers, marital status, index fingerprints and photographs, and identification card issue and expiration dates. The system also includes vehicle information such as manufacturer, model year, color and vehicle type, license plate type and number, decal number, current registration, automobile insurance data, and driver's license data. 11. Method of Information Collection: Data is collected from existing DoD databases, the Military Services, DoD Components, and from the individual. Installations can collect data via paper, electronic, and/or verbal submission. 12. Purpose of Collection: Data collected is used to enter personnel data into a database, capture biometric information, and retrieve that data and biometric information for verification and validation at a later time, especially when the individual requires installation access. 13. How Identifiable Information/Data will be Used: In the case of non-dod individuals who require base access, a DBIDS access card is produced. The records are maintained to support DoD physical security and information assurance programs and are used for identity verification purposes, to record personal property registered with the Department, and for producing facility management reports. 14. Does system create new data about individuals through aggregation? No 15. Internal and External Information/Data Sharing: Data is maintained on Regional Servers managed by DMDC. Internal to DoD: Used by security offices to monitor individuals accessing DoD installations and/or facilities. Data may be viewed by or shared with civilian employees, military members, and contractors assigned to DMDC DBIDS software/database technical support, by operators responsible for registering individuals into the database, by Installation Access Control Point (ACP) personnel, and by Installation Law enforcement personnel. External to DoD: Data may be provided to other Federal agencies under any of the DoD Blanket Routine Uses published at
3 16. Opportunities individuals will have to object to the collection of information in identifiable form about themselves or to consent to the specific uses and how consent is granted: The DLA rules for accessing records, for contesting contents, and appealing initial agency determinations are contained in 32 CFR part 323, or may be obtained from the Privacy Act Officer, Headquarters, Defense Logistics Agency, ATTN: DES-B, 8725 John J. Kingman Road, Stop 6220, Fort Belvoir, VA Once republished and managed by WHS the accessing office will be: Privacy Act Officer, Office of Freedom of Information, Washington Headquarters Services, 1155 Defense Pentagon, Washington, DC Information Provided to the Individual, the Format, and the Means of Delivery: Privacy Act Statements, as required by 5 U.S.C 552a(e)(3), are provided at the collection point. The statement provides the following: collection purpose, authorities, external uses, the voluntary nature of the program, the fact that no consequences accrue for those who choose not to participate beyond denial of a DBIDS card or visitors pass and denial of access to the installation, the name and number of the Privacy Act system notice governing the collection, and an electronic link to the system notice. The statement is included on paper and electronic collection forms. The DBIDS Privacy Act Statement reads as follows: AUTHORITY: Executive Order 9397; The Privacy Act of 1974, 5 U. S. C. 552a; DODD PRINCIPAL PURPOSE(S): To provide necessary information to DoD installations to determine if applicant meets access control requirements. Use of SSN is necessary to make positive identification of an applicant. Records in the DBIDS system are maintained to support Department of Defense physical security and information assurance programs and are used for identity verification purposes, to record personal property registered with the DoD, and for producing facility management reports. Used by security offices to monitor individuals accessing DoD installations and/or facilities. SSN, Drivers License Number, or other acceptable identification will be used to distinguish individuals who request entry to DoD installations and/or facilities. ROUTINE USE(S): The "DoD Blanket Routine Uses" are set forth at the beginning of the DoD compliation of systems of records notices. DISCLOSURE: Voluntary. However, failure to provide the requested information will result in denial of a DBIDS card or visitors pass and denial of entry to DoD installations and/or facilities. 18. Describe the administrative/business, physical, and technical processes and data controls adopted to secure, protect, and preserve the confidentiality of the information in identifiable form. Computerized records are maintained in a controlled area accessible only to authorized personnel. Entry is restricted by the use of locks, guards, and administrative procedures. Access to personal information is limited to those who require the records in the performance of their official duties, and to the individuals who are the subjects of the record or their authorized representatives. Access to personal information is further restricted by
4 the use of unique logon and passwords, which are changed periodically. 19. Privacy Act Interface: Yes. System of Records Identifier listed in question Potential privacy risks regarding the collection, use, and sharing of the information, dangers in providing notices or opportunities to object/consent to individuals; risks posed by the adopted security measures: Data is collected and used in a dedicated security mode. Data sharing occurs only among individuals authorized access to the system as stated in the governing Privacy Act system notice. Data screens are marked with the for Official Use Only data handling legend. All system users are made aware of restrictions on secondary uses of the data by initial and refresher Privacy Act and Information Assurance training. There are no dangers in providing notice of the collection or allowing an individual to object/consent. Therefore, individuals are given this opportunity at times of notice publication and data collection. Afterwards, individuals may raise objections if new threats are perceived. The security risks associated with maintaining data in an electronic environment have been mitigated through administrative, technical, and physical safeguards described in this document. The safeguards in place are commensurate with the risk and magnitude of harm resulting from the loss, misuse, or unauthorized access to or modification of the data.
