AIRSPACE WAIVERS AND FLIGHT AUTHORIZATIONS FOR CERTAIN AVIATION OPERATIONS (INCLUDING DCA) (Amended)
|
|
|
- Colleen Oliver
- 10 years ago
- Views:
Transcription
1 for the AIRSPACE WAIVERS AND FLIGHT AUTHORIZATIONS FOR CERTAIN AVIATION OPERATIONS (INCLUDING DCA) (Amended) Contact Point Lisa S. Dean Privacy Officer Transportation Security Administration (571) Reviewing Official Nuala O Connor Kelly Chief Privacy Officer Department of Homeland Security (571)
2 Page 2 1. Overview This Privacy Impact Assessment (PIA) is an updated and amended version of the PIA originally published on July 19, TSA has revised the information it intends to collect from Armed Security Officers (ASO) to include the collection of a photograph and electronic signature for use in preparing the ASO credential, as well as the collection of ASO weapon information. TSA has also developed a redress policy. 2. Program Overview After the September 11, 2001 terrorist attacks, the Federal Aviation Administration (FAA) immediately curtailed all aircraft operations within the National Airspace System (NAS), except certain military, law enforcement, and emergency related aircraft operations. On September 13, 2001, the FAA took action to allow additional aircraft operations in some areas of the NAS. However, the FAA maintained flight restrictions over certain cities and sensitive sites. Although most specific temporary flight restrictions over particular cities or sites have been rescinded, some flight restrictions are occasionally reinstated in response to specific and general intelligence information regarding terrorist threats. These flight restrictions were issued via the U.S. Notice to Airmen (NOTAM) System. Further, while many aspects of the initial flight restrictions were cancelled, in the Washington, DC Metropolitan Area for Ronald Reagan National Airport (DCA), the FAA continues to impose several temporary flight restrictions at the request of the Departments of Homeland Security (DHS) and Defense (DoD) to assist them in their counter-terrorism mission. While operations of commercial aircraft operators with full TSA security programs have been permitted to resume at DCA, commercial operators that do not have full programs and general aviation operators largely have continued to be prohibited from operating into and out of DCA. In order to fly into these restricted airspace areas certain aircraft operators must seek a waiver. The Transportation Security Administration (TSA) provides an analysis of the security aspects of requests for waivers, and established the Office of Airspace Waivers in October 2002 to manage this waiver process. A significant part of the waiver process consists of vetting individuals who will be on aircraft operated under a waiver into restricted airspace. TSA shares responsibility for managing the waiver process with the FAA. The FAA manages the safety requirements for aircraft operators who apply to operate in restricted airspace, while TSA manages the security requirements. TSA collects the required information and conducts a security threat assessment. If TSA approves the waiver request, TSA forwards the request to FAA, and FAA reviews the request to ensure that it comports with applicable safety requirements. If FAA approves the waiver request, FAA issues the waiver, which TSA forwards to the requester. Both agencies work together to ensure safety and security of aircraft operations are met while seamlessly providing the freedom of flight and commerce within U.S. airspace. In coordination with the FAA, the Office of Airspace Waivers currently issues several types of waivers, to include waivers for: Access for certain operations to Ronald Reagan Washington National Airport Access to the Washington, DC Flight Restricted Zone Major Sporting Events
3 Page 3 Disney Theme Parks Flight Training International Operations Special Events In addition, TSA issues flight authorizations for certain operations into and out of DCA. TSA has reassessed the decision to prohibit flights into DCA of the smaller aircraft operated by commercial aircraft operators, and flights by general aviation aircraft. TSA has determined that the economic impact of closing DCA to these operations was unnecessarily severe, but that restrictions are nevertheless required as a matter of security. After discussions with the United States Secret Service, the Federal Air Marshal Service (FAMS), the Department of Defense, the Homeland Security Council, and other Federal agencies, it has been determined that the national security concerns surrounding operations at DCA can be addressed effectively by authorizing these operations at DCA provided that aircraft operators comply with certain security procedures. These procedures are: Each aircraft operator and each fixed base operator that supports the operation must have appointed a security coordinator (see definitions below). For each flight into and out of DCA the aircraft operator must carry an armed security officer. Each security coordinator, armed security officer, flight crewmember, and all passengers must have been vetted by TSA by undergoing a security threat assessment. TSA has contemporaneously issued a rule, insert Title, setting out how an operator may obtain a flight authorization for such operations, which TSA issues in coordination with the FAA. 49 CFR part 1562 subpart B, 70 FR (July 19, 2005). As part of these procedures and in support of vetting requirements, TSA collects personal information from each individual affected by these procedures. The purpose of this Privacy Impact Assessment (PIA) is to provide details about this collection of information and how the airspace waiver and flight authorization programs impact the privacy of security coordinators, flight crewmembers, and passengers, including armed security officers, who apply for or are identified on an application for an airspace waiver or flight authorization to operate in restricted airspace, and the steps that TSA will take to minimize the burden on these aircraft operators and protect their information. The collection of information will differ slightly depending on the type of waiver/authorization requested and this PIA highlights the particular procedures for DCA flight authorizations throughout this document. 3. Definitions Armed Security Officer- Security officers authorized to carry a firearm under 49 C.F.R DASSP- means the aircraft operator security program (DCA Access Standard Security Program) approved by TSA under 49 CFR part 1562 for aircraft operating into and out of DCA. Fixed Base Operator- means an airport-based commercial enterprise that provides support services to aircraft operators, such as maintenance, overnight parking, fueling and deicing. FBO Security Program means the security program approved by TSA under 49 CFR part 1562 for FBOs to serve flights into or out of DCA.
