Name ofsystem/application: CRM-Correspondence Management Program Office: Office ofthe Executive Secretariat
|
|
|
- Debra Chase
- 10 years ago
- Views:
Transcription
1 PRIVACY IMPACT ASSESSMENT Name ofsystem/application: CRM-Correspondence Management Program Office: Office ofthe Executive Secretariat A. CONTACT INFORMATION 1) Who is the person completing this document? Mathilda Hunter Information Technology Specialist ) Who is the system owner? Kim Bradley Director, Executive Secretariat Office ) Who is the system manager for this system or application? Mathilda Hunter Information Technology Specialist ) Who is the IT Security Manager who reviewed this document? Dave McCauley ChiefInformation Security Officer Office ofthe ChiefInformation Officer ) Who is the Privacy Officer who reviewed this document Ethel Matthews Senior Advisor to the ChiefPrivacy Officer Office ofthe ChiefInformation Officer ) Who is the Reviewing Official? Robert Naylor
2 ChiefInformation Officer/ChiefPrivacy Officer Office ofthe ChiefInformation Officer Robert.Naylor0>,sba.gov B. SYSTEM APPLICATION/GENERAL INFORMATION 1) Does this system contain any information about individuals? Ifyes, explain. Yes, information that is received will include individuals' names, business addresses, home addresses. this information can be in paper form or . a. Is the information about individual members of the public? Yes. b. Is the information about employees?. Yes. 2) What is the purpose of the system/application? The CRM-Correspondence Management (CRM-CM) system will efficiently manage, organize, search, track, and report on correspondence and action plans. This will ' enable better responses to customers and stakeholders. The web-based application is a system used to control all correspondence from the public, members ofcongress, and Administration officials to and from the Administrator or the Deputy Administrator. The application is also used to control and track all policy/decision documents for the Administrator's or the Deputy Administrator's signature. Correspondence from members ofcongress to any SBA official is also controlled and tracked through this system. 3) Is the system in the development process? 1. Yes, (CRM-CM) is in the development process. This system is an additional feature ofthe CRM project. The CRM project has a draft Privacy Impact Assessment submitted as well as a System Security Plan on file. 2. The system does not require Personally Identifiable Information (PH): there are no fields for SSNs, DOB, etc.; however, some documents that are uploaded in the system contain privacy information. 3. System updates and designs were complete during User Acceptance Testing to include correspondence retention period in accordance with NARA schedule as described in the SBA's SOP 41 (2). 2
3 4) How will the technology investment (new or updated) affect existing privacy processes? The Correspondence Management system is designed to replace the SBA's existing Controlled Correspondence Tracking System. Since it captures the same infonnation, there is no significant impact to privacy in the functioning ofthe system. From an infrastructure standpoint, the Correspondence Management system is an integrated module within SBA's CRM system. The CRM system will be hosted on hardware at Engage's secure hosting facility, located in Atlanta, Georgia, with a backup/disaster recovery site located in Dallas, Texas. The following software components and versions will be installed and maintained on the hardware servers located at Engage's secure hosting facility. The choice for cloud-based hosting at Engage's data center was made to take the burden ofmaintaining and securing infrastructure offofsba and ensure more robust and secure infrastructure management from a team dedicated to application hosting. 5) What legal authority authorizes the purchase or development of this system/application? 15 U.S.C. 634(b) (6), 44 U.S.C PrivacyAct of 1974,5 U.S.C. 552a and related statutes (Electronic Communications Privacy Act of 1986; Computer Matching and Privacy Protection Act of 1988). Paperwork Reduction Act of 1995; 44 U.S.C Government Paperwork Elimination Act of Federal Records Act of 1950 and National Archives and Records Administration (NARA) implementing regulating at 36 C.F.R and 41 C.S.R The Office ofmanagement and Budget (OMB) Circular A-l30, "Management of Federal Infonnation Resources," Appendix III, "Security offederal Automated Information Systems." OMB Circular A-130 implements a number offederal laws relating to infonnation resources IDfuiagement (for example, the Paperwork Reduction Act, the Clinger-Cohen Act; and the Government Perfonnance and Results Act). The Federal Information Security Management Act of2002 (FISMA). Additional program definition is detailed in 13 C.F.R., Part ) Privacy Impact Analysis: What privacy risks were identified and describe how they were mitigated for security and access controls? The risk identified is limited to the transfer ofthe records from the SBA LAN to the Engage Data Center. This risk is mitigated, as end-user access to these environments is granted on an individual basis, according to a pre-defined system security process. 3
