How To Understand The Information System Of The Federal Bureau Of Prisons
|
|
|
- Stanley Fleming
- 5 years ago
- Views:
Transcription
1 Federal Bureau Of Prisons Privacy Impact Assessment for the Bureau Electronic Medical Records Initiative Issued by: Sonya D. Thompson Sr. Deputy Assistant Director/CIO Reviewed by: Approved by: Luke J. McCormack, Chief Information Officer, Department of Justice Joo Y. Chung, Acting Chief Privacy and Civil Liberties Officer, Department of Justice Date approved: September 25, 2013
2 Section 1: Description of the Information System The Federal Bureau of Prisons (BOP) protects society by confining offenders in the controlled environments of prisons, and community-based facilities that are safe, humane, and appropriately secure, and which provide work and other self-improvement opportunities to assist offenders in becoming law-abiding citizens. The BOP s Bureau Electronic Medical Records System (BEMR) provides for the collection, storage, maintenance, analysis, and dissemination of comprehensive electronic medical records for more than 200,000 offenders remanded for federal custody. The system overall includes an inmate s medical, social, and psychological history and ongoing data and related informational records. The Bureau Pharmacy System (BEMRx), integrated with BEMR, collects and stores pharmaceutical records, including prescription and dosage information. Also, the Psychology Data System (PDS), formerly a separate system, is now being integrated into BEMR as well. PDS is used to manage all documentation relevant to inmate mental health, including psychological evaluations and assessments, drug and alcohol abuse treatment, therapy, counseling, and crisis intervention. It also has a Treatment Group component, which is used to manage the clinical treatment groups within an institution (e.g., Drug Education, Sex Offender Treatment, etc.). Specific personally identifying information (PII) collected in BEMR includes: Name, Inmate federal register number, Date of birth, Social Security number, Medical, lab, radiology and psychological records. Access to each system is limited to those persons who have an appropriate security clearance and are authorized to review such information for their official duties, which is regularly reviewed. User access is restricted to those staff who need to view and upload data, and user roles are defined to limit capability (e.g., only pharmacists are authorized to fill and dispense prescriptions). System access is web-based using a unique userid and password. All transmissions of data are encrypted using 128-bit SSL encryption. The following systems data and software is planned to be integrated with BEMR at a future date: 1. Bureau Laboratory Information System (LIS): collects and stores lab tests and results. 2. Digital Teleradiology System (MedWeb): collects and stores radiology tests and read results. The above systems include applicable medical peripheral devices such as barcode scanners, clinical decision-making software, and automated medication dispensing equipment, which may be interconnected to the systems.
3 At present, BEMR is interconnected with LIS and BOP s SENTRY inmate management system. The interconnection enables the retrieval of inmate demographic information and enables sharing of data to the Special Housing Unit (SHU) application for tracking SHU reviews by psychology staff. BEMR is also interconnected with the Bureau s Trust Fund Accounting System (TRUFACS) to share data regarding inmate medical co-pays and to allow inmates to request prescription refills electronically. Teleradiology is scheduled for a future date to be interconnected to BEMR. Section 2: Information in the System 2.1 Indicate below what information is collected, maintained, or disseminated. (Check all that apply.) Identifying numbers Social Security Alien Registration Financial account Taxpayer ID Driver s license Financial transaction Employee ID Passport Patient ID File/case ID Credit card Other identifying numbers (specify): Inmate federal register number General personal data Name Date of birth Religion Maiden name Place of birth Financial info Alias Home address Medical information Gender Telephone number Military service Age address Physical characteristics Race/ethnicity Education Mother s maiden name Other general personal data (specify): Psychology evaluations and treatment plans, drug treatment assessments and treatment plans Work-related data Occupation Telephone number Salary Job title address Work history Work address Business associates Other work-related data (specify): Inmate s ability or limitations regarding fitness for work Distinguishing features/biometrics Fingerprints Photos DNA profiles Palm prints Scars, marks, tattoos Retina/iris scans Voice recording/signatures Vascular scan Dental profile
4 Work-related data Other distinguishing features/biometrics (specify): System admin/audit data User ID Date/time of access ID files accessed IP address Queries run Contents of files Other system/audit data (specify): User job title is displayed next to the user s name for psychology encounters. Other information (specify) 2.2 Indicate sources of the information in the system. (Check all that apply.) Directly from individual about whom the information pertains In person Hard copy: mail/fax Online Telephone Other (specify): Government sources Within the Component Other DOJ components Other federal entities State, local, tribal Foreign Other (specify): Non-government sources Members of the public Public media, internet Private sector Commercial data brokers Other (specify): Outside hospital providers; Private Corrections Contractors who house BOP offenders