5 ASSESSMENT RISKS MITIGATION (HIGH) (MED) (LOW) Userid/password/DBIDS card used by someone other than whom assigned Mishandling of sensitive data, reports, or storage media Virus attacks and other malicious incidents Allocation of passwords is managed and password security policies enforced. There is the possibility of loss of PII data on an individual basis. Periodic assessments of access rights and privileges are performed System controls are predicated on preventing unauthorized users from accessing DBIDS resources to minimize the risk presented by outside threats. Current DBIDS systems run on closed networks, and do not afford an outside threat the potential for system infiltration and compromise. Future DBIDS versions (3.0 and later) will utilize web services, which will increase risk. Intrusion prevention and detection methods certified and approved for use by the JTF GNO will be employed to assure security of operations. Internal threat mitigation will occur through network and Regional server monitoring to detect, identify and prevent installation of malware, and by workstation audit and configuration validation/verification by the local site SSM. We will have training certification for operators and periodic audits of installed applications and software/ hardware components by SSM, which will minimize risk by assuring only authorized products are present, installed and functioning in a manner consistent with DoD security policy. (MED) (LOW) (LOW)
6 PII data appears on certain reports Loss of DBIDS card The security requirements for the safe use, handling, storage and destruction of PII data is included in the training provided during the installation of DBIDS at each site, and is reinforced during routine site support visits. PII security awareness is included in the web based training that is developed in support of DBIDS 2.7. The proper secure handling of reports is covered in site standard operating procedures to prevent unintended exposure of data, and to preclude data loss. Reports printed out by the site must be labeled FOUO when they contain Privacy Act data. Locally, PII awareness must be a sustained focus of the individual DBIDS Site Managers and command sponsors; their daily management of the sites provides assurance against PII data compromise. It is the responsibility of the card holder to inform issuance authorities and/or the Provost Marshall/Directorate of Emergency Services in the case of a lost or stolen credential. The credential can then be flagged as lost or stolen in the DBIDS software. Until this action is performed, however, there is a chance the credential could be used by an unauthorized individual to gain access to a facility or installation. The requirement to immediately notify the local installation authorities is formally provided to the card recipient at time of issuance, and is re-advertised periodically as a matter of local command policy. This risk is mitigated by the capability of DBIDS to provide the photo of the card recipient; this photo is required to be compared to the face of the cardholder to confirm identity. Additionally, at the discretion of the local installation commander, use of a fingerprint biometric to confirm identity may be required as a matter of normal business, under selected situations or periods of time, or during periods of heightened Force Protection Condition. (MED) (MED) 21. Classification and Publication of Privacy Impact Assessment: This document will be published in full form on the DMDC public website