4 C. SYSTEM DATA 1) What categories of individuals are covered in the system? The CRM-CM will store and manage correspondence from the members ofthe U.S. House ofrepresentatives and the U.S. Senate, the President, and SBA's Administrator or Deputy Administrator. This correspondence might include attachments that could contain PIT from individuals who contacted their Congressional representative(s), or the Administrator concerning various personal or business issues affecting them. 2) What are the sources of the information in the system? a. Is the source of the information from the individual or is it taken from another source? Ifnot directly from the individual, then what other source? Correspondence information is collected from several sources: directly from members ofthe U.S. House ofrepresentatives and the U.S. Senate, the President, SBA's Administrator or Deputy Administrator, and the general public or SBA's Program Offices. b. What Federal agencies are providing data for use in the system? The Federal agencies that may provide data which would be used in this process may include correspondence from the White House, members ofcongress, OMB, OPM, and SBA's Administrator. c. What Tribal, State, and local agencies are providing data for use in the system? Any Tribal, State, and local agencies could provide data d. From what other third party sources will data be collected? Third party sources can be the general public and small business proprietors. e. What information will be collected from the employee and the public? Information received from the employee or public contained in the system will include: names, home addresses, business addresses, contact information, and various personal or business issues affecting them. 3) Accuracy, Timeliness, and Reliability a. How is data collected from sources other than SBA records verified for. accuracy? Data from federal agency records is identified by name and address, and is subject to Privacy Act regulation and documented practices for accuracy. Data from 4
5 commercial entities is subject to regulation and identified by name, address, and other contact infonnation. b. How is data checked for completeness? The Executive Secretariat Systems Administrator or Managers will conduct periodic assessments (audits) ofthe infonnation in the system to detennine data accuracy. c. Is the data current? What steps or procedures are taken to ensure the data is current and not out-of-date? Name the document (e.g., data models). Yes. Data is collected directly from members ofthe U.S. House of Representatives and the U.S. Senate, the President, SBA's Administrator or Deputy Administrator and the general public, or SBA's Program Offices. The CRM-CM Agency Database Hourly Transaction Logs and Daily incremental backups help system administrators monitor the timeliness ofdata entries and give them the ability to detennine whether data is inactive or out-of-date. d. Are the data elements described in detail and documented? Ifyes, what is the name of the document? Yes. The Engage, Inc. system support maintains the data dictionary for the system elements in the IT Configuration Plan. 3) Privacy Impact Analysis: Discuss what privacy risks were identified and how they were mitigated for the types ofinformation collected? CRM-CM is primarily a management tool, and access to the infonnation contained in the system is restricted by security roles. Most ofthe risks identified involved the technological aspects ofthe design, development, and maintenance ofthe system. Deliberate thought was given to the type ofdata collected during the requirementsgeneration process. All users must acknowledge and accept the prescribed warning regarding misuse ofthe infonnation contained in this system. D. DATAATTRIBUTES 1) Is the use ofthe data both relevant and necessary to the purpose for which the system is being designed? Yes. The system contains set fields that only collect infonnation which is sufficient to identify and track the course ofassigned cases. 2) Will the system derive new data or create previously unavailable data about an individual through aggregation from the information collected, and how wiuthis be maintained and riled? No new data will be created-the data already exists in CCTS. 5