5 2.3 Analysis: Now that you have identified the information collected and the sources of the information, please identify and evaluate any potential threats to privacy that exist in light of the information collected or the sources from which the information is collected. Please describe the choices that the component made with regard to the type or quantity of information collected and the sources providing the information in order to prevent or mitigate threats to privacy. (For example: If a decision was made to collect less data, include a discussion of this decision; if it is necessary to obtain information from sources other than the individual, explain why.) The systems include design choices to ensure that privacy protections are ensured for the sensitive information (medical and mental health data) stored therein. For example, the system uses rolebased management to ensure that users can only access and manipulate data in relation to their functional duties. Considerations were also made regarding the security and protection of such data to ensure that the systems comply with applicable privacy regulations and requirements for the protection of medical data. For example, the system is designed to ensure that inmate treatment is maintained in the same record regardless of whether an inmate s period of confinement is interrupted by release. There is a privacy risk related to the inadvertent disclosure of sensitive information to persons not authorized to receive it. To mitigate this risk, staff is annually trained on how to properly handle sensitive information. Non-BOP users (e.g., private corrections staff, contract medical staff, etc.) are required to undergo information security awareness training prior to gaining access to a system or data. Access to any relevant system is limited to those persons who have an appropriate security clearance, which is regularly reviewed and who have an official need to access such information. Information is safeguarded in accordance with Bureau rules and policy governing automated information systems security and access. These safeguards include the maintenance of records and technical equipment in restricted areas, and the required use of proper passwords and user identification to access the system. Data transmission in the system is also encrypted. Section 3: Purpose and Use of the System 3.1 Indicate why the information in the system is being collected, maintained, or disseminated. (Check all that apply.) Purpose For criminal law enforcement activities For civil enforcement activities For intelligence activities For administrative matters To conduct analysis concerning subjects of investigative or other interest To promote information sharing initiatives
6 To conduct analysis to identify previously unknown areas of note, concern, or pattern. For administering human resources programs For litigation Other (specify): Reporting infectious diseases to CDC or state health departments 3.2 Analysis: Provide an explanation of how the component specifically will use the information to accomplish the checked purpose(s). Describe why the information that is collected, maintained, or disseminated is necessary to accomplish the checked purpose(s) and to further the component s and/or the Department s mission. The BOP provides essential medical, dental, and mental health services in a manner consistent with accepted community standards for a correctional environment. The Bureau uses licensed and credentialed health care providers in its ambulatory care units, which are supported by community consultants and specialists. For inmates with chronic or acute medical conditions, the Bureau operates several medical referral centers providing advanced care. The information is used to manage and provide medical/psychological care and services for the BOP inmate population. It may also be used for administrative purposes (e.g., billing purposes for outside community providers), to report infectious diseases to state health departments and/or the CDC, to provide information to the judiciary or an adjudicative body when records are relevant, and to evaluate the quality of care provided to the inmates. The information is thus collected to ensure that the BOP delivers medically necessary health care to inmates effectively in accordance with proven standards of care without compromising public safety concerns inherent to the Bureau's overall mission.
7 3.3 Indicate the legal authorities, policies, or agreements that authorize collection of the information in the system. (Check all that apply and include citation/reference.) Authority Citation/Reference Statute 18 U.S.C and 4082 authorize the BOP to manage inmates committed to the custody of the Attorney General. The Bureau is also responsible for individuals who are directly committed to its custody pursuant to 18 U.S.C and 5003 (state inmates), and inmates from the District of Columbia pursuant to section of Chapter 1 of Subtitle C of Title I of the National Capital Revitalization and Self-Government Improvement Act of 1997 (Pub. L ; 111 Stat. 740). Executive Order Federal Regulation Memorandum of Understanding/agreement Other (summarize and provide copy of relevant portion) 3.4 Indicate how long the information will be retained to accomplish the intended purpose, and how it will be disposed of at the end of the retention period. (Reference the applicable retention schedule approved by the National Archives and Records Administration, if available.) Data in BEMR and the LIS is stored for 30 years after the expiration of the inmate s sentence. o The applicable authority has been approved by NARA (Authority # N ). Data in the Teleradiology system is stored as follows: o -ray digital images. Disposition: Temporary. Destroy 5 years after expiration of sentence. o -ray reports and -ray metadata including but not limited to an inmate's name, register number, sentence information, examination, date, referring physician or facility, analysis reports, and system-generated fielded information. Disposition: Temporary. Destroy 30 years after expiration of sentence. o Un-scanned -ray film. Disposition: Temporary. Destroy 5 years after creation. o The retention schedule has been approved by NARA (Authority # N ).