7 Preparing Official (signature) Name: Shenae Y. Morrow Title: LCDR, USN, DBIDS Privacy Officer Organization: DMDC Work Phone Number: (831) X [email protected] (date) Information Assurance Official Name: Daniel DeCloss Title: Information Assurance Operations Organization: DMDC Work Phone Number: (831) X [email protected] (signature) (date) Privacy Officer (signature) Name: William Boggess Title: Chief Information Officer Organization: DMDC Work Phone Number: (831) [email protected] (date) Reviewing Official (signature) Name: Mary Snavely-Dixon Title: Director Organization: DMDC Work Phone Number: (703) [email protected] (date)
8
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5400.11 October 29, 2014 DCMO SUBJECT: DoD Privacy Program References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues DoD Directive (DoDD) 5400.11 (Reference
SUMMARY: The Office of the Secretary of Defense proposes to. alter a system of records notice DPFPA 02, entitled Pentagon
This document is scheduled to be published in the Federal Register on 02/11/2016 and available online at http://federalregister.gov/a/2016-02788, and on FDsys.gov Billing Code: 5001-06 DEPARTMENT OF DEFENSE
SUMMARY: The Defense Health Agency proposes to alter an. existing system of records, EDTMA 02, entitled "Medical/Dental
This document is scheduled to be published in the Federal Register on 10/27/2015 and available online at http://federalregister.gov/a/2015-27229, and on FDsys.gov Billing Code: 5001-06 DEPARTMENT OF DEFENSE
PRIVACY IMPACT ASSESSMENT (PIA) For the
PRIVACY IMPACT ASSESSMENT (PIA) For the Naval Audit Service Information Management System (NASIMS) Department of the Navy - DON/AA - NAVAUDSVC SECTION 1: IS A PIA REQUIRED? a. Will this Department of Defense
Physical Access Control System
for the Physical Access Control System DHS/ALL 039 June 9, 2011 Contact Point David S. Coven Chief, Access Control Branch (202) 282-8742 Reviewing Official Mary Ellen Callahan Chief Privacy Officer (703)
Student Administration and Scheduling System
for the Student Administration and Scheduling System DHS/FLETC/PIA-002 February 12, 2013 Contact Point William H. Dooley Chief, Office of IT Budget, Policy, & Plans (912) 261-4524 Reviewing Official Jonathan
PRIVACY IMPACT ASSESSMENT (PIA) For the AMAG HOMELAND SECURITY MANAGEMENT SOFTWARE ENTERPRISE EDITION (AMAG HSMS ENT)
PRIVACY IMPACT ASSESSMENT (PIA) For the AMAG HOMELAND SECURITY MANAGEMENT SOFTWARE ENTERPRISE EDITION (AMAG HSMS ENT) Department of the Navy - CNIC - NAS Jacksonville SECTION 1: IS A PIA REQUIRED? a. Will
PRIVACY IMPACT ASSESSMENT (PIA) For the
PRIVACY IMPACT ASSESSMENT (PIA) For the Healthcare Continuing Education and Training Enterprise Subscription Service (Swank Healthcare) US Army Medical Command - Defense Health Program (DHP) Funded Application
PRIVACY IMPACT ASSESSMENT (PIA) For the
PRIVACY IMPACT ASSESSMENT (PIA) For the TOTAL WORKFORCE MANAGEMENT SERVICES (TWMS) Department of the Navy - CNIC SECTION 1: IS A PIA REQUIRED? a. Will this Department of Defense (DoD) information system
SUMMARY: The National Guard Bureau proposes to add a new system. of records, INGB 005, entitled Special Investigation Reports
This document is scheduled to be published in the Federal Register on 01/27/2016 and available online at http://federalregister.gov/a/2016-01517, and on FDsys.gov Billing Code: 5001-06 DEPARTMENT OF DEFENSE
Crew Member Self Defense Training (CMSDT) Program
for the Crew Member Self Defense Training (CMSDT) Program February 6, 2008 Contact Point Michael Rigney Federal Air Marshal Service Flight Programs Division [email protected] Reviewing Officials Peter
Privacy Impact Assessment for Threat Assessments for Access to Sensitive Security Information for Use in Litigation December 28, 2006
for Threat Assessments for Access to Sensitive Security Information for Use in Litigation December 28, 2006 Contact Point Andrew Colsky Sensitive Security Information (SSI) Office [email protected] Reviewing
AIRSPACE WAIVERS AND FLIGHT AUTHORIZATIONS FOR CERTAIN AVIATION OPERATIONS (INCLUDING DCA) (Amended)