4 Page 4 Flight Crewmember- means a pilot, flight engineer, or flight navigator assigned to duty in an aircraft during flight time. This does not include an armed security officer. Gateway airport- means an airport that has been approved by TSA under 49 CFR part 1562 as a last point of departure for flights into DCA. Passenger- means any person on an aircraft other than a flight crewmember. Security Coordinator- the individual responsible for implementing the DASSP or FBO Security Program and other security requirements under 49 CFR part System Overview 4.1 What information will be collected and used for this security threat assessment? For airspace waivers, through aircraft operators, TSA collects and retains personal information that is used to conduct a security threat assessment on the flight crewmembers and passengers who will be onboard the aircraft while it is operating in restricted airspace. This information includes: (1) first name, (2) last name, (3) middle name (if applicable), (4) social security number (submission is voluntary, although recommended), (5) passport number (if applicable), (6) passport country of issuance (if applicable), (7) date of birth, and (8) place of birth. Although provision of one s social security number is voluntary, failure to provide a social security number may result in delays in processing the waiver application. Special procedures apply for aircraft operators seeking flight authorizations for operations into or out of DCA. Under this program, aircraft operators and fixed base operators will be required to designate a security coordinator who is responsible for implementing the applicable security measures as outlined in the rule. TSA will collect fingerprints and the following information to conduct a fingerprint-based criminal history record check and a security threat assessment on the security coordinator: (1) first, middle, and last name, any applicable suffix, and any other names used; (2) current mailing address, including residential address if different than current mailing address; (3) date and place of birth; (4) social security number (submission is voluntary, although recommended); (5) citizenship status and date of naturalization (if applicable); and (6) alien registration number (if applicable). Although provision of one s social security number is voluntary, failure to provide a social security number may result in delays in processing the security threat assessment. TSA also will collect fingerprints and the information listed above from each flight crewmember and armed security officer who will be on board any aircraft operated under a flight authorization into or out of DCA. Finally, TSA will collect the information listed above, but not fingerprints, from each passenger who is not an armed security officer but who will be on board any affected aircraft operations into or out of DCA. For individuals applying to serve as armed security officers onboard flights into and out of DCA, additional information will be collected including address, citizenship, personal history including employment, criminal, medical, education and training, experience including sworn law enforcement and military experience, and references. TSA will also collect and maintain a photo and electronic signature for use on the ASO credential and reissued credentials. The credential information may be provided to law enforcement authorities in the event of an incident. ASOs will also be required to provide the make,
5 Page 5 model, caliber, and serial number of the weapon they intend to use in connection with the program. ASOs who are currently employed by a law enforcement agency must also provide a written authorization by their employing agency to participate as an ASO and specify whether an agency issued weapon is authorized for use. This information will be used to verify the individual s qualifications to perform the duties required of armed security officers onboard flights into and out of DCA. 4.2 Why is the information being collected and who is affected by the collection of this data? The collection of this information is necessary in order to grant waivers and flight authorizations to aircraft operators who request to operate in restricted airspace. The collection of information from armed security officer applicants is necessary to determine which individuals are qualified to perform the duties required of armed security officers onboard flights into or out of DCA. Individuals including flight crewmembers, security coordinators and passengers, including armed security officers, who wish to enter into restricted airspace will be affected by the collection of information. The information that is collected will be used to conduct a security threat assessment on flight crewmembers, security coordinators, and passengers, including armed security officers, and may preclude participation in operations depending on the results of the security threat assessment. 4.3 What information technology system(s) will be used for this program and how will they be integrated? For domestic airspace waiver requests, TSA uses the information submitted to check each flight crewmember and passenger against relevant databases maintained by the National Crime Information Center (NCIC). In addition to the NCIC check, information from flight crewmembers and passengers, including armed security officers, is checked against other Federal databases, including the Terrorist Screening Center Database (TSDB) and TSA Selectee lists. If a positive name match is found, the waiver request may be denied, or the particular flight crewmember or passenger may not be allowed on the aircraft. For international airspace waiver requests, TSA uses the information submitted to check each flight crewmember and passenger against Federal databases, including the TSDB and TSA Selectee lists. If a positive name match is found, the waiver request may be denied, or the particular flight crewmember or passenger may not be allowed on the aircraft. For requests to operate into or out of DCA under a flight authorization, TSA uses the information submitted to conduct a fingerprint-based Federal Bureau of Investigation (FBI) criminal history records check (CHRC) for each flight crewmember, security coordinator, and armed security officer. The CHRC is conducted at least one time, but may be repeated. In addition, TSA uses the information submitted to check each flight crewmember, security coordinator, and passenger, including armed security officer, against Federal databases, including the NCIC, TSDB and TSA Selectee lists to identify potential threats to aviation security. TSA checks flight crewmembers and passengers, including armed security officers, against Federal databases each time they fly into or out of DCA.