8 3.5 Analysis: Describe any potential threats to privacy as a result of the component s use of the information, and controls that the component has put into place to ensure that the information is handled, retained, and disposed appropriately. (For example: mandatory training for system users regarding appropriate handling of information, automatic purging of information in accordance with the retention schedule, etc.) Access to each system is limited to those persons who have an appropriate security clearance and are authorized to review such information for their official duties. User access privileges are regularly reviewed. Access is granted on a least privilege basis (i.e., users have access to only that information necessary to do their jobs), controlled by BOP s centralized directory authentication model. All access requests are processed, routed, and logged in BOP s helpdesk ticketing system for proper approval and auditing. Information in the system is safeguarded in accordance with Bureau rules and policy governing automated information systems security. System transaction errors and exceptions are logged and reviewed on a routine basis. Data edit checks are included in program code to ensure appropriate and accurate entry of data. Staff is routinely trained on the use and handling of information in the system, including annual training on information security and handling of sensitive information. Contractors with access to a system (i.e., private corrections staff and outside medical hospital staff) are required to undergo information security awareness training prior to being granted access to a relevant system. Contracts (statements of work) also include provisions requiring contract staff to safeguard and protect information consistent with federal privacy requirements. Section 4: Information Sharing 4.1 Indicate with whom the component intends to share the information in the system and how the information will be shared, such as on a case-by-case basis, bulk transfer, or direct access. How information will be shared Recipient Case-bycase Bulk Direct Other (specify) transfer access Within the component DOJ components Federal entities State, local, tribal gov t entities Public Private sector - Outside medical providers Foreign governments Foreign entities
9 How information will be shared Recipient Case-bycase Bulk Direct Other (specify) transfer access Other (specify): - Blue Cross/Blue Shield for medical bill adjudication 4.2 Analysis: Disclosure or sharing of information necessarily increases risks to privacy. Describe controls that the component has put into place in order to prevent or mitigate threats to privacy in connection with the disclosure of information. (For example: measures taken to reduce the risk of unauthorized disclosure, data breach, or receipt by an unauthorized recipient; terms in applicable MOUs, contracts, or agreements that address safeguards to be implemented by the recipient to ensure appropriate use of the information training, access controls, and security measures; etc.) Memoranda of Agreement or Statements of Work (contracts) restricts use of the data for only authorized purposes and prohibits further redistribution of the data. Outside medical providers are also subject to federal medical privacy rules such as the Health Information Portability and Accountability Act (HIPAA). Users are notified of rules and procedures regarding access and use of the information via contract and information security briefings. Outside medical providers are separately subject to HIPAA privacy requirements, which require annual training for employees of covered entities. Sharing of data increases the privacy risks of unauthorized access and modification and misuse. In addition, mitigating controls are employed so that any data entry by non-bop personnel is only performed by select medical personnel and inmates have the opportunity to consent to certain disclosures of the information. External sharing of data also increases the privacy risks of unauthorized access and modification and misuse. Additional mitigating controls include: HIPAA requirements in certain circumstances; individuals have the opportunity to consent to certain disclosures of the information; and MOAs and SOWs prescribe the security and privacy requirements of data once it is shared. Section 5: Notice, Consent, and Redress 5.1 Indicate whether individuals will be notified if their information is collected, maintained, or disseminated by the system. (Check all that apply.) Yes, notice is provided pursuant to a system of records notice published in the Federal Register and discussed in Section 7.
10 Yes, notice is provided by other means. No, notice is not provided. Specify how: Admission and Orientation sessions conducted when the inmate first arrives at an institution. Specify why not: 5.2 Indicate whether and how individuals have the opportunity to decline to provide information. Yes, individuals have the opportunity to decline to provide information. No, individuals do not have the opportunity to decline to provide information. Specify how: Specify why not: Information is required to be provided as part of the sentencing process, the initial intake and screening of the individual into custody, the re-admittance of the individual back into custody, or the release of the individual into the community. Note: inmates have the right to refuse treatment. 5.3 Indicate whether and how individuals have the opportunity to consent to particular uses of the information. Yes, individuals have an opportunity to consent to particular uses of the information. Specify how: Individuals have the opportunity to consent to any disclosures unrelated to the routine uses specified in the SORN in Section 7.1 below. If the request for information is non-routine and the inmate has not previously provided consent, the inmate will be contacted to notify him/her of the request and determine if they consent to the disclosure. The inmate can decline access to the information. Examples of nonroutine use would be a reporter requesting access to an inmate s medical records; a member of the public who is seeking copies of inmate medical records via a FOIA request, or an inmate seeking access to the medical records of another fellow inmate.