for the AIRSPACE WAIVERS AND FLIGHT AUTHORIZATIONS FOR CERTAIN AVIATION OPERATIONS (INCLUDING DCA) (Amended) Contact Point Lisa S. Dean Privacy Officer Transportation Security Administration (571) 227-3947
Introduction to The Privacy Act
Introduction to The Privacy Act Defense Privacy and Civil Liberties Office dpclo.defense.gov 1 Introduction The Privacy Act (5 U.S.C. 552a, as amended) can generally be characterized as an omnibus Code
United States Trustee Program
United States Trustee Program Privacy Impact Assessment for the Credit Counseling/Debtor Education System (CC/DE System) Issued by: Larry Wahlquist, Privacy Point of Contact Reviewed by: Approved by: Vance
U.S. Department of Transportation. Privacy Impact Assessment (Update) National Registry of Certified Medical Examiners (National Registry)
U.S. Department of Transportation Privacy Impact Assessment (Update) National Registry of Certified Medical Examiners (National Registry) Responsible Official Elaine Papp Division of Medical Programs Federal
Canine Website System (CWS System) DHS/TSA/PIA-036 January 13, 2012
for the (CWS System) DHS/TSA/PIA-036 January 13, 2012 Contact Point Carolyn Y. Dorgham Program Manager, National Explosives Detection Canine Team Program [email protected] Reviewing Official Mary
PRIVACY IMPACT ASSESSMENT (PIA) For the
PRIVACY IMPACT ASSESSMENT (PIA) For the Integrated Visual and Auditory Continuous Performance Test (IVA-AE) US Army Medical Command - Defense Health Program (DHP) Funded Application SECTION 1: IS A PIA
NSF AuthentX Identity Management System (IDMS) Privacy Impact Assessment. Version: 1.1 Date: 12/04/2006. National Science Foundation
This document has been archived and replaced by piaauthentx1207..0 National Science Foundation NSF AuthentX Identity Management System (IDMS) Privacy Impact Assessment Version: 1.1 Date: 12/04/2006 Table
PRIVACY IMPACT ASSESSMENT (PIA) For the
PRIVACY IMPACT ASSESSMENT (PIA) For the Assistance Reporting Tool (ART) Defense Health Agency (DHA) SECTION 1: IS A PIA REQUIRED? a. Will this Department of Defense (DoD) information system or electronic
SYSTEM NAME: Digital Identity Access Management System (DIAMS) - P281. SYSTEM LOCATION: U.S. Department of Housing and Urban Development, 451 Seventh
SYSTEM OF RECORDS NO.: OCIO/QN.01 SYSTEM NAME: Digital Identity Access Management System (DIAMS) - P281 SYSTEM LOCATION: U.S. Department of Housing and Urban Development, 451 Seventh Street, SW, Washington
2. APPLICABILITY AND SCOPE
Department of Defense DIRECTIVE NUMBER 1000.25 July 19, 2004 Certified Current as of April 23, 2007 USD(P&R) SUBJECT: DoD Personnel Identity Protection (PIP) Program References: (a) DoD Directive 1000.22,
Privacy Impact Assessment
AUGUST 16, 2013 Privacy Impact Assessment CIVIL PENALTY FUND AND BUREAU-ADMINISTERED REDRESS PROGRAM Contact Point: Claire Stapleton Chief Privacy Officer 1700 G Street, NW Washington, DC 20552 202-435-7220
CASE MATTER MANAGEMENT TRACKING SYSTEM
for the CASE MATTER MANAGEMENT TRACKING SYSTEM September 25, 2009 Contact Point Mr. Donald A. Pedersen Commandant (CG-0948) (202) 372-3818 Reviewing Official Mary Ellen Callahan Chief Privacy Officer Department
Recruit Analysis and Tracking System
for the November 30, 2009 Contact Point Tom DeGeorge Mission Support United States Coast Guard Recruiting Command (703) 235-1715 Reviewing Official Mary Ellen Callahan Chief Privacy Officer Department
Hiring Information Tracking System (HITS)
for the Hiring Information Tracking System (HITS) May 13, 2010 Contact Point Robert Parsons Director, Office of Human Capital U.S. Immigration and Customs Enforcement (202) 732-7770 Reviewing Official
28042 Federal Register / Vol. 75, No. 96 / Wednesday, May 19, 2010 / Notices
28042 Federal Register / Vol. 75, No. 96 / Wednesday, May 19, 2010 / Notices the records are part of an on-going investigation in which case they may be retained until completion of the investigation.