6 Page What notice or opportunities for consent are provided to individuals regarding what information is collected, and how that information is shared? The application for an airspace waiver or flight authorization includes a Privacy Act statement as required by the Privacy Act of 1974 (5 U.S.C. 552a (e)(3)). The Privacy Act statement informs individuals of the reasons their personal information is being collected, the authority for the collection, and how their information will be used. The statement also informs individuals that the collection of information is voluntary, but that those who are not willing to provide the required information may not be eligible to board a flight that requires an airspace waiver or flight authorization. 4.5 Does this program create a new system of records under the Privacy Act? No. The information collected for airspace waivers or flight authorizations, and from ASOs, is part of an existing TSA Privacy Act system of records known as the Transportation Security Threat Assessment System (DHS/TSA 002). The collection, maintenance, and disclosure of information are in compliance with the Privacy Act and the System of Records Notice for DHS/TSA What is the intended use of the information collected? TSA will use the collected information to conduct a security threat assessment on individuals applying for approval as a security coordinator for an approved fixed base operator at a TSA approved gateway airport or for an aircraft operator authorized to receive flight authorizations into DCA, or as flight crewmembers or passengers, including armed security officers, onboard aircraft operating in restricted airspace pursuant to an airspace waiver or flight authorization. TSA will also use the information collected from ASOs to determine which individuals are qualified to perform the duties required of armed security officers onboard flights into or out of DCA. The collected information will be maintained and stored for use by TSA when adjudicating subsequent requests for an airspace waiver or flight authorization. TSA will reevaluate each passenger and flight crewmember s personal information upon receipt of a new waiver or flight authorization application. TSA also will store and use the data for comparison to future application requests. A submitted name that results in a match to any of the databases used to conduct a security threat assessment will also be maintained. This information will be annotated for denied operations. 4.7 How will individuals be able to seek redress? In the case of criminal history records checks (CHRC), if an applicant disputes the results of a CHRC (i.e., disposition of a charge (s) is incorrect), the applicant can provide court documentation to TSA s Office of Transportation Threat Assessment and Credentialing at the following address:
7 Page 7 Transportation Security Administration Attention: GA into DCA Program (TSA-19) 601 South 12th Street, Arlington, VA If the applicant can show that the disposition(s) (or charge(s)) does not fall under the disqualifying offense category; he or she will be not be disqualified based on the offense(s). Similarly, if the applicant can show that corrected disposition or charge(s) no longer falls under the disqualifying offense category; he or she will be not be disqualified based on the offense(s). Individuals who believe they have been incorrectly identified as a security threat will be given the opportunity to contact TSA s Office of Transportation Threat Assessment and Credentialing (at the address above) to address their concerns. Redress based on the security threat assessment will be handled on a case-by-case basis due to the classified and/or security sensitive information that may be involved. To the extent permitted by law, TSA will provide information on which the determination was based to the applicant. There may be items that are classified or sensitive security information that TSA cannot release. For the name based security threat assessment, TSA will be the final adjudicator for security threat assessments. ASOs determined to be unqualified for reasons other than the security threat assessment (such as eligibility criteria or failure to pass training) may appeal that determination to the TSA Office of Law Enforcement. 4.8 With whom will the collected information be shared? The personal information collected from security coordinators, flight crewmembers, and passengers, including armed security officers, will be shared with TSA staff and contractors on a need to know basis. It is also shared with the FAA. Once the FAA grants final approval of an airspace waiver, TSA electronically enters the aircraft operator s information (e.g., company name (if applicable), phone number, and address) into a Master Waiver List database. This database is distributed to FAA Air Traffic Control Towers. Any information collected also may be provided to governmental agencies when relevant for criminal and civil investigations concerning threats to civil aviation security or violations of law, rule, or regulations. TSA will also maintain a list of qualified ASOs who expressly request to be on a list available to FBOs, aircraft operators, and security companies seeking qualified ASOs. 4.9 How will the information be secured against unauthorized use? (What technological mechanism will be used to ensure security against hackers or malicious intent?) TSA will secure personal information against unauthorized use through a layered security approach involving procedural and information security safeguards. The data will be encrypted using National Institute of Science and Technology (NIST) and Federal Information Security Management Act (FISMA) standards and industry best practices when being transferred between secure workstations. Only TSA employees and contractors with proper security credentials and passwords will have access to this
8 Page 8 information to conduct the security threat assessment. Moreover, all TSA and assigned contractor staff receive DHS-mandated privacy training on the use and disclosure of personal data. Specific privacy safeguards can be categorized by the following means: Technical limitations on, and tracking of, data access and use; Use of secure telecommunications techniques; and Limitation of physical access to system databases and workstations. This approach protects the information in accordance with the following requirements: The Privacy Act of 1974, as amended (5 U.S.C 552a), which requires Federal agencies to establish appropriate administrative, technical, and physical safeguards to insure the security and confidentiality of information protected by the Act. Federal Information Security Management Act of 2002 (Pub. L ), which establishes minimum security practices for Federal security systems Will the information be retained and if so, for what period of time? Information will be stored and retained until the National Archives and Records Administration (NARA) approves a record retention schedule for the information. Until such a schedule is approved by NARA, TSA is required to retain the information. TSA will retain the applications and waiver/authorization approval letters indefinitely in locked file cabinets. The FAA also will securely store copies of the approval letters at FAA Headquarters indefinitely. The indefinite time period is necessary for retrieval, comparison, and solving data discrepancies in future waiver, flight authorization applications, and renewals What databases will the names be run against? TSA will run names against Federal databases, including the NCIC, TSDB and TSA Selectee lists to identify potential threats to aviation security. These are national databases used by government agencies to determine and deter potential security threats and terrorist activity What is the step-by-step process of how the systems will work once the data has been collected for a flight? The following step-by-step process is applied to each airspace waiver request TSA receives. TSA has highlighted differences in the DCA flight authorization process. TSA will process all the flight crewmembers and passengers identified on the application through the same security threat assessment. All personnel involved have been trained on the procedures for handling sensitive material. The following is the actual step-by-step process: Airspace Waiver TSA receives an application and sorts according to flight date.