11 No, individuals do not have the opportunity to consent to particular uses of the information. Specify why not: Inmates are required to provide certain information as part of the sentencing process, the initial intake and screening of the individual into custody, the re-admittance of the individual back into custody, or the release of the individual into the community. Individuals do not have the opportunity to consent to routine uses of the information in association with those purposes (e.g., disclosure to the U.S. Probation Office or local law enforcement, judges, or outside hospital personnel for purposes of medical treatment, etc.) 5.4 Analysis: Clear and conspicuous notice and the opportunity to consent to the collection and use of individuals information provides transparency and allows individuals to understand how their information will be handled. Describe how notice for the system was crafted with these principles in mind, or if notice is not provided, explain why not. If individuals are not provided the opportunity to consent to collection or use of the information, explain why not. Some information in the system is collected from the individual as part of the pre-sentence investigation process, the intake process when the inmate is admitted to custody, and the release process when the inmate is returning to the community. Notice regarding information collected by BOP personnel is provided through publication of the applicable System of Records Notices. Inmates are also advised of health services and psychology treatment procedures as part of the Admission and Orientation process which occurs at all BOP institutions. Section 6: Information Security 6.1 Indicate all that apply. The information is secured in accordance with FISMA requirements. Provide date of most recent Certification and Accreditation: January 2013 If Certification and Accreditation has not been completed, but is underway, provide status or expected completion date: A security risk assessment has been conducted.
12 Appropriate security controls have been identified and implemented to protect against risks identified in security risk assessment. Specify: Authentication occurs via unique userids and passwords; change management is tracked and logged; and system maintenance activities are logged. Monitoring, testing, or evaluation has been undertaken to safeguard the information and prevent its misuse. Specify: Documentation is audited upon peer review, program review, Joint Commission surveys, and ACA audits. Access to certain sensitive information requires specific authorization and is limited to select personnel. Review and input of inmate medical data is technically restricted to those that directly provide care to the individual inmate or have a need to know. Auditing procedures are in place to ensure compliance with security standards. Specify, including any auditing of role-based access and measures to prevent misuse of information: User access is audited on an annual basis and information is audited as part of ACA and Joint Commission reviews. Contractors that have access to the system are subject to provisions in their contract binding them under the Privacy Act. Contractors that have access to the system are subject to information security provisions in their contracts required by DOJ policy. The following training is required for authorized users to access or receive information in the system: General information security training Training specific to the system for authorized users within the Department. Training specific to the system for authorized users outside of the component. Other (specify): 6.2 Describe how access and security controls were utilized to protect privacy and reduce the risk of unauthorized access and disclosure. System roles are assigned and privileges to view data are based on such roles. User access for an employee must be requested by an applicable medical or psychology supervisor indicating that access is required for the performance of their duties. User access for a contractor is requested by the applicable program/project manager. The request and subsequent access is documented in the BOP HelpDesk system. Access to certain sensitive information requires specific authorization and is limited to select personnel. Review and input of inmate medical data is technically restricted to those that directly provide care to the individual inmate or have a need to know. Users are trained as to the sensitive nature of the data within the systems and continuously reminded as to the need to strictly control the viewing and/or output of data from the systems. BOP users are trained annually regarding the handling of sensitive information and information security requirements. All employees who are involved in the management, operation, programming,
13 maintenance, or use of a DOJ information system are made aware of the threats to and vulnerabilities of those systems and their responsibilities with regard to privacy and information security. All contractors and volunteers who access Bureau information or systems are required to attend initial security awareness and training during orientation. Contractors and volunteers also receive 45-minute refresher security awareness training during annual training sessions. The Information Security Programs Office is responsible for providing the information on security requirements, procedures, and configuration management necessary to conduct the initial briefings for all users. External users are trained as to the use of the system and are required to sign and acknowledge Rules of Behavior before access is granted. Memoranda of Agreements with external agencies also require the appointment of an information security coordination to enforce the security and privacy aspects of the sharing program. Section 7: Privacy Act 7.1 Indicate whether a system of records is being created under the Privacy Act, 5 U.S.C. 552a. (Check the applicable block below and add the supplementary information requested.) Yes, and this system is covered by an existing system of records notice. Provide the system name and number, as well as the Federal Register citation(s) for the most recent complete notice and any subsequent notices reflecting amendment to the system: BOP-005, Inmate Central Records System, 67 Fed. Reg (May 9, 2002); 72 Fed. Reg (Jan. 25, 2007); 77 Fed. Reg (April 26, 2012); 78 Fed. Reg (Feb. 19, 2013). BOP-007, Inmate Physical and Mental Health Record System, 67 Fed. Reg (March 15, 2002); 72 Fed. Reg (Jan. 25, 2007). Yes, and a system of records notice is in development. No, a system of records is not being created. 7.2 Analysis: Describe how information in the system about United States citizens and/or lawfully admitted permanent resident aliens is or will be retrieved. Information is retrieved from the system by federal register number or inmate name.