Port Authority of New York/New Jersey Secure Worker Access Consortium Vetting Services
for the Port Authority of New York/New Jersey Secure Worker Access Consortium Vetting Services DHS/TSA/PIA-040 November 14, 2012 Contact Point Joseph Salvator Office of Intelligence & Analysis [email protected]
How To Check If A Pia Is Required For A Defense Education Activity Online Data Management System (Doea)
PRIVACY IMPACT ASSESSMENT (PIA) For the Benchmark Assessment System Online Data Management System (BAS ODMS) Department of Defense Education Activity SECTION 1: IS A PIA REQUIRED? a. Will this Department
REMEDY Enterprise Services Management System
for the Enterprise Services Management System April 28, 2016 Contact Point Marshall Nolan Border Enforcement and Management Systems Division Office of Information Technology U.S. Customs & Border Protection
PRIVACY IMPACT ASSESSMENT (PIA) For the
PRIVACY IMPACT ASSESSMENT (PIA) For the Diabetes Health Management System (CoPilot ) US Army Medical Command - DHP Funded Application SECTION 1: IS A PIA REQUIRED? a. Will this Department of Defense (DoD)
Privacy Impact Assessment
Privacy Impact Assessment For: Education Investigative Tracking System (EDITS) Date: April 10, 2013 Point of Contact: Hui Yang System Owner: Wanda A. Scott Author: William Hamel Office of Inspector General
Personal Information Collection and the Privacy Impact Assessment (PIA)
SEPTEMBER 27, 2012 Privacy Impact Assessment NATIONWIDE MORTGAGE LICENSING SYSTEM AND REGISTRY Contact Point: Claire Stapleton Chief Privacy Officer 1700 G Street, NW Washington, DC 20552 202-435-7220
PRIVACY IMPACT ASSESSMENT (PIA) For the
PRIVACY IMPACT ASSESSMENT (PIA) For the Data Backup and Protection Solution (Yosemite) US Army Medical Command - DHP Funded Application SECTION 1: IS A PIA REQUIRED? a. Will this Department of Defense
PRIVACY IMPACT ASSESSMENT (PIA) GUIDE
U.S. Securities and Exchange Commission Office of Information Technology Alexandria, VA PRIVACY IMPACT ASSESSMENT (PIA) GUIDE Revised January 2007 Privacy Office Office of Information Technology PRIVACY
Privacy Impact Assessment
DECEMBER 20, 2013 Privacy Impact Assessment MARKET ANALYSIS OF ADMINISTRATIVE DATA UNDER RESEARCH AUTHORITIES Contact Point: Claire Stapleton Chief Privacy Officer 1700 G Street, NW Washington, DC 20552
PRIVACY IMPACT ASSESSMENT (PIA) For the
PRIVACY IMPACT ASSESSMENT (PIA) For the Call Management System (Microlog ServiceFirst ) US Army Medical Command - Defense Health Program (DHP) Funded Application SECTION 1: IS A PIA REQUIRED? a. Will this
Privacy Impact Assessment of. Personal Identity Verification Program
Official of Federal Governors Reserve seal of of the System. Board Program or application name. Privacy Impact Assessment of Personal Identity Verification Program Personal Identity Verification (PIV)
9/11 Heroes Stamp Act of 2001 File System
for the 9/11 Heroes Stamp Act of 2001 File System Contact Point Elizabeth Edge US Fire Administration Federal Emergency Management Agency (202) 646-3675 Reviewing Official Nuala O Connor Kelly Chief Privacy
Federal Protective Service Dispatch and Incident Record Management Systems
for the Federal Protective Service Dispatch and Incident Record Management Systems September 16, 2009 Contact Point Gary Schenkel Director, Federal Protective Service U.S. Immigration and Customs Enforcement
This Instruction implements Department of Homeland Security (DHS) Directive 110-01, Privacy Policy for Operational Use of Social Media.