6 3) Will the new data be placed in the individual's record? 4) Can the system make determinations about employees or members of the public that would not be possible without the new data? 5) How is the new data verified for relevance, timeliness, and accuracy? 6) Ifthe data is being consolidated, what controls are in place to protect the data from unauthorized access or use? No data is being consolidated. The old legacy system data will be migrated to CM. All data will reside on one system, with User ID, password, and role responsibilitybased access controls. 7) Ifprocesses are being consolidated, are the proper controls remaining in place to protect the data and prevent unauthorized access? Ifprocesses are not being consolidated please state, "". Processes are being consolidated and the proper controls are being rolled up under CRM system authorizations. 8) How will the data be retrieved? Does a personal identifier retrieve the data? If yes, explain and list the identifiers that will be used to retrieve information on the individual. Data is accessed by authorized users with sufficient privileges based on user ill. 9) What kinds of reports can be produced on individuals? What will be the use of these reports? Who will have access to them? Reports can be produced on Program Offices for the purpose ofworkload assessment. Access is restricted to Executive Secretariat officials. The Daily Congressional Report is generated for active cases, and SBA's Administrator will have access to this. 10) What opportunities do individuals have to decline to provide Information (i.e., where providing information is voluntary) or to consent to particular uses of the information (other than required or authorized uses), and how individuals can grant consent. 6
7 11) Privacy Impact Analysis: Describe any types of controls that may be in place to ensure that information is used as intended. The system is a single one: before accessing the SBA's network, all users accept a "Rules ofbehavior" contained in the security warning banner which states, in part, that they are prohibited from accessing or attempting to access system or information for which they are not authorized. The form stipulates that users may not read, store, or transfer information for which they are not authorized, and that disciplinary action may result from any unauthorized use ofsba systems and computer resources for non-work-related activities. In accepting this agreement, users state they have read and understand their responsibilities and will comply with the outlined rules. E. MAINTENANCE AND ADMINISTRATIVE CONTROLS 1) Ifthe system is operated in more than one site, how will consistent use of the system and data be maintained in all sites? The system operates from a single site with a separate site"as a backup. Data is replicated to the backup site for disaster recovery purposes. 2) What are the retention periods ofd.ata in this system? Data retention standards are consistent with SBA's SOP 41 (2), which requires record management data to be maintained on Administrator's records for a period ofthree years. 3) What are the procedures for disposition of the data at the end of the retention period? How long will the reports produced be kept? Where are the procedures documented? The Office ofthe Executive Secretariat archives cases in the system in accordance with the NARA Retention Schedules as describes in the SBA's SOP 41 (2). Reports are maintained indefinitely. 4) Is the system using technologies in ways that the SBA has not previously employed (e.g., monitoring software, Smart Cards, Caller-ID)? There is no additional monitoring software, smart cards, or caller id. This data already resides in an existing system. 5) How does the use of this technology affect public/employee privacy? 6) Will this system provide the capability to identify, locate, and monitor individuals? Ifyes, explain. Yes. Names and addresses are a part ofthe dataset. 7