9 Page 9 A TSA program analyst reviews all information on the application to determine if the required information has been submitted. After the initial review of the application, the individual s information is checked against the TSDB and TSA Selectee list and submitted for an NCIC check. If all the flight crewmembers and passengers are cleared, TSA submits the application to FAA for final approval. If a flight crewmember or passenger is not cleared (i.e., name match to a person contained in one of the national databases), TSA informs the applicant that that individual is not approved to serve as a flight crewmember or passenger on the operation until further investigation has been completed. After the security threat assessment has been completed and cleared, the individual s personal information and date of approval are stored in a TSA database for future reference. DCA Flight Authorization Process To be eligible to apply for flight authorizations into or out of DCA, an aircraft operator first must adopt and implement a DCA Standard Security Program (DASSP). As part of the DASSP, the aircraft operator must designate a security coordinator, who must undergo a TSA security threat assessment, including a fingerprint-based CHRC. In addition, each flight crewmember who will operate on any aircraft into or out of DCA must undergo a TSA security threat assessment, including a fingerprint-based CHRC. Once the aircraft operator has complied with these requirements, the operator will be eligible to apply for flight authorizations to operate specific flights into or out of DCA. On each flight the aircraft operator will have to ensure that it has on board an armed security officer who meets the requirements of 49 CFR part 1562, which include that the officer has undergone a TSA security threat assessment that includes a fingerprint-based CHRC. The following step-by-step process will be applied to each request for a flight authorization: TSA receives an application from an aircraft operator to operate a flight into or out of DCA. A TSA program analyst reviews all information on the application to determine if the required information has been submitted. After the initial review of the application, the individual s information is checked against TSA databases. The fingerprints are run against the NCIC to check for disqualifying criminal offenses, as set forth in 49 C.F.R If all the flight crewmembers and passengers are cleared, TSA approves the application. If a flight crewmember or passenger is not cleared (i.e., name match to a person contained in one of the national databases) after the initial security threat assessment is conducted, TSA informs the applicant that that individual is not approved to serve as a flight crewmember or passenger on the operation until further investigation has been completed. After the security threat assessment has been completed and cleared, the applicant s name, social security number (if voluntarily provided), and date of approval are stored in a TSA database for future reference.
10 Page 10 Will the staff working with the data have appropriate training and security clearances to handle the sensitivity of the information? All TSA personnel and contractors will be properly trained and evaluated on the process of issuing airspace waivers and flight authorizations, and processing armed security officer applications. This training will include how to correctly and efficiently handle sensitive as well as Privacy Act protected material. All staff members will also complete the TSA mandated privacy training. In addition to the training, all TSA personnel and contractors must possess the appropriate credentials and clearances to access various databases, files, and other sensitive material. As described above, TSA will secure and lock all sensitive material at all times. Only trained and cleared personnel will be authorized the use of these documents. FOR QUESTIONS OR COMMENTS, PLEASE CONTACT: Lisa S. Dean, Privacy Officer, Transportation Security Administration, Nuala O'Connor Kelly, Chief Privacy Officer, Department of Homeland Security,
Privacy Impact Assessment for Threat Assessments for Access to Sensitive Security Information for Use in Litigation December 28, 2006
for Threat Assessments for Access to Sensitive Security Information for Use in Litigation December 28, 2006 Contact Point Andrew Colsky Sensitive Security Information (SSI) Office [email protected] Reviewing
28042 Federal Register / Vol. 75, No. 96 / Wednesday, May 19, 2010 / Notices
28042 Federal Register / Vol. 75, No. 96 / Wednesday, May 19, 2010 / Notices the records are part of an on-going investigation in which case they may be retained until completion of the investigation.
Port Authority of New York/New Jersey Secure Worker Access Consortium Vetting Services
for the Port Authority of New York/New Jersey Secure Worker Access Consortium Vetting Services DHS/TSA/PIA-040 November 14, 2012 Contact Point Joseph Salvator Office of Intelligence & Analysis [email protected]
Crew Member Self Defense Training (CMSDT) Program
for the Crew Member Self Defense Training (CMSDT) Program February 6, 2008 Contact Point Michael Rigney Federal Air Marshal Service Flight Programs Division [email protected] Reviewing Officials Peter
Screening of Passengers by Observation Techniques (SPOT) Program
for the Screening of Passengers by Observation Techniques (SPOT) Program August 5, 2008 Contact Point Michael Kimlick, Branch Chief, Behavior Detection and Travel Document Validation Branch, Screening
Agency Information Collection Activities: REAL ID: Minimum Standards for Driver s
This document is scheduled to be published in the Federal Register on 05/11/2016 and available online at http://federalregister.gov/a/2016-11133, and on FDsys.gov 9110-9B DEPARTMENT OF HOMELAND SECURITY