I. Purpose Department of Homeland Security DHS Directives System Instruction Number: 110-01-001 Revision Number: 00 Issue Date: 6/8/2012 PRIVACY POLICY FOR OPERATIONAL USE OF SOCIAL MEDIA This Instruction
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
Web Time and Attendance
Privacy Impact Assessment for the Web Time and Attendance October 31, 2006 Contact Point Mr. Mark Danter Bureau of Alcohol, Tobacco, Firearms and Explosives Office of Management/ Financial Management Division
Department of the Interior Privacy Impact Assessment
Department of the Interior September 8, 2014 Name of Project: Enterprise Data-at Rest (DAR) Encryption Bureau: Office of the Secretary Project s Unique ID: 010-000000666 Once the PIA is completed and the
Status: Final. Form Date: 30-SEP-13. Question 1: OPDIV Question 1 Answer: OS
Status: Final Form Date: 30-SEP-13 Question 1: OPDIV Question 1 Answer: OS Question 2: PIA Unique Identifier (UID): Question 2 Answer: P-2277902-798208 Question 2A: Name: Question 2A Answer: Identity and
SUMMARY: The Department of the Army proposes to alter a system. of records notice A0145-1 TRADOC, entitled Army Reserve
This document is scheduled to be published in the Federal Register on 06/27/2016 and available online at http://federalregister.gov/a/2016-15097, and on FDsys.gov Billing Code: 5001-06 DEPARTMENT OF DEFENSE
PRIVACY IMPACT ASSESSMENT (PIA) For the
PRIVACY IMPACT ASSESSMENT (PIA) For the SAF/FM Customer Relationship Management/CRM SAF/FM CRM 1.1 SECTION 1: IS A PIA REQUIRED? a. Will this Department of Defense (DoD) information system or electronic
FHFA. Privacy Impact Assessment Template FM: SYSTEMS (SYSTEM NAME)
FHFA Privacy Impact Assessment Template FM: SYSTEMS (SYSTEM NAME) This template is used when the Chief Privacy Officer determines that the system contains Personally Identifiable Information and a more
NOC Patriot Report Database
for the NOC Patriot Report Database December 7, 2010 Contact Point Ashley Tyler Department of Homeland Security Office of Operations and Coordination and Planning Reviewing Official Mary Ellen Callahan
United States Visitor and Immigrant Status Indicator Technology Program (US-VISIT)
for the Conversion to 10-Fingerprint Collection for the United States Visitor and Immigrant Status Indicator Technology Program (US-VISIT) November 15, 2007 Contact Point Barbara M. Harrison, Acting Privacy
Federal Bureau of Prisons. Privacy Impact Assessment for the HR Automation System. Issued by: Sonya D. Thompson Deputy Assistant Director/CIO
Federal Bureau of Prisons Privacy Impact Assessment for the HR Automation System Issued by: Sonya D. Thompson Deputy Assistant Director/CIO Reviewed by: Approved by: Eric Olson, Acting Chief Information
Background Check Service
for the Background Check Service Contact Point Elizabeth Gaffin USCIS Privacy Officer United States Citizenship and Immigration Services 202-272-1400 Reviewing Official Hugo Teufel III Chief Privacy Officer
Privacy Impact Assessment. For. Non-GFE for Remote Access. Date: May 26, 2015. Point of Contact and Author: Michael Gray michael.gray@ed.