Federal Bureau of Prisons
Federal Bureau of Prisons Privacy Impact Assessment for the Correspondence Tracking System (CTS) Issued by: Sonya D. Thompson Sr. Deputy Assistant Director/CIO Reviewed by: Approved by: Luke J. McCormack,
Federal Bureau of Prisons
Federal Bureau of Prisons Privacy Impact Assessment for the Forensic Laboratory Issued by: Sonya D. Thompson, Senior Component Official for Privacy, Sr. Deputy Assistant Director/CIO Approved by: Erika
Justice Management Division
Justice Management Division Privacy Impact Assessment for the Justice Unified Telecommunications Network (JUTNet) Voice Services System Issued by: Arthur E. Gary, General Counsel and Senior Component Official
JPATS Management Information System (JMIS)
United States Marshals Service (USMS) Privacy Impact Assessment for the Justice Prisoner and Alien Transportation System (JPATS) JPATS Management Information System (JMIS) Issued by: William E. Bordley
Privacy Impact Assessment for TRUFONE Inmate Telephone System
Federal Bureau of Prisons Privacy Impact Assessment for TRUFONE Inmate Telephone System Issued by: Sonya D. Thompson Reviewed by: Approved by: Vance E. Hitch, Chief Information Officer, Department of Justice
Federal Bureau of Prisons. Privacy Impact Assessment for the SENTRY Inmate Management System
Federal Bureau of Prisons Privacy Impact Assessment for the SENTRY Inmate Management System Issued by: Sonya D. Thompson Deputy Assistant Director/CIO Reviewed by: Approved by: Luke McCormack, Chief Information
Federal Bureau of Prisons
Federal Bureau of Prisons Privacy Impact Assessment for the Trust Fund Accounting System (TRUFACS) Issued by: Sonya D. Thompson Sr. Deputy Asst. Director/BOP CIO Approved by: Erika Brown Lee, Chief Privacy
Federal Bureau of Prisons. Privacy Impact Assessment for the HR Automation System. Issued by: Sonya D. Thompson Deputy Assistant Director/CIO
Federal Bureau of Prisons Privacy Impact Assessment for the HR Automation System Issued by: Sonya D. Thompson Deputy Assistant Director/CIO Reviewed by: Approved by: Eric Olson, Acting Chief Information
U.S. Department of Commerce Office of the Secretary Office of Human Resources Management (OHRM)
U.S. Department of Commerce Office of the Secretary Office of Human Resources Management (OHRM) Privacy Impact Assessment for the OHRM General Support Systems (GSS) OS-059 Reviewed by: Joey Hutcherson,
U.S. Department of Commerce
U.S. Department of Commerce U.S. Census Bureau Privacy Impact Assessment for CEN04 Commerce Business Systems Reviewed by: djttu*c_ tlsftttj, Edwina Jaramillo, AssistarifQiief, Privacy Compliance Branch
United States Trustee Program
United States Trustee Program Privacy Impact Assessment for the Credit Counseling/Debtor Education System (CC/DE System) Issued by: Larry Wahlquist, Privacy Point of Contact Reviewed by: Approved by: Vance
Web Time and Attendance
Privacy Impact Assessment for the Web Time and Attendance October 31, 2006 Contact Point Mr. Mark Danter Bureau of Alcohol, Tobacco, Firearms and Explosives Office of Management/ Financial Management Division
DHS / UKvisas Project
for the DHS / UKvisas Project November 14, 2007 Contact Point Elizabeth Gaffin Associate Counsel United States Citizenship and Immigration Services 202-272-1400 Reviewing Official Hugo Teufel III Chief
United States Visitor and Immigrant Status Indicator Technology Program (US-VISIT)
for the Conversion to 10-Fingerprint Collection for the United States Visitor and Immigrant Status Indicator Technology Program (US-VISIT) November 15, 2007 Contact Point Barbara M. Harrison, Acting Privacy
Introduction to The Privacy Act
Introduction to The Privacy Act Defense Privacy and Civil Liberties Office dpclo.defense.gov 1 Introduction The Privacy Act (5 U.S.C. 552a, as amended) can generally be characterized as an omnibus Code
Integrated Digitization Document Management Program (IDDMP)
for the Integrated Digitization Document Management Program January 5, 2007 Contact Point Elizabeth Gaffin Privacy Officer U.S. Citizenship and Immigration Services (USCIS) (202) 272-1400 Reviewing Official
Background Check Service
for the Background Check Service Contact Point Elizabeth Gaffin USCIS Privacy Officer United States Citizenship and Immigration Services 202-272-1400 Reviewing Official Hugo Teufel III Chief Privacy Officer
Federal Trade Commission Privacy Impact Assessment
Federal Trade Commission Privacy Impact Assessment for the: W120023 ONLINE FAX SERVICE December 2012 1 System Overview The Federal Trade Commission (FTC, Commission or the agency) is an independent federal
Privacy Impact Assessment for Threat Assessments for Access to Sensitive Security Information for Use in Litigation December 28, 2006
for Threat Assessments for Access to Sensitive Security Information for Use in Litigation December 28, 2006 Contact Point Andrew Colsky Sensitive Security Information (SSI) Office [email protected] Reviewing
Physical Access Control System
for the Physical Access Control System DHS/ALL 039 June 9, 2011 Contact Point David S. Coven Chief, Access Control Branch (202) 282-8742 Reviewing Official Mary Ellen Callahan Chief Privacy Officer (703)
Automated Threat Prioritization Web Service