8 7) What kinds of information are collected as a function of the monitoring of individuals? 8) What controls will be used to prevent unauthorized monitoring? Access is limited by control ofuser IDs, password controls, and the assignment ofa User Role profile to all User IDs, effectively limiting browsing. Executive Secretariat System Administrators and the Database Administrator will use audit logs to document suspicious or irregular log-ons and navigation ofthe system. Agency network log-on procedures mandate a posted Privacy notice be viewed and acknowledged prior to entry. Training ofsystem users will occur before initial system deployment, with refreshers on-demand. 9) Under which Privacy Act systems of records notice (SORN) does the system operate? Provide number and name. SBA 8 - Correspondence and Inquiries. 10)Ifthe system is being modified, will the Privacy Act SORN require amendment or revision? NIA F. DATA ACCESS 1) Who will have access to the data in the system? (e.g., contractors, users, managers, system administrators, developers, tribes, other) CRM-CM SBA employees designated as Managers or Liaisons in the Program Office, Executive Secretariat staff, and certified contractors under a non-disclosure agreement while actually engaged in system development, modification, or maintenance will have access. 2) How is access to the data by a user determined? Are criteria, procedures, controls, and responsibilities regarding access documented? Access islimited by control ofuser IDs, password controls, and the assignment ofa User Role profile to all User IDs or Workgroups. Each user role comes with a pre-determined set ofprivileges, limiting data that may be viewed to those screens and reports that are within the duties and needs ofthe user. A CRM- CM user manual will detail the various roles within the system and explain the access associated with each User Role profile. 8
9 3) Will users have access to all data on the system or will the user's access be restricted? Explain. Users have access only to screens, reports, and data corresponding to their assigned system Responsibility. Managers have control over assigned responsibilities, through the authorized system administrator. 4) What controls are in place to prevent the misuse (e.g., unauthorized browsing) of data by those having access? (please list processes and training materials) Access is limited by control ofuser IDs, password controls, and the assignment ofa User Role profile to all User IDs, effectively limiting browsing. Executive Secretariat System Administrators and the Database Administrator will use audit logs to document suspicious or irregular log-ons and navigation ofthe system. Agency network log-on procedures mandate a posted Privacy notice be viewed and acknowledged prior to entry. Training ofsystem users will occur before initial system deployment, with refreshers on-demand. 5) Are contractors involved with the design and development of the system and will they be involved with the maintenance of the system? Jfyes, were Privacy Act contract clauses inserted in their contracts and other regulatory measures addressed? Yes, contractors are involved in the design, development, and maintenance ofthe system. Each contractor involved with the system has/is required to complete an SBA 1228, Computer Access-Clearance Security Form certifying they understand and agree to protect Privacy Act and other sensitive data in accordance with the Privacy Act of 1974 and SBA regulations. 6) Do other systems share data or have access to the data in the system? Ifyes, explain. No, to date, there is no other data system interface. 7) Who will be responsible for protecting the privacy rights of the public and employees affected by the interface? All users ofthe system will be responsible for privacy and security ofdata. 8) Will other agencies share data or have access to the data in this system via transferred or transmitted (Federal, State, and Local, Other (e.g., Tribal»? No other system has access to the data in the system. Data is periodically shared with other Federal and State agencies following the proper procedures to redact PIT, as required. All information requests are cleared through the appropriate Agency Offices.. 9
10 9) How will the shared data be used by the other agency? 10) What procedures are in place for assuring proper use of the shared data? 11) Privacy Impact Analysis: Discuss what privacy risks were identified and how they were mitigated for information shared internal and external. Laws, rules, and government-wide regulations that dictate the use ofthe system data are established. Electronic data can be accessed and retrieved via secure interfaces, including VPN and secure leased lines. Recipients ofph are informed oftheir responsibilities for protecting the data and for deleting it after a defined period. 10