Computer Linked Application Information Management System
for the Computer Linked Application Information Management System DHS/USCIS/PIA-015(a) August 31, 2011 Contact Point Donald Hawkins Privacy Officer United States Citizenship and Immigration Services (202)
Department of Homeland Security Office of Inspector General
Department of Homeland Security Office of Inspector General Transportation Security Administration (TSA) Vetting of Airmen Certificates and General Aviation Airport Access and Security Procedures OIG-11-96
Canine Website System (CWS System) DHS/TSA/PIA-036 January 13, 2012
for the (CWS System) DHS/TSA/PIA-036 January 13, 2012 Contact Point Carolyn Y. Dorgham Program Manager, National Explosives Detection Canine Team Program [email protected] Reviewing Official Mary
TSA Advanced Imaging Technology
for TSA Advanced Imaging Technology DHS/TSA/PIA-032(d) December 18, 2015 Contact Point Jill Vaughan Assistant Administrator Office of Security Capabilities [email protected] Reviewing Official
RECURRENT FLIGHT SCHOOL SECURITY AWARENESS (FSSA) TRAINING
U.S. Department of Homeland Security Arlington, VA 22202 RECURRENT FLIGHT SCHOOL SECURITY AWARENESS (FSSA) TRAINING Recurrent FSSA Training for Flight School Employees and independent Certified Flight
Background Check Service
for the Background Check Service Contact Point Elizabeth Gaffin USCIS Privacy Officer United States Citizenship and Immigration Services 202-272-1400 Reviewing Official Hugo Teufel III Chief Privacy Officer
9/11 Heroes Stamp Act of 2001 File System
for the 9/11 Heroes Stamp Act of 2001 File System Contact Point Elizabeth Edge US Fire Administration Federal Emergency Management Agency (202) 646-3675 Reviewing Official Nuala O Connor Kelly Chief Privacy
Privacy Act of 1974; Department of Homeland Security, U.S. Customs and Border
BILLING CODE: 4410-10 DEPARTMENT OF HOMELAND SECURITY Office of the Secretary DHS-2008-0052 Privacy Act of 1974; Department of Homeland Security, U.S. Customs and Border Protection Electronic System for
United States Visitor and Immigrant Status Indicator Technology Program (US-VISIT)
for the Conversion to 10-Fingerprint Collection for the United States Visitor and Immigrant Status Indicator Technology Program (US-VISIT) November 15, 2007 Contact Point Barbara M. Harrison, Acting Privacy
Physical Access Control System
for the Physical Access Control System DHS/ALL 039 June 9, 2011 Contact Point David S. Coven Chief, Access Control Branch (202) 282-8742 Reviewing Official Mary Ellen Callahan Chief Privacy Officer (703)
DBIDS/IACS PRIVACY IMPACT ASSESSMENT (PIA) 2. Name of IT System: Defense Biometric Identification System (DBIDS)
DBIDS/IACS PRIVACY IMPACT ASSESSMENT (PIA) (Use N/A where appropriate) 1. DoD Component: Defense Manpower Data Center (DMDC) 2. Name of IT System: Defense Biometric Identification System (DBIDS) 3. Budget
DHS / UKvisas Project
for the DHS / UKvisas Project November 14, 2007 Contact Point Elizabeth Gaffin Associate Counsel United States Citizenship and Immigration Services 202-272-1400 Reviewing Official Hugo Teufel III Chief
Automated Threat Prioritization Web Service
for the Automated Threat Prioritization Web Service DHS/ICE/PIA-028 June 6, 2011 Contact Point Luke McCormack Chief Information Officer U.S. Immigration and Customs Enforcement (202) 732-3100 Reviewing
How To Make A Terrorist Watchlist More Secure
United States Department of Homeland Security Transportation Security Administration Statement of Kip Hawley Assistant Secretary (Transportation Security Administration) Committee on Commerce, Science
Federal Bureau of Prisons
Federal Bureau of Prisons Privacy Impact Assessment for the Forensic Laboratory Issued by: Sonya D. Thompson, Senior Component Official for Privacy, Sr. Deputy Assistant Director/CIO Approved by: Erika
Homeland Security Virtual Assistance Center
for the Homeland Security Virtual Assistance Center November 3, 2008 Contact Point Donald M. Lumpkins National Preparedness Directorate (FEMA) (202) 786-9754 Reviewing Official Hugo Teufel III Chief Privacy
Privacy Impact Assessment (PIA) Waiver Review System (WRS) Version 03.06.01.01. Last Updated: December 2, 2013
United States Department of State (PIA) Waiver Review System (WRS) Version 03.06.01.01 Last Updated: December 2, 2013 Bureau of Administration 1. Contact Information Department of State Privacy Coordinator
Enforcement Integrated Database (EID) Criminal History Information Sharing (CHIS) Program
for the Enforcement Integrated Database (EID) Criminal History Information Sharing (CHIS) Program DHS/ICE/PIA-015(h) January 15, 2016 Contact Point Peter Edge Executive Associate Director, Homeland Security
In order to adjudicate an appeal, OPM requires claimants or their authorized representatives to submit the following information:
SYSTEM NAME: Health Claims Disputes External Review Services. SYSTEM LOCATION: Office of Personnel Management, 1900 E Street NW., Washington, DC 20415. CATEGORIES OF INDIVIDUALS COVERED BY THE SYSTEM:
ICE Pattern Analysis and Information Collection (ICEPIC)
for the ICE Pattern Analysis and Information Collection (ICEPIC) January 25, 2008 Contact Point Marcy Forman Director Office of Investigations U.S. Immigration and Customs Enforcement (202) 514-0078 Reviewing
Appendix A: Data Framework Data Sets
Page 1 Appendix A: Data Framework Data Sets Appendix A includes details and information on both approved and pending datasets in the Data Framework. The information included on the datasets includes: dataset
2. APPLICABILITY. This AC provides information for any person who engages in public aircraft operations (PAO) as defined by the statute.