for the Automated Threat Prioritization Web Service DHS/ICE/PIA-028 June 6, 2011 Contact Point Luke McCormack Chief Information Officer U.S. Immigration and Customs Enforcement (202) 732-3100 Reviewing
9/11 Heroes Stamp Act of 2001 File System
for the 9/11 Heroes Stamp Act of 2001 File System Contact Point Elizabeth Edge US Fire Administration Federal Emergency Management Agency (202) 646-3675 Reviewing Official Nuala O Connor Kelly Chief Privacy
Federal Trade Commission Privacy Impact Assessment. Conference Room Scheduling PIA
Federal Trade Commission Privacy Impact Assessment Conference Room Scheduling PIA July 2014 1. System Overview The Federal Trade Commission (FTC) uses conference spaces in various FTC facilities and FTC-leased
Department of Homeland Security Web Portals
for the Department of Homeland Security Web Portals June 15, 2009 Contact Point Mary Ellen Callahan Chief Privacy Officer Department of Homeland Security (703) 235-0780 Page 2 Abstract Many Department
Student Administration and Scheduling System
for the Student Administration and Scheduling System DHS/FLETC/PIA-002 February 12, 2013 Contact Point William H. Dooley Chief, Office of IT Budget, Policy, & Plans (912) 261-4524 Reviewing Official Jonathan
Bank Secrecy Act E-Filing. Privacy Impact Assessment (PIA) Bank Secrecy Act E-Filing. Version 1.5
Bank Secrecy Act E-Filing Privacy Impact Assessment (PIA) Bank Secrecy Act E-Filing Version 1.5 August13, 2014 E-Filing Privacy Impact Assessment Revision Number Change Effective Date Revision History
Privacy Impact Assessment
MAY 24, 2012 Privacy Impact Assessment matters management system Contact Point: Claire Stapleton Chief Privacy Officer 1700 G Street, NW Washington, DC 20552 202-435-7220 [email protected] DOCUMENT
Department of State SharePoint Server PIA
1. Contact Information A/GIS/IPS Director Department of State SharePoint Server PIA Bureau of Administration Global Information Services Office of Information Programs and Services 2. System Information
United States Citizenship and Immigration Services (USCIS) Enterprise Service Bus (ESB)
for the United States Citizenship and Immigration Services (USCIS) June 22, 2007 Contact Point Harry Hopkins Office of Information Technology (OIT) (202) 272-8953 Reviewing Official Hugo Teufel III Chief
NOTICE REQUIREMENTS FOR PRESCRIPTION MONITORING PROGRAMS
NOTICE REQUIREMENTS FOR PRESCRIPTION MONITORING PROGRAMS This project was supported by Grant No. G1299ONDCP03A, awarded by the Office of National Drug Control Policy. Points of view or opinions in this
ICE Pattern Analysis and Information Collection (ICEPIC)
for the ICE Pattern Analysis and Information Collection (ICEPIC) January 25, 2008 Contact Point Marcy Forman Director Office of Investigations U.S. Immigration and Customs Enforcement (202) 514-0078 Reviewing
Privacy Impact Assessment
AUGUST 16, 2013 Privacy Impact Assessment CIVIL PENALTY FUND AND BUREAU-ADMINISTERED REDRESS PROGRAM Contact Point: Claire Stapleton Chief Privacy Officer 1700 G Street, NW Washington, DC 20552 202-435-7220
NOC Patriot Report Database
for the NOC Patriot Report Database December 7, 2010 Contact Point Ashley Tyler Department of Homeland Security Office of Operations and Coordination and Planning Reviewing Official Mary Ellen Callahan
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5400.11 October 29, 2014 DCMO SUBJECT: DoD Privacy Program References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues DoD Directive (DoDD) 5400.11 (Reference
CASE MATTER MANAGEMENT TRACKING SYSTEM
for the CASE MATTER MANAGEMENT TRACKING SYSTEM September 25, 2009 Contact Point Mr. Donald A. Pedersen Commandant (CG-0948) (202) 372-3818 Reviewing Official Mary Ellen Callahan Chief Privacy Officer Department
Crew Member Self Defense Training (CMSDT) Program
for the Crew Member Self Defense Training (CMSDT) Program February 6, 2008 Contact Point Michael Rigney Federal Air Marshal Service Flight Programs Division [email protected] Reviewing Officials Peter
Screening of Passengers by Observation Techniques (SPOT) Program
for the Screening of Passengers by Observation Techniques (SPOT) Program August 5, 2008 Contact Point Michael Kimlick, Branch Chief, Behavior Detection and Travel Document Validation Branch, Screening
The Bureau of the Fiscal Service. Privacy Impact Assessment
The Bureau of the Fiscal Service Privacy Impact Assessment The mission of the Bureau of the Fiscal Service (Fiscal Service) is to promote the financial integrity and operational efficiency of the federal
Canine Website System (CWS System) DHS/TSA/PIA-036 January 13, 2012
for the (CWS System) DHS/TSA/PIA-036 January 13, 2012 Contact Point Carolyn Y. Dorgham Program Manager, National Explosives Detection Canine Team Program [email protected] Reviewing Official Mary
United States Department of State Privacy Impact Assessment Risk Analysis and Management
United States Department of State Privacy Impact Assessment Risk Analysis and Management Bureau of Administration 1. Contact Information Risk Analysis and Management (RAM) PIA Department of State Privacy
This Instruction implements Department of Homeland Security (DHS) Directive 110-01, Privacy Policy for Operational Use of Social Media.