11 Privacy Impact Assessment PIA Approval Page The Following Officials Have Approved this Document: 1) ~~..Owner f1. ~. ~~ (Signature)./d;, /~, 1.0(0 (Date) Name: Title: Kim Bradley Director, Executive Secretariat 2) Project Manager (Signature) _~_.;... ~~_,--,-jt{~(.::;k~-1-l.o!d:...--(date) Name: Title: Mathilda Hunter Information Specialist 3). IT Secnrity Mana~ ~ I \ c.i)0 JX~ (Signature)_J~l_I_~-+I...:.]_O (Date) Name: Title: Dave McCauley Chief Information Security Officer 4) Chief Privacy Officer ~rjb-~ (Signature) 3_/ S'... /_I_D (Date) Name: Title: Robert Naylor ChiefInformation Officer/ChiefPrivacy Officer 11
Name of System/Application: Customer Relationship Management (CRM) Program Office: Office of the Chief Information Officer (CIO)
PRIVACY IMPACT ASSESSMENT Name of System/Application: Customer Relationship Management (CRM) Program Office: Office of the Chief Information Officer (CIO) Once the Privacy Impact Assessment is completed
PRIVACY IMPACT ASSESSMENT TEMPLATE
PRIVACY IMPACT ASSESSMENT TEMPLATE Name of System/Application: TeamMate Automated Audit Documentation System Program Office: Office of Inspector General Once the Privacy Impact Assessment is completed
PRIVACY IMPACT ASSESSMENT
Name of System/Application: LAN/WAN PRIVACY IMPACT ASSESSMENT U. S. Small Business Administration LAN/WAN FY 2011 Program Office: Office of the Chief Information Officer A. CONTACT INFORMATION 1) Who is
1. Describe the information (data elements and fields) available in the system in the following categories:
Legal Authority(ies ): 44 USC 2108 Purpose of this System/ Application: The system is a large index used to identify, maintain and track open OPF files stored at the Federal Records Center in Lee's Summit,
Name of Project: Auditing Management Information System (AMIS) Program Office: Office of Inspector General, Auditing Division
Name of Project: Auditing Management Information System (AMIS) Program Office: Office of Inspector General, Auditing Division A. CONTACT INFORMATION: 1. Who is the person completing this document? (Name,
Name of System/Application: Customer Service Center Telecommunication System (CSCTCS)
PRIVACY IMPACT ASSESSMENT (PIA) Name of System/Application: Customer Service Center Telecommunication System (CSCTCS) Program Office: Office of Disaster Assistance, Buffalo Customer Service Center Once
Department of the Interior Privacy Impact Assessment
Department of the Interior August 15, 2014 Name of Project: email Enterprise Records and Document Management System (eerdms) Bureau: Office of the Secretary Project s Unique ID: Not Applicable A. CONTACT
Department of the Interior Privacy Impact Assessment Template
Department of the Interior Privacy Impact Assessment Template Name of Project: Reclamation Electronic Document System (REDS) Bureau: Bureau of Reclamation Project s Unique ID: 010-10-01-07-1011-00-404-142
PRIVACY IMPACT ASSESSMENT
PRIVACY IMPACT ASSESSMENT Once the Privacy Impact Assessment is completed and the signature approval page is signed, please submit an electronic copy and hard copy with original signatures of the PIA to
Bank Secrecy Act E-Filing. Privacy Impact Assessment (PIA) Bank Secrecy Act E-Filing. Version 1.5
Bank Secrecy Act E-Filing Privacy Impact Assessment (PIA) Bank Secrecy Act E-Filing Version 1.5 August13, 2014 E-Filing Privacy Impact Assessment Revision Number Change Effective Date Revision History
Department of the Interior Privacy Impact Assessment Template
Department of the Interior Template May 28, 2014 Name of Project: Consolidated Financial System (CFS) Bureau: Office of the Secretary Project s Unique ID: 010-000000308 A. CONTACT INFORMATION: Teri Barnett
The Bureau of the Fiscal Service. Privacy Impact Assessment
The Bureau of the Fiscal Service Privacy Impact Assessment The mission of the Bureau of the Fiscal Service (Fiscal Service) is to promote the financial integrity and operational efficiency of the federal
Department of the Interior Privacy Impact Assessment
Department of the Interior Privacy Impact Assessment March 25, 2013 Name of Project: Laserfiche Document Management System (LDMS) Major Application (MA) Bureau: Office of the Secretary (OS) Project s Unique
Department of the Interior Privacy Impact Assessment
Department of the Interior Privacy Impact Assessment Name of Project: Performance Management Database System (PMDS) Bureau: National Park Service Project s Unique ID: DOI_NPS_167 A. CONTACT INFORMATION:
Office of Financial Research Constituent Relationship Management Tool Privacy Impact Assessment ( PIA ) April, 2015
Office of Financial Research Constituent Relationship Management Tool Privacy Impact Assessment ( PIA ) April, 2015 A. Identification System Name: OMB Unique Identifier: System Owner: Constituent Relationship
Department of the Interior Privacy Impact Assessment