U.S. Department of Transportation Federal Aviation Administration Advisory Circular Subject: Public Aircraft Operations Date: 2/12/14 Initiated by: AFS-800 AC No: 00-1.1A Change: 1. PURPOSE. This advisory
U.S. Department of Homeland Security Arlington, VA 22202 Fixed Based Operator (FBO) Guidance Document The guidance listed below is a broad overview of how FBOs will be approved to serve as a last point
U.S. Customs and Border Protection Security Seal/Hologram Program Procedures (Updated Sep 2010)
U.S. Customs and Border Protection Security Seal/Hologram Program Procedures (Updated Sep 2010) Definition of CBP Security Area (19 CFR 122.181) The term CBP security area means the Federal Inspection
United States Trustee Program
United States Trustee Program Privacy Impact Assessment for the Credit Counseling/Debtor Education System (CC/DE System) Issued by: Larry Wahlquist, Privacy Point of Contact Reviewed by: Approved by: Vance
Merchant Mariner Licensing and Documentation System
for the Merchant Mariner Licensing and Documentation System DHS/USCG/PIA-020 March 1, 2011 Contact Point Gary Chappell MMLD Project Officer U.S. Coast Guard CG-633 (202) 372-1293 Reviewing Official Mary
SUMMARY: The National Guard Bureau proposes to add a new system. of records, INGB 005, entitled Special Investigation Reports
This document is scheduled to be published in the Federal Register on 01/27/2016 and available online at http://federalregister.gov/a/2016-01517, and on FDsys.gov Billing Code: 5001-06 DEPARTMENT OF DEFENSE
United States Department of State Privacy Impact Assessment Risk Analysis and Management
United States Department of State Privacy Impact Assessment Risk Analysis and Management Bureau of Administration 1. Contact Information Risk Analysis and Management (RAM) PIA Department of State Privacy
Department of Homeland Security Web Portals
for the Department of Homeland Security Web Portals June 15, 2009 Contact Point Mary Ellen Callahan Chief Privacy Officer Department of Homeland Security (703) 235-0780 Page 2 Abstract Many Department
Privacy Impact Assessment Update for the
for the Enforcement Integrated Database (EID) Risk Classification Assessment (RCA 1.0), ENFORCE Alien Removal Module (EARM 5.0), and Crime Entry Screen (CES 2.0) DHS/ICE/PIA-015(d) April 6, 2012 Contact
VOLUNTEER & EMPLOYEE CRIMINAL HISTORY SERVICE (VECHS) USER AGREEMENT FOR CRIMINAL HISTORY RECORD INFORMATION
VOLUNTEER & EMPLOYEE CRIMINAL HISTORY SERVICE (VECHS) USER AGREEMENT FOR CRIMINAL HISTORY RECORD INFORMATION 1. Purpose This Agreement, entered into by the Hawaii Criminal Justice Data Center (hereinafter
US-VISIT Program, Increment 1 Privacy Impact Assessment
US-VISIT Program, Increment 1 Privacy Impact Assessment December 18, 2003 Contact Point Steve Yonkers US-VISIT Privacy Officer Department of Homeland Security (202) 298-5200 Reviewing Official Nuala O
Privacy Act of 1974; Department of Homeland Security <Component Name> - <SORN. AGENCY: Department of Homeland Security, Privacy Office.
DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2014-] Privacy Act of 1974; Department of Homeland Security -
b. Other serious crimes, including organized crime, that are transnational in nature; and
Frequently Asked Questions Regarding Customs and Border Protection Receipt of Passenger Name Records Related to Flights between the European Union and the United States United States law requires airlines
Privacy Act of 1974; Department of Transportation, Federal Aviation Administration,
(4910-62-P) DEPARTMENT OF TRANSPORTATION Office of the Secretary Docket No. DOT-OST-2015-0235 Privacy Act of 1974; Department of Transportation, Federal Aviation Administration, DOT/FAA-801; Aircraft Registration
Clearances, Logistics, Employees, Applicants, and Recruitment (CLEAR)
for Clearances, Logistics, Employees, Applicants, and Recruitment (CLEAR) DHS/USSS/PIA-013 January 3, 2013 Contact Point Latita M. Payne, Privacy Officer United States Secret Service (202) 406-5838 Reviewing
INSTRUCTIONS FOR COMPLETING THE USPTO CERTIFICATE ACTION FORM
INSTRUCTIONS FOR COMPLETING THE USPTO CERTIFICATE ACTION FORM The completed form should be sent to: Box EBC Washington D.C.20231 Block 1- Requestor Status The Certificate requester should check the appropriate
Integrated Digitization Document Management Program (IDDMP)
for the Integrated Digitization Document Management Program January 5, 2007 Contact Point Elizabeth Gaffin Privacy Officer U.S. Citizenship and Immigration Services (USCIS) (202) 272-1400 Reviewing Official
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5400.11 October 29, 2014 DCMO SUBJECT: DoD Privacy Program References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues DoD Directive (DoDD) 5400.11 (Reference
SUMMARY: The Office of the Secretary of Defense proposes to. alter a system of records notice DPFPA 02, entitled Pentagon
This document is scheduled to be published in the Federal Register on 02/11/2016 and available online at http://federalregister.gov/a/2016-02788, and on FDsys.gov Billing Code: 5001-06 DEPARTMENT OF DEFENSE
Introduction to The Privacy Act
Introduction to The Privacy Act Defense Privacy and Civil Liberties Office dpclo.defense.gov 1 Introduction The Privacy Act (5 U.S.C. 552a, as amended) can generally be characterized as an omnibus Code
TSA Operations Center Incident Management System
for the TSA Operations Center Incident Management System DHS/TSA/PIA-029(a) August 25, 2015 Contact Point John Bogers System Owner Transportation Security Operations Center Transportation Security Administration
Alien Criminal Response Information Management System (ACRIMe)
for the Alien Criminal Response Information Management System (ACRIMe) DHS/ICE/PIA 020(d) January 24, 2013 Contact Point Gary Mead Enforcement and Removal Operations U.S. Immigration and Customs Enforcement
Department of Veterans Affairs VA Directive 0710 PERSONNEL SECURITY AND SUITABILITY PROGRAM
Department of Veterans Affairs VA Directive 0710 Washington, DC 20420 Transmittal Sheet June 4, 2010 PERSONNEL SECURITY AND SUITABILITY PROGRAM 1. REASON FOR ISSUE: To revise Department of Veterans Affairs