I. Purpose Department of Homeland Security DHS Directives System Instruction Number: 110-01-001 Revision Number: 00 Issue Date: 6/8/2012 PRIVACY POLICY FOR OPERATIONAL USE OF SOCIAL MEDIA This Instruction
Privacy Impact Assessment (PIA) Waiver Review System (WRS) Version 03.06.01.01. Last Updated: December 2, 2013
United States Department of State (PIA) Waiver Review System (WRS) Version 03.06.01.01 Last Updated: December 2, 2013 Bureau of Administration 1. Contact Information Department of State Privacy Coordinator
Port Authority of New York/New Jersey Secure Worker Access Consortium Vetting Services
for the Port Authority of New York/New Jersey Secure Worker Access Consortium Vetting Services DHS/TSA/PIA-040 November 14, 2012 Contact Point Joseph Salvator Office of Intelligence & Analysis [email protected]
General Support System
PRIVACY IMPACT ASSESSMENT JUNE 30, 2015 General Support System Does the CFPB use the information to benefit or make a determination about an individual? No. What is the purpose? Store and Transmit all
Homeland Security Virtual Assistance Center
for the Homeland Security Virtual Assistance Center November 3, 2008 Contact Point Donald M. Lumpkins National Preparedness Directorate (FEMA) (202) 786-9754 Reviewing Official Hugo Teufel III Chief Privacy
Privacy Impact Assessment Update for the
for the Enforcement Integrated Database (EID) Risk Classification Assessment (RCA 1.0), ENFORCE Alien Removal Module (EARM 5.0), and Crime Entry Screen (CES 2.0) DHS/ICE/PIA-015(d) April 6, 2012 Contact
Department of the Interior Privacy Impact Assessment
Department of the Interior Privacy Impact Assessment March 25, 2013 Name of Project: Laserfiche Document Management System (LDMS) Major Application (MA) Bureau: Office of the Secretary (OS) Project s Unique
Privacy Impact Assessment (PIA) Consular Affairs Enterprise Service Bus (CAESB) 01.00.00. Last Updated: May 1, 2015
United States Department of State (PIA) Consular Affairs Enterprise Service Bus (CAESB) 01.00.00 Last Updated: May 1, 2015 Bureau of Administration 1. Contact Information A/GIS/IPS Director Bureau of Administration
PRIVACY IMPACT ASSESSMENT
Name of System/Application: LAN/WAN PRIVACY IMPACT ASSESSMENT U. S. Small Business Administration LAN/WAN FY 2011 Program Office: Office of the Chief Information Officer A. CONTACT INFORMATION 1) Who is
Online Detainee Locator System
for the Online Detainee Locator System April 9, 2010 Contact Point James Chaparro Director, Office of Detention and Removal Operations U.S. Immigration and Customs Enforcement (202) 732-3100 Reviewing
U.S. Securities and Exchange Commission. Mailroom Package Tracking System (MPTS) PRIVACY IMPACT ASSESSMENT (PIA)
U.S. Securities and Exchange Commission (MPTS) PRIVACY IMPACT ASSESSMENT (PIA) February 24, 2013 General Information 1. Name of Project or System. (MPTS) 2. Describe the project and its purpose or function
Privacy Impact Assessment. For. Non-GFE for Remote Access. Date: May 26, 2015. Point of Contact and Author: Michael Gray michael.gray@ed.