For Non-GFE for Remote Access Date: May 26, 2015 Point of Contact and Author: Michael Gray [email protected] System Owner: Allen Hill [email protected] Office of the Chief Information Officer (OCIO)
Privacy Impact Assessment for TRUFONE Inmate Telephone System
Federal Bureau of Prisons Privacy Impact Assessment for TRUFONE Inmate Telephone System Issued by: Sonya D. Thompson Reviewed by: Approved by: Vance E. Hitch, Chief Information Officer, Department of Justice
Automated Threat Prioritization Web Service
for the Automated Threat Prioritization Web Service DHS/ICE/PIA-028 June 6, 2011 Contact Point Luke McCormack Chief Information Officer U.S. Immigration and Customs Enforcement (202) 732-3100 Reviewing
TITLE III INFORMATION SECURITY
H. R. 2458 48 (1) maximize the degree to which unclassified geographic information from various sources can be made electronically compatible and accessible; and (2) promote the development of interoperable
Central Application Tracking System (CATS) Privacy Impact Assessment (PIA) Version 1.0. April 28, 2013
Central Application Tracking System (CATS) Privacy Impact Assessment (PIA) Version 1.0 April 28, 2013 Prepared by: Office of the Comptroller of the Currency (OCC) Security & Compliance Services (SCS) DOCUMENT
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 1000.13 January 23, 2014 USD(P&R) SUBJECT: Identification (ID) Cards for Members of the Uniformed Services, Their Dependents, and Other Eligible Individuals References:
PRIVACY IMPACT ASSESSMENT (PIA) For the
PRIVACY IMPACT ASSESSMENT (PIA) For the Brain Training Software US Army Medical Command - DHP Funded Applications SECTION 1: IS A PIA REQUIRED? a. Will this Department of Defense (DoD) information system
Privacy Impact Assessment (PIA) Consular Affairs Enterprise Service Bus (CAESB) 01.00.00. Last Updated: May 1, 2015
United States Department of State (PIA) Consular Affairs Enterprise Service Bus (CAESB) 01.00.00 Last Updated: May 1, 2015 Bureau of Administration 1. Contact Information A/GIS/IPS Director Bureau of Administration
TABLE OF CONTENTS. 2006.1259 Information Systems Security Handbook. 7 2006.1260 Information Systems Security program elements. 7
PART 2006 - MANAGEMENT Subpart Z - Information Systems Security TABLE OF CONTENTS Sec. 2006.1251 Purpose. 2006.1252 Policy. 2006.1253 Definitions. 2006.1254 Authority. (a) National. (b) Departmental. 2006.1255
Privacy Impact Assessment (PIA) for the. Certification & Accreditation (C&A) Web (SBU)
Privacy Impact Assessment (PIA) for the Cyber Security Assessment and Management (CSAM) Certification & Accreditation (C&A) Web (SBU) Department of Justice Information Technology Security Staff (ITSS)
Department of Homeland Security Web Portals
for the Department of Homeland Security Web Portals June 15, 2009 Contact Point Mary Ellen Callahan Chief Privacy Officer Department of Homeland Security (703) 235-0780 Page 2 Abstract Many Department
PRIVACY IMPACT ASSESSMENT (PIA) For the
PRIVACY IMPACT ASSESSMENT (PIA) For the Surgery Scheduling System (S3) Defense Health Agency (DHA) SECTION 1: IS A PIA REQUIRED? a. Will this Department of Defense (DoD) information system or electronic
U.S. Securities and Exchange Commission. Mailroom Package Tracking System (MPTS) PRIVACY IMPACT ASSESSMENT (PIA)
U.S. Securities and Exchange Commission (MPTS) PRIVACY IMPACT ASSESSMENT (PIA) February 24, 2013 General Information 1. Name of Project or System. (MPTS) 2. Describe the project and its purpose or function
Your Agency Just Had a Privacy Breach Now What?