Department of the Interior September 8, 2014 Name of Project: Enterprise Data-at Rest (DAR) Encryption Bureau: Office of the Secretary Project s Unique ID: 010-000000666 Once the PIA is completed and the
Small Business Administration Privacy Impact Assessment
Small Business Administration Privacy Impact Assessment Name of Project: Personal Identity Verification (PIV)/ Homeland Security Presidential Directive 12 (HSPD-12) (Note: This PIA is intended to cover
Treasury Retail Securities Software Application (TRSSA) / Treasury Services Contact Center (TSCC) Privacy Impact Assessment (PIA)
Treasury Retail Securities Software Application (TRSSA) / Treasury Services Contact Center (TSCC) Privacy Impact Assessment (PIA) August 30, 2012 System Information Name of System, Project or Program:
The Bureau ofthe Fiscal Service. Debt Information Management System. Privacy Impact Assessment
The Bureau ofthe Fiscal Service Debt Information Management System Privacy Impact Assessment The mission of the Bureau ofthe Fiscal Service (Fiscal Service) is to promote the financial integrity and operational
Financial Management Service. Privacy Impact Assessment
Financial Management Service Privacy Impact Assessment The Financial Management Service (FMS) Mission is to provide central payment services to Federal Program Agencies, operate the federal government's
Department of State Privacy Impact Assessment Electronic Medical Record System Updated July 2008
Department of State Privacy Impact Assessment Electronic Medical Record System Updated July 2008 A. CONTACT INFORMATION: Who is the Agency Privacy Coordinator who is conducting this assessment? (Name,
Customer Tracking and Fulfillment
Privacy impact assessment p I a, double black lines. This is a heading that repeat on all following pages Department of the Treasury BUREAU OF ENGRAVING AND PRINTING Customer Tracking and Fulfillment 25
The Bureau of the Fiscal Service. Privacy Impact Assessment
The Bureau of the Fiscal Service Privacy Impact Assessment The mission of the Bureau of the Fiscal Service (Fiscal Service) is to promote the financial integrity and operational efficiency of the federal
Privacy Impact Assessment Federal Reserve Electronic Tax Application
U.S. Department of the Treasury Financial Management Service Privacy Impact Assessment Federal Reserve Electronic Tax Application Major Application Version 2.0 FRETA-PIA Clean.DOC Financial Management
Privacy Impact Assessment
Technology, Planning, Architecture, & E-Government Version: 1.1 Date: April 14, 2011 Prepared for: USDA OCIO TPA&E Privacy Impact Assessment for the April 14, 2011 Contact Point Charles McClam Deputy Chief
DEPARTMENT OF STATE FISCAL YEAR 2008 PRIVACY IMPACT ASSESSMENT
DEPARTMENT OF STATE FISCAL YEAR 2008 PRIVACY IMPACT ASSESSMENT Security Management System-enterprise (SMSe) Conducted by: Bureau of Administration Information sharing and Services Office of Information
National Park Service Point of Sale System (POSS)
National Park Service Point of Sale System (POSS) Privacy Impact Assessment 21 June 2013 NPS Point of Sale System (POSS) Privacy Impact Assessment National Park Service Recreation Fee Program 1201 I Street,
U.S. Securities and Exchange Commission. Integrated Workplace Management System (IWMS) PRIVACY IMPACT ASSESSMENT (PIA)
U.S. Securities and Exchange Commission (IWMS) PRIVACY IMPACT ASSESSMENT (PIA) March 21, 2013 General Information 1. Name of Project or System. (IWMS) 2. Describe the project and its purpose or function
Department of the Interior Privacy Impact Assessment
Department of the Interior September 3, 2013 Name of Project: BisonConnect Google Apps for Government Bureau: Office of the Secretary Project s Unique ID: 010-000000330 Once the PIA is completed and the
Priyacy Impact Assessment. Legal Authority(ies): 44 USC Chapters 21, 29,31 and 33
Priyacy Impact Assessment Name of Project: Project's Unique ID: Access to Archiyal Databases AAD Legal Authority(ies): 44 USC Chapters 21, 29,31 and 33 Purpose of this System/Application: The Access to
U.S. Securities and Exchange Commission. Mailroom Package Tracking System (MPTS) PRIVACY IMPACT ASSESSMENT (PIA)
U.S. Securities and Exchange Commission (MPTS) PRIVACY IMPACT ASSESSMENT (PIA) February 24, 2013 General Information 1. Name of Project or System. (MPTS) 2. Describe the project and its purpose or function
FHFA. Privacy Impact Assessment Template FM: SYSTEMS (SYSTEM NAME)
FHFA Privacy Impact Assessment Template FM: SYSTEMS (SYSTEM NAME) This template is used when the Chief Privacy Officer determines that the system contains Personally Identifiable Information and a more
Corporate Property Automated Information System CPAIS. Privacy Impact Assessment