For Non-GFE for Remote Access Date: May 26, 2015 Point of Contact and Author: Michael Gray [email protected] System Owner: Allen Hill [email protected] Office of the Chief Information Officer (OCIO)
Privacy Impact Assessment
Privacy Impact Assessment For: Education Investigative Tracking System (EDITS) Date: April 10, 2013 Point of Contact: Hui Yang System Owner: Wanda A. Scott Author: William Hamel Office of Inspector General
Privacy Impact Assessment
Technology, Planning, Architecture, & E-Government Version: 1.1 Date: April 14, 2011 Prepared for: USDA OCIO TPA&E Privacy Impact Assessment for the April 14, 2011 Contact Point Charles McClam Deputy Chief
Commodity Futures Trading Commission Privacy Impact Assessment
Commodity Futures Trading Commission Privacy Impact Assessment System Name: CFTC Portal OPERA (Updated April 16, 2015) 1. Overview The Commodity Futures Trading Commission s ( Commission or CFTC ) Portal
Privacy Impact Assessment (PIA) for the. Certification & Accreditation (C&A) Web (SBU)
Privacy Impact Assessment (PIA) for the Cyber Security Assessment and Management (CSAM) Certification & Accreditation (C&A) Web (SBU) Department of Justice Information Technology Security Staff (ITSS)
PRIVACY IMPACT ASSESSMENT (PIA) GUIDE
U.S. Securities and Exchange Commission Office of Information Technology Alexandria, VA PRIVACY IMPACT ASSESSMENT (PIA) GUIDE Revised January 2007 Privacy Office Office of Information Technology PRIVACY
Computer Linked Application Information Management System
for the Computer Linked Application Information Management System DHS/USCIS/PIA-015(a) August 31, 2011 Contact Point Donald Hawkins Privacy Officer United States Citizenship and Immigration Services (202)
Health Information Privacy Refresher Training. March 2013
Health Information Privacy Refresher Training March 2013 1 Disclosure There are no significant or relevant financial relationships to disclose. 2 Topics for Today State health information privacy law Federal
Notice of Health Information Privacy Practices Radiology Associates of Norwood, Inc.
Notice of Health Information Privacy Practices THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW THIS NOTICE
Privacy Impact Assessment Of the. Office of Inspector General Information Technology Infrastructure Systems
Privacy Impact Assessment Of the Office of Inspector General Information Technology Infrastructure Systems Program or application name: Office of Inspector General Information Technology Infrastructure
Alien Criminal Response Information Management System (ACRIMe)
for the Alien Criminal Response Information Management System (ACRIMe) DHS/ICE/PIA 020(d) January 24, 2013 Contact Point Gary Mead Enforcement and Removal Operations U.S. Immigration and Customs Enforcement
I. U.S. Government Privacy Laws
I. U.S. Government Privacy Laws A. Privacy Definitions and Principles a. Privacy Definitions i. Privacy and personally identifiable information (PII) b. Privacy Basics Definition of PII 1. Office of Management
Federal Trade Commission Privacy Impact Assessment. for the: Analytics Consulting LLC Claims Management System and Online Claim Submission Website
Federal Trade Commission Privacy Impact Assessment for the: Analytics Consulting LLC Claims Management System and Online Claim Submission Website January 2015 Page 1 of 14 1 System Overview The Federal
7.0 Information Security Protections The aggregation and analysis of large collections of data and the development
7.0 Information Security Protections The aggregation and analysis of large collections of data and the development of interconnected information systems designed to facilitate information sharing is revolutionizing
Series # Records Series Title Description Minimum Retention Disposition Notes and Citations
STATE AGENCIES RECORDS SCHEDULE S4: HEALTH RECORDS (Revised: 11/2010) STATE OF CONNECTICUT Connecticut State Library Office of the Public Administrator 231 Capitol Avenue, Hartford, CT 06106 www.cslib.org/publicrecords
Justice Management Division
Justice Management Division Privacy Impact Assessment for the Consolidated Debt Collection System Issued by: Barbara Bush, JMD Acting General Counsel Reviewed by: Approved by: Vance E. Hitch, Chief Information
Integrated Financial Management Information System (IFMIS) Merger
for the Information System (IFMIS) Merger DHS/FEMA/PIA-020 December 16, 2011 Contact Point Michael Thaggard Office of Chief Financial Officer (202) 212-8192 Reviewing Official Mary Ellen Callahan Chief
ADDRESSES SYSTEM LOCATION
Volume 80, Number 28 Wednesday, February 11, 2015 Public Notice 9034; Pages 7671 Privacy Act; System of Records: Medical Records, State-24 SUMMARY: Notice is hereby given that the Department of State proposes
US-VISIT Five Country Joint Enrollment and Information-Sharing Project (FCC)
for the Five Country Joint Enrollment and Information-Sharing Project (FCC) November 2, 2009 Contact Point Paul Hasson, Privacy Officer Program National Protection & Programs Directorate (202) 298-5200