H. R. 5005 11 SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION.
H. R. 5005 11 (d) OTHER OFFICERS. To assist the Secretary in the performance of the Secretary s functions, there are the following officers, appointed by the President: (1) A Director of the Secret Service.
Hiring Information Tracking System (HITS)
for the Hiring Information Tracking System (HITS) May 13, 2010 Contact Point Robert Parsons Director, Office of Human Capital U.S. Immigration and Customs Enforcement (202) 732-7770 Reviewing Official
E X E C U T I V E O F F I CE O F T H E P R E S I D EN T
EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503 THE DIRECTOR M-05-24 August 5, 2005 MEMORANDUM FOR THE HEADS OF ALL DEPARTMENTS AND AGENCIES FROM: SUBJECT: Joshua
UNDERTAKINGS OF THE UNITED STATES BUREAU OF CUSTOMS AND BORDER PROTECTION AND THE UNITED STATES TRANSPORTATION SECURITY ADMINISTRATION
UNDERTAKINGS OF THE UNITED STATES BUREAU OF CUSTOMS AND BORDER PROTECTION AND THE UNITED STATES TRANSPORTATION SECURITY ADMINISTRATION In support of the plan of the European Commission (EC) to exercise
Privacy Impact Assessment of. Personal Identity Verification Program
Official of Federal Governors Reserve seal of of the System. Board Program or application name. Privacy Impact Assessment of Personal Identity Verification Program Personal Identity Verification (PIV)
AIRPORT SECURITY BADGE APPLICATION READ THE FOLLOWING INSTRUCTIONS CAREFULLY
AIRPORT SECURITY BADGE APPLICATION READ THE FOLLOWING INSTRUCTIONS CAREFULLY The Security Badging Office personnel will make every effort to provide you with a pleasant experience while you are going through
Legislative Language
Legislative Language SEC. 1. COORDINATION OF FEDERAL INFORMATION SECURITY POLICY. (a) IN GENERAL. Chapter 35 of title 44, United States Code, is amended by striking subchapters II and III and inserting
REVISION: This directive supersedes TSA MD 3700.4, Handling Sensitive Personally Identifiable Information, dated March 13, 2008.
OFFICE OF THE SPECIAL COUNSELOR Privacy TSA MANAGEMENT DIRECTIVE No. 3700.4 To enhance mission performance, TSA is committed to promoting a culture founded on its values of Integrity, Innovation and Team
CASE MATTER MANAGEMENT TRACKING SYSTEM
for the CASE MATTER MANAGEMENT TRACKING SYSTEM September 25, 2009 Contact Point Mr. Donald A. Pedersen Commandant (CG-0948) (202) 372-3818 Reviewing Official Mary Ellen Callahan Chief Privacy Officer Department
Digital Mail Pilot Program
for the Digital Mail Pilot Program June 18, 2010 Contact Point Ronald Boatwright Program Manager, Mail Management (202) 343-4220 Reviewing Official Mary Ellen Callahan Chief Privacy Officer Department
Extension of the Prohibition Against Certain Flights in the Simferopol (UKFV) and
This document is scheduled to be published in the Federal Register on 10/27/2015 and available online at http://federalregister.gov/a/2015-27334, and on FDsys.gov BILLING CODE 4910-13-P DEPARTMENT OF TRANSPORTATION
How to Apply For Federal Aviation Administration (FAA) Non-Premium War Risk Hull and Liability Insurance
How to Apply For Federal Aviation Administration (FAA) Non-Premium War Risk Hull and Liability Insurance INFORMATION FOR THE INSURANCE APPLICANT The FAA, under Section 44305 to Chapter 443 of Title 49
Department of Homeland Security Management Directive System MD Number: 4900 INDIVIDUAL USE AND OPERATION OF DHS INFORMATION SYSTEMS/ COMPUTERS
Department of Homeland Security Management Directive System MD Number: 4900 INDIVIDUAL USE AND OPERATION OF DHS INFORMATION SYSTEMS/ COMPUTERS 1. Purpose This directive establishes the Department of Homeland
I. U.S. Government Privacy Laws
I. U.S. Government Privacy Laws A. Privacy Definitions and Principles a. Privacy Definitions i. Privacy and personally identifiable information (PII) b. Privacy Basics Definition of PII 1. Office of Management
Electronic System for Travel Authorization (ESTA)
for the Electronic System for Travel Authorization (ESTA) June 2, 2008 Contact Point: Beverly Good Director, Admissibility and Passenger Programs--ESTA Customs and Border Protection (202) 344-2433 Reviewing
Bonds Online System (ebonds) - Phase One
for the Bonds Online System (ebonds) - Phase One July 14, 2009 Contact Point James T. Hayes, Jr. Director, Office of Detention and Removal U.S. Immigration and Customs Enforcement (202) 732-3100 Reviewing
Consular Lookout and Support System (CLASS) PIA
1. Contact Information Consular Lookout and Support System (CLASS) PIA A/GIS/IPS Director Bureau of Administration Global Information Services Office of Information Programs and Services 2. System Information
SUMMARY: The Defense Health Agency proposes to alter an. existing system of records, EDTMA 02, entitled "Medical/Dental