Corporate Property Automated Information System CPAIS Privacy Impact Assessment May 2003 CONTENTS Background...3 Access to the Data...5 Maintenance of Administrative Controls...9 1 Introduction The Office
Savings Bond Replacement System (SaBRe) Privacy Impact Assessment (PIA) May 31, 2012
Savings Bond Replacement System (SaBRe) Privacy Impact Assessment (PIA) May 31, 2012 System Information Name of System, Project or Program: Savings Bond replacement System (SaBRe) OMB Unique Identifier:
Privacy Impact Assessment (PIA) Waiver Review System (WRS) Version 03.06.01.01. Last Updated: December 2, 2013
United States Department of State (PIA) Waiver Review System (WRS) Version 03.06.01.01 Last Updated: December 2, 2013 Bureau of Administration 1. Contact Information Department of State Privacy Coordinator
Personal Information Collection and the Privacy Impact Assessment (PIA)
SEPTEMBER 27, 2012 Privacy Impact Assessment NATIONWIDE MORTGAGE LICENSING SYSTEM AND REGISTRY Contact Point: Claire Stapleton Chief Privacy Officer 1700 G Street, NW Washington, DC 20552 202-435-7220
Web Time and Attendance
Privacy Impact Assessment for the Web Time and Attendance October 31, 2006 Contact Point Mr. Mark Danter Bureau of Alcohol, Tobacco, Firearms and Explosives Office of Management/ Financial Management Division
Stakeholder Engagement Initiative: Customer Relationship Management
for the Stakeholder Engagement Initiative: December 10, 2009 Contact Point Christine Campigotto Private Sector Office Policy 202-612-1623 Reviewing Official Mary Ellen Callahan Chief Privacy Officer Department
Privacy Impact Assessment for TRUFONE Inmate Telephone System
Federal Bureau of Prisons Privacy Impact Assessment for TRUFONE Inmate Telephone System Issued by: Sonya D. Thompson Reviewed by: Approved by: Vance E. Hitch, Chief Information Officer, Department of Justice
1. Contact Information. 2. System Information. Privacy Impact Assessment (PIA)
1. Contact Information Privacy Impact Assessment (PIA) Department of State Privacy Coordinator Margaret P. Grafeld Bureau of Administration Information Sharing Services Office of Information Programs and
PRIVACY IMPACT ASSESSMENT
PRIVACY IMPACT ASSESSMENT Name of System/Application: Business Development Management Information System (BDMIS) Program Office: Government Contracting & Business Development Once the Privacy Impact Assessment
U.S. Nuclear Regulatory Commission
ADAMS ML14268A299 U.S. Nuclear Regulatory Commission Privacy Impact Assessment Designed to collect the information necessary to make relevant determinations regarding the applicability of the Privacy Act,
Privacy Impact Assessment (PIA) for the. Certification & Accreditation (C&A) Web (SBU)
Privacy Impact Assessment (PIA) for the Cyber Security Assessment and Management (CSAM) Certification & Accreditation (C&A) Web (SBU) Department of Justice Information Technology Security Staff (ITSS)
Integrated Financial Management Information System (IFMIS) Merger
for the Information System (IFMIS) Merger DHS/FEMA/PIA-020 December 16, 2011 Contact Point Michael Thaggard Office of Chief Financial Officer (202) 212-8192 Reviewing Official Mary Ellen Callahan Chief
Federal Bureau of Prisons. Privacy Impact Assessment for the HR Automation System. Issued by: Sonya D. Thompson Deputy Assistant Director/CIO
Federal Bureau of Prisons Privacy Impact Assessment for the HR Automation System Issued by: Sonya D. Thompson Deputy Assistant Director/CIO Reviewed by: Approved by: Eric Olson, Acting Chief Information
9/11 Heroes Stamp Act of 2001 File System
for the 9/11 Heroes Stamp Act of 2001 File System Contact Point Elizabeth Edge US Fire Administration Federal Emergency Management Agency (202) 646-3675 Reviewing Official Nuala O Connor Kelly Chief Privacy
U.S. Nuclear Regulatory Commission
ADAMS ML081410105 U.S. Nuclear Regulatory Commission Privacy Impact Assessment (Designed to collect the information necessary to make relevant determinations regarding the applicability of the Privacy
Privacy Impact Assessment. For Person Authentication Service (PAS) Date: January 9, 2015
For Person Authentication Service (PAS) Date: January 9, 2015 Point of Contact and Author: Hanan Abu Lebdeh [email protected] System Owner: Ganesh Reddy [email protected] Office of Federal Student
Crew Member Self Defense Training (CMSDT) Program
for the Crew Member Self Defense Training (CMSDT) Program February 6, 2008 Contact Point Michael Rigney Federal Air Marshal Service Flight Programs Division [email protected] Reviewing Officials Peter
PRIVACY IMPACT ASSESSMENT (PIA) GUIDE