1 Your Agency Just Had a Privacy Breach Now What? Kathleen Claffie U.S. Customs and Border Protection What is a Breach The loss of control, compromise, unauthorized disclosure, unauthorized acquisition,
DEPARTMENT OF THE INTERIOR. Privacy Impact Assessment Guide. Departmental Privacy Office Office of the Chief Information Officer
DEPARTMENT OF THE INTERIOR Privacy Impact Assessment Guide Departmental Privacy Office Office of the Chief Information Officer September 30, 2014 Table of Contents INTRODUCTION... 1 Section 1.0 - What
Department of Defense INSTRUCTION. Security of Unclassified DoD Information on Non-DoD Information Systems
Department of Defense INSTRUCTION NUMBER 8582.01 June 6, 2012 DoD CIO SUBJECT: Security of Unclassified DoD Information on Non-DoD Information Systems References: See Enclosure 1 1. PURPOSE. This Instruction:
PRIVACY IMPACT ASSESSMENT (PIA) For the
PRIVACY IMPACT ASSESSMENT (PIA) For the Enterprise Laboratory Information Management System (ELIMS) US Army Medical Command - DHP Funded System SECTION 1: IS A PIA REQUIRED? a. Will this Department of
Disregard all information in the paper application packet regarding fingerprinting!
Disregard all information in the paper application packet regarding fingerprinting! If you anticipate having your fingerprints received by the Board office after January 1, 2013 do not use a paper fingerprint
Privacy Impact Assessment (PIA) Waiver Review System (WRS) Version 03.06.01.01. Last Updated: December 2, 2013
United States Department of State (PIA) Waiver Review System (WRS) Version 03.06.01.01 Last Updated: December 2, 2013 Bureau of Administration 1. Contact Information Department of State Privacy Coordinator
Legislative Language
Legislative Language SEC. 1. COORDINATION OF FEDERAL INFORMATION SECURITY POLICY. (a) IN GENERAL. Chapter 35 of title 44, United States Code, is amended by striking subchapters II and III and inserting
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
Agency Information Collection Activities: REAL ID: Minimum Standards for Driver s
This document is scheduled to be published in the Federal Register on 05/11/2016 and available online at http://federalregister.gov/a/2016-11133, and on FDsys.gov 9110-9B DEPARTMENT OF HOMELAND SECURITY
Bonds Online System (ebonds) - Phase One
for the Bonds Online System (ebonds) - Phase One July 14, 2009 Contact Point James T. Hayes, Jr. Director, Office of Detention and Removal U.S. Immigration and Customs Enforcement (202) 732-3100 Reviewing
BERKELEY COLLEGE DATA SECURITY POLICY
BERKELEY COLLEGE DATA SECURITY POLICY BERKELEY COLLEGE DATA SECURITY POLICY TABLE OF CONTENTS Chapter Title Page 1 Introduction 1 2 Definitions 2 3 General Roles and Responsibilities 4 4 Sensitive Data
Privacy Impact Assessment
MAY 24, 2012 Privacy Impact Assessment matters management system Contact Point: Claire Stapleton Chief Privacy Officer 1700 G Street, NW Washington, DC 20552 202-435-7220 [email protected] DOCUMENT
Merchant Mariner Licensing and Documentation System
for the Merchant Mariner Licensing and Documentation System DHS/USCG/PIA-020 March 1, 2011 Contact Point Gary Chappell MMLD Project Officer U.S. Coast Guard CG-633 (202) 372-1293 Reviewing Official Mary
DHS / UKvisas Project
for the DHS / UKvisas Project November 14, 2007 Contact Point Elizabeth Gaffin Associate Counsel United States Citizenship and Immigration Services 202-272-1400 Reviewing Official Hugo Teufel III Chief
Federal Communications Commission Office of the Managing Director
Federal Communications Commission Office of the Managing Director Privacy Impact Assessment 1 (PIA) for the Remedy Ticket System (Service Center) July 8, 2009 FCC Bureau/Office: Office of Managing Director