This document is scheduled to be published in the Federal Register on 10/27/2015 and available online at http://federalregister.gov/a/2015-27229, and on FDsys.gov Billing Code: 5001-06 DEPARTMENT OF DEFENSE
+ Completed Fingerprint Application Form. + Payment $41 for fingerprinting due at time of printing
Ernest A. Love Field Prescott Municipal Airport City of Prescott 6546 Crystal Lane Prescott, AZ 86301 Phone (928) 777-1114 Fax (928) 771-5861 TOO (928) 778-5680 SIDA CHECKLIST + All items as outlined on
3416 1 st Avenue North Billings, MT. Phone 245-4946. Will do fingerprinting Monday Friday, 8:00-5:00. $12.00 per card
Federal Criminal Background Check The College of Education at Montana State University Billings (MSU B) requires that a national criminal history background check, including fingerprinting, be completed
Online Detainee Locator System
for the Online Detainee Locator System April 9, 2010 Contact Point James Chaparro Director, Office of Detention and Removal Operations U.S. Immigration and Customs Enforcement (202) 732-3100 Reviewing
UNDERTAKINGS OF THE DEPARTMENT OF HOMELAND SECURITY BUREAU OF CUSTOMS AND BORDER PROTECTION (CBP)
UNDERTAKINGS OF THE DEPARTMENT OF HOMELAND SECURITY BUREAU OF CUSTOMS AND BORDER PROTECTION (CBP) In support of the plan of the European Commission (Commission) to exercise the powers conferred on it by
Department of Justice Policy Guidance 1 Domestic Use of Unmanned Aircraft Systems (UAS)
Department of Justice Policy Guidance 1 Domestic Use of Unmanned Aircraft Systems (UAS) INTRODUCTION The law enforcement agencies of the Department of Justice ("the Department") work diligently to protect
NOC Patriot Report Database
for the NOC Patriot Report Database December 7, 2010 Contact Point Ashley Tyler Department of Homeland Security Office of Operations and Coordination and Planning Reviewing Official Mary Ellen Callahan
Federal Protective Service Dispatch and Incident Record Management Systems
for the Federal Protective Service Dispatch and Incident Record Management Systems September 16, 2009 Contact Point Gary Schenkel Director, Federal Protective Service U.S. Immigration and Customs Enforcement
REMEDY Enterprise Services Management System
for the Enterprise Services Management System April 28, 2016 Contact Point Marshall Nolan Border Enforcement and Management Systems Division Office of Information Technology U.S. Customs & Border Protection
U.S. Department of Transportation. Privacy Impact Assessment (Update) National Registry of Certified Medical Examiners (National Registry)
U.S. Department of Transportation Privacy Impact Assessment (Update) National Registry of Certified Medical Examiners (National Registry) Responsible Official Elaine Papp Division of Medical Programs Federal
~ Final Credentialing Standards for Issuing Personal Identity Verification Cards under HSPD-12
UNITED STATES OFFICE OF PERSONNEL MANAGEMENT Washington, DC 20415 The Director July 31, 2008 MEMORANDUM FOR HEADS OF DEPARTMENTS AND AGENCIES FROM: SUBJECT: LINDA M. SPRINGER DIRECTOR ~ Final Credentialing
Privacy Impact Assessment
Privacy Impact Assessment For: Education Investigative Tracking System (EDITS) Date: April 10, 2013 Point of Contact: Hui Yang System Owner: Wanda A. Scott Author: William Hamel Office of Inspector General
DHS SharePoint and Collaboration Sites
for the March 22, 2011 Robert Morningstar Information Systems Security Manager DHS Office of the Chief Information Officer/Enterprise Service Delivery Office (202) 447-0467 Reviewing Official Mary Ellen
STATE OF KANSAS OFFICE OF THE ATTORNEY GENERAL Through the KANSAS BUREAU OF INVESTIGATION INSTRUCTIONS
STATE OF KANSAS OFFICE OF THE ATTORNEY GENERAL Through the KANSAS BUREAU OF INVESTIGATION INSTRUCTIONS RENEWAL OF PRIVATE DETECTIVE LICENSE *Complete this renewal form if you are an employee, owner, partner,
Alien Criminal Response Information Management System (ACRIMe) April 22, 2010
for Alien Criminal Response Information Management System (ACRIMe) April 22, 2010 Contact Point James A. Dinkins, Director Office of Investigations U.S. Immigration & Customs Enforcement (202) 732-5100
Passenger Protect Program Transport Canada
AUDIT REPORT OF THE PRIVACY COMMISSIONER OF CANADA Passenger Protect Program Transport Canada Section 37 of the Privacy Act 2009 AUDIT OF PASSENGER PROTECT PROGRAM, TRANSPORT CANADA The audit work reported
Alien Criminal Response Information Management System (ACRIMe) & Enforcement Integrated Database (EID)
for the Alien Criminal Response Information Management System (ACRIMe) & Enforcement Integrated Database (EID) September 29, 2010 Contact Point James A. Dinkins, Executive Associate Director Office of