U.S. Securities and Exchange Commission Office of Information Technology Alexandria, VA PRIVACY IMPACT ASSESSMENT (PIA) GUIDE Revised January 2007 Privacy Office Office of Information Technology PRIVACY
Federal Trade Commission Privacy Impact Assessment
Federal Trade Commission Privacy Impact Assessment for the: W120023 ONLINE FAX SERVICE December 2012 1 System Overview The Federal Trade Commission (FTC, Commission or the agency) is an independent federal
CASE MATTER MANAGEMENT TRACKING SYSTEM
for the CASE MATTER MANAGEMENT TRACKING SYSTEM September 25, 2009 Contact Point Mr. Donald A. Pedersen Commandant (CG-0948) (202) 372-3818 Reviewing Official Mary Ellen Callahan Chief Privacy Officer Department
Privacy Impact Assessment
AUGUST 16, 2013 Privacy Impact Assessment CIVIL PENALTY FUND AND BUREAU-ADMINISTERED REDRESS PROGRAM Contact Point: Claire Stapleton Chief Privacy Officer 1700 G Street, NW Washington, DC 20552 202-435-7220
United States Citizenship and Immigration Services (USCIS) Enterprise Service Bus (ESB)
for the United States Citizenship and Immigration Services (USCIS) June 22, 2007 Contact Point Harry Hopkins Office of Information Technology (OIT) (202) 272-8953 Reviewing Official Hugo Teufel III Chief
United States Department of State Global Financial Management System (GFMS) Privacy Impact Assessment
United States Department of State Global Financial Management System (GFMS) Privacy Impact Assessment CGFS/DCFO/GFMS 1. Contact Information Privacy Impact Assessment (PIA) Department of State Privacy Coordinator
Canine Website System (CWS System) DHS/TSA/PIA-036 January 13, 2012
for the (CWS System) DHS/TSA/PIA-036 January 13, 2012 Contact Point Carolyn Y. Dorgham Program Manager, National Explosives Detection Canine Team Program [email protected] Reviewing Official Mary
Privacy Impact Assessment. For Rehabilitation Services Administration Management Information System (RSA-MIS) Date: November 19, 2014
For Rehabilitation Services Administration Management Information System (RSA-MIS) Date: November 19, 2014 Point of Contact and Author: Ken Schellenberg [email protected] System Owner: Ed Anthony
InCompass, Privacy Impact Assessment (PIA) 8/3/2011
DEPARTMENT OF TREASURY Washington, D.C. 20220 InCompass, Privacy Impact Assessment (PIA) 8/3/2011 A. Identification System Name: InCompass Former System Name: Integrated Talent Management (ITM) OMB Unique
Privacy Impact Assessment
MAY 24, 2012 Privacy Impact Assessment matters management system Contact Point: Claire Stapleton Chief Privacy Officer 1700 G Street, NW Washington, DC 20552 202-435-7220 [email protected] DOCUMENT
Verizon Notification Service (VNS)
ADAMS ML12067A167 U.S. Nuclear Regulatory Commission Revised Privacy Impact Assessment Designed to collect the information necessary to make relevant determinations regarding the applicability of the Privacy
Homeland Security Virtual Assistance Center
for the Homeland Security Virtual Assistance Center November 3, 2008 Contact Point Donald M. Lumpkins National Preparedness Directorate (FEMA) (202) 786-9754 Reviewing Official Hugo Teufel III Chief Privacy
Privacy Impact Assessment. For. Non-GFE for Remote Access. Date: May 26, 2015. Point of Contact and Author: Michael Gray michael.gray@ed.
For Non-GFE for Remote Access Date: May 26, 2015 Point of Contact and Author: Michael Gray [email protected] System Owner: Allen Hill [email protected] Office of the Chief Information Officer (OCIO)
REMEDY Enterprise Services Management System
for the Enterprise Services Management System April 28, 2016 Contact Point Marshall Nolan Border Enforcement and Management Systems Division Office of Information Technology U.S. Customs & Border Protection
Student Administration and Scheduling System
for the Student Administration and Scheduling System DHS/FLETC/PIA-002 February 12, 2013 Contact Point William H. Dooley Chief, Office of IT Budget, Policy, & Plans (912) 261-4524 Reviewing Official Jonathan
Advanced Call Center Network Platform
for the Platform DHS/FEMA/PIA-021 March 23, 2012 Contact Point Chris Portesi Contact Center Telecommunications Section (CCTS) Texas National Processing Service Center (940) 891-8772 Reviewing Official
Federal Trade Commission Privacy Impact Assessment
Federal Trade Commission Privacy Impact Assessment for the: StenTrack Database System September, 2011 1 System Overview The Federal Trade Commission (FTC) protects America s consumers. As part of its work
Authentication and Provisioning Services (APS)
for the (APS) DHS/FEMA/PIA-031 August 6, 2013 Contact Point Tina Wallace-Fincher Information Technology Security Branch FEMA Information Technology (202) 646-4605 Reviewing Official Jonathan R. Cantor
